WorldWideScience

Sample records for high-capacity steganography scheme

  1. CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Cemal Kocak

    2017-03-01

    Full Text Available Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the encrypted information is processed, during the embedding stage, using a 16 digit pin (I-PIN which is determined again by the user. The carrier images utilized in the study have been determined as 24 bit/pixel colour. Utilization of images in .jpeg, .tiff, .pnp format has also been provided. The performance of the CLSM method has been evaluated according to the objective quality measurement criteria of PSNR-dB (Peak Signal-to-Noise Ratio and SSIM (Structural Similarity Index. In the study, 12 different sized information between 1000 and 609,129 bits were embedded into images. Between 34.14 and 65.8 dB PSNR values and between 0.989 and 0.999 SSIM values were obtained. CLSM showed better results compared to Pixel Value Differencing (PVD method, Simulated Annealing (SA Algorithm and Mix column transform based on irreducible polynomial mathematics methods.

  2. A high capacity text steganography scheme based on LZW compression and color coding

    Directory of Open Access Journals (Sweden)

    Aruna Malik

    2017-02-01

    Full Text Available In this paper, capacity and security issues of text steganography have been considered by employing LZW compression technique and color coding based approach. The proposed technique uses the forward mail platform to hide the secret data. This algorithm first compresses secret data and then hides the compressed secret data into the email addresses and also in the cover message of the email. The secret data bits are embedded in the message (or cover text by making it colored using a color coding table. Experimental results show that the proposed method not only produces a high embedding capacity but also reduces computational complexity. Moreover, the security of the proposed method is significantly improved by employing stego keys. The superiority of the proposed method has been experimentally verified by comparing with recently developed existing techniques.

  3. A novel quantum steganography scheme for color images

    Science.gov (United States)

    Li, Panchi; Liu, Xiande

    In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.

  4. Quantum watermarking scheme through Arnold scrambling and LSB steganography

    Science.gov (United States)

    Zhou, Ri-Gui; Hu, Wenwen; Fan, Ping

    2017-09-01

    Based on the NEQR of quantum images, a new quantum gray-scale image watermarking scheme is proposed through Arnold scrambling and least significant bit (LSB) steganography. The sizes of the carrier image and the watermark image are assumed to be 2n× 2n and n× n, respectively. Firstly, a classical n× n sized watermark image with 8-bit gray scale is expanded to a 2n× 2n sized image with 2-bit gray scale. Secondly, through the module of PA-MOD N, the expanded watermark image is scrambled to a meaningless image by the Arnold transform. Then, the expanded scrambled image is embedded into the carrier image by the steganography method of LSB. Finally, the time complexity analysis is given. The simulation experiment results show that our quantum circuit has lower time complexity, and the proposed watermarking scheme is superior to others.

  5. A Novel Quantum Image Steganography Scheme Based on LSB

    Science.gov (United States)

    Zhou, Ri-Gui; Luo, Jia; Liu, XingAo; Zhu, Changming; Wei, Lai; Zhang, Xiafen

    2018-06-01

    Based on the NEQR representation of quantum images and least significant bit (LSB) scheme, a novel quantum image steganography scheme is proposed. The sizes of the cover image and the original information image are assumed to be 4 n × 4 n and n × n, respectively. Firstly, the bit-plane scrambling method is used to scramble the original information image. Then the scrambled information image is expanded to the same size of the cover image by using the key only known to the operator. The expanded image is scrambled to be a meaningless image with the Arnold scrambling. The embedding procedure and extracting procedure are carried out by K 1 and K 2 which are under control of the operator. For validation of the presented scheme, the peak-signal-to-noise ratio (PSNR), the capacity, the security of the images and the circuit complexity are analyzed.

  6. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  7. Spread spectrum image steganography.

    Science.gov (United States)

    Marvel, L M; Boncelet, C R; Retter, C T

    1999-01-01

    In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

  8. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution

    Directory of Open Access Journals (Sweden)

    H. Yang

    2009-12-01

    Full Text Available Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs substitution is proposed in this paper. The scheme exploits the brightness, edges, and texture masking of the host image to estimate the number k of LSBs for data hiding. Pixels in the noise non-sensitive regions are embedded by a k-bit LSB substitution with a lager value of k than that of the pixels in noise sensitive regions. Moreover, an optimal pixel adjustment process is used to enhance stego-image visual quality obtained by simple LSB substitution method. To ensure that the adaptive number k of LSBs remains unchanged after pixel modification, the LSBs number is computed by the high-order bits rather than all the bits of the image pixel value. The theoretical analyses and experiment results show that the proposed method achieves higher embedding capacity and better stegoimage quality compared with some existing LSB methods.

  9. PIXEL PATTERN BASED STEGANOGRAPHY ON IMAGES

    Directory of Open Access Journals (Sweden)

    R. Rejani

    2015-02-01

    Full Text Available One of the drawback of most of the existing steganography methods is that it alters the bits used for storing color information. Some of the examples include LSB or MSB based steganography. There are also various existing methods like Dynamic RGB Intensity Based Steganography Scheme, Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm etc that can be used to find out the steganography method used and break it. Another drawback of the existing methods is that it adds noise to the image which makes the image look dull or grainy making it suspicious for a person about existence of a hidden message within the image. To overcome these shortcomings we have come up with a pixel pattern based steganography which involved hiding the message within in image by using the existing RGB values whenever possible at pixel level or with minimum changes. Along with the image a key will also be used to decrypt the message stored at pixel levels. For further protection, both the message stored as well as the key file will be in encrypted format which can have same or different keys or decryption. Hence we call it as a RGB pixel pattern based steganography.

  10. Wireless steganography

    Science.gov (United States)

    Agaian, Sos S.; Akopian, David; D'Souza, Sunil

    2006-02-01

    Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on Symbian TM/Series60 TM architecture. Finally, two data hiding applications developed for Symbian TM/Series60 TM mobile phones are presented.

  11. Steganography: LSB Methodology

    Science.gov (United States)

    2012-08-02

    of LSB steganography in grayscale and color images . In J. Dittmann, K. Nahrstedt, and P. Wohlmacher, editors, Proceedings of the ACM, Special...Fridrich, M. Gojan and R. Du paper titled “Reliable detection of LSB steganography in grayscale and color images ”. From a general perspective Figure 2...REPORT Steganography : LSB Methodology (Progress Report) 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: In computer science, steganography is the science

  12. Adaptive steganography

    Science.gov (United States)

    Chandramouli, Rajarathnam; Li, Grace; Memon, Nasir D.

    2002-04-01

    Steganalysis techniques attempt to differentiate between stego-objects and cover-objects. In recent work we developed an explicit analytic upper bound for the steganographic capacity of LSB based steganographic techniques for a given false probability of detection. In this paper we look at adaptive steganographic techniques. Adaptive steganographic techniques take explicit steps to escape detection. We explore different techniques that can be used to adapt message embedding to the image content or to a known steganalysis technique. We investigate the advantages of adaptive steganography within an analytical framework. We also give experimental results with a state-of-the-art steganalysis technique demonstrating that adaptive embedding results in a significant number of bits embedded without detection.

  13. Towards Statistically Undetectable Steganography

    Science.gov (United States)

    2011-06-30

    payload size. Middle, payload proportional to y/N. Right, proportional to N. LSB replacement steganography in never-compressed cover images , detected... Images for Applications in Steganography ," IEEE Trans, on Info. Forensics and Security, vol. 3(2), pp. 247-258, 2008. Conference papers. (1) T. Filler...SPLE, Electronic Imaging , Security, Forensics, Steganography , and Watermarking of Mul- timedia Contents X, San Jose, CA, January 26-31, pp. 11-1-11-13

  14. Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

    Science.gov (United States)

    Yu, Lifang; Zhao, Yao; Ni, Rongrong; Li, Ting

    2010-12-01

    We propose a novel steganographic method in JPEG images with high performance. Firstly, we propose improved adaptive LSB steganography, which can achieve high capacity while preserving the first-order statistics. Secondly, in order to minimize visual degradation of the stego image, we shuffle bits-order of the message based on chaos whose parameters are selected by the genetic algorithm. Shuffling message's bits-order provides us with a new way to improve the performance of steganography. Experimental results show that our method outperforms classical steganographic methods in image quality, while preserving characteristics of histogram and providing high capacity.

  15. Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Yu Lifang

    2010-01-01

    Full Text Available We propose a novel steganographic method in JPEG images with high performance. Firstly, we propose improved adaptive LSB steganography, which can achieve high capacity while preserving the first-order statistics. Secondly, in order to minimize visual degradation of the stego image, we shuffle bits-order of the message based on chaos whose parameters are selected by the genetic algorithm. Shuffling message's bits-order provides us with a new way to improve the performance of steganography. Experimental results show that our method outperforms classical steganographic methods in image quality, while preserving characteristics of histogram and providing high capacity.

  16. Investigator's guide to steganography

    CERN Document Server

    Kipper, Gregory

    2003-01-01

    The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future

  17. Steganography Detection Using Entropy Measures

    Science.gov (United States)

    2012-11-16

    latter leads to the level of compression of the image . 3.3. Least Significant Bit ( LSB ) The object of steganography is to prevent suspicion upon the...6 2.3. Different kinds of steganography . . . . . . . . . . . . . . . . . . . . . 6 II. Steganography 8 3. Images and Significance of...9 3.3. Least Significant Bit ( LSB ) . . . . . . . . . . . . . . . . . . . . . . . . 9 3.4. Significant Bit Image Depiction

  18. Quantum steganography using prior entanglement

    International Nuclear Information System (INIS)

    Mihara, Takashi

    2015-01-01

    Steganography is the hiding of secret information within innocent-looking information (e.g., text, audio, image, video, etc.). A quantum version of steganography is a method based on quantum physics. In this paper, we propose quantum steganography by combining quantum error-correcting codes with prior entanglement. In many steganographic techniques, embedding secret messages in error-correcting codes may cause damage to them if the embedded part is corrupted. However, our proposed steganography can separately create secret messages and the content of cover messages. The intrinsic form of the cover message does not have to be modified for embedding secret messages. - Highlights: • Our steganography combines quantum error-correcting codes with prior entanglement. • Our steganography can separately create secret messages and the content of cover messages. • Errors in cover messages do not have affect the recovery of secret messages. • We embed a secret message in the Steane code as an example of our steganography

  19. Quantum steganography using prior entanglement

    Energy Technology Data Exchange (ETDEWEB)

    Mihara, Takashi, E-mail: mihara@toyo.jp

    2015-06-05

    Steganography is the hiding of secret information within innocent-looking information (e.g., text, audio, image, video, etc.). A quantum version of steganography is a method based on quantum physics. In this paper, we propose quantum steganography by combining quantum error-correcting codes with prior entanglement. In many steganographic techniques, embedding secret messages in error-correcting codes may cause damage to them if the embedded part is corrupted. However, our proposed steganography can separately create secret messages and the content of cover messages. The intrinsic form of the cover message does not have to be modified for embedding secret messages. - Highlights: • Our steganography combines quantum error-correcting codes with prior entanglement. • Our steganography can separately create secret messages and the content of cover messages. • Errors in cover messages do not have affect the recovery of secret messages. • We embed a secret message in the Steane code as an example of our steganography.

  20. Quantum red-green-blue image steganography

    Science.gov (United States)

    Heidari, Shahrokh; Pourarian, Mohammad Rasoul; Gheibi, Reza; Naseri, Mosayeb; Houshmand, Monireh

    One of the most considering matters in the field of quantum information processing is quantum data hiding including quantum steganography and quantum watermarking. This field is an efficient tool for protecting any kind of digital data. In this paper, three quantum color images steganography algorithms are investigated based on Least Significant Bit (LSB). The first algorithm employs only one of the image’s channels to cover secret data. The second procedure is based on LSB XORing technique, and the last algorithm utilizes two channels to cover the color image for hiding secret quantum data. The performances of the proposed schemes are analyzed by using software simulations in MATLAB environment. The analysis of PSNR, BER and Histogram graphs indicate that the presented schemes exhibit acceptable performances and also theoretical analysis demonstrates that the networks complexity of the approaches scales squarely.

  1. Online Voting System Based on Image Steganography and Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Biju Issac

    2017-01-01

    Full Text Available This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE on a web-based interface, with MySQL database server and Glassfish application server as the backend. After considering the requirements of an online voting system, current technologies on electronic voting schemes in published literature were examined. Next, the cryptographic and steganography techniques best suited for the requirements of the voting system were chosen, and the software was implemented. We have incorporated in our system techniques like the password hashed based scheme, visual cryptography, F5 image steganography and threshold decryption cryptosystem. The analysis, design and implementation phase of the software development of the voting system is discussed in detail. We have also used a questionnaire survey and did the user acceptance testing of the system.

  2. Progressive Exponential Clustering-Based Steganography

    Directory of Open Access Journals (Sweden)

    Li Yue

    2010-01-01

    Full Text Available Cluster indexing-based steganography is an important branch of data-hiding techniques. Such schemes normally achieve good balance between high embedding capacity and low embedding distortion. However, most cluster indexing-based steganographic schemes utilise less efficient clustering algorithms for embedding data, which causes redundancy and leaves room for increasing the embedding capacity further. In this paper, a new clustering algorithm, called progressive exponential clustering (PEC, is applied to increase the embedding capacity by avoiding redundancy. Meanwhile, a cluster expansion algorithm is also developed in order to further increase the capacity without sacrificing imperceptibility.

  3. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  4. Steganography and Steganalysis in Digital Images

    Science.gov (United States)

    2012-01-01

    REPORT Steganography and Steganalysis in Digital Images 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Steganography (from the Greek for "covered writing...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Least Significant Bit ( LSB ), steganography , steganalysis, stegogramme. Dr. Jeff Duffany...Z39.18 - Steganography and Steganalysis in Digital Images Report Title ABSTRACT Steganography (from the Greek for "covered writing") is the secret

  5. Noiseless Steganography The Key to Covert Communications

    CERN Document Server

    Desoky, Abdelrahman

    2012-01-01

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise b

  6. Quantum Steganography via Greenberger-Horne-Zeilinger GHZ4 State

    International Nuclear Information System (INIS)

    El Allati, A.; Hassouni, Y.; Medeni, M.B. Ould

    2012-01-01

    A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information. Moreover, the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information. Then, the scheme consists of sharing the correlation of four particle GHZ 4 states between the legitimate users. After insuring the security of the quantum channel, they begin to hide the secret information in the cover of message. Comparing the scheme with the previous quantum steganographies, capacity and imperceptibility of hidden message are good. The security of the present scheme against many attacks is also discussed. (general)

  7. COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS

    Directory of Open Access Journals (Sweden)

    S. A. Seyyedi

    2013-01-01

    Full Text Available Steganography is a method of hiding information in other information of different format (container. There are many steganography techniques with various types of container. In the Internet, digital images are the most popular and frequently used containers. We consider main image steganography techniques and their advantages and disadvantages. We also identify the requirements of a good steganography algorithm and compare various such algorithms.

  8. Digital watermarking and steganography fundamentals and techniques

    CERN Document Server

    Shih, Frank Y

    2007-01-01

    Introduction Digital Watermarking Digital Steganography Differences between Watermarking and Steganography A Brief History Appendix: Selected List of Books on Watermarking and Steganography Classification in Digital Watermarking Classification Based on Characteristics Classification Based on Applications Mathematical Preliminaries  Least-Significant-Bit Substitution Discrete Fourier Transform (DFT) Discrete Cosine Transform Discrete Wavelet Transform Random Sequence Generation  The Chaotic M

  9. A Survey on different techniques of steganography

    Directory of Open Access Journals (Sweden)

    Kaur Harpreet

    2016-01-01

    Full Text Available Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is the technology that attempts to ruin the Steganography by detecting the hidden information and extracting.Steganography is the process of Data embedding in the images, text/documented, audio and video files. The paper also highlights the security improved by applying various techniques of video steganography.

  10. CSTI High Capacity Power

    International Nuclear Information System (INIS)

    Winter, J.M.

    1989-01-01

    The SP-100 program was established in 1983 by DOD, DOE, and NASA as a joint program to develop the technology necessary for space nuclear power systems for military and civil application. During FY-86 and 87, the NASA SP-100 Advanced Technology Program was devised to maintain the momentum of promising technology advancement efforts started during Phase 1 of SP-100 and to strengthen, in key areas, the chances for successful development and growth capability of space nuclear reactor power systems for future space applications. In FY-88, the Advanced Technology Program was incorporated into NASA's new Civil Space Technology Initiative (CSTI). The CSTI Program was established to provide the foundation for technology development in automation and robotics, information, propulsion, and power. The CSTI High Capacity Power Program builds on the technology efforts of the SP-100 program, incorporates the previous NASA SP-100 Advanced Technology project, and provides a bridge to NASA Project Pathfinder. The elements of CSTI High Capacity Power development include Conversion Systems, Thermal Management, Power Management, System Diagnostics, and Environmental Interactions. Technology advancement in all areas, including materials, is required to assure the high reliability and 7 to 10 year lifetime demanded for future space nuclear power systems. The overall program will develop and demonstrate the technology base required to provide a wide range of modular power systems as well as allowing mission independence from solar and orbital attitude requirements. Several recent advancements in CSTI High Capacity power development will be discussed

  11. Steganography based on pixel intensity value decomposition

    Science.gov (United States)

    Abdulla, Alan Anwar; Sellahewa, Harin; Jassim, Sabah A.

    2014-05-01

    This paper focuses on steganography based on pixel intensity value decomposition. A number of existing schemes such as binary, Fibonacci, Prime, Natural, Lucas, and Catalan-Fibonacci (CF) are evaluated in terms of payload capacity and stego quality. A new technique based on a specific representation is proposed to decompose pixel intensity values into 16 (virtual) bit-planes suitable for embedding purposes. The proposed decomposition has a desirable property whereby the sum of all bit-planes does not exceed the maximum pixel intensity value, i.e. 255. Experimental results demonstrate that the proposed technique offers an effective compromise between payload capacity and stego quality of existing embedding techniques based on pixel intensity value decomposition. Its capacity is equal to that of binary and Lucas, while it offers a higher capacity than Fibonacci, Prime, Natural, and CF when the secret bits are embedded in 1st Least Significant Bit (LSB). When the secret bits are embedded in higher bit-planes, i.e., 2nd LSB to 8th Most Significant Bit (MSB), the proposed scheme has more capacity than Natural numbers based embedding. However, from the 6th bit-plane onwards, the proposed scheme offers better stego quality. In general, the proposed decomposition scheme has less effect in terms of quality on pixel value when compared to most existing pixel intensity value decomposition techniques when embedding messages in higher bit-planes.

  12. Combination Base64 Algorithm and EOF Technique for Steganography

    Science.gov (United States)

    Rahim, Robbi; Nurdiyanto, Heri; Hidayat, Rahmat; Saleh Ahmar, Ansari; Siregar, Dodi; Putera Utama Siahaan, Andysah; Faisal, Ilham; Rahman, Sayuti; Suita, Diana; Zamsuri, Ahmad; Abdullah, Dahlan; Napitupulu, Darmawan; Ikhsan Setiawan, Muhammad; Sriadhi, S.

    2018-04-01

    The steganography process combines mathematics and computer science. Steganography consists of a set of methods and techniques to embed the data into another media so that the contents are unreadable to anyone who does not have the authority to read these data. The main objective of the use of base64 method is to convert any file in order to achieve privacy. This paper discusses a steganography and encoding method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, the EoF technique is used to embed encoding text performed by Base64. As an example, for the mechanisms a file is used to represent the texts, and by using the two methods together will increase the security level for protecting the data, this research aims to secure many types of files in a particular media with a good security and not to damage the stored files and coverage media that used.

  13. High-capacity method for hiding data in the discrete cosine transform domain

    Science.gov (United States)

    Qazanfari, Kazem; Safabakhsh, Reza

    2013-10-01

    Steganography is the art and science of hiding data in different media such as texts, audios, images, and videos. Data hiding techniques are generally divided into two groups: spatial and frequency domain techniques. Spatial domain methods generally have low security and, as a result, are less attractive to researchers. Discrete cosine transform (DCT) is the most common transform domain used in steganography and JPEG compression. Since a large number of the DCT coefficients of JPEG images are zero, the capacity of DCT domain-based steganography methods is not very high. We present a high-capacity method for hiding messages in the DCT domain. We describe the method in two classes where the receiver has and where the receiver does not have the cover image. In each class, we consider three cases for each coefficient. By considering n coefficients, there are 3n different situations. The method embeds ⌊log2 3n⌋ bits in these n coefficients. We show that the maximum reachable capacity by our method is 58% higher than the other general steganography methods. Experimental results show that the histogram-based steganalysis methods cannot detect the stego images produced by the proposed method while the capacity is increased significantly.

  14. LSB-based Steganography Using Reflected Gray Code for Color Quantum Images

    Science.gov (United States)

    Li, Panchi; Lu, Aiping

    2018-02-01

    At present, the classical least-significant-bit (LSB) based image steganography has been extended to quantum image processing. For the existing LSB-based quantum image steganography schemes, the embedding capacity is no more than 3 bits per pixel. Therefore, it is meaningful to study how to improve the embedding capacity of quantum image steganography. This work presents a novel LSB-based steganography using reflected Gray code for colored quantum images, and the embedding capacity of this scheme is up to 4 bits per pixel. In proposed scheme, the secret qubit sequence is considered as a sequence of 4-bit segments. For the four bits in each segment, the first bit is embedded in the second LSB of B channel of the cover image, and and the remaining three bits are embedded in LSB of RGB channels of each color pixel simultaneously using reflected-Gray code to determine the embedded bit from secret information. Following the transforming rule, the LSB of stego-image are not always same as the secret bits and the differences are up to almost 50%. Experimental results confirm that the proposed scheme shows good performance and outperforms the previous ones currently found in the literature in terms of embedding capacity.

  15. Forensic analysis of video steganography tools

    Directory of Open Access Journals (Sweden)

    Thomas Sloan

    2015-05-01

    Full Text Available Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend ceasing any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful

  16. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  17. DIGITAL DATA PROTECTION USING STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    R. Rejani

    2016-03-01

    Full Text Available In today’s digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy. Throughout the last couple of decades, almost all-major or minor software has been pirated and freely circulated across the internet. The impact of the rampant software piracy has been huge and runs into billions of dollars every year. For an independent developer or a programmer, the impact of piracy will be huge. Huge companies that make specialized software often employ complex hardware methods such as usage of dongles to avoid software piracy. However, this is not possible to do for a normal independent programmer of a small company. As part of the research, a new method of software protection that does not need proprietary hardware and other complex methods are proposed in this paper. This method uses a combination of inbuilt hardware features as well as steganography and encryption to protect the software against piracy. The properties or methods used include uniqueness of hardware, steganography, strong encryption like AES and geographic location. To avoid hacking the proposed framework also makes use of self-checks in a random manner. The process is quite simple to implement for any developer and is usable on both traditional PCs as well as mobile environments.

  18. 1990s: High Capacity Backbones

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. 1990s: High Capacity Backbones. Backbone capacities increased from 2.5 Gb/s to 100s of Gb/s during the 1990's. Wavelength division multiplexing with 160 waves of 10 Gb/s was commercially available. Several high-capacity backbones built in the US and Europe.

  19. Multimedia security watermarking, steganography, and forensics

    CERN Document Server

    Shih, Frank Y

    2012-01-01

    Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different asp

  20. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  1. A New Paradigm Hidden in Steganography

    Science.gov (United States)

    2000-01-01

    the n least signi cant bits ( LSB ) of each pixel in the cov- erimage, with the n most signi cant bits (MSB) from the corresponding pixel of the image to...e.g., 2 LSB are (0,0) ) to 3 (e.g., 2 LSB are (1,1) ), it is visually impossible for Eve to detect the steganography . Of course, if Eve has knowl...cryptographic security when the steganography has failed. Simply encrypt the embedded bits so that the 2 LSB in the stegoimage appear as white noise

  2. Increasing Security for Cloud Computing By Steganography in Image Edges

    Directory of Open Access Journals (Sweden)

    Hassan Hadi Saleh

    2017-03-01

    Full Text Available The security of data storage in “cloud” is big challenge because the data keep within resources that may be accessed by particular machines. The managing of these data and services may not be high reliable. Therefore, the security of data is highly challenging. To increase the security of data in data center of cloud, we have introduced good method to ensure data security in “cloud computing” by methods of data hiding using color images which is called steganography. The fundamental objective of this paper is to prevent "Data Access” by unauthorized or opponent users. This scheme stores data at data centers within edges of color images and retrieves data from it when it is wanted.

  3. LSB-Based Steganography Using Reflected Gray Code

    Science.gov (United States)

    Chen, Chang-Chu; Chang, Chin-Chen

    Steganography aims to hide secret data into an innocuous cover-medium for transmission and to make the attacker cannot recognize the presence of secret data easily. Even the stego-medium is captured by the eavesdropper, the slight distortion is hard to be detected. The LSB-based data hiding is one of the steganographic methods, used to embed the secret data into the least significant bits of the pixel values in a cover image. In this paper, we propose an LSB-based scheme using reflected-Gray code, which can be applied to determine the embedded bit from secret information. Following the transforming rule, the LSBs of stego-image are not always equal to the secret bits and the experiment shows that the differences are up to almost 50%. According to the mathematical deduction and experimental results, the proposed scheme has the same image quality and payload as the simple LSB substitution scheme. In fact, our proposed data hiding scheme in the case of G1 (one bit Gray code) system is equivalent to the simple LSB substitution scheme.

  4. Detection of LSB+/-1 steganography based on co-occurrence matrix and bit plane clipping

    Science.gov (United States)

    Abolghasemi, Mojtaba; Aghaeinia, Hassan; Faez, Karim; Mehrabi, Mohammad Ali

    2010-01-01

    Spatial LSB+/-1 steganography changes smooth characteristics between adjoining pixels of the raw image. We present a novel steganalysis method for LSB+/-1 steganography based on feature vectors derived from the co-occurrence matrix in the spatial domain. We investigate how LSB+/-1 steganography affects the bit planes of an image and show that it changes more least significant bit (LSB) planes of it. The co-occurrence matrix is derived from an image in which some of its most significant bit planes are clipped. By this preprocessing, in addition to reducing the dimensions of the feature vector, the effects of embedding were also preserved. We compute the co-occurrence matrix in different directions and with different dependency and use the elements of the resulting co-occurrence matrix as features. This method is sensitive to the data embedding process. We use a Fisher linear discrimination (FLD) classifier and test our algorithm on different databases and embedding rates. We compare our scheme with the current LSB+/-1 steganalysis methods. It is shown that the proposed scheme outperforms the state-of-the-art methods in detecting the LSB+/-1 steganographic method for grayscale images.

  5. On LSB Spatial Domain Steganography and Channel Capacity

    Science.gov (United States)

    2008-03-21

    reveal the hidden information should not be taken as proof that the image is now clean. The survivability of LSB type spatial domain steganography ...the mindset that JPEG compressing an image is sufficient to destroy the steganography for spatial domain LSB type stego. We agree that JPEGing...modeling of 2 bit LSB steganography shows that theoretically there is non-zero stego payload possible even though the image has been JPEGed. We wish to

  6. Implementation of IMAGE STEGANOGRAPHY Based on Random LSB

    OpenAIRE

    Ashish kumari; Shyama Sharma; Navdeep Bohra

    2012-01-01

    Steganography is the technique of hiding a private message within a file in such a manner that third party cannot know the existence of matter or the hidden information. The purpose of Steganography is to create secrete communication between the sender and the receiver byreplacing the least significant bits (LSB)of the cover image with the data bits. And in this paper we have shown that how image steganography (random and sequential LSB) works and practical understanding of what image Stegano...

  7. An Analysis of Perturbed Quantization Steganography in the Spatial Domain

    Science.gov (United States)

    2005-03-01

    Transform Domain While LSB steganography hides data in the least significant areas of image pixels, this data is not robust against lossy digital...introduced a technique for detecting least significant bit ( LSB ) steganography in digital images called RS Steganalysis. RS Steganalysis produces a...the function has the effect of additive noise similar to that introduced by pixel based LSB steganography . In clean cover images , the flipping

  8. Researcher’s Perspective of Substitution Method on Text Steganography

    Science.gov (United States)

    Zamir Mansor, Fawwaz; Mustapha, Aida; Azah Samsudin, Noor

    2017-08-01

    The linguistic steganography studies are still in the stage of development and empowerment practices. This paper will present several text steganography on substitution methods based on the researcher’s perspective, all scholar paper will analyse and compared. The objective of this paper is to give basic information in the substitution method of text domain steganography that has been applied by previous researchers. The typical ways of this method also will be identified in this paper to reveal the most effective method in text domain steganography. Finally, the advantage of the characteristic and drawback on these techniques in generally also presented in this paper.

  9. Future High Capacity Backbone Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan

    are proposed. The work focuses on energy efficient routing algorithms in a dynamic optical core network environment, with Generalized MultiProtocol Label Switching (GMPLS) as the control plane. Energy ef- ficient routing algorithms for energy savings and CO2 savings are proposed, and their performance...... aiming for reducing the dynamic part of the energy consumption of the network may increase the fixed part of the energy consumption meanwhile. In the second half of the thesis, the conflict between energy efficiency and Quality of Service (QoS) is addressed by introducing a novel software defined......This thesis - Future High Capacity Backbone Networks - deals with the energy efficiency problems associated with the development of future optical networks. In the first half of the thesis, novel approaches for using multiple/single alternative energy sources for improving energy efficiency...

  10. A Novel Steganography Technique for SDTV-H.264/AVC Encoded Video

    Directory of Open Access Journals (Sweden)

    Christian Di Laura

    2016-01-01

    Full Text Available Today, eavesdropping is becoming a common issue in the rapidly growing digital network and has foreseen the need for secret communication channels embedded in digital media. In this paper, a novel steganography technique designed for Standard Definition Digital Television (SDTV H.264/AVC encoded video sequences is presented. The algorithm introduced here makes use of the compression properties of the Context Adaptive Variable Length Coding (CAVLC entropy encoder to achieve a low complexity and real-time inserting method. The chosen scheme hides the private message directly in the H.264/AVC bit stream by modifying the AC frequency quantized residual luminance coefficients of intrapredicted I-frames. In order to avoid error propagation in adjacent blocks, an interlaced embedding strategy is applied. Likewise, the steganography technique proposed allows self-detection of the hidden message at the target destination. The code source was implemented by mixing MATLAB 2010 b and Java development environments. Finally, experimental results have been assessed through objective and subjective quality measures and reveal that less visible artifacts are produced with the technique proposed by reaching PSNR values above 40.0 dB and an embedding bit rate average per secret communication channel of 425 bits/sec. This exemplifies that steganography is affordable in digital television.

  11. LSB Based Quantum Image Steganography Algorithm

    Science.gov (United States)

    Jiang, Nan; Zhao, Na; Wang, Luo

    2016-01-01

    Quantum steganography is the technique which hides a secret message into quantum covers such as quantum images. In this paper, two blind LSB steganography algorithms in the form of quantum circuits are proposed based on the novel enhanced quantum representation (NEQR) for quantum images. One algorithm is plain LSB which uses the message bits to substitute for the pixels' LSB directly. The other is block LSB which embeds a message bit into a number of pixels that belong to one image block. The extracting circuits can regain the secret message only according to the stego cover. Analysis and simulation-based experimental results demonstrate that the invisibility is good, and the balance between the capacity and the robustness can be adjusted according to the needs of applications.

  12. DWT Steganography with Usage of Scrambling

    Directory of Open Access Journals (Sweden)

    Jakub Oravec

    2016-07-01

    Full Text Available This article describes image steganography technique, which uses Discrete Wavelet Transform and Standard map for storage of secret data in form of binary image. Modifications, which are done on cover image depend on its scrambled and decomposed version. To avoid unnecessary amount of changes, proposed approach marks location of altered DWT coefficients. The paper ends with illustration of yielded results and presents some possible topics for future work.

  13. STEGANOGRAPHY USAGE TO CONTROL MULTIMEDIA STREAM

    Directory of Open Access Journals (Sweden)

    Grzegorz Koziel

    2014-03-01

    Full Text Available In the paper, a proposal of new application for steganography is presented. It is possible to use steganographic techniques to control multimedia stream playback. Special control markers can be included in the sound signal and the player can detect markers and modify the playback parameters according to the hidden instructions. This solution allows for remembering user preferences within the audio track as well as allowing for preparation of various versions of the same content at the production level.

  14. Multi-Class Classification for Identifying JPEG Steganography Embedding Methods

    Science.gov (United States)

    2008-09-01

    digital pictures on Web sites or sending them through email (Astrowsky, 2000). Steganography may also be used to allow communication between affiliates...B.H. (2000). STEGANOGRAPHY: Hidden Images, A New Challenge in the Fight Against Child Porn . UPDATE, Volume 13, Number 2, pp. 1-4, Retrieved June 3

  15. Steganography and Cryptography Inspired Enhancement of Introductory Programming Courses

    Science.gov (United States)

    Kortsarts, Yana; Kempner, Yulia

    2015-01-01

    Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…

  16. Survey of the Use of Steganography over the Internet

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela DINCA

    2011-01-01

    Full Text Available This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof. Niels Provos and Peter Honeyman conducted an extensive Internet search where they analyzed over 2 million images and didn’t find a single hidden image. After this study the scientific community was divided: some believed that Niels Provos and Peter Honeyman was conclusive enough other did not. This paper describes what Steganography is and what can be used for, various Steganography techniques and also presents the studies made regarding the use of Steganography on the Internet.

  17. Quantum color image watermarking based on Arnold transformation and LSB steganography

    Science.gov (United States)

    Zhou, Ri-Gui; Hu, Wenwen; Fan, Ping; Luo, Gaofeng

    In this paper, a quantum color image watermarking scheme is proposed through twice-scrambling of Arnold transformations and steganography of least significant bit (LSB). Both carrier image and watermark images are represented by the novel quantum representation of color digital images model (NCQI). The image sizes for carrier and watermark are assumed to be 2n×2n and 2n‑1×2n‑1, respectively. At first, the watermark is scrambled into a disordered form through image preprocessing technique of exchanging the image pixel position and altering the color information based on Arnold transforms, simultaneously. Then, the scrambled watermark with 2n‑1×2n‑1 image size and 24-qubit grayscale is further expanded to an image with size 2n×2n and 6-qubit grayscale using the nearest-neighbor interpolation method. Finally, the scrambled and expanded watermark is embedded into the carrier by steganography of LSB scheme, and a key image with 2n×2n size and 3-qubit information is generated at the meantime, which only can use the key image to retrieve the original watermark. The extraction of watermark is the reverse process of embedding, which is achieved by applying a sequence of operations in the reverse order. Simulation-based experimental results involving different carrier and watermark images (i.e. conventional or non-quantum) are simulated based on the classical computer’s MATLAB 2014b software, which illustrates that the present method has a good performance in terms of three items: visual quality, robustness and steganography capacity.

  18. Quantum steganography with a large payload based on dense coding and entanglement swapping of Greenberger—Horne—Zeilinger states

    International Nuclear Information System (INIS)

    Ye Tian-Yu; Jiang Li-Zhen

    2013-01-01

    A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger—Horne—Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable. (general)

  19. New quantization matrices for JPEG steganography

    Science.gov (United States)

    Yildiz, Yesna O.; Panetta, Karen; Agaian, Sos

    2007-04-01

    Modern steganography is a secure communication of information by embedding a secret-message within a "cover" digital multimedia without any perceptual distortion to the cover media, so the presence of the hidden message is indiscernible. Recently, the Joint Photographic Experts Group (JPEG) format attracted the attention of researchers as the main steganographic format due to the following reasons: It is the most common format for storing images, JPEG images are very abundant on the Internet bulletin boards and public Internet sites, and they are almost solely used for storing natural images. Well-known JPEG steganographic algorithms such as F5 and Model-based Steganography provide high message capacity with reasonable security. In this paper, we present a method to increase security using JPEG images as the cover medium. The key element of the method is using a new parametric key-dependent quantization matrix. This new quantization table has practically the same performance as the JPEG table as far as compression ratio and image statistics. The resulting image is indiscernible from an image that was created using the JPEG compression algorithm. This paper presents the key-dependent quantization table algorithm and then analyzes the new table performance.

  20. Secure steganography designed for mobile platforms

    Science.gov (United States)

    Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.

    2006-05-01

    Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.

  1. New LSB-based colour image steganography method to enhance ...

    Indian Academy of Sciences (India)

    Mustafa Cem kasapbaşi

    2018-04-27

    Apr 27, 2018 ... evaluate the proposed method, comparative performance tests are carried out against different spatial image ... image steganography applications based on LSB are ..... worst case scenario could occur when having highest.

  2. Steganography and Prospects of Its Application in Protection of Printing Documents

    Directory of Open Access Journals (Sweden)

    M. O. Zhmakin

    2010-09-01

    Full Text Available In the article the principle of steganography reveals. Three modern directions of concealment of the information are presented. Application classical steganography in printing prints is described.

  3. Embedded FPGA Design for Optimal Pixel Adjustment Process of Image Steganography

    Directory of Open Access Journals (Sweden)

    Chiung-Wei Huang

    2018-01-01

    Full Text Available We propose a prototype of field programmable gate array (FPGA implementation for optimal pixel adjustment process (OPAP algorithm of image steganography. In the proposed scheme, the cover image and the secret message are transmitted from a personal computer (PC to an FPGA board using RS232 interface for hardware processing. We firstly embed k-bit secret message into each pixel of the cover image by the last-significant-bit (LSB substitution method, followed by executing associated OPAP calculations to construct a stego pixel. After all pixels of the cover image have been embedded, a stego image is created and transmitted from FPGA back to the PC and stored in the PC. Moreover, we have extended the basic pixel-wise structure to a parallel structure which can fully use the hardware devices to speed up the embedding process and embed several bits of secret message at the same time. Through parallel mechanism of the hardware based design, the data hiding process can be completed in few clock cycles to produce steganography outcome. Experimental results show the effectiveness and correctness of the proposed scheme.

  4. Self-noise suppression schemes in blind image steganography

    Science.gov (United States)

    Ramkumar, Mahalingam; Akansu, Ali N.

    1999-11-01

    Blind or oblivious data hiding, can be considered as a signaling method where the origin of the signal constellation is not known. The origin however, can be estimated, by means of self-noise suppression techniques. In this paper, we propose such a technique, and present both theoretical and numerical evaluations of its performance in an additive noise scenario. The problem of optimal choice of the parameters of the proposed technique is also explored, and solutions are presented. Though the cover object is assumed to be an image for purposes of illustration, the proposed method is equally applicable for other types of multimedia data, like video, speech or music.

  5. Multimodal Authentication - Biometric Password And Steganography

    Directory of Open Access Journals (Sweden)

    Alvin Prasad

    2017-06-01

    Full Text Available Security is a major concern for everyone be it individuals or organizations. As the nature of information systems is becoming distributed securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

  6. Secure Image Steganography Algorithm Based on DCT with OTP Encryption

    Directory of Open Access Journals (Sweden)

    De Rosal Ignatius Moses Setiadi

    2017-04-01

    Full Text Available Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR and ormalize cross Correlation (NCC to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT, One Time Pad, Vernam, Chiper, Image Cryptography

  7. High capacity photonic integrated switching circuits

    NARCIS (Netherlands)

    Albores Mejia, A.

    2011-01-01

    As the demand for high-capacity data transfer keeps increasing in high performance computing and in a broader range of system area networking environments; reconfiguring the strained networks at ever faster speeds with larger volumes of traffic has become a huge challenge. Formidable bottlenecks

  8. Quantum steganography with noisy quantum channels

    International Nuclear Information System (INIS)

    Shaw, Bilal A.; Brun, Todd A.

    2011-01-01

    Steganography is the technique of hiding secret information by embedding it in a seemingly ''innocent'' message. We present protocols for hiding quantum information by disguising it as noise in a codeword of a quantum error-correcting code. The sender (Alice) swaps quantum information into the codeword and applies a random choice of unitary operation, drawing on a secret random key she shares with the receiver (Bob). Using the key, Bob can retrieve the information, but an eavesdropper (Eve) with the power to monitor the channel, but without the secret key, cannot distinguish the message from channel noise. We consider two types of protocols: one in which the hidden quantum information is stored locally in the codeword, and another in which it is embedded in the space of error syndromes. We analyze how difficult it is for Eve to detect the presence of secret messages, and estimate rates of steganographic communication and secret key consumption for specific protocols and examples of error channels. We consider both the case where there is no actual noise in the channel (so that all errors in the codeword result from the deliberate actions of Alice), and the case where the channel is noisy and not controlled by Alice and Bob.

  9. SCOPES: steganography with compression using permutation search

    Science.gov (United States)

    Boorboor, Sahar; Zolfaghari, Behrouz; Mozafari, Saadat Pour

    2011-10-01

    LSB (Least Significant Bit) is a widely used method for image steganography, which hides the secret message as a bit stream in LSBs of pixel bytes in the cover image. This paper proposes a variant of LSB named SCOPES that encodes and compresses the secret message while being hidden through storing addresses instead of message bytes. Reducing the length of the stored message improves the storage capacity and makes the stego image visually less suspicious to the third party. The main idea behind the SCOPES approach is dividing the message into 3-character segments, seeking each segment in the cover image and storing the address of the position containing the segment instead of the segment itself. In this approach, every permutation of the 3 bytes (if found) can be stored along with some extra bits indicating the permutation. In some rare cases the segment may not be found in the image and this can cause the message to be expanded by some overhead bits2 instead of being compressed. But experimental results show that SCOPES performs overlay better than traditional LSB even in the worst cases.

  10. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Fadhil Mahmood

    2013-04-01

    Full Text Available     Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.        In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.      This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secures data transmission applications

  11. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Mahmood

    2014-04-01

    Full Text Available Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.  In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.  This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secure data transmission applications

  12. High Capacity cylinder roller bearing; High Capacity Zylinderrollenlager. Ein vollrolliges Lager mit Kaefig

    Energy Technology Data Exchange (ETDEWEB)

    Reichert, J.; Baum, J. [SKF, Schweinfurt (Germany)

    2007-07-15

    The high capacity cylinder roller bearing is an example for continuous development of SKF products and does an effective contribution to increase operational safety and offers the possibility to reduce weight and compact design. (GL)

  13. New methods to improve the pixel domain steganography, steganalysis, and simplify the assessment of steganalysis tools

    OpenAIRE

    Khalind, Omed Saleem

    2015-01-01

    Unlike other security methods, steganography hides the very existence of secret messages rather than their content only. Both steganography and steganalysis are strongly related to each other, the new steganographic methods should be evaluated with current steganalysis methods and vice-versa. Since steganography is considered broken when the stego object is recognised, undetectability would be the most important property of any steganographic system. Digital image files are excellent media fo...

  14. High-capacity neutron activation analysis facility

    International Nuclear Information System (INIS)

    Hochel, R.C.

    1979-01-01

    A high-capacity neutron activation analysis facility, the Reactor Activation Facility, was designed and built and has been in operation for about a year at one of the Savannah River Plant's production reactors. The facility determines uranium and about 19 other trace elements in hydrogeochemical samples collected in the National Uranium Resource Evaluation program. The facility has a demonstrated average analysis rate of over 10,000 samples per month, and a peak rate of over 16,000 samples per month. Uranium is determined by cyclic activation and delayed neutron counting of the U-235 fission products; other elements are determined from gamma-ray spectra recorded in subsequent irradiation, decay, and counting steps. The method relies on the absolute activation technique and is highly automated for round-the-clock unattended operation

  15. High Capacity Radio over Fiber Transmission Links

    DEFF Research Database (Denmark)

    Caballero Jambrina, Antonio

    . This achievement has satisfied the requirements on transmission robustness and high capacity of next generation hybrid optical fibre-wireless networks. One important contribution of this thesis is the novel concept of photonic downconversion with free-running pulsed laser source for phase modulated Radio-over-Fiber......This thesis expands the state-of-the-art on the detection of high speed wireless signals using optics. Signal detection at speeds over 1 Gbps at carrier Radio Frequency (RF) ranging from 5 GHz to 100 GHz have been achieved by applying novel concepts on optical digital coherent receivers......-wave frequencies at carrier frequencies exceeding 60 GHz, using photonic baseband technologies. For signal generation, high spectral-efficient optical modulation technologies are used together with optical heterodyning. In the detection side, the mm-wave signal is modulated in the optical domain and received using...

  16. High Capacity Hydrogen Storage on Nanoporous Biocarbon

    Science.gov (United States)

    Burress, Jacob; Wood, Mikael; Gordon, Michael; Parilla, Phillip; Benham, Michael; Wexler, Carlos; Hawthorne, Fred; Pfeifer, Peter

    2008-03-01

    The Alliance for Collaborative Research in Alternative Fuel Technology (http://all-craft.missouri.edu) has been optimizing nanoporous biocarbon for high capacity hydrogen storage. The hydrogen storage was measured gravimetrically and volumetrically (Sievert's apparatus). These measurements have been validated by NREL and Hiden Isochema. Sample S-33/k, our current best performer, stores 73-91 g H2/kg carbon at 77 K and 47 bar, and 1.0-1.6 g H2/kg carbon at 293 K and 47 bar. Hydrogen isotherms run by Hiden Isochema have given experimental binding energies of 8.8 kJ/mol compared to the binding energy of graphite of 5 kJ/mol. Results from a novel boron doping technique will also be presented. The benefits and validity of using boron-doping on carbon will also be discussed.

  17. High-capacity neutron activation analysis facility

    International Nuclear Information System (INIS)

    Hochel, R.C.; Bowman, W.W.; Zeh, C.W.

    1980-01-01

    A high-capacity neutron activation analysis facility, the Reactor Activation Facility, was designed and built and has been in operation for about a year at one of the Savannah River Plant's production reactors. The facility determines uranium and about 19 other elements in hydrogeochemical samples collected in the National Uranium Resource Evaluation program, which is sponsored and funded by the United States Department of Energy, Grand Junction Office. The facility has a demonstrated average analysis rate of over 10,000 samples per month, and a peak rate of over 16,000 samples per month. Uranium is determined by cyclic activation and delayed neutron counting of the U-235 fission products; other elements are determined from gamma-ray spectra recorded in subsequent irradiation, decay, and counting steps. The method relies on the absolute activation technique and is highly automated for round-the-clock unattended operation

  18. The NASA CSTI High Capacity Power Project

    International Nuclear Information System (INIS)

    Winter, J.; Dudenhoefer, J.; Juhasz, A.; Schwarze, G.; Patterson, R.; Ferguson, D.; Schmitz, P.; Vandersande, J.

    1992-01-01

    This paper describes the elements of NASA's CSTI High Capacity Power Project which include Systems Analysis, Stirling Power Conversion, Thermoelectric Power Conversion, Thermal Management, Power Management, Systems Diagnostics, Environmental Interactions, and Material/Structural Development. Technology advancement in all elements is required to provide the growth capability, high reliability and 7 to 10 year lifetime demanded for future space nuclear power systems. The overall project will develop and demonstrate the technology base required to provide a wide range of modular power systems compatible with the SP-100 reactor which facilitates operation during lunar and planetary day/night cycles as well as allowing spacecraft operation at any attitude or distance from the sun. Significant accomplishments in all of the project elements will be presented, along with revised goals and project timeliness recently developed

  19. Improved chaos-based video steganography using DNA alphabets

    Directory of Open Access Journals (Sweden)

    Nirmalya Kar

    2018-03-01

    Full Text Available DNA based steganography plays a vital role in the field of privacy and secure communication. Here, we propose a DNA properties-based mechanism to send data hidden inside a video file. Initially, the video file is converted into image frames. Random frames are then selected and data is hidden in these at random locations by using the Least Significant Bit substitution method. We analyze the proposed architecture in terms of peak signal-to-noise ratio as well as mean squared error measured between the original and steganographic files averaged over all video frames. The results show minimal degradation of the steganographic video file. Keywords: Chaotic map, DNA, Linear congruential generator, Video steganography, Least significant bit

  20. Comparison of Video Steganography Methods for Watermark Embedding

    Directory of Open Access Journals (Sweden)

    Griberman David

    2016-05-01

    Full Text Available The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and compared based on their embedding efficiency and fidelity. A video steganography program has been developed in the Java programming language with all of the researched methods implemented for experiments. The experiments used 3 video containers with different amounts of movement. The impact of the movement has been addressed in the paper as well as the ways of potential improvement of embedding efficiency using adaptive embedding based on the movement amount. Results of the research have been verified using a survey with 17 participants.

  1. The NASA CSTI High Capacity Power Program

    International Nuclear Information System (INIS)

    Winter, J.M.

    1991-09-01

    The SP-100 program was established in 1983 by DOD, DOE, and NASA as a joint program to develop the technology necessary for space nuclear power systems for military and civil applications. During 1986 and 1987, the NASA Advanced Technology Program was responsible for maintaining the momentum of promising technology advancement efforts started during Phase 1 of SP-100 and to strengthen, in key areas, the chances for successful development and growth capability of space nuclear reactor power systems for future space applications. In 1988, the NASA Advanced Technology Program was incorporated into NASA's new Civil Space Technology Initiative (CSTI). The CSTI program was established to provide the foundation for technology development in automation and robotics, information, propulsion, and power. The CSTI High Capacity Power Program builds on the technology efforts of the SP-100 program, incorporates the previous NASA advanced technology project, and provides a bridge to the NASA exploration technology programs. The elements of CSTI high capacity power development include conversion systems: Stirling and thermoelectric, thermal management, power management, system diagnostics, and environmental interactions. Technology advancement in all areas, including materials, is required to provide the growth capability, high reliability, and 7 to 10 year lifetime demanded for future space nuclear power systems. The overall program will develop and demonstrate the technology base required to provide a wide range of modular power systems while minimizing the impact of day/night operations as well as attitudes and distance from the Sun. Significant accomplishments in all of the program elements will be discussed, along with revised goals and project timelines recently developed

  2. Secured Data Transmission Using Wavelet Based Steganography and cryptography

    OpenAIRE

    K.Ravindra Reddy; Ms Shaik Taj Mahaboob

    2014-01-01

    Steganography and cryptographic methods are used together with wavelets to increase the security of the data while transmitting through networks. Another technology, the digital watermarking is the process of embedding information into a digital (image) signal. Before embedding the plain text into the image, the plain text is encrypted by using Data Encryption Standard (DES) algorithm. The encrypted text is embedded into the LL sub band of the wavelet decomposed image using Le...

  3. EFFICIENT ADAPTIVE STEGANOGRAPHY FOR COLOR IMAGESBASED ON LSBMR ALGORITHM

    Directory of Open Access Journals (Sweden)

    B. Sharmila

    2012-02-01

    Full Text Available Steganography is the art of hiding the fact that communication is taking place, by hiding information in other medium. Many different carrier file formats can be used, but digital images are the most popular because of their frequent use on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques. The Least Significant Bit (LSB based approach is a simplest type of steganographic algorithm. In all the existing approaches, the decision of choosing the region within a cover image is performed without considering the relationship between image content and the size of secret message. Thus, the plain regions in the cover will be ruin after data hiding even at a low data rate. Hence choosing the edge region for data hiding will be a solution. Many algorithms are deal with edges in images for data hiding. The Paper 'Edge adaptive image steganography based on LSBMR algorithm' is a LSB steganography presented the results of algorithms on gray-scale images only. This paper presents the results of analyzing the performance of edge adaptive steganography for colored images (JPEG. The algorithms have been slightly modified for colored image implementation and are compared on the basis of evaluation parameters like peak signal noise ratio (PSNR and mean square error (MSE. This method can select the edge region depending on the length of secret message and difference between two consecutive bits in the cover image. For length of message is short, only small edge regions are utilized while on leaving other region as such. When the data rate increases, more regions can be used adaptively for data hiding by adjusting the parameters. Besides this, the message is encrypted using efficient cryptographic algorithm which further increases the security.

  4. Video steganography based on bit-plane decomposition of wavelet-transformed video

    Science.gov (United States)

    Noda, Hideki; Furuta, Tomofumi; Niimi, Michiharu; Kawaguchi, Eiji

    2004-06-01

    This paper presents a steganography method using lossy compressed video which provides a natural way to send a large amount of secret data. The proposed method is based on wavelet compression for video data and bit-plane complexity segmentation (BPCS) steganography. BPCS steganography makes use of bit-plane decomposition and the characteristics of the human vision system, where noise-like regions in bit-planes of a dummy image are replaced with secret data without deteriorating image quality. In wavelet-based video compression methods such as 3-D set partitioning in hierarchical trees (SPIHT) algorithm and Motion-JPEG2000, wavelet coefficients in discrete wavelet transformed video are quantized into a bit-plane structure and therefore BPCS steganography can be applied in the wavelet domain. 3-D SPIHT-BPCS steganography and Motion-JPEG2000-BPCS steganography are presented and tested, which are the integration of 3-D SPIHT video coding and BPCS steganography, and that of Motion-JPEG2000 and BPCS, respectively. Experimental results show that 3-D SPIHT-BPCS is superior to Motion-JPEG2000-BPCS with regard to embedding performance. In 3-D SPIHT-BPCS steganography, embedding rates of around 28% of the compressed video size are achieved for twelve bit representation of wavelet coefficients with no noticeable degradation in video quality.

  5. Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers

    Directory of Open Access Journals (Sweden)

    Asawaree Kulkarni

    2009-06-01

    Full Text Available Steganography is the art and science of hiding information within information so that an observer does not know that communication is taking place. Bad actors passing information using steganography are of concern to the national security establishment and law enforcement. An attempt was made to determine if steganography was being used by criminals to communicate information. Web crawling technology was used and images were downloaded from Web sites that were considered as likely candidates for containing information hidden using steganographic techniques. A detection tool was used to analyze these images. The research failed to demonstrate that steganography was prevalent on the public Internet. The probable reasons included the growth and availability of large number of steganography-producing tools and the limited capacity of the detection tools to cope with them. Thus, a redirection was introduced in the methodology and the detection focus was shifted from the analysis of the ‘product’ of the steganography-producing software; viz. the images, to the 'artifacts’ left by the steganography-producing software while it is being used to generate steganographic images. This approach was based on the concept of ‘Stego-Usage Timeline’. As a proof of concept, a sample set of criminal computers was scanned for the remnants of steganography-producing software. The results demonstrated that the problem of ‘the detection of the usage of steganography’ could be addressed by the approach adopted after the research redirection and that certain steganographic software was popular among the criminals. Thus, the contribution of the research was in demonstrating that the limitations of the tools based on the signature detection of steganographically altered images can be overcome by focusing the detection effort on detecting the artifacts of the steganography-producing tools.

  6. Building the UPPA high capacity tensiometer

    Directory of Open Access Journals (Sweden)

    Mendes Joao

    2016-01-01

    Full Text Available High capacity tensiometers (HCTs are sensors capable of directly measuring tensile pore water pressure (suction in soils. HCTs are typically composed of a casing that encapsulates a high air entry value ceramic filter, a water reservoir and a pressure sensing element. Since the creation of the first HCT by Ridley and Burland in 1993 at Imperial College London, HCTs have been almost exclusively built and used in academic research. The limited use in industrial applications can be explained by a lack of unsaturated soil mechanics knowledge among engineering practitioners but also by the technical difficulties associated to the direct measurement of tensile water pressures beyond the cavitation limit of -100kPa. In this paper, we present the recent design and manufacture of a new HCT at the Université de Pau et des Pays de l’Adour (UPPA in France. Different prototypes were tried by changing the main components of the device including the type of ceramic filter, pressure transducer and geometry of the external casing. In particular, two ceramic filters of distinct porosity, three pressure transducers with distinct materials/geometries and four casing designs were tested.

  7. High capacity getter pump for UHV operation

    International Nuclear Information System (INIS)

    Manini, P.; Marino, M.; Belloni, F.; Porro, M.

    1993-01-01

    UHV pumps based on non-evaporable getter coated strips find widespread use in particle accelerators, synchrotron radiation machines and nuclear fusion experimental devices. Depending on the geometric constraints, pressure operation conditions and the foreseen gas loads, optimized getter structures, such as modules and cartridges, can be designed and assembled into a high-efficiency pump. In the present paper, the design and performance of a newly conceived High Capacity Getter Pump (HCGP) based on sintered getter bodies, in the shape of blades instead of strips, is illustrated. The porosity and the specific surface area of the blades and their arrangement in the cartridge have been optimized to significantly increase sorption capacity at a given speed. These pumps are well suited for those applications where a very high gas load is expected during the machine operation. The sintered getter bodies increase surface area and capacity, requiring less frequent reactivation and facilitating greater overall life of the pump. A discussion of the experimental results in terms of sorption speed and capacity for various gases is presented

  8. Development of high-capacity antimatter storage

    International Nuclear Information System (INIS)

    Howe, Steven D.; Smith, Gerald A.

    2000-01-01

    Space is vast. Over the next few decades, humanity will strive to send probes farther and farther into space to establish long baselines for interferometry, to visit the Kuiper Belt, to identify the heliopause, or to map the Oort cloud. In order to solve many of the mysteries of the universe or to explore the solar system and beyond, one single technology must be developed--high performance propulsion. In essence, future missions to deep space will require specific impulses between 50,000 and 200,000 seconds and energy densities greater than 10 14 j/kg in order to accomplish the mission within the career lifetime of an individual, 40 years. Only two technologies available to mankind offer such performance--fusion and antimatter. Currently envisioned fusion systems are too massive. Alternatively, because of the high energy density, antimatter powered systems may be relatively compact. The single key technology that is required to enable the revolutionary concept of antimatter propulsion is safe, reliable, high-density storage. Under a grant from the NASA Institute of Advanced Concepts, we have identified two potential mechanisms that may enable high capacity antimatter storage systems to be built. We will describe planned experiments to verify the concepts. Development of a system capable of storing megajoules per gram will allow highly instrumented platforms to make fast missions to great distances. Such a development will open the universe to humanity

  9. Towards green high capacity optical networks

    Science.gov (United States)

    Glesk, I.; Mohd Warip, M. N.; Idris, S. K.; Osadola, T. B.; Andonovic, I.

    2011-09-01

    The demand for fast, secure, energy efficient high capacity networks is growing. It is fuelled by transmission bandwidth needs which will support among other things the rapid penetration of multimedia applications empowering smart consumer electronics and E-businesses. All the above trigger unparallel needs for networking solutions which must offer not only high-speed low-cost "on demand" mobile connectivity but should be ecologically friendly and have low carbon footprint. The first answer to address the bandwidth needs was deployment of fibre optic technologies into transport networks. After this it became quickly obvious that the inferior electronic bandwidth (if compared to optical fiber) will further keep its upper hand on maximum implementable serial data rates. A new solution was found by introducing parallelism into data transport in the form of Wavelength Division Multiplexing (WDM) which has helped dramatically to improve aggregate throughput of optical networks. However with these advancements a new bottleneck has emerged at fibre endpoints where data routers must process the incoming and outgoing traffic. Here, even with the massive and power hungry electronic parallelism routers today (still relying upon bandwidth limiting electronics) do not offer needed processing speeds networks demands. In this paper we will discuss some novel unconventional approaches to address network scalability leading to energy savings via advance optical signal processing. We will also investigate energy savings based on advanced network management through nodes hibernation proposed for Optical IP networks. The hibernation reduces the network overall power consumption by forming virtual network reconfigurations through selective nodes groupings and by links segmentations and partitionings.

  10. Code domain steganography in video tracks

    Science.gov (United States)

    Rymaszewski, Sławomir

    2008-01-01

    This article is dealing with a practical method of hiding secret information in video stream. Method is dedicated for MPEG-2 stream. The algorithm takes to consider not only MPEG video coding scheme described in standard but also bits PES-packets encapsulation in MPEG-2 Program Stream (PS). This modification give higher capacity and more effective bit rate control for output stream than previously proposed methods.

  11. Robust Steganography Using LSB-XOR and Image Sharing

    OpenAIRE

    Adak, Chandranath

    2013-01-01

    Hiding and securing the secret digital information and data that are transmitted over the internet is of widespread and most challenging interest. This paper presents a new idea of robust steganography using bitwise-XOR operation between stego-key-image-pixel LSB (Least Significant Bit) value and secret message-character ASCII-binary value (or, secret image-pixel value). The stego-key-image is shared in dual-layer using odd-even position of each pixel to make the system robust. Due to image s...

  12. LSB steganography with improved embedding efficiency and undetectability

    OpenAIRE

    Khalind, Omed; Aziz, Benjamin Yowell Yousif

    2015-01-01

    In this paper, we propose a new method of non-adapt ive LSB steganography in still images to improve the embedding efficiency from 2 to 8/3 rand om bits per one embedding change even for the embedding rate of 1 bit per pixel. The method t akes 2-bits of the secret message at a time and compares them to the LSBs of the two chosen pix el values for embedding, it always assumes a single mismatch between the two and uses the seco nd LSB o...

  13. Single-mismatch 2LSB embedding method of steganography

    OpenAIRE

    Khalind, Omed; Aziz, Benjamin

    2013-01-01

    This paper proposes a new method of 2LSB embedding steganography in still images. The proposed method considers a single mismatch in each 2LSB embedding between the 2LSB of the pixel value and the 2-bits of the secret message, while the 2LSB replacement overwrites the 2LSB of the image’s pixel value with 2-bits of the secret message. The number of bit-changes needed for the proposed method is 0.375 bits from the 2LSBs of the cover image, and is much less than the 2LSB replacement which is 0.5...

  14. Diffie-Hellman Key Exchange through Steganographied Images

    Directory of Open Access Journals (Sweden)

    Amine Khaldi

    2018-05-01

    Full Text Available Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.

  15. Throughput increase of the covert communication channel organized by the stable steganography algorithm using spatial domain of the image

    Directory of Open Access Journals (Sweden)

    O.V. Kostyrka

    2016-09-01

    Full Text Available At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed steganography message, significant throughput of a steganography communication channel. Aim: The aim of this research is to modify the steganography method, developed by the author earlier, which will allow to increase the throughput of the corresponding covert communication channel when saving resistance to attacks against the built-in message and perception reliability of the created steganography message, inherent to developed method. Materials and Methods: Modifications of a steganography method that is steady against attacks against the built-in message which is carrying out the inclusion and decoding of the sent (additional information in spatial domain of the image allowing to increase the throughput of the organized communication channel are offered. Use of spatial domain of the image allows to avoid accumulation of an additional computational error during the inclusion/decoding of additional information due to “transitions” from spatial domain of the image to the area of conversion and back that positively affects the efficiency of decoding. Such methods are considered as attacks against the built-in message: imposing of different noise on a steganography message, filtering, lossy compression of a ste-ganography message where the JPEG and JPEG2000 formats with different quality coefficients for saving of a steganography message are used. Results: It is shown that algorithmic implementations of the offered methods modifications remain steady against the perturbing influences, including considerable, provide reliability of perception of the created steganography message, increase the throughput of the created steganography communication channel in comparison with the algorithm implementing

  16. An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods

    OpenAIRE

    Qazanfari, Kazem; Safabakhsh, Reza

    2017-01-01

    The aim of the steganography methods is to communicate securely in a completely undetectable manner. LSB Matching and LSB Matching Revisited steganography methods are two general and esiest methods to achieve this aim. Being secured against first order steganalysis methods is the most important feature of these methods. On the other hand, these methods don't consider inter pixel dependency. Therefore, recently, several steganalysis methods are proposed that by using co-occurrence matrix detec...

  17. The development and application of high-capacity thickening techniques

    International Nuclear Information System (INIS)

    Ji Zhenwan; Song Yuejie

    1995-01-01

    On the basis of sedimentation theory and comparison between the high-capacity and conventional thickening techniques, the authors analyse the ways to increase capacity and to improve technological parameters of thickeners, describes the construction features, development, application, automatic control and test installations of high-capacity thickeners at home and abroad

  18. Biometric feature embedding using robust steganography technique

    Science.gov (United States)

    Rashid, Rasber D.; Sellahewa, Harin; Jassim, Sabah A.

    2013-05-01

    This paper is concerned with robust steganographic techniques to hide and communicate biometric data in mobile media objects like images, over open networks. More specifically, the aim is to embed binarised features extracted using discrete wavelet transforms and local binary patterns of face images as a secret message in an image. The need for such techniques can arise in law enforcement, forensics, counter terrorism, internet/mobile banking and border control. What differentiates this problem from normal information hiding techniques is the added requirement that there should be minimal effect on face recognition accuracy. We propose an LSB-Witness embedding technique in which the secret message is already present in the LSB plane but instead of changing the cover image LSB values, the second LSB plane will be changed to stand as a witness/informer to the receiver during message recovery. Although this approach may affect the stego quality, it is eliminating the weakness of traditional LSB schemes that is exploited by steganalysis techniques for LSB, such as PoV and RS steganalysis, to detect the existence of secrete message. Experimental results show that the proposed method is robust against PoV and RS attacks compared to other variants of LSB. We also discussed variants of this approach and determine capacity requirements for embedding face biometric feature vectors while maintain accuracy of face recognition.

  19. A Learning-Based Steganalytic Method against LSB Matching Steganography

    Directory of Open Access Journals (Sweden)

    Z. Xia

    2011-04-01

    Full Text Available This paper considers the detection of spatial domain least significant bit (LSB matching steganography in gray images. Natural images hold some inherent properties, such as histogram, dependence between neighboring pixels, and dependence among pixels that are not adjacent to each other. These properties are likely to be disturbed by LSB matching. Firstly, histogram will become smoother after LSB matching. Secondly, the two kinds of dependence will be weakened by the message embedding. Accordingly, three features, which are respectively based on image histogram, neighborhood degree histogram and run-length histogram, are extracted at first. Then, support vector machine is utilized to learn and discriminate the difference of features between cover and stego images. Experimental results prove that the proposed method possesses reliable detection ability and outperforms the two previous state-of-the-art methods. Further more, the conclusions are drawn by analyzing the individual performance of three features and their fused feature.

  20. Rate-distortion analysis of steganography for conveying stereovision disparity maps

    Science.gov (United States)

    Umeda, Toshiyuki; Batolomeu, Ana B. D. T.; Francob, Filipe A. L.; Delannay, Damien; Macq, Benoit M. M.

    2004-06-01

    3-D images transmission in a way which is compliant with traditional 2-D representations can be done through the embedding of disparity maps within the 2-D signal. This approach enables the transmission of stereoscopic video sequences or images on traditional analogue TV channels (PAL or NTSC) or printed photographic images. The aim of this work is to study the achievable performances of such a technique. The embedding of disparity maps has to be seen as a global rate-distortion problem. The embedding capacity through steganography is determined by the transmission channel noise and by the bearable distortion on the watermarked image. The distortion of the 3-D image displayed as two stereo views depends on the rate allocated to the complementary information required to build those two views from one reference 2-D image. Results from the works on the scalar Costa scheme are used to optimize the embedding of the disparity map compressed bit stream into the reference image. A method for computing the optimal trade off between the disparity map distortion and embedding distortion as a function of the channel impairments is proposed. The goal is to get a similar distortion on the left (the reference image) and the right (the disparity compensated image) images. We show that in typical situations the embedding of 2 bits/pixels in the left image, while the disparity map is compressed at 1 bit per pixel leads to a good trade-off. The disparity map is encoded with a strong error correcting code, including synchronisation bits.

  1. A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE

    Directory of Open Access Journals (Sweden)

    MELAD J. SAEED

    2013-10-01

    Full Text Available Image steganography is the art of hiding information into a cover image. This paper presents a new technique based on chaotic steganography and encryption text in DCT domain for color image, where DCT is used to transform original image (cover image from spatial domain to frequency domain. This technique used chaotic function in two phases; firstly; for encryption secret message, second; for embedding in DCT cover image. With this new technique, good results are obtained through satisfying the important properties of steganography such as: imperceptibility; improved by having mean square error (MSE, peak signal to noise ratio (PSNR and normalized correlation (NC, to phase and capacity; improved by encoding the secret message characters with variable length codes and embedding the secret message in one level of color image only.

  2. A novel JPEG steganography method based on modulus function with histogram analysis

    Directory of Open Access Journals (Sweden)

    V. Banoci

    2012-06-01

    Full Text Available In this paper, we present a novel steganographic method for embedding of secret data in still grayscale JPEG image. In order to provide large capacity of the proposed method while maintaining good visual quality of stego-image, the embedding process is performed in quantized transform coefficients of Discrete Cosine transform (DCT by modifying coefficients according to modulo function, what gives to the steganography system blind extraction predisposition. After-embedding histogram of proposed Modulo Histogram Fitting (MHF method is analyzed to secure steganography system against steganalysis attacks. In addition, AES ciphering was implemented to increase security and improve histogram after-embedding characteristics of proposed steganography system as experimental results show.

  3. Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems

    Directory of Open Access Journals (Sweden)

    Jude Hemanth Duraisamy

    2016-01-01

    Full Text Available Image steganography is one of the ever growing computational approaches which has found its application in many fields. The frequency domain techniques are highly preferred for image steganography applications. However, there are significant drawbacks associated with these techniques. In transform based approaches, the secret data is embedded in random manner in the transform coefficients of the cover image. These transform coefficients may not be optimal in terms of the stego image quality and embedding capacity. In this work, the application of Genetic Algorithm (GA and Particle Swarm Optimization (PSO have been explored in the context of determining the optimal coefficients in these transforms. Frequency domain transforms such as Bandelet Transform (BT and Finite Ridgelet Transform (FRIT are used in combination with GA and PSO to improve the efficiency of the image steganography system.

  4. AUDIO CRYPTANALYSIS- AN APPLICATION OF SYMMETRIC KEY CRYPTOGRAPHY AND AUDIO STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Smita Paira

    2016-09-01

    Full Text Available In the recent trend of network and technology, “Cryptography” and “Steganography” have emerged out as the essential elements of providing network security. Although Cryptography plays a major role in the fabrication and modification of the secret message into an encrypted version yet it has certain drawbacks. Steganography is the art that meets one of the basic limitations of Cryptography. In this paper, a new algorithm has been proposed based on both Symmetric Key Cryptography and Audio Steganography. The combination of a randomly generated Symmetric Key along with LSB technique of Audio Steganography sends a secret message unrecognizable through an insecure medium. The Stego File generated is almost lossless giving a 100 percent recovery of the original message. This paper also presents a detailed experimental analysis of the algorithm with a brief comparison with other existing algorithms and a future scope. The experimental verification and security issues are promising.

  5. CRYPTO-STEG: A Hybrid Cryptology - Steganography Approach for Improved Data Security

    Directory of Open Access Journals (Sweden)

    Atif Bin Mansoor

    2012-04-01

    Full Text Available Internet is a widely used medium for transfer of information due to its reach and ease of availability. However, internet is an insecure medium and any information might be easily intercepted and viewed during its transfer. Different mechanisms like cryptology and steganography are adopted to secure the data communication over an inherently insecure medium like internet. Cryptology scrambles the information in a manner that an unintended recipient cannot easily extract the information, while steganography hides the information in a cover object so that it is transferred unnoticed in the cover. Encrypted data may not be extracted easily but causes a direct suspicion to any observer, while data hidden using steganographic techniques go inconspicuous. Cryptanalysis is the process of attacking the encrypted text to extract the information, while steganalysis is the process of detecting the disguised messages. In literature, both cryptology and steganography are treated separately. In this paper, we present our research on an improved data security paradigm, where data is first encrypted using AES (Advanced Encryption Standard and DES (Data Encryption Standard cryptology algorithms. Both plain and encrypted data is hidden in the images using Model Based and F5 steganographic techniques. Features are extracted in DWT (Discrete Wavelet Transform and DCT (Discrete Cosine Transform domains using higher order statistics for steganalysis, and subsequently used to train a FLD (Fisher Linear Discriminant classifier which is employed to categorize a separate set of images as clean or stego (containing hidden messages. Experimental results demonstrate improved data security using proposed CRYPTO-STEG approach compared to plain text steganography. Results also demonstrate that the Model Based steganography is more secure than the F5 steganography.

  6. High capacity anode materials for lithium ion batteries

    Science.gov (United States)

    Lopez, Herman A.; Anguchamy, Yogesh Kumar; Deng, Haixia; Han, Yongbon; Masarapu, Charan; Venkatachalam, Subramanian; Kumar, Suject

    2015-11-19

    High capacity silicon based anode active materials are described for lithium ion batteries. These materials are shown to be effective in combination with high capacity lithium rich cathode active materials. Supplemental lithium is shown to improve the cycling performance and reduce irreversible capacity loss for at least certain silicon based active materials. In particular silicon based active materials can be formed in composites with electrically conductive coatings, such as pyrolytic carbon coatings or metal coatings, and composites can also be formed with other electrically conductive carbon components, such as carbon nanofibers and carbon nanoparticles. Additional alloys with silicon are explored.

  7. A secure approach for encrypting and compressing biometric information employing orthogonal code and steganography

    Science.gov (United States)

    Islam, Muhammad F.; Islam, Mohammed N.

    2012-04-01

    The objective of this paper is to develop a novel approach for encryption and compression of biometric information utilizing orthogonal coding and steganography techniques. Multiple biometric signatures are encrypted individually using orthogonal codes and then multiplexed together to form a single image, which is then embedded in a cover image using the proposed steganography technique. The proposed technique employs three least significant bits for this purpose and a secret key is developed to choose one from among these bits to be replaced by the corresponding bit of the biometric image. The proposed technique offers secure transmission of multiple biometric signatures in an identification document which will be protected from unauthorized steganalysis attempt.

  8. A novel hash based least significant bit (2-3-3) image steganography in spatial domain

    OpenAIRE

    Manjula, G. R.; Danti, Ajit

    2015-01-01

    This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show ...

  9. Minimizing embedding impact in steganography using trellis-coded quantization

    Science.gov (United States)

    Filler, Tomáš; Judas, Jan; Fridrich, Jessica

    2010-01-01

    In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance with bounds derived from appropriate rate-distortion bounds. We assume that each cover element can be assigned a positive scalar expressing the impact of making an embedding change at that element (single-letter distortion). The problem is to embed a given payload with minimal possible average embedding impact. This task, which can be viewed as a generalization of matrix embedding or writing on wet paper, has been approached using heuristic and suboptimal tools in the past. Here, we propose a fast and very versatile solution to this problem that can theoretically achieve performance arbitrarily close to the bound. It is based on syndrome coding using linear convolutional codes with the optimal binary quantizer implemented using the Viterbi algorithm run in the dual domain. The complexity and memory requirements of the embedding algorithm are linear w.r.t. the number of cover elements. For practitioners, we include detailed algorithms for finding good codes and their implementation. Finally, we report extensive experimental results for a large set of relative payloads and for different distortion profiles, including the wet paper channel.

  10. Effective ASCII-HEX steganography for secure cloud

    International Nuclear Information System (INIS)

    Afghan, S.

    2015-01-01

    There are many reasons of cloud computing popularity some of the most important are; backup and rescue, cost effective, nearly limitless storage, automatic software amalgamation, easy access to information and many more. Pay-as-you-go model is followed to provide everything as a service. Data is secured by using standard security policies available at cloud end. In spite of its many benefits, as mentioned above, cloud computing has also some security issues. Provider as well as customer has to provide and collect data in a secure manner. Both of these issues plus efficient transmitting of data over cloud are very critical issues and needed to be resolved. There is need of security during the travel time of sensitive data over the network that can be processed or stored by the customer. Security to the customer's data at the provider end can be provided by using current security algorithms, which are not known by the customer. There is reliability problem due to existence of multiple boundaries in the cloud resource access. ASCII and HEX security with steganography is used to propose an algorithm that stores the encrypted data/cipher text in an image file which will be then sent to the cloud end. This is done by using CDM (Common Deployment Model). In future, an algorithm should be proposed and implemented for the security of virtual images in the cloud computing. (author)

  11. The Impact of Hard Disk Firmware Steganography on Computer Forensics

    Directory of Open Access Journals (Sweden)

    Iain Sutherland

    2009-06-01

    Full Text Available The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation. The majority of available software tools and literature relating to the investigation of the structure and content contained within a hard disk drive concerns the extraction and analysis of evidence from the various file systems which can reside in the user accessible area of the disk. It is known that there are other areas of the hard disk drive which could be used to conceal information, such as the Host Protected Area and the Device Configuration Overlay. There are recommended methods for the detection and forensic analysis of these areas using appropriate tools and techniques. However, there are additional areas of a disk that have currently been overlooked.  The Service Area or Platter Resident Firmware Area is used to store code and control structures responsible for the functionality of the drive and for logging failing or failed sectors.This paper provides an introduction into initial research into the investigation and identification of issues relating to the analysis of the Platter Resident Firmware Area. In particular, the possibility that the Platter Resident Firmware Area could be manipulated and exploited to facilitate a form of steganography, enabling information to be concealed by a user and potentially from a digital forensic investigator.

  12. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  13. Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss

    Directory of Open Access Journals (Sweden)

    Avinash Srinivasan

    2015-08-01

    Full Text Available Information hiding techniques, especially steganography, have been extensively researched for over two decades. Nonetheless, steganography on smartphones over cellular carrier networks is yet to be fully explored. Today, smartphones, which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel. In this paper, we propose Android-Stego - a framework for steganography employing smart-phones. Android-Stego has been evaluated and confirmed to achieve covert communication over real world cellular service providers' communication networks such as Verizon and Sprint. A key contribution of our research presented in this paper is the benchmark results we have provided by analyzing real world cellular carriers network restrictions on MMS message size. We have also analyzed the actions the carriers take - such as compression and/or format conversion - on MMS messages that fall outside the established MMS communication norm, which varies for each service provider. Finally, We have used these benchmark results in implementing Android-Stego such that it is sensitive to carrier restrictions and robust to message loss.

  14. A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition

    Directory of Open Access Journals (Sweden)

    Junhui He

    2018-01-01

    Full Text Available Steganography is a means of covert communication without revealing the occurrence and the real purpose of communication. The adaptive multirate wideband (AMR-WB is a widely adapted format in mobile handsets and is also the recommended speech codec for VoLTE. In this paper, a novel AMR-WB speech steganography is proposed based on diameter-neighbor codebook partition algorithm. Different embedding capacity may be achieved by adjusting the iterative parameters during codebook division. The experimental results prove that the presented AMR-WB steganography may provide higher and flexible embedding capacity without inducing perceptible distortion compared with the state-of-the-art methods. With 48 iterations of cluster merging, twice the embedding capacity of complementary-neighbor-vertices-based embedding method may be obtained with a decrease of only around 2% in speech quality and much the same undetectability. Moreover, both the quality of stego speech and the security regarding statistical steganalysis are better than the recent speech steganography based on neighbor-index-division codebook partition.

  15. Recycling rice husks for high-capacity lithium battery anodes.

    Science.gov (United States)

    Jung, Dae Soo; Ryou, Myung-Hyun; Sung, Yong Joo; Park, Seung Bin; Choi, Jang Wook

    2013-07-23

    The rice husk is the outer covering of a rice kernel and protects the inner ingredients from external attack by insects and bacteria. To perform this function while ventilating air and moisture, rice plants have developed unique nanoporous silica layers in their husks through years of natural evolution. Despite the massive amount of annual production near 10(8) tons worldwide, so far rice husks have been recycled only for low-value agricultural items. In an effort to recycle rice husks for high-value applications, we convert the silica to silicon and use it for high-capacity lithium battery anodes. Taking advantage of the interconnected nanoporous structure naturally existing in rice husks, the converted silicon exhibits excellent electrochemical performance as a lithium battery anode, suggesting that rice husks can be a massive resource for use in high-capacity lithium battery negative electrodes.

  16. High-capacity nanocarbon anodes for lithium-ion batteries

    International Nuclear Information System (INIS)

    Zhang, Haitao; Sun, Xianzhong; Zhang, Xiong; Lin, He; Wang, Kai; Ma, Yanwei

    2015-01-01

    Highlights: • The nanocarbon anodes in lithium-ion batteries deliver a high capacity of ∼1100 mA h g −1 . • The nanocarbon anodes exhibit excellent cyclic stability. • A novel structure of carbon materials, hollow carbon nanoboxes, has potential application in lithium-ion batteries. - Abstract: High energy and power density of secondary cells like lithium-ion batteries become much more important in today’s society. However, lithium-ion battery anodes based on graphite material have theoretical capacity of 372 mA h g −1 and low charging-discharging rate. Here, we report that nanocarbons including mesoporous graphene (MPG), carbon tubular nanostructures (CTN), and hollow carbon nanoboxes (HCB) are good candidate for lithium-ion battery anodes. The nanocarbon anodes have high capacity of ∼1100, ∼600, and ∼500 mA h g −1 at 0.1 A g −1 for MPG, CTN, and HCB, respectively. The capacity of 181, 141, and 139 mA h g −1 at 4 A g −1 for MPG, CTN, and HCB anodes is retained. Besides, nanocarbon anodes show high cycling stability during 1000 cycles, indicating formation of a passivating layer—solid electrolyte interphase, which support long-term cycling. Nanocarbons, constructed with graphene layers which fulfill lithiation/delithiation process, high ratio of graphite edge structure, and high surface area which facilitates capacitive behavior, deliver high capacity and improved rate-capability

  17. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  18. Colloidal silica films for high-capacity DNA arrays

    Science.gov (United States)

    Glazer, Marc Irving

    The human genome project has greatly expanded the amount of genetic information available to researchers, but before this vast new source of data can be fully utilized, techniques for rapid, large-scale analysis of DNA and RNA must continue to develop. DNA arrays have emerged as a powerful new technology for analyzing genomic samples in a highly parallel format. The detection sensitivity of these arrays is dependent on the quantity and density of immobilized probe molecules. We have investigated substrates with a porous, "three-dimensional" surface layer as a means of increasing the surface area available for the synthesis of oligonucleotide probes, thereby increasing the number of available probes and the amount of detectable bound target. Porous colloidal silica films were created by two techniques. In the first approach, films were deposited by spin-coating silica colloid suspensions onto flat glass substrates, with the pores being formed by the natural voids between the solid particles (typically 23nm pores, 35% porosity). In the second approach, latex particles were co-deposited with the silica and then pyrolyzed, creating films with larger pores (36 nm), higher porosity (65%), and higher surface area. For 0.3 mum films, enhancements of eight to ten-fold and 12- to 14-fold were achieved with the pure silica films and the films "templated" with polymer latex, respectively. In gene expression assays for up to 7,000 genes using complex biological samples, the high-capacity films provided enhanced signals and performed equivalently or better than planar glass on all other functional measures, confirming that colloidal silica films are a promising platform for high-capacity DNA arrays. We have also investigated the kinetics of hybridization on planar glass and high-capacity substrates. Adsorption on planar arrays is similar to ideal Langmuir-type adsorption, although with an "overshoot" at high solution concentration. Hybridization on high-capacity films is

  19. Cycloaddition in peptides for high-capacity optical storage

    DEFF Research Database (Denmark)

    Lohse, Brian; Berg, Rolf Henrik; Hvilsted, Søren

    2006-01-01

    Photodimerization of chromophores attached to a short peptide chain is investigated for high-capacity optical digital storage with UV lasers. The length and rigidity of the peptide chain assure an optimal distance and orientation of the chromophores for effective photodimerization. Using a theory...... developed by Tomlinson, the absorption cross section for the dimerization process in a uracil-ornithine-based hexamer is determined to be 9 x 10(-20) cm(2). A large change in the transmission due to irradiation in the UV area may make it possible to realize multilevel storage in a thin film of the peptides....

  20. A novel quantum LSB-based steganography method using the Gray code for colored quantum images

    Science.gov (United States)

    Heidari, Shahrokh; Farzadnia, Ehsan

    2017-10-01

    As one of the prevalent data-hiding techniques, steganography is defined as the act of concealing secret information in a cover multimedia encompassing text, image, video and audio, imperceptibly, in order to perform interaction between the sender and the receiver in which nobody except the receiver can figure out the secret data. In this approach a quantum LSB-based steganography method utilizing the Gray code for quantum RGB images is investigated. This method uses the Gray code to accommodate two secret qubits in 3 LSBs of each pixel simultaneously according to reference tables. Experimental consequences which are analyzed in MATLAB environment, exhibit that the present schema shows good performance and also it is more secure and applicable than the previous one currently found in the literature.

  1. StegNet: Mega Image Steganography Capacity with Deep Convolutional Network

    Directory of Open Access Journals (Sweden)

    Pin Wu

    2018-06-01

    Full Text Available Traditional image steganography often leans interests towards safely embedding hidden information into cover images with payload capacity almost neglected. This paper combines recent deep convolutional neural network methods with image-into-image steganography. It successfully hides the same size images with a decoding rate of 98.2% or bpp (bits per pixel of 23.57 by changing only 0.76% of the cover image on average. Our method directly learns end-to-end mappings between the cover image and the embedded image and between the hidden image and the decoded image. We further show that our embedded image, while with mega payload capacity, is still robust to statistical analysis.

  2. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  3. Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem.

    Science.gov (United States)

    Jain, Mamta; Kumar, Anil; Choudhary, Rishabh Charan

    2017-06-01

    In this article, we have proposed an improved diagonal queue medical image steganography for patient secret medical data transmission using chaotic standard map, linear feedback shift register, and Rabin cryptosystem, for improvement of previous technique (Jain and Lenka in Springer Brain Inform 3:39-51, 2016). The proposed algorithm comprises four stages, generation of pseudo-random sequences (pseudo-random sequences are generated by linear feedback shift register and standard chaotic map), permutation and XORing using pseudo-random sequences, encryption using Rabin cryptosystem, and steganography using the improved diagonal queues. Security analysis has been carried out. Performance analysis is observed using MSE, PSNR, maximum embedding capacity, as well as by histogram analysis between various Brain disease stego and cover images.

  4. Steganalysis of LSB Image Steganography using Multiple Regression and Auto Regressive (AR) Model

    OpenAIRE

    Souvik Bhattacharyya; Gautam Sanyal

    2011-01-01

    The staggering growth in communication technologyand usage of public domain channels (i.e. Internet) has greatly facilitated transfer of data. However, such open communication channelshave greater vulnerability to security threats causing unauthorizedin- formation access. Traditionally, encryption is used to realizethen communication security. However, important information is notprotected once decoded. Steganography is the art and science of communicating in a way which hides the existence o...

  5. Extreme learning machine based optimal embedding location finder for image steganography.

    Directory of Open Access Journals (Sweden)

    Hayfaa Abdulzahra Atee

    Full Text Available In image steganography, determining the optimum location for embedding the secret message precisely with minimum distortion of the host medium remains a challenging issue. Yet, an effective approach for the selection of the best embedding location with least deformation is far from being achieved. To attain this goal, we propose a novel approach for image steganography with high-performance, where extreme learning machine (ELM algorithm is modified to create a supervised mathematical model. This ELM is first trained on a part of an image or any host medium before being tested in the regression mode. This allowed us to choose the optimal location for embedding the message with best values of the predicted evaluation metrics. Contrast, homogeneity, and other texture features are used for training on a new metric. Furthermore, the developed ELM is exploited for counter over-fitting while training. The performance of the proposed steganography approach is evaluated by computing the correlation, structural similarity (SSIM index, fusion matrices, and mean square error (MSE. The modified ELM is found to outperform the existing approaches in terms of imperceptibility. Excellent features of the experimental results demonstrate that the proposed steganographic approach is greatly proficient for preserving the visual information of an image. An improvement in the imperceptibility as much as 28% is achieved compared to the existing state of the art methods.

  6. Spatial and Transform Domain based Steganography Using Chaotic ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... further improve security chaotic maps are used for scrambling the ... I. INTRODUCTION. With the rapid growth of internet network and computer ..... techniques, then we will have two layers of protection. In this scheme, the ...

  7. High-Capacity, High-Voltage Composite Oxide Cathode Materials

    Science.gov (United States)

    Hagh, Nader M.

    2015-01-01

    This SBIR project integrates theoretical and experimental work to enable a new generation of high-capacity, high-voltage cathode materials that will lead to high-performance, robust energy storage systems. At low operating temperatures, commercially available electrode materials for lithium-ion (Li-ion) batteries do not meet energy and power requirements for NASA's planned exploration activities. NEI Corporation, in partnership with the University of California, San Diego, has developed layered composite cathode materials that increase power and energy densities at temperatures as low as 0 degC and considerably reduce the overall volume and weight of battery packs. In Phase I of the project, through innovations in the structure and morphology of composite electrode particles, the partners successfully demonstrated an energy density exceeding 1,000 Wh/kg at 4 V at room temperature. In Phase II, the team enhanced the kinetics of Li-ion transport and electronic conductivity at 0 degC. An important feature of the composite cathode is that it has at least two components that are structurally integrated. The layered material is electrochemically inactive; however, upon structural integration with a spinel material, the layered material can be electrochemically activated and deliver a large amount of energy with stable cycling.

  8. Space qualification of high capacity grooved heat pipes

    Energy Technology Data Exchange (ETDEWEB)

    Dubois, M; Mullender, B; Druart, J [SABCA, Societe Anomyme Belgel de Construction Aeronautique (Belgium); Supper, W; Beddows, A [ESTEC-The (Netherlands)

    1997-12-31

    Based on the thermal requirements of the future telecommunication satellites, the development of a High Capacity Grooved Heat Pipe (HPG), was contracted by ESA to SABCA leading to an aluminium extruded heat pipe (outer diameter of 25 mm) based on a multi re-entrant grooves design. After an intensive acceptance test campaign whose results showed a good confidence in the design and the fulfillment of the required specifications of heat transport and on tilt capability (experimental maximum heat transport capability of 1500 Watt metres for a vapour temperature of 20 deg C), similar heat pipes have been developed with various outer diameters (11 mm, 15 mm and 20 mm) and with various shapes (circular outer shapes, integrated saddles). Several of these heat pipes were tested during two parabolic flight campaigns, by varying the heat loads during the micro-gravity periods. This HGP heat pipe family is now being submitted to a space qualification program according to ESA standards (ESA PSS-49), both in straight and bent configuration. Within this qualification, the heat pipes are submitted to an extended test campaign including environmental (random/sinus vibration, constant acceleration) and thermal tests (thermal performance, thermal cycle, thermal soak, ageing). (authors) 9 refs.

  9. High-capacity aqueous zinc batteries using sustainable quinone electrodes

    Science.gov (United States)

    Zhao, Qing; Huang, Weiwei; Luo, Zhiqiang; Liu, Luojia; Lu, Yong; Li, Yixin; Li, Lin; Hu, Jinyan; Ma, Hua; Chen, Jun

    2018-01-01

    Quinones, which are ubiquitous in nature, can act as sustainable and green electrode materials but face dissolution in organic electrolytes, resulting in fast fading of capacity and short cycle life. We report that quinone electrodes, especially calix[4]quinone (C4Q) in rechargeable metal zinc batteries coupled with a cation-selective membrane using an aqueous electrolyte, exhibit a high capacity of 335 mA h g−1 with an energy efficiency of 93% at 20 mA g−1 and a long life of 1000 cycles with a capacity retention of 87% at 500 mA g−1. The pouch zinc batteries with a respective depth of discharge of 89% (C4Q) and 49% (zinc anode) can deliver an energy density of 220 Wh kg−1 by mass of both a C4Q cathode and a theoretical Zn anode. We also develop an electrostatic potential computing method to demonstrate that carbonyl groups are active centers of electrochemistry. Moreover, the structural evolution and dissolution behavior of active materials during discharge and charge processes are investigated by operando spectral techniques such as IR, Raman, and ultraviolet-visible spectroscopies. Our results show that batteries using quinone cathodes and metal anodes in aqueous electrolyte are reliable approaches for mass energy storage. PMID:29511734

  10. Space qualification of high capacity grooved heat pipes

    Energy Technology Data Exchange (ETDEWEB)

    Dubois, M.; Mullender, B.; Druart, J. [SABCA, Societe Anomyme Belgel de Construction Aeronautique (Belgium); Supper, W.; Beddows, A. [ESTEC-The (Netherlands)

    1996-12-31

    Based on the thermal requirements of the future telecommunication satellites, the development of a High Capacity Grooved Heat Pipe (HPG), was contracted by ESA to SABCA leading to an aluminium extruded heat pipe (outer diameter of 25 mm) based on a multi re-entrant grooves design. After an intensive acceptance test campaign whose results showed a good confidence in the design and the fulfillment of the required specifications of heat transport and on tilt capability (experimental maximum heat transport capability of 1500 Watt metres for a vapour temperature of 20 deg C), similar heat pipes have been developed with various outer diameters (11 mm, 15 mm and 20 mm) and with various shapes (circular outer shapes, integrated saddles). Several of these heat pipes were tested during two parabolic flight campaigns, by varying the heat loads during the micro-gravity periods. This HGP heat pipe family is now being submitted to a space qualification program according to ESA standards (ESA PSS-49), both in straight and bent configuration. Within this qualification, the heat pipes are submitted to an extended test campaign including environmental (random/sinus vibration, constant acceleration) and thermal tests (thermal performance, thermal cycle, thermal soak, ageing). (authors) 9 refs.

  11. High-Capacity Spacesuit Evaporator Absorber Radiator (SEAR)

    Science.gov (United States)

    Izenson, Michael G.; Chen, Weibo; Phillips, Scott; Chepko, Ariane; Bue, Grant; Quinn, Gregory

    2015-01-01

    Future human space exploration missions will require advanced life support technology that can operate across a wide range of applications and environments. Thermal control systems for space suits and spacecraft will need to meet critical requirements for water conservation and multifunctional operation. This paper describes a Space Evaporator Absorber Radiator (SEAR) that has been designed to meet performance requirements for future life support systems. A SEAR system comprises a lithium chloride absorber radiator (LCAR) for heat rejection coupled with a space water membrane evaporator (SWME) for heat acquisition. SEAR systems provide heat pumping to minimize radiator size, thermal storage to accommodate variable environmental conditions, and water absorption to minimize use of expendables. We have built and tested a flight-like, high-capacity LCAR, demonstrated its performance in thermal vacuum tests, and explored the feasibility of an ISS demonstration test of a SEAR system. The new LCAR design provides the same cooling capability as prior LCAR prototypes while enabling over 30% more heat absorbing capacity. Studies show that it should be feasible to demonstrate SEAR operation in flight by coupling with an existing EMU on the space station.

  12. High-Capacity Short-Range Optical Communication Links

    DEFF Research Database (Denmark)

    Tatarczak, Anna

    Over the last decade, we have observed a tremendous spread of end-user mobile devices. The user base of a mobile application can grow or shrink by millions per day. This situation creates a pressing need for highly scalable server infrastructure; a need nowadays satisfied through cloud computing...... offered by data centers. As the popularity of cloud computing soars, the demand for high-speed, short-range data center links grows. Vertical cavity surface emitting lasers (VCSEL) and multimode fibers (MMF) prove especially well-suited for such scenarios. VCSELs have high modulation bandwidths......, we achieve 10 Gbps over 400 m and then conrm the approach in an optimized system at 25 Gbps over 300 m. The techniques described in this thesis leverage additional degrees of freedom to better utilize the available resources of short-range links. The proposed schemes enable higher speeds and longer...

  13. Building a Steganography Program Including How to Load, Process, and Save JPEG and PNG Files in Java

    Science.gov (United States)

    Courtney, Mary F.; Stix, Allen

    2006-01-01

    Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…

  14. Fast and simple high-capacity quantum cryptography with error detection

    Science.gov (United States)

    Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A.

    2017-04-01

    Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.

  15. Fast and simple high-capacity quantum cryptography with error detection.

    Science.gov (United States)

    Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A

    2017-04-13

    Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.

  16. High-Capacity Transmission Using High-Density Multicore Fiber

    DEFF Research Database (Denmark)

    Morioka, Toshio

    2017-01-01

    There have been intense research activities on SDM technologies including SDM fibers, MC-, MM-amplifiers, DEMUXs/DEMUXs with record-breaking transmission demonstrations up to 2 Pbit/s. 100 (20 dB) SDM gain, i.e. 10 Pbit/s per fiber will be a short-term goal in order for the new fibers to be consi......There have been intense research activities on SDM technologies including SDM fibers, MC-, MM-amplifiers, DEMUXs/DEMUXs with record-breaking transmission demonstrations up to 2 Pbit/s. 100 (20 dB) SDM gain, i.e. 10 Pbit/s per fiber will be a short-term goal in order for the new fibers...... to be considered for installation in the future systems although the far long term demand should be transporting 1 Ebit/s per fiber over 1000 km meaning Zbit/s-km. Cost effective network capability such as ADM and XC should also be investigated based on the new SDM schemes. In the 10-20 years time frame, we need...

  17. Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos

    Directory of Open Access Journals (Sweden)

    Geeta Kasana

    2016-02-01

    Full Text Available In this paper, a Bit Plane Coding (BPC based steganography technique for JPEG2000 images and Motion JPEG2000 video is proposed. Embedding in this technique is performed in the lowest significant bit planes of the wavelet coefficients of a cover image. In JPEG2000 standard, the number of bit planes of wavelet coefficients to be used in encoding is dependent on the compression rate and are used in Tier-2 process of JPEG2000. In the proposed technique, Tier-1 and Tier-2 processes of JPEG2000 and Motion JPEG2000 are executed twice on the encoder side to collect the information about the lowest bit planes of all code blocks of a cover image, which is utilized in embedding and transmitted to the decoder. After embedding secret data, Optimal Pixel Adjustment Process (OPAP is applied on stego images to enhance its visual quality. Experimental results show that proposed technique provides large embedding capacity and better visual quality of stego images than existing steganography techniques for JPEG2000 compressed images and videos. Extracted secret image is similar to the original secret image.

  18. A Novel Quantum Video Steganography Protocol with Large Payload Based on MCQI Quantum Video

    Science.gov (United States)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai

    2017-11-01

    As one of important multimedia forms in quantum network, quantum video attracts more and more attention of experts and scholars in the world. A secure quantum video steganography protocol with large payload based on the video strip encoding method called as MCQI (Multi-Channel Quantum Images) is proposed in this paper. The new protocol randomly embeds the secret information with the form of quantum video into quantum carrier video on the basis of unique features of video frames. It exploits to embed quantum video as secret information for covert communication. As a result, its capacity are greatly expanded compared with the previous quantum steganography achievements. Meanwhile, the new protocol also achieves good security and imperceptibility by virtue of the randomization of embedding positions and efficient use of redundant frames. Furthermore, the receiver enables to extract secret information from stego video without retaining the original carrier video, and restore the original quantum video as a follow. The simulation and experiment results prove that the algorithm not only has good imperceptibility, high security, but also has large payload.

  19. Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery

    Directory of Open Access Journals (Sweden)

    Afany Zeinata Firdaus

    2013-12-01

    Full Text Available In today's era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding the secret message is shorter than the average computation time making phase (extracting the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB . Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.

  20. Steganalysis and improvement of a quantum steganography protocol via a GHZ4 state

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2013-01-01

    Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, El Allati et al. proposed a new quantum steganography using the GHZ 4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ 4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ 4 state, we give another 8 groups of unitary transformations that can change the GHZ 4 state into 8 different quantum states. Due to the symmetry of the GHZ 4 state, all the possible 16 groups of unitary transformations change the GHZ 4 state into 8 different quantum states, so the improved protocol achieves a high efficiency

  1. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    Science.gov (United States)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  2. COMPARATIVE STUDY OF EDGE BASED LSB MATCHING STEGANOGRAPHY FOR COLOR IMAGES

    Directory of Open Access Journals (Sweden)

    A.J. Umbarkar

    2016-02-01

    Full Text Available Steganography is a very pivotal technique mainly used for covert transfer of information over a covert communication channel. This paper proposes a significant comparative study of the spatial LSB domain technique that focuses on sharper edges of the color as well as gray scale images for the purpose of data hiding and hides secret message first in sharper edge regions and then in smooth regions of the image. Message embedding depends on content of the image and message size. The experimental results illustrate that, for low embedding rate the method hides the message in sharp edges of cover image to get better stego image visualization quality. For high embedding rate, smooth regions and edges of the cover image are used for the purpose of data hiding. In this steganography method, color image and textured kind of image preserves better visual quality of stego image. The novelty of the comparative study is that, it helps to analyze the efficiency and performance of the method as it gives better results because it directly works on color images instead of converting to gray scale image.

  3. High-capacity, selective solid sequestrants for innovative chemical separation: Inorganic ion exchange approach

    International Nuclear Information System (INIS)

    Bray, L.

    1995-01-01

    The approach of this task is to develop high-capacity, selective solid inorganic ion exchangers for the recovery of cesium and strontium from nuclear alkaline and acid wastes. To achieve this goal, Pacific Northwest Laboratories (PNL) is collaborating with industry and university participants to develop high capacity, selective, solid ion exchangers for the removal of specific contaminants from nuclear waste streams

  4. Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications.

    Science.gov (United States)

    Loan, Nazir A; Parah, Shabir A; Sheikh, Javaid A; Akhoon, Jahangir A; Bhat, Ghulam M

    2017-09-01

    A high capacity and semi-reversible data hiding scheme based on Pixel Repetition Method (PRM) and hybrid edge detection for scalable medical images has been proposed in this paper. PRM has been used to scale up the small sized image (seed image) and hybrid edge detection ensures that no important edge information is missed. The scaled up version of seed image has been divided into 2×2 non overlapping blocks. In each block there is one seed pixel whose status decides the number of bits to be embedded in the remaining three pixels of that block. The Electronic Patient Record (EPR)/data have been embedded by using Least Significant and Intermediate Significant Bit Substitution (ISBS). The RC4 encryption has been used to add an additional security layer for embedded EPR/data. The proposed scheme has been tested for various medical and general images and compared with some state of art techniques in the field. The experimental results reveal that the proposed scheme besides being semi-reversible and computationally efficient is capable of handling high payload and as such can be used effectively for electronic healthcare applications. Copyright © 2017. Published by Elsevier Inc.

  5. A Novel Image Steganography Technique for Secured Online Transaction Using DWT and Visual Cryptography

    Science.gov (United States)

    Anitha Devi, M. D.; ShivaKumar, K. B.

    2017-08-01

    Online payment eco system is the main target especially for cyber frauds. Therefore end to end encryption is very much needed in order to maintain the integrity of secret information related to transactions carried online. With access to payment related sensitive information, which enables lot of money transactions every day, the payment infrastructure is a major target for hackers. The proposed system highlights, an ideal approach for secure online transaction for fund transfer with a unique combination of visual cryptography and Haar based discrete wavelet transform steganography technique. This combination of data hiding technique reduces the amount of information shared between consumer and online merchant needed for successful online transaction along with providing enhanced security to customer’s account details and thereby increasing customer’s confidence preventing “Identity theft” and “Phishing”. To evaluate the effectiveness of proposed algorithm Root mean square error, Peak signal to noise ratio have been used as evaluation parameters

  6. An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution

    Science.gov (United States)

    Chadha, Ankit; Satam, Neha; Sood, Rakshak; Bade, Dattatray

    2013-09-01

    In order to improve the data hiding in all types of multimedia data formats such as image and audio and to make hidden message imperceptible, a novel method for steganography is introduced in this paper. It is based on Least Significant Bit (LSB) manipulation and inclusion of redundant noise as secret key in the message. This method is applied to data hiding in images. For data hiding in audio, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) both are used. All the results displayed prove to be time-efficient and effective. Also the algorithm is tested for various numbers of bits. For those values of bits, Mean Square Error (MSE) and Peak-Signal-to-Noise-Ratio (PSNR) are calculated and plotted. Experimental results show that the stego-image is visually indistinguishable from the original cover-image when nsteganography process does not reveal presence of any hidden message, thus qualifying the criteria of imperceptible message.

  7. On Max-Plus Algebra and Its Application on Image Steganography

    Directory of Open Access Journals (Sweden)

    Kiswara Agung Santoso

    2018-01-01

    Full Text Available We propose a new steganography method to hide an image into another image using matrix multiplication operations on max-plus algebra. This is especially interesting because the matrix used in encoding or information disguises generally has an inverse, whereas matrix multiplication operations in max-plus algebra do not have an inverse. The advantages of this method are the size of the image that can be hidden into the cover image, larger than the previous method. The proposed method has been tested on many secret images, and the results are satisfactory which have a high level of strength and a high level of security and can be used in various operating systems.

  8. Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer

    Directory of Open Access Journals (Sweden)

    Michael J. Pelosi

    2018-04-01

    Full Text Available In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp. Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs. In this extended reprint, we introduce additional application and discussion regarding cold storage of crypto-currency account and password information, as well as applications for secure transfer in hostile or insecure network circumstances.

  9. Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication

    Directory of Open Access Journals (Sweden)

    Jung-oh Park

    2015-01-01

    Full Text Available Recently, as the utilization of CCTV (closed circuit television is emerging as an issue, the studies on CCTV are receiving much attention. Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure, SN (serial number, and R value (random number attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. This paper should be appropriate for utilization of user infringement-related CCTV where user information protection-related technology is not applied for CCTV in the future.

  10. Mesoporous Silicon-Based Anodes for High Capacity, High Performance Li-ion Batteries, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — A new high capacity anode composite based on mesoporous silicon is proposed. By virtue of a structure that resembles a pseudo one-dimensional phase, the active anode...

  11. Mechanics of high-capacity electrodes in lithium-ion batteries

    International Nuclear Information System (INIS)

    Zhu, Ting

    2016-01-01

    Rechargeable batteries, such as lithium-ion batteries, play an important role in the emerging sustainable energy landscape. Mechanical degradation and resulting capacity fade in high-capacity electrode materials critically hinder their use in high-performance lithium-ion batteries. This paper presents an overview of recent advances in understanding the electrochemically-induced mechanical behavior of the electrode materials in lithium-ion batteries. Particular emphasis is placed on stress generation and facture in high-capacity anode materials such as silicon. Finally, we identify several important unresolved issues for future research. (topical review)

  12. A novel fuzzy logic-based image steganography method to ensure medical data security.

    Science.gov (United States)

    Karakış, R; Güler, I; Çapraz, I; Bilir, E

    2015-12-01

    This study aims to secure medical data by combining them into one file format using steganographic methods. The electroencephalogram (EEG) is selected as hidden data, and magnetic resonance (MR) images are also used as the cover image. In addition to the EEG, the message is composed of the doctor׳s comments and patient information in the file header of images. Two new image steganography methods that are based on fuzzy-logic and similarity are proposed to select the non-sequential least significant bits (LSB) of image pixels. The similarity values of the gray levels in the pixels are used to hide the message. The message is secured to prevent attacks by using lossless compression and symmetric encryption algorithms. The performance of stego image quality is measured by mean square of error (MSE), peak signal-to-noise ratio (PSNR), structural similarity measure (SSIM), universal quality index (UQI), and correlation coefficient (R). According to the obtained result, the proposed method ensures the confidentiality of the patient information, and increases data repository and transmission capacity of both MR images and EEG signals. Copyright © 2015 Elsevier Ltd. All rights reserved.

  13. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography

    Science.gov (United States)

    Pevný, Tomáš; Filler, Tomáš; Bas, Patrick

    This paper presents a complete methodology for designing practical and highly-undetectable stegosystems for real digital media. The main design principle is to minimize a suitably-defined distortion by means of efficient coding algorithm. The distortion is defined as a weighted difference of extended state-of-the-art feature vectors already used in steganalysis. This allows us to "preserve" the model used by steganalyst and thus be undetectable even for large payloads. This framework can be efficiently implemented even when the dimensionality of the feature set used by the embedder is larger than 107. The high dimensional model is necessary to avoid known security weaknesses. Although high-dimensional models might be problem in steganalysis, we explain, why they are acceptable in steganography. As an example, we introduce HUGO, a new embedding algorithm for spatial-domain digital images and we contrast its performance with LSB matching. On the BOWS2 image database and in contrast with LSB matching, HUGO allows the embedder to hide 7× longer message with the same level of security level.

  14. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  15. Image Steganography of Multiple File Types with Encryption and Compression Algorithms

    Directory of Open Access Journals (Sweden)

    Ernest Andreigh C. Centina

    2017-05-01

    Full Text Available The goals of this study were to develop a system intended for securing files through the technique of image steganography integrated with cryptography by utilizing ZLIB Algorithm for compressing and decompressing secret files, DES Algorithm for encryption and decryption, and Least Significant Bit Algorithm for file embedding and extraction to avoid compromise on highly confidential files from exploits of unauthorized persons. Ensuing to this, the system is in acc ordance with ISO 9126 international quality standards. Every quality criteria of the system was evaluated by 10 Information Technology professionals, and the arithmetic Mean and Standard Deviation of the survey were computed. The result exhibits that m ost of them strongly agreed that the system is excellently effective based on Functionality, Reliability, Usability, Efficiency, Maintainability and Portability conformance to ISO 9126 standards. The system was found to be a useful tool for both governmen t agencies and private institutions for it could keep not only the message secret but also the existence of that particular message or file et maintaining the privacy of highly confidential and sensitive files from unauthorized access.

  16. Beyond the magic number four: Remapping high-capacity, pre-attentive, fragile working memory

    NARCIS (Netherlands)

    Zerr, P.; Gayet, S.; Mulder, K.T.; Sligte, I.G.; Stigchel, S. van der

    2017-01-01

    Visual short term memory allows us to access visual information after termination of its retinal input. Generally, a distinction is made between a robust, capacity-limited form (working memory, WM) and high-capacity, pre-attentive, maskable forms (sensory memory, e.g. fragile memory, FM). Eye

  17. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  18. Addition of titanium as a potential catalyst for a high-capacity hydrogen storage medium (abstract only)

    International Nuclear Information System (INIS)

    Zuliani, F; Baerends, E J

    2008-01-01

    In recent years there has been increased interest in the characterization of titanium as a catalyst for high-capacity hydrogen storage materials. A first-principles study (Yildirim and Ciraci 2005 Phys. Rev. Lett. 94 175501) demonstrated that a single Ti atom coated on a single-walled nanotube (SWNT) binds up to four hydrogen molecules. The bonding was claimed to be an 'unusual combination of chemisorption and physisorption'. We report an ab initio study by means of the ADF program, which provides a complete insight into the donation/back-donation mechanism characterizing the bond between the Ti atom and the four H 2 molecules, and a full understanding of the catalytic role played by the Ti atom. In addition, we found that the same amount of adsorbed hydrogen can be stored using benzene support for Ti in place of the SWNT, due to the dominant local contribution of the hexagonal carbon ring surrounding the Ti atom. The benzene-Ti-H 2 bonding is discussed on the basis of molecular orbital interaction schemes as provided by ADF. This result advances our insight into the role of titanium as a catalyst and suggests new routes to better storage through different combinations of supports and catalysts

  19. Effect of using different cover image quality to obtain robust selective embedding in steganography

    Science.gov (United States)

    Abdullah, Karwan Asaad; Al-Jawad, Naseer; Abdulla, Alan Anwer

    2014-05-01

    One of the common types of steganography is to conceal an image as a secret message in another image which normally called a cover image; the resulting image is called a stego image. The aim of this paper is to investigate the effect of using different cover image quality, and also analyse the use of different bit-plane in term of robustness against well-known active attacks such as gamma, statistical filters, and linear spatial filters. The secret messages are embedded in higher bit-plane, i.e. in other than Least Significant Bit (LSB), in order to resist active attacks. The embedding process is performed in three major steps: First, the embedding algorithm is selectively identifying useful areas (blocks) for embedding based on its lighting condition. Second, is to nominate the most useful blocks for embedding based on their entropy and average. Third, is to select the right bit-plane for embedding. This kind of block selection made the embedding process scatters the secret message(s) randomly around the cover image. Different tests have been performed for selecting a proper block size and this is related to the nature of the used cover image. Our proposed method suggests a suitable embedding bit-plane as well as the right blocks for the embedding. Experimental results demonstrate that different image quality used for the cover images will have an effect when the stego image is attacked by different active attacks. Although the secret messages are embedded in higher bit-plane, but they cannot be recognised visually within the stegos image.

  20. Estimation of Parameters Obtained by Electrochemical Impedance Spectroscopy on Systems Containing High Capacities

    Directory of Open Access Journals (Sweden)

    Mirjana Rajčić Vujasinović

    2009-09-01

    Full Text Available Electrochemical systems with high capacities demand devices for electrochemical impedance spectroscopy (EIS with ultra-low frequencies (in order of mHz, that are almost impossible to accomplish with analogue techniques, but this becomes possible by using a computer technique and accompanying digital equipment. Recently, an original software and hardware for electrochemical measurements, intended for electrochemical systems exhibiting high capacities, such as supercapacitors, has been developed. One of the included methods is EIS. In this paper, the method of calculation of circuit parameters from an EIS curve is described. The results of testing on a physical model of an electrochemical system, constructed of known elements (including a 1.6 F capacitor in a defined arrangement, proved the validity of the system and the method.

  1. Radiation and temperature effects on electronic components investigated under the CSTI high capacity power project

    International Nuclear Information System (INIS)

    Schwarze, G.E.; Niedra, J.M.; Frasca, A.J.; Wieserman, W.R.

    1993-01-01

    The effects of nuclear radiation and high temperature environments must be fully known and understood for the electronic components and materials used in both the Power Conditioning and Control subsystem and the reactor Instrumentation and Control subsystem of future high capacity nuclear space power systems. This knowledge is required by the designer of these subsystems in order to develop highly reliable, long-life power systems for future NASA missions. A review and summary of the experimental results obtained for the electronic components and materials investigated under the power management element of the CSTI high capacity power project will be presented in this paper: (1) Neutron, gamma ray, and temperature effects on power semiconductor switches, (2) Temperature and frequency effects on soft magnetic materials; and (3) Temperature effects on rare-earth permanent magnets

  2. High-Capacity Hydrogen-Based Green-Energy Storage Solutions For The Grid Balancing

    Science.gov (United States)

    D'Errico, F.; Screnci, A.

    One of the current main challenges in green-power storage and smart grids is the lack of effective solutions for accommodating the unbalance between renewable energy sources, that offer intermittent electricity supply, and a variable electricity demand. Energy management systems have to be foreseen for the near future, while they still represent a major challenge. Integrating intermittent renewable energy sources, by safe and cost-effective energy storage systems based on solid state hydrogen is today achievable thanks to recently some technology breakthroughs. Optimized solid storage method made of magnesium-based hydrides guarantees a very rapid absorption and desorption kinetics. Coupled with electrolyzer technology, high-capacity storage of green-hydrogen is therefore practicable. Besides these aspects, magnesium has been emerging as environmentally friend energy storage method to sustain integration, monitoring and control of large quantity of GWh from high capacity renewable generation in the EU.

  3. Radiation and temperature effects on electronic components investigated under the CSTI High Capacity Power Project

    International Nuclear Information System (INIS)

    Shwarze, G.E.; Wieserman, W.R.

    1994-01-01

    The effects of nuclear radiation and high temperature environments must be fully known and understood for the electronic components and materials used in both the Power Conditioning and Control subsystem and the reactor Instrumentation and Control subsystem of future high capacity nuclear space power systems. This knowledge is required by the designer of these subsystems in order to develop highly reliable, long-life power systems for future NASA missions. A review and summary of the experimental results obtained for the electronic components and materials investigated under the power management element of the CSTI high capacity power project will be presented in this paper: (1) Neutron, gamma ray, and temperature effects on power semiconductor switches, (2) Temperature and frequency effects on soft magnetic materials; and (3) Temperature effects on rare earth permanent magnets

  4. Silicon oxide based high capacity anode materials for lithium ion batteries

    Science.gov (United States)

    Deng, Haixia; Han, Yongbong; Masarapu, Charan; Anguchamy, Yogesh Kumar; Lopez, Herman A.; Kumar, Sujeet

    2017-03-21

    Silicon oxide based materials, including composites with various electrical conductive compositions, are formulated into desirable anodes. The anodes can be effectively combined into lithium ion batteries with high capacity cathode materials. In some formulations, supplemental lithium can be used to stabilize cycling as well as to reduce effects of first cycle irreversible capacity loss. Batteries are described with surprisingly good cycling properties with good specific capacities with respect to both cathode active weights and anode active weights.

  5. Reversible anionic redox chemistry in high-capacity layered-oxide electrodes

    Science.gov (United States)

    Sathiya, M.; Rousse, G.; Ramesha, K.; Laisa, C. P.; Vezin, H.; Sougrati, M. T.; Doublet, M.-L.; Foix, D.; Gonbeau, D.; Walker, W.; Prakash, A. S.; Ben Hassine, M.; Dupont, L.; Tarascon, J.-M.

    2013-09-01

    Li-ion batteries have contributed to the commercial success of portable electronics and may soon dominate the electric transportation market provided that major scientific advances including new materials and concepts are developed. Classical positive electrodes for Li-ion technology operate mainly through an insertion-deinsertion redox process involving cationic species. However, this mechanism is insufficient to account for the high capacities exhibited by the new generation of Li-rich (Li1+xNiyCozMn(1-x-y-z)O2) layered oxides that present unusual Li reactivity. In an attempt to overcome both the inherent composition and the structural complexity of this class of oxides, we have designed structurally related Li2Ru1-ySnyO3 materials that have a single redox cation and exhibit sustainable reversible capacities as high as 230 mA h g-1. Moreover, they present good cycling behaviour with no signs of voltage decay and a small irreversible capacity. We also unambiguously show, on the basis of an arsenal of characterization techniques, that the reactivity of these high-capacity materials towards Li entails cumulative cationic (Mn+→M(n+1)+) and anionic (O2-→O22-) reversible redox processes, owing to the d-sp hybridization associated with a reductive coupling mechanism. Because Li2MO3 is a large family of compounds, this study opens the door to the exploration of a vast number of high-capacity materials.

  6. High-Capacity Cathode Material with High Voltage for Li-Ion Batteries.

    Science.gov (United States)

    Shi, Ji-Lei; Xiao, Dong-Dong; Ge, Mingyuan; Yu, Xiqian; Chu, Yong; Huang, Xiaojing; Zhang, Xu-Dong; Yin, Ya-Xia; Yang, Xiao-Qing; Guo, Yu-Guo; Gu, Lin; Wan, Li-Jun

    2018-03-01

    Electrochemical energy storage devices with a high energy density are an important technology in modern society, especially for electric vehicles. The most effective approach to improve the energy density of batteries is to search for high-capacity electrode materials. According to the concept of energy quality, a high-voltage battery delivers a highly useful energy, thus providing a new insight to improve energy density. Based on this concept, a novel and successful strategy to increase the energy density and energy quality by increasing the discharge voltage of cathode materials and preserving high capacity is proposed. The proposal is realized in high-capacity Li-rich cathode materials. The average discharge voltage is increased from 3.5 to 3.8 V by increasing the nickel content and applying a simple after-treatment, and the specific energy is improved from 912 to 1033 Wh kg -1 . The current work provides an insightful universal principle for developing, designing, and screening electrode materials for high energy density and energy quality. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  8. Titanium-decorated graphene for high-capacity hydrogen storage studied by density functional simulations

    International Nuclear Information System (INIS)

    Liu Yali; Ren Ling; He Yao; Cheng Haiping

    2010-01-01

    We present results of density functional theory (DFT) calculations of the adsorption of hydrogen molecules on Ti-decorated graphene. Our results indicate that the binding energies of molecular hydrogen on Ti-decorated graphene can be dramatically enhanced to 0.23-0.60 eV. The hybridization of the Ti 3d orbitals with the H 2 σ and σ* orbitals plays a central role in the enhanced binding. There is also a contribution from the attractive interaction between the surface dipole and the dipole of polarized H 2 . It can be expected that Ti-decorated graphene could be considered as a potential high-capacity hydrogen storage medium.

  9. The Sensory Components of High-Capacity Iconic Memory and Visual Working Memory

    OpenAIRE

    Bradley, Claire; Pearson, Joel

    2012-01-01

    Early visual memory can be split into two primary components: a high-capacity, short-lived iconic memory followed by a limited-capacity visual working memory that can last many seconds. Whereas a large number of studies have investigated visual working memory for low-level sensory features, much research on iconic memory has used more “high-level” alphanumeric stimuli such as letters or numbers. These two forms of memory are typically examined separately, despite an intrinsic overlap in their...

  10. OTDM Networking for Short Range High-Capacity Highly Dynamic Networks

    DEFF Research Database (Denmark)

    Medhin, Ashenafi Kiros

    This PhD thesis aims at investigating the possibility of designing energy-efficient high-capacity (up to Tbit/s) optical network scenarios, leveraging on the effect of collective switching of many bits simultaneously, as is inherent in high bit rate serial optical data signals. The focus...... is on short range highly dynamic networks, catering to data center needs. The investigation concerns optical network scenarios, and experimental implementations of high bit rate serial data packet generation and reception, scalable optical packet labeling, simple optical label extraction and stable ultra...

  11. Development and Testing of a High Capacity Plasma Chemical Reactor in the Ukraine

    Energy Technology Data Exchange (ETDEWEB)

    Reilly, Raymond W.

    2012-07-30

    This project, Development and Testing of a High Capacity Plasma Chemical Reactor in the Ukraine was established at the Kharkiv Institute of Physics and Technology (KIPT). The associated CRADA was established with Campbell Applied Physics (CAP) located in El Dorado Hills, California. This project extends an earlier project involving both CAP and KIPT conducted under a separate CRADA. The initial project developed the basic Plasma Chemical Reactor (PCR) for generation of ozone gas. This project built upon the technology developed in the first project, greatly enhancing the output of the PCR while also improving reliability and system control.

  12. The sensory components of high-capacity iconic memory and visual working memory

    OpenAIRE

    Claire eBradley; Claire eBradley; Joel ePearson

    2012-01-01

    Early visual memory can be split into two primary components: a high-capacity, short-lived iconic memory followed by a limited-capacity visual working memory that can last many seconds. Whereas a large number of studies have investigated visual working memory for low-level sensory features, much research on iconic memory has used more high-level alphanumeric stimuli such as letters or numbers. These two forms of memory are typically examined separately, despite an intrinsic overlap in their c...

  13. Charge Modulation in Graphitic Carbon Nitride as a Switchable Approach to High-Capacity Hydrogen Storage.

    Science.gov (United States)

    Tan, Xin; Kou, Liangzhi; Tahini, Hassan A; Smith, Sean C

    2015-11-01

    Electrical charging of graphitic carbon nitride nanosheets (g-C4 N3 and g-C3 N4 ) is proposed as a strategy for high-capacity and electrocatalytically switchable hydrogen storage. Using first-principle calculations, we found that the adsorption energy of H2 molecules on graphitic carbon nitride nanosheets is dramatically enhanced by injecting extra electrons into the adsorbent. At full hydrogen coverage, the negatively charged graphitic carbon nitride achieves storage capacities up to 6-7 wt %. In contrast to other hydrogen storage approaches, the storage/release occurs spontaneously once extra electrons are introduced or removed, and these processes can be simply controlled by switching on/off the charging voltage. Therefore, this approach promises both facile reversibility and tunable kinetics without the need of specific catalysts. Importantly, g-C4 N3 has good electrical conductivity and high electron mobility, which can be a very good candidate for electron injection/release. These predictions may prove to be instrumental in searching for a new class of high-capacity hydrogen storage materials. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. High capacity fiber optic sensor networks using hybrid multiplexing techniques and their applications

    Science.gov (United States)

    Sun, Qizhen; Li, Xiaolei; Zhang, Manliang; Liu, Qi; Liu, Hai; Liu, Deming

    2013-12-01

    Fiber optic sensor network is the development trend of fiber senor technologies and industries. In this paper, I will discuss recent research progress on high capacity fiber sensor networks with hybrid multiplexing techniques and their applications in the fields of security monitoring, environment monitoring, Smart eHome, etc. Firstly, I will present the architecture of hybrid multiplexing sensor passive optical network (HSPON), and the key technologies for integrated access and intelligent management of massive fiber sensor units. Two typical hybrid WDM/TDM fiber sensor networks for perimeter intrusion monitor and cultural relics security are introduced. Secondly, we propose the concept of "Microstructure-Optical X Domin Refecltor (M-OXDR)" for fiber sensor network expansion. By fabricating smart micro-structures with the ability of multidimensional encoded and low insertion loss along the fiber, the fiber sensor network of simple structure and huge capacity more than one thousand could be achieved. Assisted by the WDM/TDM and WDM/FDM decoding methods respectively, we built the verification systems for long-haul and real-time temperature sensing. Finally, I will show the high capacity and flexible fiber sensor network with IPv6 protocol based hybrid fiber/wireless access. By developing the fiber optic sensor with embedded IPv6 protocol conversion module and IPv6 router, huge amounts of fiber optic sensor nodes can be uniquely addressed. Meanwhile, various sensing information could be integrated and accessed to the Next Generation Internet.

  15. E- and W-band high-capacity hybrid fiber-wireless link

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Pang, Xiaodan; Tafur Monroy, Idelfonso

    2014-01-01

    In this paper we summarize the work conducted in our group in the area of E- and W-band optical high-capacity fiber-wireless links. We present performance evaluations of E- and W-band mm-wave signal generation using photonic frequency upconversion employing both VCSELs and ECLs, along with transm...... in mobile backhaul/fronthaul applications, dense distributed antenna systems and fiber-over-radio scenarios.......In this paper we summarize the work conducted in our group in the area of E- and W-band optical high-capacity fiber-wireless links. We present performance evaluations of E- and W-band mm-wave signal generation using photonic frequency upconversion employing both VCSELs and ECLs, along...... with transmission over different type of optical fibers and for a number of values for the wireless link distance. Hybrid wireless-optical links can be composed of mature and resilient technology available off-the-shelf, and provide functionalities that can add value to optical access networks, specifically...

  16. Review on anionic redox for high-capacity lithium- and sodium-ion batteries

    International Nuclear Information System (INIS)

    Zhao, Chenglong; Lu, Yaxiang; Hu, Yong-Sheng; Chen, Liquan; Wang, Qidi; Li, Baohua

    2017-01-01

    Rechargeable batteries, especially lithium-ion batteries, are now widely used as power sources for portable electronics and electric vehicles, but material innovations are still needed to satisfy the increasing demand for larger energy density. Recently, lithium- and sodium-rich electrode materials, including the A 2 MO 3 -family layered compounds (A  =  Li, Na; M  =  Mn 4+ , Ru 4+ , etc), have been extensively studied as potential high-capacity electrode materials for a cumulative cationic and anionic redox activity. Negatively charged oxide ions can potentially donate electrons to compensate for the absence of oxidable transition metals as a redox center to further increase the reversible capacity. Understanding and controlling the state-of-the-art anionic redox processes is pivotal for the design of advanced energy materials, highlighted in rechargeable batteries. Hence, experimental and theoretical approaches have been developed to consecutively study the diverting processes, states, and structures involved. In this review, we attempt to present a literature overview and provide insight into the reaction mechanism with respect to the anionic redox processes, proposing some opinions as target oriented. It is hoped that, through this discussion, the search for anionic redox electrode materials with high-capacity rechargeable batteries can be advanced, and practical applications realized as soon as possible. (topical review)

  17. Final Scientific/Technical Report for Low Cost, High Capacity Non- Intercalation Chemistry Automotive Cells

    Energy Technology Data Exchange (ETDEWEB)

    Berdichevsky, Gene [Sila Nanotechnologies, Inc., Alameda, CA (United States)

    2017-09-08

    Commercial Li-ion batteries typically use Ni- and Co-based intercalation cathodes. As the demand for improved performance from batteries increases, these cathode materials will no longer be able to provide the desired energy storage characteristics since they are currently approaching their theoretical limits. Conversion cathode materials are prime candidates for improvement of Li-ion batteries. On both a volumetric and gravimetric basis they have higher theoretical capacity than intercalation cathode materials. Metal fluoride (MFx) cathodes offer higher specific energy density and dramatically higher volumetric energy density. Challenges associated with metal fluoride cathodes were addressed through nanostructured material design and synthesis. A major goal of this project was to develop and demonstrate Li-ion cells based on Si-comprising anodes and metal fluoride (MFx) comprising cathodes. Pairing the high-capacity MFx cathode with a high-capacity anode, such as an alloying Si anode, allows for the highest possible energy density on a cell level. After facing and overcoming multiple material synthesis and electrochemical instability challenges, we succeeded in fabrication of MFx half cells with cycle stability in excess of 500 cycles (to 20% or smaller degradation) and full cells with MFx-based cathodes and Si-based anodes with cycle stability in excess of 200 cycles (to 20% or smaller degradation).

  18. Crack-resistant polyimide coating for high-capacity battery anodes

    Science.gov (United States)

    Li, Yingshun; Wang, Shuo; Lee, Pui-Kit; He, Jieqing; Yu, Denis Y. W.

    2017-10-01

    Electrode cracking is a serious problem that hinders the application of many next-generation high-capacity anode materials for lithium-ion batteries. Even though nano-sizing the material can reduce fracturing of individual particles, capacity fading is still observed due to large volume change and loss of contact in the electrode during lithium insertion and extraction. In this study, we design a crack-resistant high-modulus polyimide coating with high compressive strength which can hold multiple particles together during charge and discharge to maintain contact. The effectiveness of the coating is demonstrated on tin dioxide, a high-capacity large-volume-change material that undergoes both alloy and conversion reactions. The polyimide coating improves capacity retention of SnO2 from 80% to 100% after 80 cycles at 250 mA g-1. Stable capacity of 585 mAh g-1 can be obtained even at 500 mA g-1 after 300 cycles. Scanning electron microscopy and in-situ dilatometry confirm that electrode cracking is suppressed and thickness change is reduced with the coating. In addition, the chemically-stable polyimide film can separate the surface from direct contact with electrolyte, improving coulombic efficiency to ∼100%. We expect the novel strategy of suppressing electrode degradation with a crack-resistant coating can also be used for other alloy and conversion-based anodes.

  19. The sensory components of high-capacity iconic memory and visual working memory.

    Science.gov (United States)

    Bradley, Claire; Pearson, Joel

    2012-01-01

    EARLY VISUAL MEMORY CAN BE SPLIT INTO TWO PRIMARY COMPONENTS: a high-capacity, short-lived iconic memory followed by a limited-capacity visual working memory that can last many seconds. Whereas a large number of studies have investigated visual working memory for low-level sensory features, much research on iconic memory has used more "high-level" alphanumeric stimuli such as letters or numbers. These two forms of memory are typically examined separately, despite an intrinsic overlap in their characteristics. Here, we used a purely sensory paradigm to examine visual short-term memory for 10 homogeneous items of three different visual features (color, orientation and motion) across a range of durations from 0 to 6 s. We found that the amount of information stored in iconic memory is smaller for motion than for color or orientation. Performance declined exponentially with longer storage durations and reached chance levels after ∼2 s. Further experiments showed that performance for the 10 items at 1 s was contingent on unperturbed attentional resources. In addition, for orientation stimuli, performance was contingent on the location of stimuli in the visual field, especially for short cue delays. Overall, our results suggest a smooth transition between an automatic, high-capacity, feature-specific sensory-iconic memory, and an effortful "lower-capacity" visual working memory.

  20. Does visual short-term memory have a high-capacity stage?

    Science.gov (United States)

    Matsukura, Michi; Hollingworth, Andrew

    2011-12-01

    Visual short-term memory (VSTM) has long been considered a durable, limited-capacity system for the brief retention of visual information. However, a recent work by Sligte et al. (Plos One 3:e1699, 2008) reported that, relatively early after the removal of a memory array, a cue allowed participants to access a fragile, high-capacity stage of VSTM that is distinct from iconic memory. In the present study, we examined whether this stage division is warranted by attempting to corroborate the existence of an early, high-capacity form of VSTM. The results of four experiments did not support Sligte et al.'s claim, since we did not obtain evidence for VSTM retention that exceeded traditional estimates of capacity. However, performance approaching that observed in Sligte et al. can be achieved through extensive practice, providing a clear explanation for their findings. Our evidence favors the standard view of VSTM as a limited-capacity system that maintains a few object representations in a relatively durable form.

  1. Study on the flow nonuniformity in a high capacity Stirling pulse tube cryocooler

    Science.gov (United States)

    You, X.; Zhi, X.; Duan, C.; Jiang, X.; Qiu, L.; Li, J.

    2017-12-01

    High capacity Stirling-type pulse tube cryocoolers (SPTC) have promising applications in high temperature superconductive motor and gas liquefaction. However, with the increase of cooling capacity, its performance deviates from well-accepted one-dimensional model simulation, such as Sage and Regen, mainly due to the strong field nonuniformity. In this study, several flow straighteners placed at both ends of the pulse tube are investigated to improve the flow distribution. A two-dimensional model of the pulse tube based on the computational fluid dynamics (CFD) method has been built to study the flow distribution of the pulse tube with different flow straighteners including copper screens, copper slots, taper transition and taper stainless slot. A SPTC set-up which has more than one hundred Watts cooling power at 80 K has been built and tested. The flow straighteners mentioned above have been applied and tested. The results show that with the best flow straightener the cooling performance of the SPTC can be significantly improved. Both CFD simulation and experiment show that the straighteners have impacts on the flow distribution and the performance of the high capacity SPTC.

  2. The sensory components of high-capacity iconic memory and visual working memory

    Directory of Open Access Journals (Sweden)

    Claire eBradley

    2012-09-01

    Full Text Available Early visual memory can be split into two primary components: a high-capacity, short-lived iconic memory followed by a limited-capacity visual working memory that can last many seconds. Whereas a large number of studies have investigated visual working memory for low-level sensory features, much research on iconic memory has used more high-level alphanumeric stimuli such as letters or numbers. These two forms of memory are typically examined separately, despite an intrinsic overlap in their characteristics. Here, we used a purely sensory paradigm to examine visual short-term memory for 10 homogeneous items of 3 different visual features (colour, orientation and motion across a range of durations from 0 to 6 seconds. We found that the amount of information stored in iconic memory is smaller for motion than for colour or orientation. Performance declined exponentially with longer storage durations and reached chance levels after ~2 seconds. Further experiments showed that performance for the 10 items at 1 second was contingent on unperturbed attentional resources. In addition, for orientation stimuli, performance was contingent on the location of stimuli in the visual field, especially for short cue delays. Overall, our results suggest a smooth transition between an automatic, high-capacity, feature-specific sensory-iconic memory and an effortful ‘lower-capacity’ visual working memory.

  3. A review on "A Novel Technique for Image Steganography Based on Block-DCT and Huffman Encoding"

    Science.gov (United States)

    Das, Rig; Tuithung, Themrichon

    2013-03-01

    This paper reviews the embedding and extraction algorithm proposed by "A. Nag, S. Biswas, D. Sarkar and P. P. Sarkar" on "A Novel Technique for Image Steganography based on Block-DCT and Huffman Encoding" in "International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010" [3] and shows that the Extraction of Secret Image is Not Possible for the algorithm proposed in [3]. 8 bit Cover Image of size is divided into non joint blocks and a two dimensional Discrete Cosine Transformation (2-D DCT) is performed on each of the blocks. Huffman Encoding is performed on an 8 bit Secret Image of size and each bit of the Huffman Encoded Bit Stream is embedded in the frequency domain by altering the LSB of the DCT coefficients of Cover Image blocks. The Huffman Encoded Bit Stream and Huffman Table

  4. Audre's daughter: Black lesbian steganography in Dee Rees' Pariah and Audre Lorde's Zami: A New Spelling of My Name.

    Science.gov (United States)

    Kang, Nancy

    2016-01-01

    This article argues that African-American director Dee Rees' critically acclaimed debut Pariah (2011) is a rewriting of lesbian poet-activist Audre Lorde's iconic "bio-mythography" Zami: A New Spelling of My Name (1982). The article examines how Rees' work creatively and subtly re-envisions Lorde's Zami by way of deeply rooted and often cleverly camouflaged patterns, resonances, and contrasts. Shared topics include naming, mother-daughter bonds, the role of clothing in identity formation, domestic abuse, queer time, and lesbian, gay, bisexual, and transgender legacy discourse construction. What emerges between the visual and written texts is a hidden language of connection--what may be termed Black lesbian steganography--which proves thought-provoking to viewers and readers alike.

  5. Klasifikasi Bit-Plane Noise untuk Penyisipan Pesan pada Teknik Steganography BPCS Menggunakan Fuzzy Inference Sistem Mamdani

    Directory of Open Access Journals (Sweden)

    Rahmad Hidayat

    2015-04-01

    Full Text Available Bit-Plane Complexity Segmentation (BPCS is a fairly new steganography technique. The most important process in BPCS is the calculation of complexity value of a bit-plane. The bit-plane complexity is calculated by looking at the amount of bit changes contained in a bit-plane. If a bit-plane has a high complexity, the bi-plane is categorized as a noise bit-plane that does not contain valuable information on the image. Classification of the bit-plane using the set cripst set (noise/not is not fair, where a little difference of the value will significantly change the status of the bit-plane. The purpose of this study is to apply the principles of fuzzy sets to classify the bit-plane into three sets that are informative, partly informative, and the noise region. Classification of the bit-plane into a fuzzy set is expected to classify the bit-plane in a more objective approach and ultimately message capacity of the images can be improved by using the Mamdani fuzzy inference to take decisions which bit-plane will be replaced with a message based on the classification of bit-plane and the size of the message that will be inserted. This research is able to increase the capability of BPCS steganography techniques to insert a message in bit-pane with more precise so that the container image quality would be better. It can be seen that the PSNR value of original image and stego-image is only slightly different.

  6. High capacity argon extraction and purification system. [Suitable for age estimation of rocks

    Energy Technology Data Exchange (ETDEWEB)

    Balogh, K; Morik, Gy [Magyar Tudomanyos Akademia Atommag Kutato Intezete, Debrecen

    1979-01-01

    A high capacity metal-glass argon extraction and purification system has been developed for K/Ar dating of geologic materials. A set of samples can be loaded simultaneously and degassed in turn in the system by high frequency induction heating in a molybdenum crucible. The argon purification is carried out by titanium sponge, molecular sieve, copper oxide and glass and charcoal filled traps cooled by liquid nitrogen. The /sup 38/Ar spike and the atmospheric argon used for calibrating the mass spectrometer are dispensed by a gas-pipette system. 80-120 minutes after starting the degassing of the sample, the purified argon can be introduced into the mass spectrometer; the gettering materials regenerate in 1-5 hours, thus 1-3 samples may be analysed a day. The atmospheric argon inflow during an experimental process is less than 5x10/sup -8/ cc STP.

  7. Design of a Two-stage High-capacity Stirling Cryocooler Operating below 30K

    Science.gov (United States)

    Wang, Xiaotao; Dai, Wei; Zhu, Jian; Chen, Shuai; Li, Haibing; Luo, Ercang

    The high capacity cryocooler working below 30K can find many applications such as superconducting motors, superconducting cables and cryopump. Compared to the GM cryocooler, the Stirling cryocooler can achieve higher efficiency and more compact structure. Because of these obvious advantages, we have designed a two stage free piston Stirling cryocooler system, which is driven by a moving magnet linear compressor with an operating frequency of 40 Hz and a maximum 5 kW input electric power. The first stage of the cryocooler is designed to operate in the liquid nitrogen temperature and output a cooling power of 100 W. And the second stage is expected to simultaneously provide a cooling power of 50 W below the temperature of 30 K. In order to achieve the best system efficiency, a numerical model based on the thermoacoustic model was developed to optimize the system operating and structure parameters.

  8. Key technology studies of GY-20 and GY-40 High-capacity cobalt-60 transport casks

    International Nuclear Information System (INIS)

    Liu Huifang; Zhang Xin

    2012-01-01

    GY-20 and GY-40 high-capacity cobalt-60 transport casks are used to transport cobalt-60 industrial irradiators and cobalt-60 bundles. The radioactive contents have special features of high-activity and high residual heat, so only a few countries such as Canada, England and Russia have design capacity. The key technologies and corresponding solutions were studied for the design and manufacture of the cask taking into account the structural, thermal, mechanics and shield requests. A series of tests prove that the cask structure design, design criteria for lead coating structure and quality control measurements are reasonable and effective, and the cask shield integrity can be ensured for all conditions. The casks have ability to transport high-activity sealed sources safely, and the design of cask satisfies the requirement of design code and standard. It can provide reference for other B type package. (authors)

  9. Development of high-capacity nickel-metal hydride batteries using superlattice hydrogen-absorbing alloys

    Science.gov (United States)

    Yasuoka, Shigekazu; Magari, Yoshifumi; Murata, Tetsuyuki; Tanaka, Tadayoshi; Ishida, Jun; Nakamura, Hiroshi; Nohma, Toshiyuki; Kihara, Masaru; Baba, Yoshitaka; Teraoka, Hirohito

    New R-Mg-Ni (R: rare earths) superlattice alloys with higher-capacity and higher-durability than the conventional Mm-Ni alloys with CaCu 5 structure have been developed. The oxidation resistibility of the superlattice alloys has been improved by optimizing the alloy composition by such as substituting aluminum for nickel and optimizing the magnesium content in order to prolong the battery life. High-capacity nickel-metal hydride batteries for the retail market, the Ni-MH2500/900 series (AA size type 2500 mAh, AAA size type 900 mAh), have been developed and commercialized by using an improved superlattice alloy for negative electrode material.

  10. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    of broadband services access. To realize the seamless convergence between the two network segments, the lower capacity of wireless systems need to be increased to match the continuously increasing bandwidth of fiber-optic systems. The research works included in this thesis are devoted to experimental...... investigations of photonic-wireless links with record high capacities to fulfill the requirements of next generation hybrid optical fiber-wireless access networks. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high speed millimeter-wave (mm-wave) communication links......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility...

  11. A micro-structured Si-based electrodes for high capacity electrical double layer capacitors

    International Nuclear Information System (INIS)

    Krikscikas, Valdas; Oguchi, Hiroyuki; Hara, Motoaki; Kuwano, Hiroki; Yanazawa, Hiroshi

    2014-01-01

    We challenged to make basis for Si electrodes of electric double layer capacitors (EDLC) used as a power source of micro-sensor nodes. Mcroelectromechanical systems (MEMS) processes were successfully introduced to fabricate micro-structured Si-based electrodes to obtain high surface area which leads to high capacity of EDLCs. Study of fundamental properties revealed that the microstructured electrodes benefit from good wettability to electrolytes, but suffer from electric resistance. We found that this problem can be solved by metal-coating of the electrode surface. Finally we build an EDLC consisting of Au-coated micro-structured Si electrodes. This EDLC showed capacity of 14.3 mF/cm 2 , which is about 530 times larger than that of an EDLC consisting of flat Au electrodes

  12. An FDMA system concept for 30/20 GHz high capacity domestic satellite service

    Science.gov (United States)

    Berk, G.; Jean, P. N.; Rotholz, E.; White, B. E.

    1982-01-01

    The paper summarizes a feasibility study of a multibeam FDMA satellite system operating in the 30/20 GHz band. The system must accommodate a very high volume of traffic within the restrictions of a 5 kW solar cell array and a 2.5 GHz bandwidth. Multibeam satellite operation reduces the DC power demand and allows reuse of the available bandwidth. Interferences among the beams are brought to acceptable levels by appropriate frequency assignments. A transponder design is presented; it is greatly simplified by the application of a regional concept. System analysis shows that MSK modulation is appropriate for a high-capacity system because it conserves the frequency spectrum. Rain attenuation, a serious problem in this frequency band, is combatted with sufficient power margins and with coding. Link budgets, cost analysis, and weight and power calculations are also discussed. A satellite-routed FDMA system compares favorably in performance and cost with a satellite-switched TDMA system.

  13. Operating experience with a high capacity helium pump under supercritical conditions

    International Nuclear Information System (INIS)

    Lehmann, W.; Minges, J.

    1984-01-01

    This chapter discusses the development and testing of a high-capacity piston pump to provide forced cooling for large superconducting magnets. The pump is a three cylinder, vertically arranged single-acting piston pump equipped with a frequency controlled three-phase geared motor operating at room temperature. The pump is capable of delivering up to 150 g/s at a maximum speed of 310 rpm and under the inlet conditions of 4 bar/4.5 K. No decline was noticed in delivery head and efficiencies during more than 560 hours of operation. It is concluded that the pump satisfies all requirements for circulating large mass flows across great pressure differences as needed (e.g. in fusion magnet design)

  14. Porous carbon with small mesoporesas an ultra-high capacity adsorption medium

    Science.gov (United States)

    Gao, Biaofeng; Zhou, Haitao; Chen, De; Yang, Jianhong

    2017-10-01

    Resins (732-type), abundant and inexpensive resources were used to prepare porous carbon with small mesopores (CSM) by carbonization and post-chemical-activation with potassium hydroxide (KOH). The N2 adsorption measurements revealed that CSM had high surface areas (1776.5 m2 g-1), large pore volumes (1.10 cm3 g-1), and nearly optimal narrow small mesopore sizes ranging from 2 to 7 nm. CSM was used as adsorbent to investigate the adsorption behavior for Rhodamine B (RhB). Due to the optimal pore size distributions (PSD), intensive-stacking interaction, S-doped, and electrostatic attraction, the CSM exhibited an ultra-high-capacity of 1590 mg g-1 for RhB in aqueous solutions.

  15. Flower-like SnO2/graphene composite for high-capacity lithium storage

    International Nuclear Information System (INIS)

    Liu Hongdong; Huang Jiamu; Li Xinlu; Liu Jia; Zhang Yuxin; Du Kun

    2012-01-01

    Flower-like SnO 2 /graphene composite is synthesized by a simple hydrothermal method for high-capacity lithium storage. The as-prepared products are characterized by XRD, FTIR, FESEM, TGA and Nitrogen adsorption/desorption. The electrochemical performance of the flower-like SnO 2 /graphene composite is measured by cyclic voltammetry and galvanostatic charge/discharge cycling. The results show that the flower-like SnO 2 nanorod clusters are 800 nm in size and homogeneously adhere on graphene sheets. The flower-like SnO 2 /graphene composite displays superior Li-battery performance with large reversible capacity, excellent cyclic performance and good rate capability.

  16. Development of high-capacity nickel-metal hydride batteries using superlattice hydrogen-absorbing alloys

    International Nuclear Information System (INIS)

    Yasuoka, Shigekazu; Magari, Yoshifumi; Murata, Tetsuyuki; Tanaka, Tadayoshi; Ishida, Jun; Nakamura, Hiroshi; Nohma, Toshiyuki; Kihara, Masaru; Baba, Yoshitaka; Teraoka, Hirohito

    2006-01-01

    New R-Mg-Ni (R: rare earths) superlattice alloys with higher-capacity and higher-durability than the conventional Mm-Ni alloys with CaCu 5 structure have been developed. The oxidation resistibility of the superlattice alloys has been improved by optimizing the alloy composition by such as substituting aluminum for nickel and optimizing the magnesium content in order to prolong the battery life. High-capacity nickel-metal hydride batteries for the retail market, the Ni-MH2500/900 series (AA size type 2500mAh, AAA size type 900mAh), have been developed and commercialized by using an improved superlattice alloy for negative electrode material. alized by using an improved superlattice alloy for negative electrode material. (author)

  17. Durability testing of the high-capacity GA-4/GA-9 trailer

    International Nuclear Information System (INIS)

    Zimmer, A.

    1993-01-01

    General Atomics (GA) is under contract to the US Department of Energy (DOE), Idaho Field Office, to develop two legal-weight truck from-reactor spent-fuel shipping casks with trailers. GA is developing these high capacity transport systems to support the Office of Civilian Radioactive Waste Management's (OCRWM) mission to transport spent fuel from reactors to a permanent disposal site. GA's goal is to maximize the number of fuel assemblies that the transport system can safely carry. The GA-4 Cask is being designed to transport four pressurized-water-reactor (PWR) spent-fuel assemblies, and the GA-9 Cask is being designed to transport nine boiling-water-reactor (BWR) spent-fuel assemblies. The use of these high-capacity transport systems will have a large benefit to-public safety since the number of legal-weight truck shipments will be reduced by at least a factor of four over existing spent-fuel shipping cask systems. Achieving these capacities requires that the weight of each component of the transport system. i.e., cask, trailer and tractor, be minimized. The weight of the trailer is of particular importance. With a high load-to-weight ratio, the durability and reliability of the trailer become significant factors in the success of the transport system. In order to verify that the trailer design will meet the durability and performance requirements to safely transport spent-fuel, GA has planned an extensive testing program. The testing program includes non-destructive examination (NDE) of the trailer welds, operational testing, a static load test, an over-the-road performance test, and a test to verify the durability of the trailer up to its 1,000,000-mile design life. Since a prototype cask will not be available for the testing, GA designed and built a dummy payload that simulates the correct weight distribution and approximates the dynamic response of the prototype cask

  18. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  19. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states

    Science.gov (United States)

    Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo

    2017-12-01

    This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.

  20. High-capacity, high-strength trailer designs for the GA-4/GA-9 casks

    International Nuclear Information System (INIS)

    Rickard, N.D.; Kissinger, J.A.; Taylor, C.; Zimmer, A.

    1991-01-01

    General Atomics (GA) is developing final designs for two dedicated legal-weight trailers to transport the GA-4 and GA-9 Spent-Fuel Casks. The basic designs for these high-capacity, high-strength trailers are essentially identical except for small modifications to account for the differences in cask geometry. The authors are designing both trailers to carry a 55,000 lb (24,900 kg) payload and to withstand a 2.5 g vertical design load. The GA-4 and GA-9 trailers are designed for significantly higher loads than are typical commercial semitrailers, which are designed to loads in the range of 1.7 to 2.0 g. To meet the federal gross vehicle weight limit for legal-weight trucks, GA has set a target design weight for the trailers of 9000 lb (4080 kg). This weight includes the personnel barrier, cask tiedowns, and impact limiter removal and storage system. Based on the preliminary trailer designs, the final design weight will to be very close to this target weight

  1. Carbon Nanofiber/3D Nanoporous Silicon Hybrids as High Capacity Lithium Storage Materials.

    Science.gov (United States)

    Park, Hyeong-Il; Sohn, Myungbeom; Kim, Dae Sik; Park, Cheolho; Choi, Jeong-Hee; Kim, Hansu

    2016-04-21

    Carbon nanofiber (CNF)/3D nanoporous (3DNP) Si hybrid materials were prepared by chemical etching of melt-spun Si/Al-Cu-Fe alloy nanocomposites, followed by carbonization using a pitch. CNFs were successfully grown on the surface of 3DNP Si particles using residual Fe impurities after acidic etching, which acted as a catalyst for the growth of CNFs. The resulting CNF/3DNP Si hybrid materials showed an enhanced cycle performance up to 100 cycles compared to that of the pristine Si/Al-Cu-Fe alloy nanocomposite as well as that of bare 3DNP Si particles. These results indicate that CNFs and the carbon coating layer have a beneficial effect on the capacity retention characteristics of 3DNP Si particles by providing continuous electron-conduction pathways in the electrode during cycling. The approach presented here provides another way to improve the electrochemical performances of porous Si-based high capacity anode materials for lithium-ion batteries. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. State Violence and Oppositional Protest in High-Capacity Authoritarian Regimes

    Directory of Open Access Journals (Sweden)

    Hank Johnston

    2012-05-01

    Full Text Available This examination of the mobilization-repression nexus in high-capacity authoritarian regimes draws on examples from China, Russia, Iran, and several Middle Eastern states to develop a framework for analyzing state violence and how political oppositions are organized. The study examines middle and low levels of state violence, the provincial and municipal organization of party and regime, and the police, private militias, and thugs as low-level enforcers, and focuses on: (1 the complexity of the state’s apparatus of repression and control and how different levels exercise different forms of violence against activists; (2 the creativity of the opposition’s actions to voice its demands and avoid repression and surveillance; and (3 the recursive relationship between the two, a dark dance between state and opposition with high stakes for both. Hierarchical analysis at national, provincial, and local levels, and lateral analysis across these levels, where elite interests frequently diverge, show that intersections and gaps on both axes can create lapses in social control and openings the opposition. These free spaces of speech and innovative action give rise to novel ways to keep oppositional sentiments in the public forum. The article offers several propositions for analyzing repression and state violence at various levels, and, similarly, the various ways that these free spaces occur.

  3. Study on a high capacity two-stage free piston Stirling cryocooler working around 30 K

    Science.gov (United States)

    Wang, Xiaotao; Zhu, Jian; Chen, Shuai; Dai, Wei; Li, Ke; Pang, Xiaomin; Yu, Guoyao; Luo, Ercang

    2016-12-01

    This paper presents a two-stage high-capacity free-piston Stirling cryocooler driven by a linear compressor to meet the requirement of the high temperature superconductor (HTS) motor applications. The cryocooler system comprises a single piston linear compressor, a two-stage free piston Stirling cryocooler and a passive oscillator. A single stepped displacer configuration was adopted. A numerical model based on the thermoacoustic theory was used to optimize the system operating and structure parameters. Distributions of pressure wave, phase differences between the pressure wave and the volume flow rate and different energy flows are presented for a better understanding of the system. Some characterizing experimental results are presented. Thus far, the cryocooler has reached a lowest cold-head temperature of 27.6 K and achieved a cooling power of 78 W at 40 K with an input electric power of 3.2 kW, which indicates a relative Carnot efficiency of 14.8%. When the cold-head temperature increased to 77 K, the cooling power reached 284 W with a relative Carnot efficiency of 25.9%. The influences of different parameters such as mean pressure, input electric power and cold-head temperature are also investigated.

  4. On-demand high-capacity ride-sharing via dynamic trip-vehicle assignment.

    Science.gov (United States)

    Alonso-Mora, Javier; Samaranayake, Samitha; Wallar, Alex; Frazzoli, Emilio; Rus, Daniela

    2017-01-17

    Ride-sharing services are transforming urban mobility by providing timely and convenient transportation to anybody, anywhere, and anytime. These services present enormous potential for positive societal impacts with respect to pollution, energy consumption, congestion, etc. Current mathematical models, however, do not fully address the potential of ride-sharing. Recently, a large-scale study highlighted some of the benefits of car pooling but was limited to static routes with two riders per vehicle (optimally) or three (with heuristics). We present a more general mathematical model for real-time high-capacity ride-sharing that (i) scales to large numbers of passengers and trips and (ii) dynamically generates optimal routes with respect to online demand and vehicle locations. The algorithm starts from a greedy assignment and improves it through a constrained optimization, quickly returning solutions of good quality and converging to the optimal assignment over time. We quantify experimentally the tradeoff between fleet size, capacity, waiting time, travel delay, and operational costs for low- to medium-capacity vehicles, such as taxis and van shuttles. The algorithm is validated with ∼3 million rides extracted from the New York City taxicab public dataset. Our experimental study considers ride-sharing with rider capacity of up to 10 simultaneous passengers per vehicle. The algorithm applies to fleets of autonomous vehicles and also incorporates rebalancing of idling vehicles to areas of high demand. This framework is general and can be used for many real-time multivehicle, multitask assignment problems.

  5. High-capacity, high-strength trailer designs for the GA-4/GA-9 Casks

    International Nuclear Information System (INIS)

    Kissinger, J.A.; Rickard, N.D.; Taylor, C.; Zimmer, A.

    1991-01-01

    General Atomics (GA) is developing final designs for two dedicated legal-weight trailers to transport the GA-4 and GA-9 Spent-Fuel Casks. The basic designs for these high-capacity, high-strength trailers are essentially identical except for small modifications to account for the differences in cask geometry. We are designing both trailers to carry a 55,000 lb (24,900 kg) payload and to withstand a 2.5 g vertical design load. The GA-4 and GA-9 trailers are designed for significantly higher loads than are typical commercial semitrailers, which are designed to loads in the range of 1.7 to 2.0 g. To meet the federal gross vehicle weight limit for legal-weight trucks, GA has set a target design weight for the trailers of 9000 lb (4080 kg). This weight includes the personnel barrier, cask tiedowns, and impact limiter removal and storage system. Based on the preliminary trailer designs, the final design weight is expected to be very close to this target weight. 3 refs., 3 figs

  6. High capacity for extracellular acid-base regulation in the air-breathing fish Pangasianodon hypophthalmus.

    Science.gov (United States)

    Damsgaard, Christian; Gam, Le Thi Hong; Tuong, Dang Diem; Thinh, Phan Vinh; Huong Thanh, Do Thi; Wang, Tobias; Bayley, Mark

    2015-05-01

    The evolution of accessory air-breathing structures is typically associated with reduction of the gills, although branchial ion transport remains pivotal for acid-base and ion regulation. Therefore, air-breathing fishes are believed to have a low capacity for extracellular pH regulation during a respiratory acidosis. In the present study, we investigated acid-base regulation during hypercapnia in the air-breathing fish Pangasianodon hypophthalmus in normoxic and hypoxic water at 28-30°C. Contrary to previous studies, we show that this air-breathing fish has a pronounced ability to regulate extracellular pH (pHe) during hypercapnia, with complete metabolic compensation of pHe within 72 h of exposure to hypoxic hypercapnia with CO2 levels above 34 mmHg. The high capacity for pHe regulation relies on a pronounced ability to increase levels of HCO3(-) in the plasma. Our study illustrates the diversity in the physiology of air-breathing fishes, such that generalizations across phylogenies may be difficult. © 2015. Published by The Company of Biologists Ltd.

  7. Li2C2, a High-Capacity Cathode Material for Lithium Ion Batteries.

    Science.gov (United States)

    Tian, Na; Gao, Yurui; Li, Yurong; Wang, Zhaoxiang; Song, Xiaoyan; Chen, Liquan

    2016-01-11

    As a typical alkaline earth metal carbide, lithium carbide (Li2C2) has the highest theoretical specific capacity (1400 mA h g(-1)) among all the reported lithium-containing cathode materials for lithium ion batteries. Herein, the feasibility of using Li2C2 as a cathode material was studied. The results show that at least half of the lithium can be extracted from Li2C2 and the reversible specific capacity reaches 700 mA h g(-1). The C≡C bond tends to rotate to form C4 (C≡C⋅⋅⋅C≡C) chains during lithium extraction, as indicated with the first-principles molecular dynamics (FPMD) simulation. The low electronic and ionic conductivity are believed to be responsible for the potential gap between charge and discharge, as is supported with density functional theory (DFT) calculations and Arrhenius fitting results. These findings illustrate the feasibility to use the alkali and alkaline earth metal carbides as high-capacity electrode materials for secondary batteries. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. High-capacity NO2 denuder systems operated at various temperatures (298-473 K).

    Science.gov (United States)

    Wolf, Jan-Christoph; Niessner, Reinhard

    2012-12-01

    In this study, we investigated several coatings for high-temperature, high-capacity, and high-efficiency denuder-based NO(2) removal, with the scope to face the harsh conditions and requirements of automotive exhaust gas sampling. As first coating, we propose a potassium iodide (KI)/polyethylene glycol coating with a high removal efficiency (ε > 98%) for about 2 h and 50 ppm NO(2) at room temperature (298 K). At elevated temperatures (423 K), the initial capacity (100 ppmh) is decreased to 15 ppmh. Furthermore, this is the first proposal of the ionic liquid methyl-butyl-imidazolium iodide ([BMIm(+)][I(-)]) as denuder coating material. At room temperature, this ionic liquid exhibits far greater capacity (300 ppmh) and NO(2) removal efficiency (ε > 99.9%) than KI. Nevertheless, KI exhibits a slightly (~10%) higher capacity at elevated temperatures than [BMIm(+)][I(-)]. Both coatings presented are suitable for applications requiring selective denuding of NO(2) at temperatures up to 423 K.

  9. High-capacity transport, floor area ratio and its relationship with urbanization of metropolitan areas

    Energy Technology Data Exchange (ETDEWEB)

    Carvalho da Costa, B.L. de; Carvalho da Costa, F.B. de

    2016-07-01

    Most of the world’s population lives in urban areas (54%). Near 42% of the global urban population live in cities with more than 1 million inhabitants, where problems associated with urban sprawl such as informal settlement, social-economic changes, environmental degradation and deficient high-capacity transport (HCT) systems are common. Meanwhile, urbanization and its associated transportation infrastructure define the relationship between city and countryside, between the city’s inner core and the periphery, between the citizen and his right to move. This article discusses and presents an overview about the relationship between the planning and extension of HCT systems and urban planning, (in the figure of the floor-area ratio - FAR- prescribed in regulations). The methodological approach consists of drawing a conceptual framework and studying 33 different cities of metropolitan areas on five continents. It’s noticed that areas in cities with a high construction potential but with an insufficient HCT negatively influence in urban mobility and hence the right to the city. We consider right to the city the various social and fundamental rights that, among others, includes the right to public transportation. Therefore there’s a real need of an integrated approach of community participation, FAR distribution, urban planning and transportation planning and so that urbanization, inevitable these days, takes place in a fair and harmonious way. (Author)

  10. Evaluation of burnup credit for accommodating PWR spent nuclear fuel in high-capacity cask designs

    International Nuclear Information System (INIS)

    Wagner, John C.

    2003-01-01

    This paper presents an evaluation of the amount of burnup credit needed for high-density casks to transport the current U.S. inventory of commercial spent nuclear fuel (SNF) assemblies. A prototypic 32-assembly cask and the current regulatory guidance were used as bases for this evaluation. By comparing actual pressurized-water-reactor (PWR) discharge data (i.e., fuel burnup and initial enrichment specifications for fuel assemblies discharged from U.S. PWRs) with actinide-only-based loading curves, this evaluation finds that additional negative reactivity (through either increased credit for fuel burnup or cask design/utilization modifications) is necessary to accommodate the majority of SNF assemblies in high-capacity storage and transportation casks. The impact of varying selected calculational assumptions is also investigated, and considerable improvement in effectiveness is shown with the inclusion of the principal fission products (FPs) and minor actinides and the use of a bounding best-estimate approach for isotopic validation. Given sufficient data for validation, the most significant component that would improve accuracy, and subsequently enhance the utilization of burnup credit, is the inclusion of FPs. (author)

  11. An Aqueous Redox-Flow Battery with High Capacity and Power: The TEMPTMA/MV System.

    Science.gov (United States)

    Janoschka, Tobias; Martin, Norbert; Hager, Martin D; Schubert, Ulrich S

    2016-11-07

    Redox-flow batteries (RFB) can easily store large amounts of electric energy and thereby mitigate the fluctuating output of renewable power plants. They are widely discussed as energy-storage solutions for wind and solar farms to improve the stability of the electrical grid. Most common RFB concepts are based on strongly acidic metal-salt solutions or poorly performing organics. Herein we present a battery which employs the highly soluble N,N,N-2,2,6,6-heptamethylpiperidinyl oxy-4-ammonium chloride (TEMPTMA) and the viologen derivative N,N'-dimethyl-4,4-bipyridinium dichloride (MV) in a simple and safe aqueous solution as redox-active materials. The resulting battery using these electrolyte solutions has capacities of 54 Ah L -1 , giving a total energy density of 38 Wh L -1 at a cell voltage of 1.4 V. With peak current densities of up to 200 mA cm -2 the TEMPTMA/MV system is a suitable candidate for compact high-capacity and high-power applications. © 2016 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. Human visual system-based color image steganography using the contourlet transform

    Science.gov (United States)

    Abdul, W.; Carré, P.; Gaborit, P.

    2010-01-01

    We present a steganographic scheme based on the contourlet transform which uses the contrast sensitivity function (CSF) to control the force of insertion of the hidden information in a perceptually uniform color space. The CIELAB color space is used as it is well suited for steganographic applications because any change in the CIELAB color space has a corresponding effect on the human visual system as is very important for steganographic schemes to be undetectable by the human visual system (HVS). The perceptual decomposition of the contourlet transform gives it a natural advantage over other decompositions as it can be molded with respect to the human perception of different frequencies in an image. The evaluation of the imperceptibility of the steganographic scheme with respect to the color perception of the HVS is done using standard methods such as the structural similarity (SSIM) and CIEDE2000. The robustness of the inserted watermark is tested against JPEG compression.

  13. High-Capacity Multi-Core Fibers for Space-Division Multiplexing

    DEFF Research Database (Denmark)

    Ye, Feihong

    The transmission capacity of the present optical fiber communication systems based on time division multiplexing (TDM) and wavelength-division multiplexing (WDM) using single-mode fibers (SMFs) is reaching its limit of around 100 Tbit/s per fiber due to the fiber nonlinearities, fiber fuse...... phenomenon and the optical amplifier bandwidth. To meet the ever increasing global data traffic growth and to overcome the looming capacity crunch, a new multiplexing technology using new optical fibers is urgently needed. Space-division multiplexing (SDM) is a promising scheme to overcome the capacity limit...... of the present SMF-based systems. Among the proposed SDM schemes, the one based on uncoupled multi-core fibers (MCFs) having multiple cores in a mutual cladding has proven effective in substantially increasing the transmission capacity per fiber with least system complexity as demonstrated in several state...

  14. Preserving privacy of online digital physiological signals using blind and reversible steganography.

    Science.gov (United States)

    Shiu, Hung-Jr; Lin, Bor-Sing; Huang, Chien-Hung; Chiang, Pei-Ying; Lei, Chin-Laung

    2017-11-01

    Physiological signals such as electrocardiograms (ECG) and electromyograms (EMG) are widely used to diagnose diseases. Presently, the Internet offers numerous cloud storage services which enable digital physiological signals to be uploaded for convenient access and use. Numerous online databases of medical signals have been built. The data in them must be processed in a manner that preserves patients' confidentiality. A reversible error-correcting-coding strategy will be adopted to transform digital physiological signals into a new bit-stream that uses a matrix in which is embedded the Hamming code to pass secret messages or private information. The shared keys are the matrix and the version of the Hamming code. An online open database, the MIT-BIH arrhythmia database, was used to test the proposed algorithms. The time-complexity, capacity and robustness are evaluated. Comparisons of several evaluations subject to related work are also proposed. This work proposes a reversible, low-payload steganographic scheme for preserving the privacy of physiological signals. An (n,  m)-hamming code is used to insert (n - m) secret bits into n bits of a cover signal. The number of embedded bits per modification is higher than in comparable methods, and the computational power is efficient and the scheme is secure. Unlike other Hamming-code based schemes, the proposed scheme is both reversible and blind. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Copper sulfide microspheres wrapped with reduced graphene oxide for high-capacity lithium-ion storage

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Yiyong; Li, Kun; Wang, Yunhui; Zeng, Jing; Ji, Panying; Zhao, Jinbao, E-mail: jbzhao@xmu.edu.cn

    2016-11-15

    Highlights: • We prepare the nanocomposites of Cu{sub x}S microspheres wrapped with rGO. • As-prepared Cu{sub x}S/rGO can effectively accommodate large volume changes. • As-prepared Cu{sub x}S/rGO supply a 2D conductive network. • As-prepared Cu{sub x}S/rGO trap the polysulfides generated during the discharge–charge. • The Cu{sub x}S/rGO has high capacity, cycle stability and excellent rate capability. - Abstract: In this study, a facile two-step approach was developed to prepare the nanocomposites (Cu{sub x}S/rGO) of copper sulfide (Cu{sub x}S) microspheres wrapped with reduced graphene oxide (rGO). The morphology and structure of Cu{sub x}S/rGO materials were researched by using SEM, XRD and laser Raman spectroscopy. As-prepared Cu{sub x}S/rGO nanocomposites, as an active anode material in LIBs, showed distinctly improved electrochemical characteristics, superior cycling stability and high rate capability. Due to the synergistic effect between the Cu{sub x}S microspheres and the rGO nanosheets, as-prepared Cu{sub x}S/rGO nanocomposites could effectively alleviate large volume changes, provide a 2D conductive network and trap the diffusion of polysulfides during the discharge–charge processes, therefore, the Cu{sub x}S/rGO nanocomposites showed excellent electrochemical characteristics.

  16. High-capacity thermo-responsive magnetic molecularly imprinted polymers for selective extraction of curcuminoids.

    Science.gov (United States)

    You, Qingping; Zhang, Yuping; Zhang, Qingwen; Guo, Junfang; Huang, Weihua; Shi, Shuyun; Chen, Xiaoqin

    2014-08-08

    Thermo-responsive magnetic molecularly imprinted polymers (TMMIPs) for selective recognition of curcuminoids with high capacity and selectivity have firstly been developed. The resulting TMMIPs were characterized by TEM, FT-IR, TGA, VSM and UV, which indicated that TMMIPs showed thermo-responsiveness [lower critical solution temperature (LCST) at 33.71°C] and rapid magnetic separation (5s). The polymerization, adsorption and release conditions were optimized in detail to obtain the highest binding capacity, selectivity and release ratio. We found that the adopted thermo-responsive monomer [N-isopropylacrylamide (NIPAm)] could be considered not only as inert polymer backbone for thermo-responsiveness but also as functional co-monomers combination with basic monomer (4-VP) for more specific binding sites when ethanol was added in binding solution. The maximum adsorption capacity with highest selectivity of curcumin was 440.3μg/g (1.93 times that on MMIPs with no thermosensitivity) at 45°C (above LCST) in 20% (v/v) ethanol solution on shrunk TMMIPs, and the maximum release proportion was about 98% at 20°C (below LCST) in methanol-acetic acid (9/1, v/v) solution on swelled TMMIPs. The adsorption process between curcumin and TMMIPs followed Langumuir adsorption isotherm and pseudo-first-order reaction kinetics. The prepared TMMIPs also showed high reproducibility (RSD<6% for batch-to-batch evaluation) and stability (only 7% decrease after five cycles). Subsequently, the TMMIPs were successfully applied for selective extraction of curcuminoids from complex natural product, Curcuma longa. Copyright © 2014 Elsevier B.V. All rights reserved.

  17. Groundwater-Surface water interaction in agricultural watershed that encompasses dense network of High Capacity wells

    Science.gov (United States)

    Talib, A.; Desai, A. R.

    2017-12-01

    The Central Sands region of Wisconsin is characterized by productive trout streams, lakes, farmland and forest. However, stream channelization, past wetland drainage, and ground water withdrawals have disrupted the hydrology of this Central Sands region. Climatically driven conditions in last decade (2000-2008) alone are unable to account for the severely depressed water levels. Increased interception and evapotranspiration from afforested areas in central sand Wisconsin may also be culprit for reduced water recharge. Hence, there is need to study the cumulative effects of changing precipitation patterns, groundwater withdrawals, and forest evapotranspiration to improve projections of the future of lake levels and water availability in this region. Here, the SWAT-MODFLOW coupled model approach was applied at large spatio-temporal scale. The coupled model fully integrates a watershed model (SWAT) with a groundwater flow model (MODFLOW). Surface water and ground water flows were simulated integratively at daily time step to estimate the groundwater discharge to the stream network in Central Sands that encompasses high capacity wells. The model was calibrated (2010-2013) and validated (2014-2017) based on streamflow, groundwater extraction, and water table elevation. As the long-term trends in some of the primary drivers is presently ambiguous in Central Sands under future climate, as is the case for total precipitation or timing of precipitation, we relied on a sensitivity student to quantitatively access how primary and secondary drivers may influence future net groundwater recharge. We demonstrate how such an approach could then be coupled with decision-making models to evaluate the effectiveness of groundwater withdrawal policies under a changing climate.

  18. A Low Cost, High Capacity Regenerable Sorbent for Pre-combustion CO{sub 2} Capture

    Energy Technology Data Exchange (ETDEWEB)

    Alptekin, Gokhan

    2012-09-30

    The overall objective of the proposed research is to develop a low cost, high capacity CO{sub 2} sorbent and demonstrate its technical and economic viability for pre-combustion CO{sub 2} capture. The specific objectives supporting our research plan were to optimize the chemical structure and physical properties of the sorbent, scale-up its production using high throughput manufacturing equipment and bulk raw materials and then evaluate its performance, first in bench-scale experiments and then in slipstream tests using actual coal-derived synthesis gas. One of the objectives of the laboratory-scale evaluations was to demonstrate the life and durability of the sorbent for over 10,000 cycles and to assess the impact of contaminants (such as sulfur) on its performance. In the field tests, our objective was to demonstrate the operation of the sorbent using actual coal-derived synthesis gas streams generated by air-blown and oxygen-blown commercial and pilot-scale coal gasifiers (the CO{sub 2} partial pressure in these gas streams is significantly different, which directly impacts the operating conditions hence the performance of the sorbent). To support the field demonstration work, TDA collaborated with Phillips 66 and Southern Company to carry out two separate field tests using actual coal-derived synthesis gas at the Wabash River IGCC Power Plant in Terre Haute, IN and the National Carbon Capture Center (NCCC) in Wilsonville, AL. In collaboration with the University of California, Irvine (UCI), a detailed engineering and economic analysis for the new CO{sub 2} capture system was also proposed to be carried out using Aspen PlusTM simulation software, and estimate its effect on the plant efficiency.

  19. MX 8: the next generation high capacity system for the transport of fresh MOX fuel

    International Nuclear Information System (INIS)

    Potelle, F.; Issard, H.

    1998-01-01

    The choice of reprocessing policy was made a long time ago in France, leading to the development of an advanced Pu recycling industry. In 1987, Saint Laurent was the first French reactor to be loaded with fresh MOX fuel. Transnucleaire, then in charge of transport packaging development, created the FS 69 concept, derived from the classical RCC concept for the transport of UO 2 fresh fuel. On the other hand, Cogema, as the main actor in the field of fuel cycle and thus in transport matters, developed the associated security truck and security caisson in order to provide the transport system with the acceptable Physical Protection devices required by French Authorities. As a whole, the security truck and the FS 69 have now been used for more than ten years with a remarkable level of efficiency and safety. Indeed, more than 600 fresh MOX fuel elements have been delivered, without any incident, both regarding safety or fuel integrity requirements. But, as a matter of fact, the replacement of FS 69 transport system is now scheduled for several reasons. First of all, the burnups achieved with UO 2 fuel progressed together with its enrichment within the last ten years, and the MOX 'equivalence' also implies that its Pu content be increased to enhance its reactor performances: from 5.25 % of Pu content today, the MOX fuel will reach 7% tomorrow, and almost 10% the day after tomorrow. Lastly, the reprocessing/recycling policy has been confirmed and amplified, leading to an increasing number of 'moxified' reactors. As a consequence, the French utility (EDF), the fuel designer (Fragema, the joint venture between Framatome and Cogema), the fuel manufacturer (Cogema), and the transporter (Transnucleaire) joined in a specific working group devoted to the development of the MX 8, the next generation high capacity system for the land transport of MOX fuel. (authors)

  20. Binders and Hosts for High-Capacity Lithium-ion Battery Anodes

    Science.gov (United States)

    Dufficy, Martin Kyle

    Lithium-ion batteries (LIBs) are universal electrochemical energy storage devices that have revolutionized our mobile society. Nonetheless, societal and technological advances drive consumer demand for LIBs with enhanced electrochemical performance, such as higher charge capacity and longer life, compared to conventional LIBs. One method to enhance LIB performance is to replace graphite, the industry standard anode since commercialization of LIBs in 1991, with high-charge capacity materials. Implementing high-capacity anode materials such as tin, silicon, and manganese vanadates, to LIBs presents challenges; Li-insertion is destructive to anode framework, and increasing capacity increases structural strains that pulverize anode materials and results in a short-cycle life. This thesis reports on various methods to extended the cycle life of high-capacity materials. Most of the work is conducted on nano-sized anode materials to reduce Li and electron transport pathway length (facilitating charge-transfer) and reduce strains from volume expansions (preserving anode structure). The first method involves encapsulating tin particles into a graphene-containing carbon nanofiber (CNF) matrix. The composite-CNF matrix houses tin particles to assume strains from tin-volume expansions and produces favorable surface-electrolyte chemistries for stable charge-discharge cycling. Before tin addition, graphene-containing CNFs are produced and assessed as anode materials for LIBs. Graphene addition to CNFs improves electronic and mechanical properties of CNFs. Furthermore, the 2-D nature of graphene provides Li-binding sites to enhance composite-CNF both first-cycle and high-rate capacities > 150% when compared to CNFs in the absence of graphene. With addition of Sn, we vary loadings and thermal production temperature to elucidate structure-composition relationships of tin and graphene-containing CNF electrodes that lead to increased capacity retention. Of note, electrodes containing

  1. Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods

    Science.gov (United States)

    Rojali, Salman, Afan Galih; George

    2017-08-01

    Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or image quality that is approaching very good.

  2. Feasibility assessment of optical technologies for reliable high capacity feeder links

    Science.gov (United States)

    Witternigg, Norbert; Schönhuber, Michael; Leitgeb, Erich; Plank, Thomas

    2013-08-01

    Space telecom scenarios like data relay satellite and broadband/broadcast service providers require reliable feeder links with high bandwidth/data rate for the communication between ground station and satellite. Free space optical communication (FSOC) is an attractive alternative to microwave links, improving performance by offering abundant bandwidth at small apertures of the optical terminals. At the same time Near-Earth communication by FSOC avoids interference with other services and is free of regulatory issues. The drawback however is the impairment by the laser propagation through the atmosphere at optical wavelengths. Also to be considered are questions of eye safety for ground personnel and aviation. In this paper we assess the user requirements for typical space telecom scenarios and compare these requirements with solutions using optical data links through the atmosphere. We suggest a site diversity scheme with a number of ground stations and a switching scheme using two optical terminals on-board the satellite. Considering the technology trade-offs between four different optical wavelengths we recommend the future use of 1.5 μm laser technology and calculate a link budget for an atmospheric condition of light haze on the optical path. By comparing link budgets we show an outlook to the future potential use of 10 μm laser technology.

  3. A Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain

    Directory of Open Access Journals (Sweden)

    M. Soleimanpour-moghadam

    2013-06-01

    Full Text Available This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the number of changes of LSB values. This method verifiably reduces the probability of detection and also improves the visual quality of stego images. So, our proposal draws on the Mielikainen's technique to present an enhanced dual-state scoring model, structured upon genetic algorithm which assesses the performance of different orders for LSB matching and searches for a near-optimum solution among all the permutation orders. Experimental results confirm superiority of the new approach compared to the Mielikainen’s pair-wise LSB matching scheme.

  4. Preparation of surface modified zinc oxide nanoparticle with high capacity dye removal ability

    International Nuclear Information System (INIS)

    Mahmoodi, Niyaz Mohammad; Najafi, Farhood

    2012-01-01

    Highlights: ► Amine-functionalized zinc oxide nanoparticle (AFZON) was synthesized. ► Isotherm and kinetics data followed Langmuir isotherm and pseudo-second order kinetic model, respectively. ► Q 0 of ZON for AB25, DR23 and DR31 was 20, 12 and 15 mg/g, respectively. ► Q 0 of AFZON for AB25, DR23 and DR31 was 1250, 1000 and 1429 mg/g, respectively. ► AFZON was regenerated at pH 12. -- Abstract: In this paper, the surface modification of zinc oxide nanoparticle (ZON) by amine functionalization was studied to prepare high capacity adsorbent. Dye removal ability of amine-functionalized zinc oxide nanoparticle (AFZON) and zinc oxide nanoparticle (ZON) was also investigated. The physical characteristics of AFZON were studied using Fourier transform infrared (FTIR), scanning electron microscopy (SEM) and X-ray diffraction (XRD). Acid Blue 25 (AB25), Direct Red 23 (DR23) and Direct Red 31 (DR31) were used as model compounds. The effect of operational parameters such as dye concentration, adsorbent dosage, pH and salt on dye removal was evaluated. The isotherm and kinetic of dye adsorption were studied. The maximum dye adsorption capacity (Q 0 ) was 20 mg/g AB25, 12 mg/g DR23 and 15 mg/g DR31 for ZON and 1250 mg/g AB25, 1000 mg/g DR23 and 1429 mg/g DR31 for AFZON. It was found that dye adsorption followed Langmuir isotherm. Adsorption kinetic of dyes was found to conform to pseudo-second order kinetics. Dye desorption tests (adsorbent regeneration) showed that the maximum dye release of 90% AB25, 86% for DR23 and 90% for DR31 were achieved in aqueous solution at pH 12. Based on the data of the present investigation, it can be concluded that the AFZON being an adsorbent with high dye adsorption capacity might be a suitable alternative to remove dyes from colored aqueous solutions.

  5. Technology Assessment of High Capacity Data Storage Systems: Can We Avoid a Data Survivability Crisis?

    Science.gov (United States)

    Halem, M.; Shaffer, F.; Palm, N.; Salmon, E.; Raghavan, S.; Kempster, L.

    1998-01-01

    This technology assessment of long-term high capacity data storage systems identifies an emerging crisis of severe proportions related to preserving important historical data in science, healthcare, manufacturing, finance and other fields. For the last 50 years, the information revolution, which has engulfed all major institutions of modem society, centered itself on data-their collection, storage, retrieval, transmission, analysis and presentation. The transformation of long term historical data records into information concepts, according to Drucker, is the next stage in this revolution towards building the new information based scientific and business foundations. For this to occur, data survivability, reliability and evolvability of long term storage media and systems pose formidable technological challenges. Unlike the Y2K problem, where the clock is ticking and a crisis is set to go off at a specific time, large capacity data storage repositories face a crisis similar to the social security system in that the seriousness of the problem emerges after a decade or two. The essence of the storage crisis is as follows: since it could take a decade to migrate a peta-byte of data to a new media for preservation, and the life expectancy of the storage media itself is only a decade, then it may not be possible to complete the transfer before an irrecoverable data loss occurs. Over the last two decades, a number of anecdotal crises have occurred where vital scientific and business data were lost or would have been lost if not for major expenditures of resources and funds to save this data, much like what is happening today to solve the Y2K problem. A pr-ime example was the joint NASA/NSF/NOAA effort to rescue eight years worth of TOVS/AVHRR data from an obsolete system, which otherwise would have not resulted in the valuable 20-year long satellite record of global warming. Current storage systems solutions to long-term data survivability rest on scalable architectures

  6. Low-cost and high-capacity short-range optical interconnects using graded-index plastic optical fiber

    NARCIS (Netherlands)

    Tangdiongga, E.; Yang, H.; Lee, S.C.J.; Okonkwo, C.M.; Boom, van den H.P.A.; Randel, S.; Koonen, A.M.J.

    2010-01-01

    We demonstrate a transmission rate of 51.8 Gb/s over 100-meters of perfluorinated multimode graded-index plastic optical fiber using discrete multitone modulation. The results prove suitability of plastic fibers for low-cost high-capacity optical interconnects.

  7. Spongelike Nanosized Mn 3 O 4 as a High-Capacity Anode Material for Rechargeable Lithium Batteries

    KAUST Repository

    Gao, Jie; Lowe, Michael A.; Abruña, Héctor D.

    2011-01-01

    Mn3O4 has been investigated as a high-capacity anode material for rechargeable lithium ion batteries. Spongelike nanosized Mn 3O4 was synthesized by a simple precipitation method and characterized by powder X-ray diffraction, Raman scattering

  8. Amine-Functionalized Amino Acid-based Ionic Liquids as Efficient and High-Capacity Absorbents for CO2

    DEFF Research Database (Denmark)

    Shunmugavel, Saravanamurugan; Kunov-Kruse, Andreas Jonas; Fehrmann, Rasmus

    2014-01-01

    Ionic liquids (ILs) comprised of ammonium cations and anions of naturally occurring amino acids containing an additional amine group (e.g., lysine, histidine, asparagine, and glutamine) were examined as high-capacity absorbents for CO2. An absorption capacity of 2.1 mol CO2 per mol of IL (3.5 mol...

  9. Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization

    Science.gov (United States)

    Bajaj, Ruchika; Bedi, Punam; Pal, S. K.

    Steganography is an art of hiding information in such a way that prevents the detection of hidden messages. Besides security of data, the quantity of data that can be hidden in a single cover medium, is also very important. We present a secure data hiding scheme with high embedding capacity for messages of variable length based on Particle Swarm Optimization. This technique gives the best pixel positions in the cover image, which can be used to hide the secret data. In the proposed scheme, k bits of the secret message are substituted into k least significant bits of the image pixel, where k varies from 1 to 4 depending on the message length. The proposed scheme is tested and results compared with simple LSB substitution, uniform 4-bit LSB hiding (with PSO) for the test images Nature, Baboon, Lena and Kitty. The experimental study confirms that the proposed method achieves high data hiding capacity and maintains imperceptibility and minimizes the distortion between the cover image and the obtained stego image.

  10. SLC2A9 is a high-capacity urate transporter in humans.

    Directory of Open Access Journals (Sweden)

    Mark J Caulfield

    2008-10-01

    ] 0.9 to 1.05, p > 0.33 by meta-analysis of an SLC2A9 variant in six case-control studies including 11,897 participants. In a separate meta-analysis of four population studies including 11,629 participants we found no association of SLC2A9 with systolic (effect size -0.12 mm Hg, 95% CI -0.68 to 0.43, p = 0.664 or diastolic blood pressure (effect size -0.03 mm Hg, 95% CI -0.39 to 0.31, p = 0.82.This study provides evidence that SLC2A9 splice variants act as high-capacity urate transporters and is one of the first functional characterisations of findings from genome-wide association scans. We did not find an association of the SLC2A9 gene with blood pressure in this study. Our findings suggest potential pathogenic mechanisms that could offer a new drug target for gout.

  11. Hybrid Approach To Steganography System Based On Quantum Encryption And Chaos Algorithms

    Directory of Open Access Journals (Sweden)

    ZAID A. ABOD

    2018-01-01

    Full Text Available A hybrid scheme for secretly embedding image into a dithered multilevel image is presented. This work inputs both a cover image and secret image, which are scrambling and divided into groups to embedded together based on multiple chaos algorithms (Lorenz map, Henon map and Logistic map respectively. Finally, encrypt the embedded images by using one of the quantum cryptography mechanisms, which is quantum one time pad. The experimental results show that the proposed hybrid system successfully embedded images and combine with the quantum cryptography algorithms and gives high efficiency for secure communication.

  12. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD) Scheme.

    Science.gov (United States)

    Idbeaa, Tarik; Abdul Samad, Salina; Husain, Hafizah

    2016-01-01

    This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES) algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  13. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD Scheme.

    Directory of Open Access Journals (Sweden)

    Tarik Idbeaa

    Full Text Available This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD. Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  14. Morphology control of ordered mesoporous carbons for high capacity lithium sulfur batteries

    Energy Technology Data Exchange (ETDEWEB)

    Schuster, Joerg David

    2011-06-07

    The focus of this thesis concerns the morphology control of ordered mesoporous carbon (OMC) materials. Ordered mesoporous carbons with diverse morphologies, that are thin films, fibers - embedded in anodic alumina membranes and free-standing - or spherical nanoparticles, have been successfully prepared by soft-templating procedures. The mechanisms of structure formation and processing were investigated with in-situ SAXS measurements and their application in high capacity lithium-sulfur batteries was successfully tested in cooperation with Guang He and Linda Nazar from the University of Waterloo in Canada. The Li-S batteries receive increasing attention due to their high theoretical energy density which is 3 to 5 times higher than from lithium-ion batteries. For this type of battery the specific pore volume is crucial for the content of the active component (sulfur) in the cathode and therefore correlates with the capacity and gravimetric energy density of the battery. At first, mesoporous thin films with 2D-hexagonal structure were obtained through organic-organic self-assembly of a preformed oligomeric resol precursor and the triblock copolymer template Pluronic P123. The formation of a condensed-wall material through thermopolymerization of the precursor oligomers resulted in mesostructured phenolic resin films. Subsequent decomposition of the surfactant and partial carbonization were achieved through thermal treatment in inert atmosphere. The films were crack-free with tunable homogenous thicknesses, and showed either 2D-hexagonal or lamellar mesostructure. An additional, yet unknown 3D-mesostructure was also found. In the second part, cubic and circular hexagonal mesoporous carbon phases in the confined environment of tubular anodic alumina membrane (AAM) pores were obtained by self-assembly of the mentioned resol precursor and the triblock copolymer templates Pluronic F127 or P123, respectively. Casting and solvent-evaporation were also followed by

  15. Criminal Use of Assault Weapons and High-Capacity Semiautomatic Firearms: an Updated Examination of Local and National Sources.

    Science.gov (United States)

    Koper, Christopher S; Johnson, William D; Nichols, Jordan L; Ayers, Ambrozine; Mullins, Natalie

    2017-10-02

    Policies restricting semiautomatic assault weapons and large-capacity ammunition magazines are intended to reduce gunshot victimizations by limiting the stock of semiautomatic firearms with large ammunition capacities and other military-style features conducive to criminal use. The federal government banned such weaponry from 1994 to 2004, and a few states currently impose similar restrictions. Recent debates concerning these weapons have highlighted their use in mass shootings, but there has been little examination of their use in gun crime more generally since the expiration of the federal ban. This study investigates current levels of criminal activity with assault weapons and other high-capacity semiautomatics in the USA using several local and national data sources including the following: (1) guns recovered by police in ten large cities, (2) guns reported by police to federal authorities for investigative tracing, (3) guns used in murders of police, and (4) guns used in mass murders. Results suggest assault weapons (primarily assault-type rifles) account for 2-12% of guns used in crime in general (most estimates suggest less than 7%) and 13-16% of guns used in murders of police. Assault weapons and other high-capacity semiautomatics together generally account for 22 to 36% of crime guns, with some estimates upwards of 40% for cases involving serious violence including murders of police. Assault weapons and other high-capacity semiautomatics appear to be used in a higher share of firearm mass murders (up to 57% in total), though data on this issue are very limited. Trend analyses also indicate that high-capacity semiautomatics have grown from 33 to 112% as a share of crime guns since the expiration of the federal ban-a trend that has coincided with recent growth in shootings nationwide. Further research seems warranted on how these weapons affect injuries and deaths from gun violence and how their regulation may impact public health.

  16. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  17. Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks

    Directory of Open Access Journals (Sweden)

    Anita Pradhan

    2017-01-01

    Full Text Available The traditional pixel value differencing (PVD steganographical schemes are easily detected by pixel difference histogram (PDH analysis. This problem could be addressed by adding two tricks: (i utilizing horizontal, vertical, and diagonal edges and (ii using adaptive quantization ranges. This paper presents an adaptive PVD technique using 6-pixel blocks. There are two variants. The proposed adaptive PVD for 2×3-pixel blocks is known as variant 1, and the proposed adaptive PVD for 3×2-pixel blocks is known as variant 2. For every block in variant 1, the four corner pixels are used to hide data bits using the middle column pixels for detecting the horizontal and diagonal edges. Similarly, for every block in variant 2, the four corner pixels are used to hide data bits using the middle row pixels for detecting the vertical and diagonal edges. The quantization ranges are adaptive and are calculated using the correlation of the two middle column/row pixels with the four corner pixels. The technique performs better as compared to the existing adaptive PVD techniques by possessing higher hiding capacity and lesser distortion. Furthermore, it has been proven that the PDH steganalysis and RS steganalysis cannot detect this proposed technique.

  18. Development of a new biofertilizer with a high capacity for N2 fixation, phosphate and potassium solubilization and auxin production.

    Science.gov (United States)

    Leaungvutiviroj, Chaveevan; Ruangphisarn, Pimtida; Hansanimitkul, Pikul; Shinkawa, Hidenori; Sasaki, Ken

    2010-01-01

    Biofertilizers that possess a high capacity for N(2) fixation (Azotobacter tropicalis), and consist of phosphate solubilizing bacteria (Burkhoderia unamae), and potassium solubilizing bacteria (Bacillus subtilis) and produce auxin (KJB9/2 strain), have a high potential for growth and yield enhancement of corn and vegetables (Chinese kale). For vegetables, the addition of biofertilizer alone enhanced growth 4 times. Moreover, an enhancement of growth by 7 times was observed due to the addition of rock phosphate and K-feldspar, natural mineral fertilizers, in combination with the biofertilizer.

  19. Lithographically encoded polymer microtaggant using high-capacity and error-correctable QR code for anti-counterfeiting of drugs.

    Science.gov (United States)

    Han, Sangkwon; Bae, Hyung Jong; Kim, Junhoi; Shin, Sunghwan; Choi, Sung-Eun; Lee, Sung Hoon; Kwon, Sunghoon; Park, Wook

    2012-11-20

    A QR-coded microtaggant for the anti-counterfeiting of drugs is proposed that can provide high capacity and error-correction capability. It is fabricated lithographically in a microfluidic channel with special consideration of the island patterns in the QR Code. The microtaggant is incorporated in the drug capsule ("on-dose authentication") and can be read by a simple smartphone QR Code reader application when removed from the capsule and washed free of drug. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. The H_6_0Si_6C_5_4 heterofullerene as high-capacity hydrogen storage medium

    International Nuclear Information System (INIS)

    Yong, Yongliang; Zhou, Qingxiao; Li, Xiaohong; Lv, Shijie

    2016-01-01

    With the great success in Si atoms doped C_6_0 fullerene and the well-established methods for synthesis of hydrogenated carbon fullerenes, this leads naturally to wonder whether Si-doped fullerenes are possible for special applications such as hydrogen storage. Here by using first-principles calculations, we design a novel high-capacity hydrogen storage material, H_6_0Si_6C_5_4 heterofullerene, and confirm its geometric stability. It is found that the H_6_0Si_6C_5_4 heterofullerene has a large HOMO-LUMO gap and a high symmetry, indicating it is high chemically stable. Further, our finite temperature simulations indicate that the H_6_0Si_6C_5_4 heterofullerene is thermally stable at 300 K. H_2 molecules would enter into the cage from the Si-hexagon ring because of lower energy barrier. Through our calculation, a maximum of 21 H_2 molecules can be stored inside the H_6_0Si_6C_5_4 cage in molecular form, leading to a gravimetric density of 11.11 wt% for 21H_2@H_6_0Si_6C_5_4 system, which suggests that the hydrogenated Si_6C_5_4 heterofullerene could be suitable as a high-capacity hydrogen storage material.

  1. When High-Capacity Readers Slow Down and Low-Capacity Readers Speed Up: Working Memory and Locality Effects.

    Science.gov (United States)

    Nicenboim, Bruno; Logačev, Pavel; Gattei, Carolina; Vasishth, Shravan

    2016-01-01

    We examined the effects of argument-head distance in SVO and SOV languages (Spanish and German), while taking into account readers' working memory capacity and controlling for expectation (Levy, 2008) and other factors. We predicted only locality effects, that is, a slowdown produced by increased dependency distance (Gibson, 2000; Lewis and Vasishth, 2005). Furthermore, we expected stronger locality effects for readers with low working memory capacity. Contrary to our predictions, low-capacity readers showed faster reading with increased distance, while high-capacity readers showed locality effects. We suggest that while the locality effects are compatible with memory-based explanations, the speedup of low-capacity readers can be explained by an increased probability of retrieval failure. We present a computational model based on ACT-R built under the previous assumptions, which is able to give a qualitative account for the present data and can be tested in future research. Our results suggest that in some cases, interpreting longer RTs as indexing increased processing difficulty and shorter RTs as facilitation may be too simplistic: The same increase in processing difficulty may lead to slowdowns in high-capacity readers and speedups in low-capacity ones. Ignoring individual level capacity differences when investigating locality effects may lead to misleading conclusions.

  2. Fabrication of high-capacity polyelectrolyte brush-grafted porous AAO-silica composite membrane via RAFT polymerization.

    Science.gov (United States)

    Song, Cunfeng; Wang, Meijie; Liu, Xin; Wang, He; Chen, Xiaoling; Dai, Lizong

    2017-09-01

    Surface-initiated reversible addition-fragmentation chain transfer (RAFT) polymerization has been utilized to fabricate high-capacity strong anion-exchange (AEX) membrane for the separation of protein. By means of RAFT polymerization, quaternized poly(3-(methacrylamidomethyl)-pyridine) brushes formed 3-dimensional nanolayers on the surface of porous anodic aluminum oxide (AAO)-silica composite membrane. The surface properties of the membranes were analyzed by SEM, water contact angle, ATR-FTIR, XPS and TGA. To investigate the adsorption performance, the new AEX membranes were applied to recover a model protein, ovalbumin (OVA). High adsorption capacities of 95.8mg/g membranes (static) and 65.3mg/g membranes (dynamic) were obtained at ambient temperature. In the further studies, up to 90% of the adsorbed OVA was efficiently eluted by using phosphate buffer-1M NaCl as elution medium. The successful separation of OVA with high purity from a mixture protein solution was also achieved by using the AEX membranes. The present study demonstrated that under mild reaction condition, RAFT polymerization can be used to fabricate ion-exchange membrane which has many remarkable features, such as high capacity and selectivity, easy elution and so on. Copyright © 2017. Published by Elsevier B.V.

  3. When high-capacity readers slow down and low-capacity readers speed up: Working memory and locality effects

    Directory of Open Access Journals (Sweden)

    Bruno eNicenboim

    2016-03-01

    Full Text Available We examined the effects of argument-head distance in SVO and SOV languages (Spanish and German, while taking into account readers’ working memory capacity and controlling for expectation (Levy, 2008 and other factors. We predicted only locality effects, that is, a slow-down produced by increased dependency distance (Gibson, 2000; Lewis & Vasishth, 2005. Furthermore, we expected stronger locality effects for readers with low working memory capacity. Contrary to our predictions, low-capacity readers showed faster reading with increased distance, while high-capacity readers showed locality effects. We suggest that while the locality effects are compatible with memory-based explanations, the speedup of low-capacity readers can be explained by an increased probability of retrieval failure. We present a computational model based on ACT-R built under the previous assumptions, which is able to give a qualitative account for the present data and can be tested in future research. Our results suggest that in some cases, interpreting longer RTs as indexing increased processing difficulty and shorter RTs as facilitation may be too simplistic: The same increase in processing difficulty may lead to slowdowns in high-capacity readers and speedups in low-capacity ones. Ignoring individual level capacity differences when investigating locality effects may lead to misleading conclusions.

  4. Life cycle environmental impact of high-capacity lithium ion battery with silicon nanowires anode for electric vehicles.

    Science.gov (United States)

    Li, Bingbing; Gao, Xianfeng; Li, Jianyang; Yuan, Chris

    2014-01-01

    Although silicon nanowires (SiNW) have been widely studied as an ideal material for developing high-capacity lithium ion batteries (LIBs) for electric vehicles (EVs), little is known about the environmental impacts of such a new EV battery pack during its whole life cycle. This paper reports a life cycle assessment (LCA) of a high-capacity LIB pack using SiNW prepared via metal-assisted chemical etching as anode material. The LCA study is conducted based on the average U.S. driving and electricity supply conditions. Nanowastes and nanoparticle emissions from the SiNW synthesis are also characterized and reported. The LCA results show that over 50% of most characterized impacts are generated from the battery operations, while the battery anode with SiNW material contributes to around 15% of global warming potential and 10% of human toxicity potential. Overall the life cycle impacts of this new battery pack are moderately higher than those of conventional LIBs but could be actually comparable when considering the uncertainties and scale-up potential of the technology. These results are encouraging because they not only provide a solid base for sustainable development of next generation LIBs but also confirm that appropriate nanomanufacturing technologies could be used in sustainable product development.

  5. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  6. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  7. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  8. Spongelike Nanosized Mn 3 O 4 as a High-Capacity Anode Material for Rechargeable Lithium Batteries

    KAUST Repository

    Gao, Jie

    2011-07-12

    Mn3O4 has been investigated as a high-capacity anode material for rechargeable lithium ion batteries. Spongelike nanosized Mn 3O4 was synthesized by a simple precipitation method and characterized by powder X-ray diffraction, Raman scattering and scanning electron microscopy. Its electrochemical performance, as an anode material, was evaluated by galvanostatic discharge-charge tests. The results indicate that this novel type of nanosized Mn3O4 exhibits a high initial reversible capacity (869 mA h/g) and significantly enhanced first Coulomb efficiency with a stabilized reversible capacity of around 800 mA h/g after over 40 charge/discharge cycles. © 2011 American Chemical Society.

  9. Random oriented hexagonal nickel hydroxide nanoplates grown on graphene as binder free anode for lithium ion battery with high capacity

    Science.gov (United States)

    Du, Yingjie; Ma, Hu; Guo, Mingxuan; Gao, Tie; Li, Haibo

    2018-05-01

    In this work, two-step method has been employed to prepare random oriented hexagonal hydroxide nanoplates on graphene (Ni(OH)2@G) as binder free anode for lithium ion battery (LIB) with high capacity. The morphology, microstructure, crystal phase and elemental bonding have been characterized. When evaluated as anode for LIB, the Ni(OH)2@G exhibited high initial discharge capacity of 1318 mAh/g at the current density of 50 mA/g. After 80 cycles, the capacity was maintained at 834 mAh/g, implying 63.3% remaining. Even the charge rate was increased to 2000 mA/g, an impressive capacity of 141 mAh/g can be obtained, indicating good rate capability. The superior LIB behavior of Ni(OH)2@G is ascribed to the excellent combination between Ni(OH)2 nanoplates and graphene via both covalent chemical bonding and van der Waals interactions.

  10. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  11. Topology of genetic associations between regional gray matter volume and intellectual ability: Evidence for a high capacity network.

    Science.gov (United States)

    Bohlken, Marc M; Brouwer, Rachel M; Mandl, René C W; Hedman, Anna M; van den Heuvel, Martijn P; van Haren, Neeltje E M; Kahn, René S; Hulshoff Pol, Hilleke E

    2016-01-01

    Intelligence is associated with a network of distributed gray matter areas including the frontal and parietal higher association cortices and primary processing areas of the temporal and occipital lobes. Efficient information transfer between gray matter regions implicated in intelligence is thought to be critical for this trait to emerge. Genetic factors implicated in intelligence and gray matter may promote a high capacity for information transfer. Whether these genetic factors act globally or on local gray matter areas separately is not known. Brain maps of phenotypic and genetic associations between gray matter volume and intelligence were made using structural equation modeling of 3T MRI T1-weighted scans acquired in 167 adult twins of the newly acquired U-TWIN cohort. Subsequently, structural connectivity analyses (DTI) were performed to test the hypothesis that gray matter regions associated with intellectual ability form a densely connected core. Gray matter regions associated with intellectual ability were situated in the right prefrontal, bilateral temporal, bilateral parietal, right occipital and subcortical regions. Regions implicated in intelligence had high structural connectivity density compared to 10,000 reference networks (p=0.031). The genetic association with intelligence was for 39% explained by a genetic source unique to these regions (independent of total brain volume), this source specifically implicated the right supramarginal gyrus. Using a twin design, we show that intelligence is genetically represented in a spatially distributed and densely connected network of gray matter regions providing a high capacity infrastructure. Although genes for intelligence have overlap with those for total brain volume, we present evidence that there are genes for intelligence that act specifically on the subset of brain areas that form an efficient brain network. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  13. A Framework of Secured Embedding Scheme Using Vector Discrete Wavelet Transformation and Lagrange Interpolation

    Directory of Open Access Journals (Sweden)

    Maheswari Subramanian

    2018-01-01

    Full Text Available Information hiding techniques have a significant role in recent application areas. Steganography is the embedding of information within an innocent cover work in a way which cannot be detected by any person without accessing the steganographic key. The proposed work uses a steganographic scheme for useful information with the help of human skin tone regions as cover image. The proposed algorithm has undergone Lagrange interpolation encryption for enhancement of the security of the hidden information. First, the skin tone regions are identified by using YCbCr color space which can be used as a cover image. Image pixels which belong to the skin regions are used to carry more secret bits, and the secret information is hidden in both horizontal and vertical sequences of the skin areas of the cover image. The secret information will hide behind the human skin regions rather than other objects in the same image because the skin pixels have high intensity value. The performance of embedding is done and is quite invisible by the vector discrete wavelet transformation (VDWT technique. A new Lagrange interpolation-based encryption method is introduced to achieve high security of the hidden information with higher payload and better visual quality.

  14. Final Report: DE- FC36-05GO15063, Fundamental Studies of Advanced High-Capacity, Reversible Metal Hydrides

    Energy Technology Data Exchange (ETDEWEB)

    Jensen, Craig [Univ. of Hawaii, Honolulu, HI (United States); McGrady, Sean [Univ. of New Brunswick, Fredericton NB (Canada); Severa, Godwin [Univ. of Hawaii, Honolulu, HI (United States); Eliseo, Jennifer [Univ. of Hawaii, Honolulu, HI (United States); Chong, Marina [Univ. of Hawaii, Honolulu, HI (United States)

    2013-05-31

    The project was component of the US DOE, Metal Hydride Center of Excellence (MHCoE). The Sandia National Laboratory led center was established to conduct highly collaborative and multi-disciplinary applied R&D to develop new reversible hydrogen storage materials that meet or exceed DOE/FreedomCAR 2010 and 2015 system targets for hydrogen storage materials. Our approach entailed a wide variety of activities ranging from synthesis, characterization, and evaluation of new candidate hydrogen storage materials; screening of catalysts for high capacity materials requiring kinetics enhancement; development of low temperature methods for nano-confinement of hydrides and determining its effects on the kinetics and thermodynamics of hydrides; and development of novel processes for the direct re-hydrogenation of materials. These efforts have resulted in several advancements the development of hydrogen storage materials. We have greatly extended the fundamental knowledge about the highly promising hydrogen storage carrier, alane (AlH3), by carrying out the first crystal structure determinations and the first determination of the heats of dehydrogenation of β–AlH3 and γ-AlD3. A low-temperature homogenous organometallic approach to incorporation of Al and Mg based hydrides into carbon aerogels has been developed that that allows high loadings without degradation of the nano-porous scaffold. Nano-confinement was found to significantly improve the dehydrogenation kinetics but not effect the enthalpy of dehydrogenation. We conceived, characterized, and synthesized a novel class of potential hydrogen storage materials, bimetallic borohydrides. These novel compounds were found to have many favorable properties including release of significant amounts of hydrogen at moderate temperatures (75-190 º C). However, in situ IR studies in tandem with thermal gravimetric analysis have shown that about 0.5 equivalents of diborane are released during the

  15. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  16. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  17. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  18. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  19. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  20. Steganography using RTP packets

    OpenAIRE

    Pontón Loaiza, Melina Marcela

    2014-01-01

    En tiempos actuales, donde la mayoría de las comunicaciones se realizan a través de medios digitales, la privacidad y seguridad al transmitir información pueden ser fácilmente vulnerables. La esteganografía, siendo la ciencia de ocultar comunicaciones secretas en medios aparentemente inocentes, nos puede ayudar a alcanzar este propósito. El objetivo del presente trabajo es el de actualizar y mejorar la herramienta esteganográfica stegan RTP, además de analizar las diferentes maneras en que la...

  1. New Encrypted Steganography Approach

    Directory of Open Access Journals (Sweden)

    Saba Mohammed Husain‎

    2017-12-01

    Full Text Available The proposed research Provides an approach for hiding an encrypted text in side a digital image. Where the text is encrypted in a complex manner used method of PlayFair to encrypt clear text and to increase security put lettering ciphertext on the geometric shape clockwise and then we write the ciphertext output in the form of lines, taken new ciphertext and converted to Ascii code and then to binary and hidden text in bits least importance in the picture. The results were good by PNSR scale

  2. Three-dimensional carbon network confined antimony nanoparticle anodes for high-capacity K-ion batteries.

    Science.gov (United States)

    Han, Chunhua; Han, Kang; Wang, Xuanpeng; Wang, Chenyang; Li, Qi; Meng, Jiashen; Xu, Xiaoming; He, Qiu; Luo, Wen; Wu, Liming; Mai, Liqiang

    2018-04-19

    Antimony (Sb) represents a promising anode for K-ion batteries (KIBs) due to its high theoretical capacity and suitable working voltage. However, the large volume change that occurs in the potassiation/depotassiation process can lead to severe capacity fading. Herein, we report a high-capacity anode material by in situ confining Sb nanoparticles in a three-dimensional carbon framework (3D SbNPs@C) via a template-assisted freeze-drying treatment and subsequent carbothermic reduction. The as-prepared 3D SbNPs@C hybrid material delivers high reversible capacity and good cycling stability when used as the anode for KIBs. Furthermore, cyclic voltammetry and in situ X-ray diffraction analysis were performed to reveal the intrinsic mechanism of a K-Sb alloying reaction. Therefore, this work is of great importance to understand the electrochemical process of the Sb-based alloying reaction and will pave the way for the exploration of high performance KIB anode materials.

  3. Manganese Sesquioxide as Cathode Material for Multivalent Zinc Ion Battery with High Capacity and Long Cycle Life

    International Nuclear Information System (INIS)

    Jiang, Baozheng; Xu, Chengjun; Wu, Changle; Dong, Liubing; Li, Jia; Kang, Feiyu

    2017-01-01

    Highlights: • Manganese oxides with Mn(III) state is firstly reported to store zinc ion. • Zinc ion battery with α-Mn 2 O 3 cathode is assembled. • Storage mechanism of zinc ion in α-Mn 2 O 3 is investigated. - Abstract: Rechargeable zinc ion battery is considered as one of the most potential energy storage devices for large-scale energy storage system due to its safety, low-cost, high capacity and nontoxicity. However, only a few cathode materials have been studied for rechargeable zinc ion batteries. Here, we firstly report manganese sesquioxide (Mn 2 O 3 ) with Mn(III) state as cathode material for rechargeable zinc ion battery. The α-Mn 2 O 3 cathode displays a reversible capacity of 148 mAh g −1 , which is relatively high among all the reported cathode materials for ZIB. The cathode also exhibits good rate capability and excellent cycling stability with a long cycle life up to 2000 times. The ion storage mechanism of α-Mn 2 O 3 in zinc ion battery was also revealed. The pristine α-Mn 2 O 3 undergoes a reversible phase transition from bixbyite structure to layered-type zinc birnessite during the electrochemical zinc ion insertion and extraction. The results not only benefit for the practical application of rechargeable zinc ion battery, but also broaden the horizons of understanding the electrochemical behavior and mechanism of rechargeable zinc ion batteries.

  4. Criticality safety and shielding design issues in the development of a high-capacity cask for truck transport

    International Nuclear Information System (INIS)

    Boshoven, J.K.

    1992-01-01

    General Atomics (GA) will be submitting an application for certification to the US Nuclear Regulatory Commission (NRC) for the GA-4 and GA-9 Casks In 1992. The GA-4 and GA-9 Casks are high-capacity legal weight truck casks designed to transport light water reactor spent fuel assemblies. To maintain a capacity of four pressurized-water-reactor (PWR) spent fuel assemblies, the GA-4 Cask uses burnup credit as part of the criticality control for initial enrichments over 3.0 wt% U-235. Using the US Department of Energy (DOE) Burnup Credit Program as a basis, GA has performed burnup credit analysis which is included in the Safety Analysis Report for Packaging (SARP). The GA-9 Cask can meet the criticality safety requirements using the ''fresh fuel'' assumption. Our approach to shielding design is to optimize the GA-4 and GA-9 Cask shielding configurations for minimum weights and maximum payloads. This optimization involves the use of the most effective shielding material, square cross-section geometry with rounded corners and tapered neutron shielding sections in the non-fuel regions

  5. Atomistic Origins of High Capacity and High Structural Stability of Polymer-Derived SiOC Anode Materials.

    Science.gov (United States)

    Sun, Hong; Zhao, Kejie

    2017-10-11

    Capacity and structural stability are often mutually exclusive properties of electrodes in Li-ion batteries (LIBs): a gain in capacity is usually accompanied by the undesired large volumetric change of the host material upon lithiation. Polymer-derived ceramics, such as silicon oxycarbide (SiOC) of hybrid Si-O-C bonds, show an exceptional combination of high capacity and superior structural stability. We investigate the atomistic origins of the unique chemomechanical performance of carbon-rich SiOC using the first-principles theoretical approach. The atomic model of SiOC is composed of continuous Si-O-C units caged by a graphene-like cellular network and percolated nanovoids. The segregated sp 2 carbon network serves as the backbone to maintain the structural stability of the lattice. Li insertion is first absorbed at the nanovoid sites, and then it is accommodated by the SiOC tetrahedral units, excess C atoms, and topological defects at the edge of or within the segregated carbon network. SiOC expands up to 22% in volumetric strain at the fully lithiated capacity of 1230 mA h/g. We examine in great detail the evolution of the microscopic features of the SiOC molecule in the course of Li reactions. The first-principles modeling provides a fundamental understanding of the physicochemical properties of Si-based glass ceramics for their application in LIBs.

  6. Recent advances in high-capacity free-space optical and radio-frequency communications using orbital angular momentum multiplexing

    Science.gov (United States)

    Ren, Yongxiong; Xie, Guodong; Yan, Yan; Li, Long; Zhao, Zhe; Wang, Jian; Tur, Moshe; Molisch, Andreas F.; Ashrafi, Solyman

    2017-01-01

    There is a continuing growth in the demand for data bandwidth, and the multiplexing of multiple independent data streams has the potential to provide the needed data capacity. One technique uses the spatial domain of an electromagnetic (EM) wave, and space division multiplexing (SDM) has become increasingly important for increased transmission capacity and spectral efficiency of a communication system. A subset of SDM is mode division multiplexing (MDM), in which multiple orthogonal beams each on a different mode can be multiplexed. A potential modal basis set to achieve MDM is to use orbital angular momentum (OAM) of EM waves. In such a system, multiple OAM beams each carrying an independent data stream are multiplexed at the transmitter, propagate through a common medium and are demultiplexed at the receiver. As a result, the total capacity and spectral efficiency of the communication system can be multiplied by a factor equal to the number of transmitted OAM modes. Over the past few years, progress has been made in understanding the advantages and limitations of using multiplexed OAM beams for communication systems. In this review paper, we highlight recent advances in the use of OAM multiplexing for high-capacity free-space optical and millimetre-wave communications. We discuss different technical challenges (e.g. atmospheric turbulence and crosstalk) as well as potential techniques to mitigate such degrading effects. This article is part of the themed issue ‘Optical orbital angular momentum’. PMID:28069770

  7. Enabling the high capacity of lithium-rich anti-fluorite lithium iron oxide by simultaneous anionic and cationic redox

    Science.gov (United States)

    Zhan, Chun; Yao, Zhenpeng; Lu, Jun; Ma, Lu; Maroni, Victor A.; Li, Liang; Lee, Eungje; Alp, Esen E.; Wu, Tianpin; Wen, Jianguo; Ren, Yang; Johnson, Christopher; Thackeray, Michael M.; Chan, Maria K. Y.; Wolverton, Chris; Amine, Khalil

    2017-12-01

    Anionic redox reactions in cathodes of lithium-ion batteries are allowing opportunities to double or even triple the energy density. However, it is still challenging to develop a cathode, especially with Earth-abundant elements, that enables anionic redox activity for real-world applications, primarily due to limited strategies to intercept the oxygenates from further irreversible oxidation to O2 gas. Here we report simultaneous iron and oxygen redox activity in a Li-rich anti-fluorite Li5FeO4 electrode. During the removal of the first two Li ions, the oxidation potential of O2- is lowered to approximately 3.5 V versus Li+/Li0, at which potential the cationic oxidation occurs concurrently. These anionic and cationic redox reactions show high reversibility without any obvious O2 gas release. Moreover, this study provides an insightful guide to designing high-capacity cathodes with reversible oxygen redox activity by simply introducing oxygen ions that are exclusively coordinated by Li+.

  8. Systems-level computational modeling demonstrates fuel selection switching in high capacity running and low capacity running rats

    Science.gov (United States)

    Qi, Nathan R.

    2018-01-01

    High capacity and low capacity running rats, HCR and LCR respectively, have been bred to represent two extremes of running endurance and have recently demonstrated disparities in fuel usage during transient aerobic exercise. HCR rats can maintain fatty acid (FA) utilization throughout the course of transient aerobic exercise whereas LCR rats rely predominantly on glucose utilization. We hypothesized that the difference between HCR and LCR fuel utilization could be explained by a difference in mitochondrial density. To test this hypothesis and to investigate mechanisms of fuel selection, we used a constraint-based kinetic analysis of whole-body metabolism to analyze transient exercise data from these rats. Our model analysis used a thermodynamically constrained kinetic framework that accounts for glycolysis, the TCA cycle, and mitochondrial FA transport and oxidation. The model can effectively match the observed relative rates of oxidation of glucose versus FA, as a function of ATP demand. In searching for the minimal differences required to explain metabolic function in HCR versus LCR rats, it was determined that the whole-body metabolic phenotype of LCR, compared to the HCR, could be explained by a ~50% reduction in total mitochondrial activity with an additional 5-fold reduction in mitochondrial FA transport activity. Finally, we postulate that over sustained periods of exercise that LCR can partly overcome the initial deficit in FA catabolic activity by upregulating FA transport and/or oxidation processes. PMID:29474500

  9. FDM and DMT performance comparison in high capacity point-to-point fibre links for intra/inter-datacentre connections

    Science.gov (United States)

    Gatto, A.; Parolari, P.; Boffi, P.

    2018-05-01

    Frequency division multiplexing (FDM) is attractive to achieve high capacities in multiple access networks characterized by direct modulation and direct detection. In this paper we take into account point-to-point intra- and inter-datacenter connections to understand the performance of FDM operation compared with the ones achievable with standard multiple carrier modulation approach based on discrete multitone (DMT). DMT and FDM allow to match the non-uniform and bandwidth-limited response of the system under test, associated with the employment of low-cost directly-modulated sources, such as VCSELs with high-frequency chirp, and with fibre-propagation in presence of chromatic dispersion. While for very short distances typical of intra-datacentre communications, the huge number of DMT subcarriers permits to increase the transported capacity with respect to the FDM employment, in case of few tens-km reaches typical of inter-datacentre connections, the capabilities of FDM are more evident, providing system performance similar to the case of DMT application.

  10. Mn 3 O 4 −Graphene Hybrid as a High-Capacity Anode Material for Lithium Ion Batteries

    KAUST Repository

    Wang, Hailiang

    2010-10-13

    We developed two-step solution-phase reactions to form hybrid materials of Mn3O4 nanoparticles on reduced graphene oxide (RGO) sheets for lithium ion battery applications. Selective growth of Mn3O 4 nanoparticles on RGO sheets, in contrast to free particle growth in solution, allowed for the electrically insulating Mn3O4 nanoparticles to be wired up to a current collector through the underlying conducting graphene network. The Mn3O4 nanoparticles formed on RGO show a high specific capacity up to ∼900 mAh/g, near their theoretical capacity, with good rate capability and cycling stability, owing to the intimate interactions between the graphene substrates and the Mn 3O4 nanoparticles grown atop. The Mn3O 4/RGO hybrid could be a promising candidate material for a high-capacity, low-cost, and environmentally friendly anode for lithium ion batteries. Our growth-on-graphene approach should offer a new technique for the design and synthesis of battery electrodes based on highly insulating materials. © 2010 American Chemical Society.

  11. Nanoscale surface modification of Li-rich layered oxides for high-capacity cathodes in Li-ion batteries

    Science.gov (United States)

    Lan, Xiwei; Xin, Yue; Wang, Libin; Hu, Xianluo

    2018-03-01

    Li-rich layered oxides (LLOs) have been developed as a high-capacity cathode material for Li-ion batteries, but the structural complexity and unique initial charging behavior lead to several problems including large initial capacity loss, capacity and voltage fading, poor cyclability, and inferior rate capability. Since the surface conditions are critical to electrochemical performance and the drawbacks, nanoscale surface modification for improving LLO's properties is a general strategy. This review mainly summarizes the surface modification of LLOs and classifies them into three types of surface pre-treatment, surface gradient doping, and surface coating. Surface pre-treatment usually introduces removal of Li2O for lower irreversible capacity while surface doping is aimed to stabilize the structure during electrochemical cycling. Surface coating layers with different properties, protective layers to suppress the interface side reaction, coating layers related to structural transformation, and electronic/ionic conductive layers for better rate capability, can avoid the shortcomings of LLOs. In addition to surface modification for performance enhancement, other strategies can also be investigated to achieve high-performance LLO-based cathode materials.

  12. Network coding multiuser scheme for indoor visible light communications

    Science.gov (United States)

    Zhang, Jiankun; Dang, Anhong

    2017-12-01

    Visible light communication (VLC) is a unique alternative for indoor data transfer and developing beyond point-to-point. However, for realizing high-capacity networks, VLC is facing challenges including the constrained bandwidth of the optical access point and random occlusion. A network coding scheme for VLC (NC-VLC) is proposed, with increased throughput and system robustness. Based on the Lambertian illumination model, theoretical decoding failure probability of the multiuser NC-VLC system is derived, and the impact of the system parameters on the performance is analyzed. Experiments demonstrate the proposed scheme successfully in the indoor multiuser scenario. These results indicate that the NC-VLC system shows a good performance under the link loss and random occlusion.

  13. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  14. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  15. Nanoelectrospray high capacity ion trap multiple stage mass spectrometry for the structural analysis of human brain gangliosides

    International Nuclear Information System (INIS)

    Vukelic, Zeljka; Ratiu, Cornelia; Grozescu, Ioan; Zamfir, Alina Diana

    2006-01-01

    Full text: A novel protocol based on electrospray ionization (ESI) multiple stage high capacity ion trap (HCT) mass spectrometry (MS) was developed for glycosphingolipidomic surveys. The method was optimized for detailed structural elucidation of human brain gangliosides and particularly applied to human hippocampus-associated structures. The multiple stage MS experiments allowed for a complete structural characterization of GM1 ganglioside species, which was achieved by elucidation of the oligosaccharide sequence, identification of the GM1 a structural isomer from the data upon sialic acid localization along the sugar backbone and determination of the d18:1/18:0 of fatty acid/sphingoid base composition of the ceramide moiety. The methodology developed here is of general practical applicability for glycolipids and represents a step forward in the implementation of the advanced and most modern MS methods in glycomics. Gangliosides are glycosphingolipids, which consist of a mono- to polysialylated oligosaccharide chain of variable length attached to a ceramide portion of different composition with respect to the type of sphingoid base and fatty acid residues. Among all body systems, the central nervous system (CNS) possesses the highest content of gangliosides and they are playing a particularly important biological role at this level. Specific changes in the ganglioside expression and type of the expressed structures were observed to occur during brain development, maturation, and aging, and due to diseases or neurodegeneration processes. Gangliosides represent, therefore, an important class of biomarkers, carriers of information upon various CNS processes and events. Though in the human brain, their expression was observed to have a regional and tissue development induced specificity, the differences in ganglioside structure, composition and quantity were not systematically investigated or rigorously determined so far. (authors)

  16. Stress Dispersed Cu Metal Anode by Laser Multiscale Patterning for Lithium-Ion Batteries with High Capacity

    Directory of Open Access Journals (Sweden)

    Jin-Young So

    2018-06-01

    Full Text Available Electric power production continues to increase as the industry advances, and the demand for high-capacity batteries for efficient operation of the electric power produced is higher than ever before. Si has been attracting a great deal of attention recently as an anode electrode material because of its high theoretical capacity. However, it suffers from significant capacity-loss, resulting from the volume-expansion of Si during charge and discharge cycles. Inspired by the multiscale structures commonly found in nature, we attempt to solve this problem by patterning the surface of the Cu current-collector. To this end, we develop a direct, one-step method using laser patterning to manufacture a multiscale structure on the surface of the current-collector. The inherent exfoliation characteristic of the Cu current-collector allows the spontaneous formation of the multiscale structure while being irradiated with a laser. A micro/nano structure, with a different surface area, is fabricated by varying the laser output at three levels, and the batteries prepared with the fabricated Cu current-collector are tested to evaluate their charge-discharge characteristics and electrochemical impedance. The results show that the multiscale structure reduces mechanical stress. The initial capacity of the Cu current-collector is proportional to the laser output, and the initial capacity of the coin cell prepared with the Cu current-collector, fabricated at the highest laser output, is 396.7% higher than that of the coin cell prepared with a bare Cu current-collector. The impedance is inversely proportional to the laser output. The charge transfer resistance of the coin cell prepared with the Cu current-collector and irradiated with the highest laser output is 190.2% lower than that of the coin cell prepared with the bare Cu current-collector.

  17. Development and evaluation of a low-cost and high-capacity DICOM image data storage system for research.

    Science.gov (United States)

    Yakami, Masahiro; Ishizu, Koichi; Kubo, Takeshi; Okada, Tomohisa; Togashi, Kaori

    2011-04-01

    Thin-slice CT data, useful for clinical diagnosis and research, is now widely available but is typically discarded in many institutions, after a short period of time due to data storage capacity limitations. We designed and built a low-cost high-capacity Digital Imaging and COmmunication in Medicine (DICOM) storage system able to store thin-slice image data for years, using off-the-shelf consumer hardware components, such as a Macintosh computer, a Windows PC, and network-attached storage units. "Ordinary" hierarchical file systems, instead of a centralized data management system such as relational database, were adopted to manage patient DICOM files by arranging them in directories enabling quick and easy access to the DICOM files of each study by following the directory trees with Windows Explorer via study date and patient ID. Software used for this system was open-source OsiriX and additional programs we developed ourselves, both of which were freely available via the Internet. The initial cost of this system was about $3,600 with an incremental storage cost of about $900 per 1 terabyte (TB). This system has been running since 7th Feb 2008 with the data stored increasing at the rate of about 1.3 TB per month. Total data stored was 21.3 TB on 23rd June 2009. The maintenance workload was found to be about 30 to 60 min once every 2 weeks. In conclusion, this newly developed DICOM storage system is useful for research due to its cost-effectiveness, enormous capacity, high scalability, sufficient reliability, and easy data access.

  18. High-Capacity Micrometer-Sized Li 2 S Particles as Cathode Materials for Advanced Rechargeable Lithium-Ion Batteries

    KAUST Repository

    Yang, Yuan

    2012-09-19

    Li 2S is a high-capacity cathode material for lithium metal-free rechargeable batteries. It has a theoretical capacity of 1166 mAh/g, which is nearly 1 order of magnitude higher than traditional metal oxides/phosphates cathodes. However, Li 2S is usually considered to be electrochemically inactive due to its high electronic resistivity and low lithium-ion diffusivity. In this paper, we discover that a large potential barrier (∼1 V) exists at the beginning of charging for Li 2S. By applying a higher voltage cutoff, this barrier can be overcome and Li 2S becomes active. Moreover, this barrier does not appear again in the following cycling. Subsequent cycling shows that the material behaves similar to common sulfur cathodes with high energy efficiency. The initial discharge capacity is greater than 800 mAh/g for even 10 μm Li 2S particles. Moreover, after 10 cycles, the capacity is stabilized around 500-550 mAh/g with a capacity decay rate of only ∼0.25% per cycle. The origin of the initial barrier is found to be the phase nucleation of polysulfides, but the amplitude of barrier is mainly due to two factors: (a) charge transfer directly between Li 2S and electrolyte without polysulfide and (b) lithium-ion diffusion in Li 2S. These results demonstrate a simple and scalable approach to utilizing Li 2S as the cathode material for rechargeable lithium-ion batteries with high specific energy. © 2012 American Chemical Society.

  19. Conductive Boron-Doped Graphene as an Ideal Material for Electrocatalytically Switchable and High-Capacity Hydrogen Storage.

    Science.gov (United States)

    Tan, Xin; Tahini, Hassan A; Smith, Sean C

    2016-12-07

    Electrocatalytic, switchable hydrogen storage promises both tunable kinetics and facile reversibility without the need for specific catalysts. The feasibility of this approach relies on having materials that are easy to synthesize, possessing good electrical conductivities. Graphitic carbon nitride (g-C 4 N 3 ) has been predicted to display charge-responsive binding with molecular hydrogen-the only such conductive sorbent material that has been discovered to date. As yet, however, this conductive variant of graphitic carbon nitride is not readily synthesized by scalable methods. Here, we examine the possibility of conductive and easily synthesized boron-doped graphene nanosheets (B-doped graphene) as sorbent materials for practical applications of electrocatalytically switchable hydrogen storage. Using first-principle calculations, we find that the adsorption energy of H 2 molecules on B-doped graphene can be dramatically enhanced by removing electrons from and thereby positively charging the adsorbent. Thus, by controlling charge injected or depleted from the adsorbent, one can effectively tune the storage/release processes which occur spontaneously without any energy barriers. At full hydrogen coverage, the positively charged BC 5 achieves high storage capacities up to 5.3 wt %. Importantly, B-doped graphene, such as BC 49 , BC 7 , and BC 5 , have good electrical conductivity and can be easily synthesized by scalable methods, which positions this class of material as a very good candidate for charge injection/release. These predictions pave the route for practical implementation of electrocatalytic systems with switchable storage/release capacities that offer high capacity for hydrogen storage.

  20. Fetal muscle gene transfer is not enhanced by an RGD capsid modification to high-capacity adenoviral vectors.

    Science.gov (United States)

    Bilbao, R; Reay, D P; Hughes, T; Biermann, V; Volpers, C; Goldberg, L; Bergelson, J; Kochanek, S; Clemens, P R

    2003-10-01

    High levels of alpha(v) integrin expression by fetal muscle suggested that vector re-targeting to integrins could enhance adenoviral vector-mediated transduction, thereby increasing safety and efficacy of muscle gene transfer in utero. High-capacity adenoviral (HC-Ad) vectors modified by an Arg-Gly-Asp (RGD) peptide motif in the HI loop of the adenoviral fiber (RGD-HC-Ad) have demonstrated efficient gene transfer through binding to alpha(v) integrins. To test integrin targeting of HC-Ad vectors for fetal muscle gene transfer, we compared unmodified and RGD-modified HC-Ad vectors. In vivo, unmodified HC-Ad vector transduced fetal mouse muscle with four-fold higher efficiency compared to RGD-HC-Ad vector. Confirming that the difference was due to muscle cell autonomous factors and not mechanical barriers, transduction of primary myogenic cells isolated from murine fetal muscle in vitro demonstrated a three-fold better transduction by HC-Ad vector than by RGD-HC-Ad vector. We hypothesized that the high expression level of coxsackievirus and adenovirus receptor (CAR), demonstrated in fetal muscle cells both in vitro and in vivo, was the crucial variable influencing the relative transduction efficiencies of HC-Ad and RGD-HC-Ad vectors. To explore this further, we studied transduction by HC-Ad and RGD-HC-Ad vectors in paired cell lines that expressed alpha(v) integrins and differed only by the presence or absence of CAR expression. The results increase our understanding of factors that will be important for retargeting HC-Ad vectors to enhance gene transfer to fetal muscle.

  1. High-capacity lithium-ion battery conversion cathodes based on iron fluoride nanowires and insights into the conversion mechanism.

    Science.gov (United States)

    Li, Linsen; Meng, Fei; Jin, Song

    2012-11-14

    The increasing demands from large-scale energy applications call for the development of lithium-ion battery (LIB) electrode materials with high energy density. Earth abundant conversion cathode material iron trifluoride (FeF(3)) has a high theoretical capacity (712 mAh g(-1)) and the potential to double the energy density of the current cathode material based on lithium cobalt oxide. Such promise has not been fulfilled due to the nonoptimal material properties and poor kinetics of the electrochemical conversion reactions. Here, we report for the first time a high-capacity LIB cathode that is based on networks of FeF(3) nanowires (NWs) made via an inexpensive and scalable synthesis. The FeF(3) NW cathode yielded a discharge capacity as high as 543 mAh g(-1) at the first cycle and retained a capacity of 223 mAh g(-1) after 50 cycles at room temperature under the current of 50 mA g(-1). Moreover, high-resolution transmission electron microscopy revealed the existence of continuous networks of Fe in the lithiated FeF(3) NWs after discharging, which is likely an important factor for the observed improved electrochemical performance. The loss of active material (FeF(3)) caused by the increasingly ineffective reconversion process during charging was found to be a major factor responsible for the capacity loss upon cycling. With the advantages of low cost, large quantity, and ease of processing, these FeF(3) NWs are not only promising battery cathode materials but also provide a convenient platform for fundamental studies and further improving conversion cathodes in general.

  2. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  3. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  4. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  5. Alternative reprocessing schemes evaluation

    International Nuclear Information System (INIS)

    1979-02-01

    This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented

  6. Introduction to association schemes

    NARCIS (Netherlands)

    Seidel, J.J.

    1991-01-01

    The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs

  7. Reaction schemes of immunoanalysis

    International Nuclear Information System (INIS)

    Delaage, M.; Barbet, J.

    1991-01-01

    The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr

  8. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  9. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  10. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  11. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  12. Low Cost, High Capacity Regenerable Sorbent for Carbon Dioxide Capture from Existing Coal-fired Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Alptekin, Gokhan [TDA Research, Inc., Wheat Ridge, CO (United States); Jayaraman, Ambalavanan [TDA Research, Inc., Wheat Ridge, CO (United States); Dietz, Steven [TDA Research, Inc., Wheat Ridge, CO (United States)

    2016-03-03

    In this project TDA Research, Inc (TDA) has developed a new post combustion carbon capture technology based on a vacuum swing adsorption system that uses a steam purge and demonstrated its technical feasibility and economic viability in laboratory-scale tests and tests in actual coal derived flue gas. TDA uses an advanced physical adsorbent to selectively remove CO2 from the flue gas. The sorbent exhibits a much higher affinity for CO2 than N2, H2O or O2, enabling effective CO2 separation from the flue gas. We also carried out a detailed process design and analysis of the new system as part of both sub-critical and super-critical pulverized coal fired power plants. The new technology uses a low cost, high capacity adsorbent that selectively removes CO2 in the presence of moisture at the flue gas temperature without a need for significant cooling of the flue gas or moisture removal. The sorbent is based on a TDA proprietary mesoporous carbon that consists of surface functionalized groups that remove CO2 via physical adsorption. The high surface area and favorable porosity of the sorbent also provides a unique platform to introduce additional functionality, such as active groups to remove trace metals (e.g., Hg, As). In collaboration with the Advanced Power and Energy Program of the University of California, Irvine (UCI), TDA developed system simulation models using Aspen PlusTM simulation software to assess the economic viability of TDA’s VSA-based post-combustion carbon capture technology. The levelized cost of electricity including the TS&M costs for CO2 is calculated as $116.71/MWh and $113.76/MWh for TDA system integrated with sub-critical and super-critical pulverized coal fired power plants; much lower than the $153.03/MWhand $147.44/MWh calculated for the corresponding amine based systems. The cost of CO2 captured for TDA’s VSA based system is $38

  13. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  14. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  15. Conception of PIPERADE: A high-capacity Penning-trap mass separator for high isobaric contamination at DESIR

    Energy Technology Data Exchange (ETDEWEB)

    Minaya Ramirez, E., E-mail: minaya@ipno.in2p3.fr [Max-Planck-Institut für Kernphysik, 69117 Heidelberg (Germany); Alfaurt, P.; Aouadi, M.; Ascher, P.; Blank, B. [Centre d’Etudes Nucléaires de Bordeaux-Gradignan (France); Blaum, K. [Max-Planck-Institut für Kernphysik, 69117 Heidelberg (Germany); Cam, J.-F. [Laboratoire de Physique Corpusculaire, Caen (France); Chauveau, P. [Grand Accélérateur National d’Ions Lourds CEA/DSM-CNRS-IN2P3, Caen (France); Daudin, L. [Centre d’Etudes Nucléaires de Bordeaux-Gradignan (France); Delahaye, P. [Grand Accélérateur National d’Ions Lourds CEA/DSM-CNRS-IN2P3, Caen (France); Delalee, F. [Centre d’Etudes Nucléaires de Bordeaux-Gradignan (France); Dupré, P. [Centre de Sciences Nucléaires et de Sciences de la Matière, Orsay (France); El Abbeir, S.; Gerbaux, M.; Grévy, S.; Guérin, H. [Centre d’Etudes Nucléaires de Bordeaux-Gradignan (France); Lunney, D. [Centre de Sciences Nucléaires et de Sciences de la Matière, Orsay (France); Metz, F. [Max-Planck-Institut für Kernphysik, 69117 Heidelberg (Germany); Naimi, S. [Riken, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Perrot, L. [Institut de Physique Nucléaire, Orsay (France); and others

    2016-06-01

    The DESIR (decay, excitation and storage of radioactive ions) facility at GANIL-SPIRAL2 will receive a large variety of exotic nuclei at low energy (up to 60 keV) with high intensities. However, the production methods of radioactive beams are non selective, limiting the purity of the beams of interest. Moreover, the high precision needed for nuclear structure and astrophysics studies using beta decay spectroscopy, laser spectroscopy and trap-based experiments at DESIR requires highly pure samples of exotic nuclei. The aim of the double-Pennig-trap mass separator PIPERADE is to deliver large and very pure samples of exotic nuclei to the different experiments in DESIR. New excitation schemes and a large inner diameter of the first trap will mitigate space charge effects to attempt trapping of up to 10{sup 5} ions per pulse. The purification cycle will be performed in a few milliseconds so that short-lived nuclei can be purified. To extract the nuclides of interest from the large amount of isobaric contaminants, a resolving power of 10{sup 5} is mandatory. Afterwards the ions of interest will be accumulated in the second trap until they constitute a sufficiently pure sample for the measurements. The status of the project is presented.

  16. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  17. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  18. Cobalt Oxide Porous Nanofibers Directly Grown on Conductive Substrate as a Binder/Additive-Free Lithium-Ion Battery Anode with High Capacity.

    Science.gov (United States)

    Liu, Hao; Zheng, Zheng; Chen, Bochao; Liao, Libing; Wang, Xina

    2017-12-01

    In order to reduce the amount of inactive materials, such as binders and carbon additives in battery electrode, porous cobalt monoxide nanofibers were directly grown on conductive substrate as a binder/additive-free lithium-ion battery anode. This electrode exhibited very high specific discharging/charging capacities at various rates and good cycling stability. It was promising as high capacity anode materials for lithium-ion battery.

  19. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  20. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  1. Summary of efficiency testing of standard and high-capacity high-efficiency particulate air filters subjected to simulated tornado depressurization and explosive shock waves

    International Nuclear Information System (INIS)

    Smith, P.R.; Gregory, W.S.

    1985-04-01

    Pressure transients in nuclear facility air cleaning systems can originate from natural phenomena such as tornadoes or from accident-induced explosive blast waves. This study was concerned with the effective efficiency of high-efficiency particulate air (HEPA) filters during pressure surges resulting from simulated tornado and explosion transients. The primary objective of the study was to examine filter efficiencies at pressure levels below the point of structural failure. Both standard and high-capacity 0.61-m by 0.61-m HEPA filters were evaluated, as were several 0.2-m by 0.2-m HEPA filters. For a particular manufacturer, the material release when subjected to tornado transients is the same (per unit area) for both the 0.2-m by 0.2-m and the 0.61-m by 0.61-m filters. For tornado transients, the material release was on the order of micrograms per square meter. When subjecting clean HEPA filters to simulated tornado transients with aerosol entrained in the pressure pulse, all filters tested showed a degradation of filter efficiency. For explosive transients, the material release from preloaded high-capacity filters was as much as 340 g. When preloaded high-capacity filters were subjected to shock waves approximately 50% of the structural limit level, 1 to 2 mg of particulate was released

  2. Achievement report for fiscal 1998 on area consortium research and development business. Area consortium for venture business development by building base for small business (abuse double protected next generation card system based on steganography); 1998 nendo venture kigyo ikuseigata chiiki consortium kenkyu kaihatsu (chusho kigyo sozo kibangata). Steganography gijutsu wo riyoshita jisedaigata fusei shiyo taju boshi guard system no kenkyu kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    A card system is developed using BPCS (Business Planning and Control System) steganography, with electronic data imbedded in the card. Under the system, the visual recognition of the user and the mechanical verification of the card are carried out simultaneously, with the card rejecting any abuse. In fiscal 1998, a system was built by way of trial, constituted of technologies of encoding, decoding, and packaging data into an IC (integrated circuit) card. A photograph of the user's face is attached to the card, the card carries an 8KB IC memory device, and the device stores data of the photograph of the user's face etc. A password has to be inputted before any data may be taken out. A customized key is required to display the imbedded personal data and, for the restoration of the key data, the personal key known only to the owner and the company key that is kept by the card managing company need to be collated with each other. Multiple checking is available for the prevention of abuse, which include the collation of face photographs, collation with display by inputting the password, and request for the customized key to confirm the presence of authority to read the imbedded personal data. (NEDO)

  3. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  4. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  5. An Integrated Approach Using Chaotic Map & Sample Value Difference Method for Electrocardiogram Steganography and OFDM Based Secured Patient Information Transmission.

    Science.gov (United States)

    Pandey, Anukul; Saini, Barjinder Singh; Singh, Butta; Sood, Neetu

    2017-10-18

    This paper presents a patient's confidential data hiding scheme in electrocardiogram (ECG) signal and its subsequent wireless transmission. Patient's confidential data is embedded in ECG (called stego-ECG) using chaotic map and the sample value difference approach. The sample value difference approach effectually hides the patient's confidential data in ECG sample pairs at the predefined locations. The chaotic map generates these predefined locations through the use of selective control parameters. Subsequently, the wireless transmission of the stego-ECG is analyzed using the Orthogonal Frequency Division Multiplexing (OFDM) system in a Rayleigh fading scenario for telemedicine applications. Evaluation of proposed method on all 48 records of MIT-BIH arrhythmia ECG database demonstrates that the embedding does not alter the diagnostic features of cover ECG. The secret data imperceptibility in stego-ECG is evident through the statistical and clinical performance measures. Statistical measures comprise of Percentage Root-mean-square Difference (PRD), Peak Signal to Noise Ratio (PSNR), and Kulback-Leibler Divergence (KL-Div), etc. while clinical metrics includes wavelet Energy Based Diagnostic Distortion (WEDD) and Wavelet based Weighted PRD (WWPRD). The various channel Signal-to-Noise Ratio scenarios are simulated for wireless communication of stego-ECG in OFDM system. The proposed method over all the 48 records of MIT-BIH arrhythmia database resulted in average, PRD = 0.26, PSNR = 55.49, KL-Div = 3.34 × 10 -6 , WEDD = 0.02, and WWPRD = 0.10 with secret data size of 21Kb. Further, a comparative analysis of proposed method and recent existing works was also performed. The results clearly, demonstrated the superiority of proposed method.

  6. Superposed Redox Chemistry of Fused Carbon Rings in Cyclooctatetraene-Based Organic Molecules for High-Voltage and High-Capacity Cathodes.

    Science.gov (United States)

    Zhao, Xiaolin; Qiu, Wujie; Ma, Chao; Zhao, Yingqin; Wang, Kaixue; Zhang, Wenqing; Kang, Litao; Liu, Jianjun

    2018-01-24

    Even though many organic cathodes have been developed and have made a significant improvement in energy density and reversibility, some organic materials always generate relatively low voltage and limited discharge capacity because their energy storage mechanism is solely based on redox reactions of limited functional groups [N-O, C═X (X = O, N, S)] linking to aromatic rings. Here, a series of cyclooctatetraene-based (C 8 H 8 ) organic molecules were demonstrated to have electrochemical activity of high-capacity and high-voltage from carbon rings by means of first-principles calculations and electronic structure analysis. Fused molecules of C 8 -C 4 -C 8 (C 16 H 12 ) and C 8 -C 4 -C 8 -C 4 -C 8 (C 24 H 16 ) contain, respectively, four and eight electron-deficient carbons, generating high-capacity by their multiple redox reactions. Our sodiation calculations predict that C 16 H 12 and C 24 H 16 exhibit discharge capacities of 525.3 and 357.2 mA h g -1 at the voltage change from 3.5 to 1.0 V and 3.7 to 1.3 V versus Na + /Na, respectively. Electronic structure analysis reveals that the high voltages are attributed to superposed electron stabilization mechanisms, including double-bond reformation and aromatization from carbon rings. High thermodynamic stability of these C 24 H 16 -based systems strongly suggests feasibility of experimental realization. The present work provides evidence that cyclooctatetraene-based organic molecules fused with the C 4 ring are promising in designing high-capacity and high-voltage organic rechargeable cathodes.

  7. Increased productivity in construction of civil and mining tunnels through the use of high-capacity tunnel-boring machines and continuous belt conveyor muck haulage

    Energy Technology Data Exchange (ETDEWEB)

    Beatty, J.G.; Ganey, R.J.; Killingsworth, J.E. [Perini Corp., Chicago, IL (United States). US Heavy Division

    1994-12-31

    The use of a large diameter high production tunnel boring machine interfaced with a high capacity continuous belt conveyor system provides a highly productive and cost effective construction system for both civil and mining tunnels. Continuous advance of the tunnel boring machine for a distance of 1,000 feet (305 m) allows for very efficient operation of the system. The available cost reductions will likely prove that this approach to waste handling will make marginally viable projects economically feasible. 9 refs., 10 figs., 1 tab.

  8. Bead Injection Extraction Chromatography using High-capacity Lab-on-Valve as a Front End to Inductively Coupled Plasma Mass Spectrometry for Rapid Urine Radiobioassay

    DEFF Research Database (Denmark)

    Qiao, Jixin; Hou, Xiaolin; Roos, Per

    2013-01-01

    A novel bead injection (BI) extraction chromatographic microflow system exploiting high-capacity lab-on-valve (LOV) platform coupled with inductively coupled plasma mass spectrometric detection is developed for rapid and automated determination of plutonium in human urine. A microconduit (1 m......L) incorporated within the LOV processing unit is loaded on-line with a metered amount of disposable extraction chromatographic resin (up to 330 mg of TEVA) through programmable beads transport. Selective capture and purification of plutonium onto the resin beads is then performed by pressure driven flow after...

  9. Role of H2O2 on the kinetics of low-affinity high-capacity Na+-dependent alanine transport in SHR proximal tubular epithelial cells

    International Nuclear Information System (INIS)

    Pinto, Vanda; Pinho, Maria Joao; Jose, Pedro A.; Soares-da-Silva, Patricio

    2010-01-01

    Research highlights: → H 2 O 2 in excess is required for the presence of a low-affinity high-capacity component for the Na + -dependent [ 14 C]-L-alanine uptake in SHR PTE cells only. → It is suggested that Na + binding in renal ASCT2 may be regulated by ROS in SHR PTE cells. -- Abstract: The presence of high and low sodium affinity states for the Na + -dependent [ 14 C]-L-alanine uptake in immortalized renal proximal tubular epithelial (PTE) cells was previously reported (Am. J. Physiol. 293 (2007) R538-R547). This study evaluated the role of H 2 O 2 on the Na + -dependent [ 14 C]-L-alanine uptake of ASCT2 in immortalized renal PTE cells from Wistar Kyoto rat (WKY) and spontaneously hypertensive rat (SHR). Na + dependence of [ 14 C]-L-alanine uptake was investigated replacing NaCl with an equimolar concentration of choline chloride in vehicle- and apocynin-treated cells. Na + removal from the uptake solution abolished transport activity in both WKY and SHR PTE cells. Decreases in H 2 O 2 levels in the extracellular medium significantly reduced Na + -K m and V max values of the low-affinity high-capacity component in SHR PTE cells, with no effect on the high-affinity low-capacity state of the Na + -dependent [ 14 C]-L-alanine uptake. After removal of apocynin from the culture medium, H 2 O 2 levels returned to basal values within 1 to 3 h in both WKY and SHR PTE cells and these were found stable for the next 24 h. Under these experimental conditions, the Na + -K m and V max of the high-affinity low-capacity state were unaffected and the low-affinity high-capacity component remained significantly decreased 1 day but not 4 days after apocynin removal. In conclusion, H 2 O 2 in excess is required for the presence of a low-affinity high-capacity component for the Na + -dependent [ 14 C]-L-alanine uptake in SHR PTE cells only. It is suggested that Na + binding in renal ASCT2 may be regulated by ROS in SHR PTE cells.

  10. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  11. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  12. The H{sub 60}Si{sub 6}C{sub 54} heterofullerene as high-capacity hydrogen storage medium

    Energy Technology Data Exchange (ETDEWEB)

    Yong, Yongliang, E-mail: ylyong@haust.edu.cn [College of Physics and Engineering, Henan University of Science and Technology, Luoyang 471003 (China); Department of Physics, Zhejiang University, Hangzhou 310027 (China); Zhou, Qingxiao; Li, Xiaohong; Lv, Shijie [College of Physics and Engineering, Henan University of Science and Technology, Luoyang 471003 (China)

    2016-07-15

    With the great success in Si atoms doped C{sub 60} fullerene and the well-established methods for synthesis of hydrogenated carbon fullerenes, this leads naturally to wonder whether Si-doped fullerenes are possible for special applications such as hydrogen storage. Here by using first-principles calculations, we design a novel high-capacity hydrogen storage material, H{sub 60}Si{sub 6}C{sub 54} heterofullerene, and confirm its geometric stability. It is found that the H{sub 60}Si{sub 6}C{sub 54} heterofullerene has a large HOMO-LUMO gap and a high symmetry, indicating it is high chemically stable. Further, our finite temperature simulations indicate that the H{sub 60}Si{sub 6}C{sub 54} heterofullerene is thermally stable at 300 K. H{sub 2} molecules would enter into the cage from the Si-hexagon ring because of lower energy barrier. Through our calculation, a maximum of 21 H{sub 2} molecules can be stored inside the H{sub 60}Si{sub 6}C{sub 54} cage in molecular form, leading to a gravimetric density of 11.11 wt% for 21H{sub 2}@H{sub 60}Si{sub 6}C{sub 54} system, which suggests that the hydrogenated Si{sub 6}C{sub 54} heterofullerene could be suitable as a high-capacity hydrogen storage material.

  13. Electrostatic Self-Assembly of Fe3O4 Nanoparticles on Graphene Oxides for High Capacity Lithium-Ion Battery Anodes

    Directory of Open Access Journals (Sweden)

    Jung Kyoo Lee

    2013-09-01

    Full Text Available Magnetite, Fe3O4, is a promising anode material for lithium ion batteries due to its high theoretical capacity (924 mA h g−1, high density, low cost and low toxicity. However, its application as high capacity anodes is still hampered by poor cycling performance. To stabilize the cycling performance of Fe3O4 nanoparticles, composites comprising Fe3O4 nanoparticles and graphene sheets (GS were fabricated. The Fe3O4/GS composite disks of mm dimensions were prepared by electrostatic self-assembly between negatively charged graphene oxide (GO sheets and positively charged Fe3O4-APTMS [Fe3O4 grafted with (3-aminopropyltrimethoxysilane (APTMS] in an acidic solution (pH = 2 followed by in situ chemical reduction. Thus prepared Fe3O4/GS composite showed an excellent rate capability as well as much enhanced cycling stability compared with Fe3O4 electrode. The superior electrochemical responses of Fe3O4/GS composite disks assure the advantages of: (1 electrostatic self-assembly between high storage-capacity materials with GO; and (2 incorporation of GS in the Fe3O4/GS composite for high capacity lithium-ion battery application.

  14. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  15. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  16. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  17. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  18. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  19. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  20. High capacity carbon dioxide sorbent

    Science.gov (United States)

    Dietz, Steven Dean; Alptekin, Gokhan; Jayaraman, Ambalavanan

    2015-09-01

    The present invention provides a sorbent for the removal of carbon dioxide from gas streams, comprising: a CO.sub.2 capacity of at least 9 weight percent when measured at 22.degree. C. and 1 atmosphere; an H.sub.2O capacity of at most 15 weight percent when measured at 25.degree. C. and 1 atmosphere; and an isosteric heat of adsorption of from 5 to 8.5 kilocalories per mole of CO.sub.2. The invention also provides a carbon sorbent in a powder, a granular or a pellet form for the removal of carbon dioxide from gas streams, comprising: a carbon content of at least 90 weight percent; a nitrogen content of at least 1 weight percent; an oxygen content of at most 3 weight percent; a BET surface area from 50 to 2600 m.sup.2/g; and a DFT micropore volume from 0.04 to 0.8 cc/g.

  1. An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks

    OpenAIRE

    S. Santhosh Baboo; K. Gokulraj

    2012-01-01

    Network security is the prevailing and challenging factor in computer communications. Computer security and communication security are interrelated and essential features in the internetworking system. Network security is ascertained by many factors like authentication, authorization, digital signatures, cryptography, steganography etc. Among them authentication is playing an important role in networked communications, where the communicating partners are to be identified each other legit...

  2. Stable High-Capacity Lithium Ion Battery Anodes Produced by Supersonic Spray Deposition of Hematite Nanoparticles and Self-Healing Reduced Graphene Oxide

    International Nuclear Information System (INIS)

    Lee, Jong-Gun; Joshi, Bhavana N.; Lee, Jong-Hyuk; Kim, Tae-Gun; Kim, Do-Yeon; Al-Deyab, Salem S.; Seong, Il Won; Swihart, Mark T.; Yoon, Woo Young; Yoon, Sam S.

    2017-01-01

    Hematite (Fe 2 O 3 ) nanoparticles and reduced graphene oxide (rGO) were supersonically sprayed onto copper current collectors to create high-performance, binder-free lithium ion battery (LIB) electrodes. Supersonic spray deposition is rapid, low-cost, and suitable for large-scale production. Supersonic impact of rGO sheets and Fe 2 O 3 nanoparticles on the substrate produces compacted nanocomposite films with short diffusion lengths for Li + ions. This structure produces high reversible capacity and markedly improved capacity retention over many cycles. Decomposition of lithium oxide generated during cycling activates the solid electrolyte interface layer, contributing to high capacity retention. The optimal composition ratio of rGO to Fe 2 O 3 was 9.1 wt.%, which produced a reversible capacity of 1242 mAh g −1 after N = 305 cycles at a current density of 1000 mA g −1 (1C).

  3. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  4. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  5. Video Error Correction Using Steganography

    Science.gov (United States)

    Robie, David L.; Mersereau, Russell M.

    2002-12-01

    The transmission of any data is always subject to corruption due to errors, but video transmission, because of its real time nature must deal with these errors without retransmission of the corrupted data. The error can be handled using forward error correction in the encoder or error concealment techniques in the decoder. This MPEG-2 compliant codec uses data hiding to transmit error correction information and several error concealment techniques in the decoder. The decoder resynchronizes more quickly with fewer errors than traditional resynchronization techniques. It also allows for perfect recovery of differentially encoded DCT-DC components and motion vectors. This provides for a much higher quality picture in an error-prone environment while creating an almost imperceptible degradation of the picture in an error-free environment.

  6. Limited distortion in LSB steganography

    Science.gov (United States)

    Kim, Younhee; Duric, Zoran; Richards, Dana

    2006-02-01

    It is well known that all information hiding methods that modify the least significant bits introduce distortions into the cover objects. Those distortions have been utilized by steganalysis algorithms to detect that the objects had been modified. It has been proposed that only coefficients whose modification does not introduce large distortions should be used for embedding. In this paper we propose an effcient algorithm for information hiding in the LSBs of JPEG coefficients. Our algorithm uses parity coding to choose the coefficients whose modifications introduce minimal additional distortion. We derive the expected value of the additional distortion as a function of the message length and the probability distribution of the JPEG quantization errors of cover images. Our experiments show close agreement between the theoretical prediction and the actual additional distortion.

  7. One improved LSB steganography algorithm

    Science.gov (United States)

    Song, Bing; Zhang, Zhi-hong

    2013-03-01

    It is easy to be detected by X2 and RS steganalysis with high accuracy that using LSB algorithm to hide information in digital image. We started by selecting information embedded location and modifying the information embedded method, combined with sub-affine transformation and matrix coding method, improved the LSB algorithm and a new LSB algorithm was proposed. Experimental results show that the improved one can resist the X2 and RS steganalysis effectively.

  8. Video Error Correction Using Steganography

    Directory of Open Access Journals (Sweden)

    Robie David L

    2002-01-01

    Full Text Available The transmission of any data is always subject to corruption due to errors, but video transmission, because of its real time nature must deal with these errors without retransmission of the corrupted data. The error can be handled using forward error correction in the encoder or error concealment techniques in the decoder. This MPEG-2 compliant codec uses data hiding to transmit error correction information and several error concealment techniques in the decoder. The decoder resynchronizes more quickly with fewer errors than traditional resynchronization techniques. It also allows for perfect recovery of differentially encoded DCT-DC components and motion vectors. This provides for a much higher quality picture in an error-prone environment while creating an almost imperceptible degradation of the picture in an error-free environment.

  9. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  10. Signal multiplexing scheme for LINAC

    International Nuclear Information System (INIS)

    Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra

    2004-01-01

    For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)

  11. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  12. Multiwalled carbon nanotube@a-C@Co9S8 nanocomposites: a high-capacity and long-life anode material for advanced lithium ion batteries

    Science.gov (United States)

    Zhou, Yanli; Yan, Dong; Xu, Huayun; Liu, Shuo; Yang, Jian; Qian, Yitai

    2015-02-01

    A one-dimensional MWCNT@a-C@Co9S8 nanocomposite has been prepared via a facile solvothermal reaction followed by a calcination process. The amorphous carbon layer between Co9S8 and MWCNT acts as a linker to increase the loading of sulfides on MWCNT. When evaluated as anode materials for lithium ion batteries, the MWCNT@a-C@Co9S8 nanocomposite shows the advantages of high capacity and long life, superior to Co9S8 nanoparticles and MWCNT@Co9S8 nanocomposites. The reversible capacity could be retained at 662 mA h g-1 after 120 cycles at 1 A g-1. The efficient synthesis and excellent performances of this nanocomposite offer numerous opportunities for other sulfides as a new anode for lithium ion batteries.A one-dimensional MWCNT@a-C@Co9S8 nanocomposite has been prepared via a facile solvothermal reaction followed by a calcination process. The amorphous carbon layer between Co9S8 and MWCNT acts as a linker to increase the loading of sulfides on MWCNT. When evaluated as anode materials for lithium ion batteries, the MWCNT@a-C@Co9S8 nanocomposite shows the advantages of high capacity and long life, superior to Co9S8 nanoparticles and MWCNT@Co9S8 nanocomposites. The reversible capacity could be retained at 662 mA h g-1 after 120 cycles at 1 A g-1. The efficient synthesis and excellent performances of this nanocomposite offer numerous opportunities for other sulfides as a new anode for lithium ion batteries. Electronic supplementary information (ESI) available: Infrared spectrogram (IR) of glucose treated MWCNT; TEM images of MWCNT@a-C treated by different concentrations of glucose; SEM and TEM images of the intermediate product obtained from the solvothermal reaction between thiourea and Co(Ac)2; EDS spectrum of MWCNT@a-C@Co9S8 composites; SEM and TEM images of MWCNT@Co9S8 nanocomposites obtained without the hydrothermal treatment by glucose; SEM and TEM images of Co9S8 nanoparticles; Galvanostatic discharge-charge profiles and cycling performance of MWCNT@a-C; TEM images

  13. Final Project Report for DOE/EERE High-Capacity and Low-Cost Hydrogen-Storage Sorbents for Automotive Applications

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Hong-Cai [Texas A & M Univ., College Station, TX (United States); Liu, Di-Jia [Texas A & M Univ., College Station, TX (United States)

    2017-12-01

    This report provides a review of the objectives, progress, and milestones of the research conducted during this project on the topic of developing innovative metal-organic frameworks (MOFs) and porous organic polymers (POPs) for high-capacity and low-cost hydrogen-storage sorbents in automotive applications.1 The objectives of the proposed research were to develop new materials as next-generation hydrogen storage sorbents that meet or exceed DOE’s 2017 performance targets of gravimetric capacity of 0.055 kg H2/kgsystem and volumetric capacity of 0.040 kg H2/Lsystem at a cost of $400/kg H2 stored. Texas A&M University (TAMU) and Argonne National Laboratory (ANL) collaborated in developing low-cost and high-capacity hydrogen-storage sorbents with appropriate stability, sorption kinetics, and thermal conductivity. The research scope and methods developed to achieve the project’s goals include the following: Advanced ligand design and synthesis to construct MOF sorbents with optimal hydrogen storage capacities, low cost and high stability; Substantially improve the hydrogen uptake capacity and chemical stability of MOF-based sorbents by incorporating high valent metal ions during synthesis or through the post-synthetic metal metathesis oxidation approach; Enhance sorbent storage capacity through material engineering and characterization; Generate a better understanding of the H2-sorbent interaction through advanced characterization and simulation. Over the course of the project 5 different MOFs were developed and studied: PCN-250, PCN-12, PCN-12’, PCN-608 and PCN-609.2-3 Two different samples were submitted to the National Renewable Energy Laboratory (NREL) in order to validate their hydrogen adsorption capacity, PCN-250 and PCN-12. Neither of these samples reached the project’s Go/No-Go requirements but the data obtained did further prove the hypothesis that the presence of open metal

  14. High Capacity of Hard Carbon Anode in Na-Ion Batteries Unlocked by PO x Doping

    Energy Technology Data Exchange (ETDEWEB)

    Li, Zhifei; Ma, Lu; Surta, Todd Wesley; Bommier, Clement; Jian, Zelang; Xing, Zhenyu; Stickle, William F.; Dolgos, Michelle; Amine, Khalil; Lu, Jun; Wu, Tianpin; Ji, Xiulei

    2016-08-12

    The capacity of hard carbon anodes in Na-ion batteries 2.5 rarely reaches values beyond 300 mAh/g. We report that doping POx into local structures of hard carbon increases its reversible capacity from 283 to 359 mAh/g. We confirm that the doped POx is redox inactive by X-ray adsorption near edge structure measurements, thus not contributing to the higher capacity. We observe two significant changes of hard carbon's local structures caused by doping. First, the (002) d-spacing inside the turbostratic nanodomains is increased, revealed by both laboratory and synchrotron X-ray diffraction. Second, doping turns turbostratic nanodomains more defective along ab planes, indicated by neutron total scattering and the associated pair distribution function studies. The local structural changes of hard carbon are correlated to the higher capacity, where both the plateau and slope regions in the potential profiles are enhanced. Our study demonstrates that Na-ion storage in hard carbon heavily depends on carbon local structures, where such structures, despite being disordered, can be tuned toward unusually high capacities.

  15. High-capacity hollow porous dummy molecular imprinted polymers using ionic liquid as functional monomer for selective recognition of salicylic acid.

    Science.gov (United States)

    Xiang, Haiyan; Peng, Mijun; Li, Hui; Peng, Sheng; Shi, Shuyun

    2017-01-30

    The existence of strong intramolecular hydrogen bond in salicylic acid (SA) weakens its intermolecular hydrogen bonding with functional monomer, then it is a challenge work to fabricate molecularly imprinted polymers (MIPs) for SA recognition with high capacity and good selectivity. Here, hollow porous dummy MIPs (HPDMIPs) were prepared using benzoic acid (BA) as dummy template, ionic liquid (i.e. 1-vinyl-3-methylimidazolium chloride) as functional monomer, and MCM-48 as sacrificial support. Factors that affected adsorption, such as type of template and porogen, mole ratio of template-functional monomer-cross-linker and type of binding solvent, were optimized in detail. Multiple strong interactions between SA and ionic liquid in HPDMIPs deduced higher binding capacity (29.75mg/g), imprinting factor (5.61) and selectivity than any previously reported MIPs by traditional or surface imprinting technology. The large surface area (543.9m 2 /g) with hollow porous structure resulted in faster kinetic binding (25min). The equilibrium data fitted well to Freundlich equation and the adsorption process could be described by pseudo-second order model. Finally, HPDMIPs were successfully applied to selectively extract and enrich SA from Actinidia chinensis with a relatively high recovery (84.6-94.5%). Copyright © 2016 Elsevier B.V. All rights reserved.

  16. Three-dimensionally interconnected Si frameworks derived from natural halloysite clay: a high-capacity anode material for lithium-ion batteries.

    Science.gov (United States)

    Wan, Hao; Xiong, Hao; Liu, Xiaohe; Chen, Gen; Zhang, Ning; Wang, Haidong; Ma, Renzhi; Qiu, Guanzhou

    2018-05-23

    On account of its high theoretical capacity, silicon (Si) has been regarded as a promising anode material for Li-ion batteries. Extracting Si content from earth-abundant and low-cost aluminosilicate minerals, rather than from artificial silica (SiO2) precursors, is a more favorable and practical method for the large-scale application of Si anodes. In this work, three-dimensionally interconnected (3D-interconnected) Si frameworks with a branch diameter of ∼15 nm are prepared by the reduction of amorphous SiO2 nanotubes derived from natural halloysite clay. Benefiting from their nanostructure, the as-prepared 3D-interconnected Si frameworks yield high reversible capacities of 2.54 A h g-1 at 0.1 A g-1 after 50 cycles, 1.87 A h g-1 at 0.5 A g-1 after 200 cycles, and 0.97 A h g-1 at 2 A g-1 after a long-term charge-discharge process of 500 cycles, remarkably outperforming the commercial Si material. Further, when the as-prepared Si frameworks and commercial LiCoO2 cathodes are paired in full cells, a high anode capacity of 0.98 A h g-1 is achieved after 100 cycles of rapid charge/discharge at 2 A g-1. This work provides a new strategy for the synthesis of high-capacity Si anodes derived from natural aluminosilicate clay.

  17. Numerical and Experimental Study on Manufacture of a Novel High-Capacity Engine Oil Pan Subjected to Hydro-Mechanical Deep Drawing

    Science.gov (United States)

    Chen, D. Y.; Xu, Y.; Zhang, S. H.; El-Aty, A. Abd; Ma, Y.

    2017-09-01

    The oil pan is equipped at the bottom of engine crankcase of the automobile to prevent impurity and collect the lubrication oil from the surfaces of the engine which is helpful for heat dissipation and oxidation prevention. The present study aims at manufacturing a novel high-capacity engine oil pan, which is considered as a complex shaped component with features of thin wall, large size and asymmetric deep cavity through both numerical and experimental methods. The result indicated that it is difficult to form the current part through the common deep drawing process. Accordingly, the hydro-mechanical deep drawing technology was conducted, which consisted of two steps, previous local drawing and the final integral deep drawing with hydraulic pressure. The finite element analysis (FEA) was carried out to investigate the influence of initial blank dimension and the key process parameters such as loading path, draw-bead force and fillet radius on the formability of the sheet blank. Compared with the common deep drawing, the limit drawing ratio by hydro-mechanical deep drawing can be increased from 2.34 to 2.77, while the reduction in blank wall thickness can be controlled in the range of 28%. The formability is greatly improved without any defects such as crack and wrinkle by means of parameters optimisation. The results gained from simulation keep a reasonable agreement with that obtained from experiment trials.

  18. Characterization of the cloned full-length and a truncated human target of rapamycin: Activity, specificity, and enzyme inhibition as studied by a high capacity assay

    International Nuclear Information System (INIS)

    Toral-Barza, Lourdes; Zhang Weiguo; Lamison, Craig; LaRocque, James; Gibbons, James; Yu, Ker

    2005-01-01

    The mammalian target of rapamycin (mTOR/TOR) is implicated in cancer and other human disorders and thus an important target for therapeutic intervention. To study human TOR in vitro, we have produced in large scale both the full-length TOR (289 kDa) and a truncated TOR (132 kDa) from HEK293 cells. Both enzymes demonstrated a robust and specific catalytic activity towards the physiological substrate proteins, p70 S6 ribosomal protein kinase 1 (p70S6K1) and eIF4E binding protein 1 (4EBP1), as measured by phosphor-specific antibodies in Western blotting. We developed a high capacity dissociation-enhanced lanthanide fluorescence immunoassay (DELFIA) for analysis of kinetic parameters. The Michaelis constant (K m ) values of TOR for ATP and the His6-S6K substrate were shown to be 50 and 0.8 μM, respectively. Dose-response and inhibition mechanisms of several known inhibitors, the rapamycin-FKBP12 complex, wortmannin and LY294002, were also studied in DELFIA. Our data indicate that TOR exhibits kinetic features of those shared by traditional serine/threonine kinases and demonstrate the feasibility for TOR enzyme screen in searching for new inhibitors

  19. Quantifying the environmental impact of a Li-rich high-capacity cathode material in electric vehicles via life cycle assessment.

    Science.gov (United States)

    Wang, Yuqi; Yu, Yajuan; Huang, Kai; Chen, Bo; Deng, Wensheng; Yao, Ying

    2017-01-01

    A promising Li-rich high-capacity cathode material (xLi 2 MnO 3 ·(1-x)LiMn 0.5 Ni 0.5 O 2 ) has received much attention with regard to improving the performance of lithium-ion batteries in electric vehicles. This study presents an environmental impact evaluation of a lithium-ion battery with Li-rich materials used in an electric vehicle throughout the life cycle of the battery. A comparison between this cathode material and a Li-ion cathode material containing cobalt was compiled in this study. The battery use stage was found to play a large role in the total environmental impact and high greenhouse gas emissions. During battery production, cathode material manufacturing has the highest environmental impact due to its complex processing and variety of raw materials. Compared to the cathode with cobalt, the Li-rich material generates fewer impacts in terms of human health and ecosystem quality. Through the life cycle assessment (LCA) results and sensitivity analysis, we found that the electricity mix and energy efficiency significantly influence the environmental impacts of both battery production and battery use. This paper also provides a detailed life cycle inventory, including firsthand data on lithium-ion batteries with Li-rich cathode materials.

  20. Organic cation transporter 2 (SLC22A2), a low-affinity and high-capacity choline transporter, is preferentially enriched on synaptic vesicles in cholinergic neurons.

    Science.gov (United States)

    Nakata, T; Matsui, T; Kobayashi, K; Kobayashi, Y; Anzai, N

    2013-11-12

    Organic cation transporters (OCTs) are expressed mainly in the kidney and liver. OCTs transport intrinsic organic cations, including monoamine, dopamine, serotonine and choline, across the plasma membrane. Here, we demonstrate that OCT2 (SLC22A2) is expressed in cholinergic neurons, motoneurons in the anterior horn of the spinal cord, and is implicated in acetylcholine (Ach) recycling in presynaptic terminals. Application of rabbit anti-peptide antibody revealed that OCT2 was expressed in the anterior horn of the spinal cord. Double immunostaining of muscle sections with anti-OCT2 and alpha-bungarotoxin (BTX) revealed that OCT2 was localized in the neuromuscular junctions (NMJs). Immunoelectron microscopy revealed that OCT2 was localized both in synaptic vesicles (SVs) in presynaptic terminals around the motoneurons (C-terminals) and in SVs in nerve terminals in NMJs. The similarity in the distribution of OCT2 in cholinergic neurons and that of vesicular acetyl choline transporter (VAchT), and the fact that OCT2 can transport choline suggest that OCT2 could work as a low-affinity and high-capacity choline transporter at presynaptic terminals in cholinergic neurons in a firing-dependent manner. Copyright © 2013 IBRO. Published by Elsevier Ltd. All rights reserved.

  1. Efficient fabrication of high-capacity immobilized metal ion affinity chromatographic media: The role of the dextran-grafting process and its manipulation.

    Science.gov (United States)

    Zhao, Lan; Zhang, Jingfei; Huang, Yongdong; Li, Qiang; Zhang, Rongyue; Zhu, Kai; Suo, Jia; Su, Zhiguo; Zhang, Zhigang; Ma, Guanghui

    2016-03-01

    Novel high-capacity Ni(2+) immobilized metal ion affinity chromatographic media were prepared through the dextran-grafting process. Dextran was grafted to an allyl-activated agarose-based matrix followed by functionalization for the immobilized metal ion affinity chromatographic media. With elaborate regulation of the allylation degree, dextran was completely or partly grafted to agarose microspheres, namely, completely dextran-grafted agarose microspheres and partly dextran-grafted ones, respectively. Confocal laser scanning microscope results demonstrated that a good adjustment of dextran-grafting degree was achieved, and dextran was distributed uniformly in whole completely dextran-grafted microspheres, while just distributed around the outside of the partly dextran-grafted ones. Flow hydrodynamic properties were improved greatly after the dextran-grafting process, and the flow velocity increased by about 30% compared with that of a commercial chromatographic medium (Ni Sepharose FF). A significant improvement of protein binding performance was also achieved by the dextran-grafting process, and partly dextran-grafted Ni(2+) chelating medium had a maximum binding capacity for His-tagged lactate dehydrogenase about 2.5 times higher than that of Ni Sepharose FF. The results indicated that this novel chromatographic medium is promising for applications in high-efficiency and large-scale protein purification. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. Preparation of high-capacity, weak anion-exchange membranes by surface-initiated atom transfer radical polymerization of poly(glycidyl methacrylate) and subsequent derivatization with diethylamine

    International Nuclear Information System (INIS)

    Qian, Xiaolei; Fan, Hua; Wang, Chaozhan; Wei, Yinmao

    2013-01-01

    Ion-exchange membrane is of importance for the development of membrane chromatography. In this work, a high-capacity anion-exchange membrane was prepared by grafting of glycidyl methacrylate (GMA) onto the surface of regenerated cellulose (RC) membranes via surface-initiated atom transfer radical polymerization (SI-ATRP) and subsequent derivatization with diethylamine. Attenuated total reflectance Fourier-transform infrared (ATR-FTIR), X-ray photoelectron spectroscopy (XPS) and scanning electron microscopy (SEM) were used to characterize changes in the chemical functionality, surface topography and pore morphology of the modified membranes. The static capacity of the prepared anion-exchange membrane was evaluated with bovine serum albumin (BSA) as a model protein. The results indicated that the anion-exchange membrane which could reach a maximum capacity of 96 mg/mL for static adsorption possesses a higher adsorption capacity, and the adsorption capacity increases with the polymerization time. The effect of pH and salt concentration confirmed that the adsorption of BSA followed ion-exchange mechanism. The established method would have potential application in the preparation of anion-exchange membrane.

  3. Vasoactive intestinal peptide (VIP) binds to guinea pig peritoneal eosinophils: A single class of binding sites with low affinity and high capacity

    International Nuclear Information System (INIS)

    Sakakibara, H.; Shima, K.; Takamatsu, J.; Said, S.I.

    1990-01-01

    VIP binds to specific receptors on lymphocytes and mononuclear cells and exhibits antiinflammatory properties. Eosinophils (Eos) contribute to inflammatory reactions but the regulation of Eos function is incompletely understood. The authors examined the binding of monoradioiodinated VIP, [Tyr( 125 I) 10 ] VIP ( 125 I-VIP), to Eos in guinea pigs. The interaction of 125 i-VIP with Eos was rapid, reversible, saturable and linearly dependent on the number of cells. At equilibrium the binding was competitively inhibited by native peptide or by the related peptide helodermin. Scatchard analysis suggested the presence of a single class of VIP binding sites with a low affinity and a high capacity. In the presence of isobutyl-methylxanthine, VIP, PHI or helodermin did not stimulate cyclic AMP accumulation in intact Eos, while PGE 2 or 1-isoproterenol did. VIP also did not inhibit superoxide anion generation from Eos stimulated by phorbol myristate acetate. The authors conclude that: (1) VIP binds to low-affinity, specific sites on guinea pig peritoneal eosinophils; (2) this binding is not coupled to stimulation of adenylate cyclase; and (3) the possible function of these binding sites is at present unknown

  4. Three-dimensional hierarchical porous flower-like nickel-cobalt oxide/multi-walled carbon nanotubes nanocomposite for high-capacity supercapacitors

    International Nuclear Information System (INIS)

    Liu, Peipei; Hu, Zhonghua; Liu, Yafei; Yao, Mingming; Zhang, Qiang

    2015-01-01

    Highlights: • 3D hierarchical porous flower-like Ni-Co oxide/MWCNTs was synthesized. • The electrode shows a large specific surface area and desirable mesoporosity. • High specific capacitances and outstanding stability were obtained. • The content of MWCNTs affects the electrochemical properties of the electrode. - Abstract: Three-dimensional (3D) hierarchical porous flower-like nickel-cobalt oxide/multi-walled carbon nanotubes (Ni-Co oxide/MWCNTs) nanocomposites were fabricated by a facile and template-free hydrothermal method as electrodes for high-capacity supercapacitors. The samples were characterized by energy dispersive spectroscopy (EDS), X-ray diffraction (XRD), X-ray photoelectron spectroscopy (XPS), scanning electron microscopy (SEM), transmission electron microscopy (TEM), nitrogen adsorption-desorption and thermal gravimetric analysis (TGA). The electrochemical performance was investigated by cyclic voltammetry (CV), galvanostatic charge-discharge, and cycle life. It was found that Ni-Co oxide/MWCNTs nanocomposites displayed a high specific capacitance (1703 F g −1 at a discharge current density of 1 A g −1 ) and, additionally, an excellent cycling performance, retaining 97% of the maximum capacitance after 2000 cycles at 10 A g −1 . Even at a high current density (20 A g −1 ), the specific capacitance was still up to 1309 F g −1 . This outstanding capacitive performance may be attributed to the ideal composition of the material and to its unique 3D hierarchical porous flower-like architecture

  5. Determination of airborne, volatile amines from polyurethane foams by sorption onto a high-capacity cation-exchange resin based on poly(succinic acid).

    Science.gov (United States)

    Seeber, G; Buchmeiser, M R; Bonn, G K; Bertsch, T

    1998-06-05

    A high-capacity carboxylic acid-functionalized resin prepared by ring-opening metathesis polymerization based on cross-linked endo,endo-poly(norborn-2-ene-5,6-dicarboxylic acid) was used for the sampling of volatile, airborne amines from polyurethane (PU) foams. Six tertiary amines which represent commonly used promotors for the formation of PUs from diisocyanates and polyols, namely pentamethyldiethylenetriamine, diazabicyclooctane, N-methylmorpholine, N-ethylmorphine, 1,4-dimethylpiperazine and N,N-dimethylethanolamine, were sorbed onto the new resin. The sorption behavior of the new material was investigated in terms of loading capacities, the influence of concentration, flow-rate as well as of the amount of resin. Breakthrough curves were recorded from each single component as well as of mixtures thereof. Finally, the resin was used for the sampling of amines evaporating from PU foams applied in buildings. Further information about time dependent concentration profiles were obtained using a combination of GC-MS and Fourier transform IR spectroscopy.

  6. On 165Ho level scheme

    International Nuclear Information System (INIS)

    Ardisson, Claire; Ardisson, Gerard.

    1976-01-01

    A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr

  7. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping

    2014-01-01

    the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost

  8. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  9. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  10. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  11. Three-dimensional hierarchical porous flower-like nickel-cobalt oxide/multi-walled carbon nanotubes nanocomposite for high-capacity supercapacitors

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Peipei; Hu, Zhonghua, E-mail: huzh@tongji.edu.cn; Liu, Yafei; Yao, Mingming; Zhang, Qiang

    2015-02-15

    Highlights: • 3D hierarchical porous flower-like Ni-Co oxide/MWCNTs was synthesized. • The electrode shows a large specific surface area and desirable mesoporosity. • High specific capacitances and outstanding stability were obtained. • The content of MWCNTs affects the electrochemical properties of the electrode. - Abstract: Three-dimensional (3D) hierarchical porous flower-like nickel-cobalt oxide/multi-walled carbon nanotubes (Ni-Co oxide/MWCNTs) nanocomposites were fabricated by a facile and template-free hydrothermal method as electrodes for high-capacity supercapacitors. The samples were characterized by energy dispersive spectroscopy (EDS), X-ray diffraction (XRD), X-ray photoelectron spectroscopy (XPS), scanning electron microscopy (SEM), transmission electron microscopy (TEM), nitrogen adsorption-desorption and thermal gravimetric analysis (TGA). The electrochemical performance was investigated by cyclic voltammetry (CV), galvanostatic charge-discharge, and cycle life. It was found that Ni-Co oxide/MWCNTs nanocomposites displayed a high specific capacitance (1703 F g{sup −1} at a discharge current density of 1 A g{sup −1}) and, additionally, an excellent cycling performance, retaining 97% of the maximum capacitance after 2000 cycles at 10 A g{sup −1}. Even at a high current density (20 A g{sup −1}), the specific capacitance was still up to 1309 F g{sup −1}. This outstanding capacitive performance may be attributed to the ideal composition of the material and to its unique 3D hierarchical porous flower-like architecture.

  12. Environmentally benign and scalable synthesis of LiFePO4 nanoplates with high capacity and excellent rate cycling performance for lithium ion batteries

    International Nuclear Information System (INIS)

    Zhao, Chunsong; Wang, Lu-Ning; Chen, Jitao; Gao, Min

    2017-01-01

    Highlights: •LiFePO 4 precursors were successfully prepared in pure water phase under atmosphere. •LiFePO 4 nanostructures were also regenerated by recycling filtrate. •LiFePO 4 /C delivers high discharge capacity of 160 mAh g −1 at 0.2 C and high rate capacity of 107 mAh g −1 at 20C. •LiFePO 4 /C delivers a capacity retention rate closed to 97% after 240 cycles at 20C. -- Abstract: An economical and scalable synthesis route of LiFePO 4 nanoplate precursors is successfully prepared in pure water phase under atmosphere without employing environmentally toxic surfactants or high temperature and high pressure compared with traditional hydrothermal or solvothermal methods, which also involves recycling the filtrate to regenerate LiFePO 4 nanoplate precursors and collecting by-product Na 2 SO 4 . The LiFePO 4 precursors present a plate-like morphology with mean thickness and length of 50–100 and 100–300 nm, respectively. After carbon coating, the LiFePO 4 /C nanoparticles with particle size around 200 nm can be observed which exhibit a high discharge capacity of 160 mAh g −1 at 0.2 C and 107 mAh g −1 at 20 C. A high capacity retention closed to 91% can be reached after 500 cycles even at a high current rate of 20C with coulombic efficiency of 99.5%. This work suggests a simple, economic and environmentally benign method in preparation of LiFePO 4 /C cathode material for power batteries that would be feasible for large scale industrial production.

  13. High-Capacity and Long-Cycle Life Aqueous Rechargeable Lithium-Ion Battery with the FePO4 Anode.

    Science.gov (United States)

    Wang, Yuesheng; Yang, Shi-Ze; You, Ya; Feng, Zimin; Zhu, Wen; Gariépy, Vincent; Xia, Jiexiang; Commarieu, Basile; Darwiche, Ali; Guerfi, Abdelbast; Zaghib, Karim

    2018-02-28

    Aqueous lithium-ion batteries are emerging as strong candidates for a great variety of energy storage applications because of their low cost, high-rate capability, and high safety. Exciting progress has been made in the search for anode materials with high capacity, low toxicity, and high conductivity; yet, most of the anode materials, because of their low equilibrium voltages, facilitate hydrogen evolution. Here, we show the application of olivine FePO 4 and amorphous FePO 4 ·2H 2 O as anode materials for aqueous lithium-ion batteries. Their capacities reached 163 and 82 mA h/g at a current rate of 0.2 C, respectively. The full cell with an amorphous FePO 4 ·2H 2 O anode maintained 92% capacity after 500 cycles at a current rate of 0.2 C. The acidic aqueous electrolyte in the full cells prevented cathodic oxygen evolution, while the higher equilibrium voltage of FePO 4 avoided hydrogen evolution as well, making them highly stable. A combination of in situ X-ray diffraction analyses and computational studies revealed that olivine FePO 4 still has the biphase reaction in the aqueous electrolyte and that the intercalation pathways in FePO 4 ·2H 2 O form a 2-D mesh. The low cost, high safety, and outstanding electrochemical performance make the full cells with olivine or amorphous hydrated FePO 4 anodes commercially viable configurations for aqueous lithium-ion batteries.

  14. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    , Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...

  15. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  16. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  17. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...

  18. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  19. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  20. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  1. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  2. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  3. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  4. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  5. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  6. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  7. Ultra-high capacity WDM-SDM optical access network with self-homodyne detection downstream and 32QAM-FBMC upstream.

    Science.gov (United States)

    Feng, Zhenhua; Xu, Liang; Wu, Qiong; Tang, Ming; Fu, Songnian; Tong, Weijun; Shum, Perry Ping; Liu, Deming

    2017-03-20

    Towards 100G beyond large-capacity optical access networks, wavelength division multiplexing (WDM) techniques incorporating with space division multiplexing (SDM) and affordable spectrally efficient advanced modulation formats are indispensable. In this paper, we proposed and experimentally demonstrated a cost-efficient multicore fiber (MCF) based hybrid WDM-SDM optical access network with self-homodyne coherent detection (SHCD) based downstream (DS) and direct detection optical filter bank multi carrier (DDO-FBMC) based upstream (US). In the DS experiments, the inner core of the 7-core fiber is used as a dedicated channel to deliver the local oscillator (LO) lights while the other 6 outer cores are used to transmit 4 channels of wavelength multiplexed 200-Gb/s PDM-16QAM-OFDM signals. For US transmission, 4 wavelengths with channel spacing of 100 GHz are intensity modulated with 30 Gb/s 32-QAM-FBMC and directly detected by a ~7 GHz bandwidth receiver after transmission along one of the outer core. The results show that a 4 × 6 × 200-Gb/s DS transmission can be realized over 37 km 7-core fiber without carrier frequency offset (CFO) and phase noise (PN) compensation even using 10 MHz linewidth DFB lasers. The SHCD based on MCF provides a compromise and cost efficient scheme between conventional intradyne coherent detection and intensity modulation and direct detection (IM/DD) schemes. Both US and DS have acceptable BER performance and high spectral efficiency.

  8. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  9. Synthesis and characterization of advanced high capacity cathode active nanomaterials with three integrated spinel-layered phases for Li-ion batteries

    Energy Technology Data Exchange (ETDEWEB)

    Bulut, Emrah, E-mail: ebulut@sakarya.edu.tr [Department of Chemistry, Sakarya University, 54187 Serdivan, Sakarya (Turkey); Can, Mustafa, E-mail: mstfacan@gmail.com [Vocational School of Arifiye, Sakarya University, 54580 Arifiye, Sakarya (Turkey); Özacar, Mahmut, E-mail: nmozacart@hotmail.com [Department of Chemistry, Sakarya University, 54187 Serdivan, Sakarya (Turkey); Akbulut, Hatem, E-mail: akbulut@Sakarya.edu.tr [Department of Metallurgical and Materials Engineering, Sakarya University, 54187 Serdivan, Sakarya (Turkey)

    2016-06-15

    .1C rate. • High capacity retentions were achieved for undoped and doped materials in 50 cycles.

  10. A kinetic-based sigmoidal model for the polymerase chain reaction and its application to high-capacity absolute quantitative real-time PCR

    Directory of Open Access Journals (Sweden)

    Stewart Don

    2008-05-01

    with the LinReg and Miner automated qPCR data processing packages further demonstrated the superior performance of this kinetic-based methodology. Conclusion Called "linear regression of efficiency" or LRE, this novel kinetic approach confers the ability to conduct high-capacity absolute quantification with unprecedented quality control capabilities. The computational simplicity and recursive nature of LRE quantification also makes it amenable to software implementation, as demonstrated by a prototypic Java program that automates data analysis. This in turn introduces the prospect of conducting absolute quantification with little additional effort beyond that required for the preparation of the amplification reactions.

  11. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  12. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  13. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  14. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  15. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  16. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  17. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  18. Fragment separator momentum compression schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  19. Fragment separator momentum compression schemes

    International Nuclear Information System (INIS)

    Bandura, Laura; Erdelyi, Bela; Hausmann, Marc; Kubo, Toshiyuki; Nolen, Jerry; Portillo, Mauricio; Sherrill, Bradley M.

    2011-01-01

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  20. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...

  1. Scheme of thinking quantum systems

    International Nuclear Information System (INIS)

    Yukalov, V I; Sornette, D

    2009-01-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field

  2. Yellow light for green scheme

    International Nuclear Information System (INIS)

    Morch, Stein

    2004-01-01

    The article asserts that there could be an investment boom for wind, hydro and bio power in a common Norwegian-Swedish market scheme for green certificates. The Swedish authorities are ready, and the Norwegian government is preparing a report to the Norwegian Parliament. What are the ambitions of Norway, and will hydro power be included? A green certificate market common to more countries have never before been established and requires the solution of many challenging problems. In Sweden, certificate support is expected to promote primarily bioenergy, wind power and small-scale hydro power. In Norway there is an evident potential for wind power, and more hydro power can be developed if desired

  3. Pomeranchuk conjecture and symmetry schemes

    Energy Technology Data Exchange (ETDEWEB)

    Galindo, A.; Morales, A.; Ruegg, H. [Junta de Energia Nuclear, Madrid (Spain); European Organization for Nuclear Research, Geneva (Switzerland); University of Geneva, Geneva (Switzerland)

    1963-01-15

    Pomeranchuk has conjectured that the cross-sections for charge-exchange processes vanish asymptotically as the energy tends to infinity. (By ''charge'' it is meant any internal quantum number, like electric charge, hypercharge, .. . ). It has been stated by several people that this conjecture implies equalities among the total cross-sections whenever any symmetry scheme is invoked for the strong interactions. But to our knowledge no explicit general proof of this statement has been given so far. We want to give this proof for any compact Lie group. We also prove, under certain assumptions, that the equality of the total cross-sections implies that s{sup -l} times the charge-exchange forward scattering absorptive amplitudes tend to zero as s -> ∞.

  4. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  5. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  6. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  7. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  8. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  9. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  10. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  11. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  12. Community healthcare financing scheme: findings among residents ...

    African Journals Online (AJOL)

    ... none were active participants as 2(0.6%) were indifferent. There was a statistically significant relationship, Fischers <0.0001 between sex and the scheme's knowledge. Conclusion: Knowledge of the scheme was poor among majority of the respondents and none were active participants. Bribery and corruption was the ...

  13. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme...

  14. A generalized scheme for designing multistable continuous ...

    Indian Academy of Sciences (India)

    In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two mdimensional dynamical systems, multistable ...

  15. Consolidation of the health insurance scheme

    CERN Document Server

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  16. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  17. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  18. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...

  19. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  20. Birkhoffian Symplectic Scheme for a Quantum System

    International Nuclear Information System (INIS)

    Su Hongling

    2010-01-01

    In this paper, a classical system of ordinary differential equations is built to describe a kind of n-dimensional quantum systems. The absorption spectrum and the density of the states for the system are defined from the points of quantum view and classical view. From the Birkhoffian form of the equations, a Birkhoffian symplectic scheme is derived for solving n-dimensional equations by using the generating function method. Besides the Birkhoffian structure-preserving, the new scheme is proven to preserve the discrete local energy conservation law of the system with zero vector f. Some numerical experiments for a 3-dimensional example show that the new scheme can simulate the general Birkhoffian system better than the implicit midpoint scheme, which is well known to be symplectic scheme for Hamiltonian system. (general)

  1. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  2. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  3. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  4. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  5. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  6. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  7. Multidimensional flux-limited advection schemes

    International Nuclear Information System (INIS)

    Thuburn, J.

    1996-01-01

    A general method for building multidimensional shape preserving advection schemes using flux limiters is presented. The method works for advected passive scalars in either compressible or incompressible flow and on arbitrary grids. With a minor modification it can be applied to the equation for fluid density. Schemes using the simplest form of the flux limiter can cause distortion of the advected profile, particularly sideways spreading, depending on the orientation of the flow relative to the grid. This is partly because the simple limiter is too restrictive. However, some straightforward refinements lead to a shape-preserving scheme that gives satisfactory results, with negligible grid-flow angle-dependent distortion

  8. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  9. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  10. The new WAGR data acquisition scheme

    International Nuclear Information System (INIS)

    Ellis, W.E.; Leng, J.H.; Smith, I.C.; Smith, M.R.

    1976-06-01

    The existing WAGR data acquisition equipment was inadequate to meet the requirements introduced by the installation of two additional experimental loops and was in any case due for replacement. A completely new scheme was planned and implemented based on mini-computers, which while preserving all the useful features of the old scheme provided additional flexibility and improved data display. Both the initial objectives of the design and the final implementation are discussed without introducing detailed descriptions of hardware or the programming techniques employed. Although the scheme solves a specific problem the general principles are more widely applicable and could readily be adapted to other data checking and display problems. (author)

  11. Kinematic reversal schemes for the geomagnetic dipole.

    Science.gov (United States)

    Levy, E. H.

    1972-01-01

    Fluctuations in the distribution of cyclonic convective cells, in the earth's core, can reverse the sign of the geomagnetic field. Two kinematic reversal schemes are discussed. In the first scheme, a field maintained by cyclones concentrated at low latitude is reversed by a burst of cyclones at high latitude. Conversely, in the second scheme, a field maintained predominantly by cyclones in high latitudes is reversed by a fluctuation consisting of a burst of cyclonic convection at low latitude. The precise fluid motions which produce the geomagnetic field are not known. However, it appears that, whatever the details are, a fluctuation in the distribution of cyclonic cells over latitude can cause a geomagnetic reversal.

  12. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    ) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...

  13. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  14. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  15. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  16. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...

  17. Betatron tune correction schemes in nuclotron

    International Nuclear Information System (INIS)

    Shchepunov, V.A.

    1992-01-01

    Algorithms of the betatron tune corrections in Nuclotron with sextupolar and octupolar magnets are considered. Second order effects caused by chromaticity correctors are taken into account and sextupolar compensation schemes are proposed to suppress them. 6 refs.; 1 tab

  18. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  19. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  20. Nigeria's first national social protection scheme | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-06-14

    Jun 14, 2017 ... Women and children at an IDP Camp in DRC ... The cash transfer was provided through the Nigerian Ekiti State Social Security Scheme, ... national policy conference to discuss the findings with media and policy stakeholders.

  1. Verifiable Secret Redistribution for Threshold Sharing Schemes

    National Research Council Canada - National Science Library

    Wong, Theodore M; Wang, Chenxi; Wing, Jeannette M

    2002-01-01

    .... Our protocol guards against dynamic adversaries. We observe that existing protocols either cannot be readily extended to allow redistribution between different threshold schemes, or have vulnerabilities that allow faulty old shareholders...

  2. Boson expansion theory in the seniority scheme

    International Nuclear Information System (INIS)

    Tamura, T.; Li, C.; Pedrocchi, V.G.

    1985-01-01

    A boson expansion formalism in the seniority scheme is presented and its relation with number-conserving quasiparticle calculations is elucidated. Accuracy and convergence are demonstrated numerically. A comparative discussion with other related approaches is given

  3. Designing optimal sampling schemes for field visits

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2008-10-01

    Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...

  4. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption

  5. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    of Acronyms and Abbreviations AE authenticated encryption AWS Amazon Web Services CIO Chief Information Officer DISA Defense Information Systems Agency...the number of possible challenges, H be a cryptographic hash function, AE be an authenticated encryption scheme, f be a keyed pseudo-random function...key kenc R←− Kenc for symmetric encryption scheme Enc, and a random HMAC key kmac R←− Kmac. The secret key is sk = 〈kenc, kmac〉 and public key is pk

  6. A Classification Scheme for Production System Processes

    DEFF Research Database (Denmark)

    Sørensen, Daniel Grud Hellerup; Brunø, Thomas Ditlev; Nielsen, Kjeld

    2018-01-01

    Manufacturing companies often have difficulties developing production platforms, partly due to the complexity of many production systems and difficulty determining which processes constitute a platform. Understanding production processes is an important step to identifying candidate processes...... for a production platform based on existing production systems. Reviewing a number of existing classifications and taxonomies, a consolidated classification scheme for processes in production of discrete products has been outlined. The classification scheme helps ensure consistency during mapping of existing...

  7. A scheme for the hadron spectrum

    International Nuclear Information System (INIS)

    Hoyer, P.

    1978-03-01

    A theoretically self-consistent dual scheme is proposed for the hadron spectrum, which follows naturally from basic requirements and phenomenology. All resonance properties and couplings are calculable in terms of a limited number of input parameters. A first application to ππ→ππ explains the linear trajectory and small daughter couplings. The Zweig rule and the decoupling of baryonium from mesons are expected to be consequences of the scheme. (Auth.)

  8. A Practical Voter-Verifiable Election Scheme.

    OpenAIRE

    Chaum, D; Ryan, PYA; Schneider, SA

    2005-01-01

    We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the vot...

  9. Sellafield site (including Drigg) emergency scheme manual

    International Nuclear Information System (INIS)

    1987-02-01

    This Emergency Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. This manual covers the general principles of the total emergency scheme and those detailed procedures which are not specific to any single department. (U.K.)

  10. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  11. An Optimization Scheme for ProdMod

    International Nuclear Information System (INIS)

    Gregory, M.V.

    1999-01-01

    A general purpose dynamic optimization scheme has been devised in conjunction with the ProdMod simulator. The optimization scheme is suitable for the Savannah River Site (SRS) High Level Waste (HLW) complex operations, and able to handle different types of optimizations such as linear, nonlinear, etc. The optimization is performed in the stand-alone FORTRAN based optimization deliver, while the optimizer is interfaced with the ProdMod simulator for flow of information between the two

  12. Employee-referral schemes and discrimination law

    OpenAIRE

    Connolly, M.

    2015-01-01

    Employee-referral schemes (‘introduce a friend’) are in common usage in recruitment. They carry a potential to discriminate by perpetuating an already unbalanced workforce (say, by gender and ethnicity). With this, or course, comes the risk of litigation and bad publicity as well as any inherent inefficiencies associated with discrimination. This article is threefold. First, it examines the present state of the law. Second, it is based on a survey of employers who use these schemes. Third, it...

  13. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  14. Navigators’ Behavior in Traffic Separation Schemes

    Directory of Open Access Journals (Sweden)

    Zbigniew Pietrzykowski

    2015-03-01

    Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.

  15. A Classification Scheme for Literary Characters

    Directory of Open Access Journals (Sweden)

    Matthew Berry

    2017-10-01

    Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.

  16. Canonical, stable, general mapping using context schemes.

    Science.gov (United States)

    Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict

    2015-11-15

    Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  17. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  18. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  19. Renewable energy production support schemes for residential-scale solar photovoltaic systems in Nordic conditions

    International Nuclear Information System (INIS)

    Hirvonen, Janne; Kayo, Genku; Cao, Sunliang; Hasan, Ala; Sirén, Kai

    2015-01-01

    The objective of this study was to examine the effect of production-based support schemes on the economic feasibility of residential-scale PV systems (1–10 kW) in Finland. This was done by calculating the payback time for various sizes of newly installed PV systems for a Finnish detached house with district heating. Three types of economic support schemes (guaranteed selling price, fixed premiums and self-consumption incentives) were tested in an hourly simulation. The load of the building was based on real-life measurements, while PV output was simulated with TRNSYS software. The energy results were post-processed with economic data in MATLAB to find the payback time. Hourly electricity prices from the Nordic energy market were used with PV system prices from Finnish companies. Unsubsidised residential PV systems in Finland had payback times of more than 40 years. The production-based support for PV generation needs to be two to three times the buying price of electricity, to make it possible to pay back the initial investment in 20 years. Low capacity systems with more than 50% self-consumption (under 3 kW) were favoured by self-consumption incentives, while high capacity systems with less than 40% self-consumption (over 5 kW) were favoured by the FIT-type support schemes. - Highlights: • Unsubsidised residential PV is uneconomical in Finland. • Support rate must be 2 times the electricity price for reasonable payback time. • Even using all electricity on-site is not profitable enough without support. • Assumed real interest rate had great influence on payback time. • Hourly electricity prices are much lower than average values from Finnish statistics

  20. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  1. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  2. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  3. A fast resonance interference treatment scheme with subgroup method

    International Nuclear Information System (INIS)

    Cao, L.; He, Q.; Wu, H.; Zu, T.; Shen, W.

    2015-01-01

    A fast Resonance Interference Factor (RIF) scheme is proposed to treat the resonance interference effects between different resonance nuclides. This scheme utilizes the conventional subgroup method to evaluate the self-shielded cross sections of the dominant resonance nuclide in the heterogeneous system and the hyper-fine energy group method to represent the resonance interference effects in a simplified homogeneous model. In this paper, the newly implemented scheme is compared to the background iteration scheme, the Resonance Nuclide Group (RNG) scheme and the conventional RIF scheme. The numerical results show that the errors of the effective self-shielded cross sections are significantly reduced by the fast RIF scheme compared with the background iteration scheme and the RNG scheme. Besides, the fast RIF scheme consumes less computation time than the conventional RIF schemes. The speed-up ratio is ~4.5 for MOX pin cell problems. (author)

  4. How update schemes influence crowd simulations

    International Nuclear Information System (INIS)

    Seitz, Michael J; Köster, Gerta

    2014-01-01

    Time discretization is a key modeling aspect of dynamic computer simulations. In current pedestrian motion models based on discrete events, e.g. cellular automata and the Optimal Steps Model, fixed-order sequential updates and shuffle updates are prevalent. We propose to use event-driven updates that process events in the order they occur, and thus better match natural movement. In addition, we present a parallel update with collision detection and resolution for situations where computational speed is crucial. Two simulation studies serve to demonstrate the practical impact of the choice of update scheme. Not only do density-speed relations differ, but there is a statistically significant effect on evacuation times. Fixed-order sequential and random shuffle updates with a short update period come close to event-driven updates. The parallel update scheme overestimates evacuation times. All schemes can be employed for arbitrary simulation models with discrete events, such as car traffic or animal behavior. (paper)

  5. Asynchronous discrete event schemes for PDEs

    Science.gov (United States)

    Stone, D.; Geiger, S.; Lord, G. J.

    2017-08-01

    A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations is introduced, based on the principle of allowing quanta of mass to pass through faces of a (regular, structured) Cartesian finite volume grid. The timescales of these events are linked to the flux on the face. The resulting schemes are self-adaptive, and local in both time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate reference solutions where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased, and we outline a framework for analysis.

  6. An adaptive Cartesian control scheme for manipulators

    Science.gov (United States)

    Seraji, H.

    1987-01-01

    A adaptive control scheme for direct control of manipulator end-effectors to achieve trajectory tracking in Cartesian space is developed. The control structure is obtained from linear multivariable theory and is composed of simple feedforward and feedback controllers and an auxiliary input. The direct adaptation laws are derived from model reference adaptive control theory and are not based on parameter estimation of the robot model. The utilization of feedforward control and the inclusion of auxiliary input are novel features of the present scheme and result in improved dynamic performance over existing adaptive control schemes. The adaptive controller does not require the complex mathematical model of the robot dynamics or any knowledge of the robot parameters or the payload, and is computationally fast for online implementation with high sampling rates.

  7. A Traffic Restriction Scheme for Enhancing Carpooling

    Directory of Open Access Journals (Sweden)

    Dong Ding

    2017-01-01

    Full Text Available For the purpose of alleviating traffic congestion, this paper proposes a scheme to encourage travelers to carpool by traffic restriction. By a variational inequity we describe travelers’ mode (solo driving and carpooling and route choice under user equilibrium principle in the context of fixed demand and detect the performance of a simple network with various restriction links, restriction proportions, and carpooling costs. Then the optimal traffic restriction scheme aiming at minimal total travel cost is designed through a bilevel program and applied to a Sioux Fall network example with genetic algorithm. According to various requirements, optimal restriction regions and proportions for restricted automobiles are captured. From the results it is found that traffic restriction scheme is possible to enhance carpooling and alleviate congestion. However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.

  8. Quantum Watermarking Scheme Based on INEQR

    Science.gov (United States)

    Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou

    2018-04-01

    Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.

  9. Improvement of One Quantum Encryption Scheme

    Science.gov (United States)

    Cao, Zhengjun; Liu, Lihua

    2012-01-01

    Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.

  10. A universal encoding scheme for MIMO transmission using a single active element for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama; Papadias, C.B.; Kalis, A.

    2009-01-01

    A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO sys...

  11. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  12. Carbon trading: Current schemes and future developments

    International Nuclear Information System (INIS)

    Perdan, Slobodan; Azapagic, Adisa

    2011-01-01

    This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: → The paper provides an extensive overview of mandatory emissions trading schemes around the world. → Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. → The expansion requires considerable technical fixes and harmonisation of different trading systems. → Clear policy signals, political support and a stable economic environment are needed for the expansion. → A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.

  13. Pressure correction schemes for compressible flows

    International Nuclear Information System (INIS)

    Kheriji, W.

    2011-01-01

    This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)

  14. EPU correction scheme study at the CLS

    Energy Technology Data Exchange (ETDEWEB)

    Bertwistle, Drew, E-mail: drew.bertwistle@lightsource.ca; Baribeau, C.; Dallin, L.; Chen, S.; Vogt, J.; Wurtz, W. [Canadian Light Source Inc. 44 Innovation Boulevard, Saskatoon, SK S7N 2V3 (Canada)

    2016-07-27

    The Canadian Light Source (CLS) Quantum Materials Spectroscopy Center (QMSC) beamline will employ a novel double period (55 mm, 180 mm) elliptically polarizing undulator (EPU) to produce photons of arbitrary polarization in the soft X-ray regime. The long period and high field of the 180 mm period EPU will have a strong dynamic focusing effect on the storage ring electron beam. We have considered two partial correction schemes, a 4 m long planar array of BESSY-II style current strips, and soft iron L-shims. In this paper we briefly consider the implementation of these correction schemes.

  15. Verification of an objective analysis scheme

    International Nuclear Information System (INIS)

    Cats, G.J.; Haan, B.J. de; Hafkenscheid, L.M.

    1987-01-01

    An intermittent data assimilation scheme has been used to produce wind and precipitation fields during the 10 days after the explosion at the Chernobyl nuclear power plant on 25 April 1986. The wind fields are analyses, the precipitation fields have been generated by the forecast model part of the scheme. The precipitation fields are of fair quality. The quality of the wind fields has been monitored by the ensuing trajectories. These were found to describe the arrival times of radioactive air in good agreement with most observational data, taken all over Europe. The wind analyses are therefore considered to be reliable. 25 refs.; 13 figs

  16. Optimal powering schemes for legged robotics

    Science.gov (United States)

    Muench, Paul; Bednarz, David; Czerniak, Gregory P.; Cheok, Ka C.

    2010-04-01

    Legged Robots have tremendous mobility, but they can also be very inefficient. These inefficiencies can be due to suboptimal control schemes, among other things. If your goal is to get from point A to point B in the least amount of time, your control scheme will be different from if your goal is to get there using the least amount of energy. In this paper, we seek a balance between these extremes by looking at both efficiency and speed. We model a walking robot as a rimless wheel, and, using Pontryagin's Maximum Principle (PMP), we find an "on-off" control for the model, and describe the switching curve between these control extremes.

  17. System Protection Schemes in Eastern Denmark

    DEFF Research Database (Denmark)

    Rasmussen, Joana

    outages in the southern part of the 132-kV system introduce further stress in the power system, eventually leading to a voltage collapse. The local System Protection Scheme against voltage collapse is designed as a response-based scheme, which is dependent on local indication of reactive and active power...... effective measures, because they are associated with large reactive power losses in the transmission system. Ordered reduction of wind generation is considered an effective measure to maintain voltage stability in the system. Reactive power in the system is released due to tripping of a significant amount...... system. In that way, the power system capability could be extended beyond normal limits....

  18. Group Buying Schemes : A Sustainable Business Model?

    OpenAIRE

    Köpp, Sebastian; Mukhachou, Aliaksei; Schwaninger, Markus

    2013-01-01

    Die Autoren gehen der Frage nach, ob "Group Buying Schemes" wie beispielsweise von den Unternehmen Groupon und Dein Deal angeboten, ein nachhaltiges Geschäftsmodell sind. Anhand der Fallstudie Groupon wird mit einem System Dynamics Modell festgestellt, dass das Geschäftsmodell geändert werden muss, wenn die Unternehmung auf Dauer lebensfähig sein soll. The authors examine if group buying schemes are a sustainable business model. By means of the Groupon case study and using a System Dynami...

  19. New Imaging Operation Scheme at VLTI

    Science.gov (United States)

    Haubois, Xavier

    2018-04-01

    After PIONIER and GRAVITY, MATISSE will soon complete the set of 4 telescope beam combiners at VLTI. Together with recent developments in the image reconstruction algorithms, the VLTI aims to develop its operation scheme to allow optimized and adaptive UV plane coverage. The combination of spectro-imaging instruments, optimized operation framework and image reconstruction algorithms should lead to an increase of the reliability and quantity of the interferometric images. In this contribution, I will present the status of this new scheme as well as possible synergies with other instruments.

  20. Hilbert schemes of points and Heisenberg algebras

    International Nuclear Information System (INIS)

    Ellingsrud, G.; Goettsche, L.

    2000-01-01

    Let X [n] be the Hilbert scheme of n points on a smooth projective surface X over the complex numbers. In these lectures we describe the action of the Heisenberg algebra on the direct sum of the cohomologies of all the X [n] , which has been constructed by Nakajima. In the second half of the lectures we study the relation of the Heisenberg algebra action and the ring structures of the cohomologies of the X [n] , following recent work of Lehn. In particular we study the Chern and Segre classes of tautological vector bundles on the Hilbert schemes X [n] . (author)

  1. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  2. Optimal sampling schemes applied in geology

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2010-05-01

    Full Text Available Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology UP 2010 2 / 47 Outline 1 Introduction to hyperspectral remote... sensing 2 Objective of Study 1 3 Study Area 4 Data used 5 Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology...

  3. Quadratically convergent MCSCF scheme using Fock operators

    International Nuclear Information System (INIS)

    Das, G.

    1981-01-01

    A quadratically convergent formulation of the MCSCF method using Fock operators is presented. Among its advantages the present formulation is quadratically convergent unlike the earlier ones based on Fock operators. In contrast to other quadratically convergent schemes as well as the one based on generalized Brillouin's theorem, this method leads easily to a hybrid scheme where the weakly coupled orbitals (such as the core) are handled purely by Fock equations, while the rest of the orbitals are treated by a quadratically convergent approach with a truncated virtual space obtained by the use of the corresponding Fock equations

  4. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  5. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  6. High capacity hydrogen storage nanocomposite materials

    Science.gov (United States)

    Zidan, Ragaiy; Wellons, Matthew S.

    2017-12-12

    A novel hydrogen absorption material is provided comprising a mixture of a lithium hydride with a fullerene. The subsequent reaction product provides for a hydrogen storage material which reversibly stores and releases hydrogen at temperatures of about 270.degree. C.

  7. High capacity carrier ethernet transport networks

    DEFF Research Database (Denmark)

    Rasmussen, Anders; Zhang, Jiang; Yu, Hao

    2009-01-01

    OAM functions, survivability and the increased bandwidth requirements of carrier class systems. This article provides an overview of PBB-TE and T-MPLS and demonstrates how IPTV services can be realized in the framework of Carrier Ethernet. In addition we provide a case study on performing bit error...

  8. A high capacity FASTBUS multiple event buffer

    International Nuclear Information System (INIS)

    Appel, J.A.; Farr, W.D.; Kaplan, D.M.; Levit, L.B.; Napier, T.M.

    1985-01-01

    We have developed a front-end data acquisition and event buffering memory. This single-width FASTBUS module has a capacity of 256K X 32 bits plus parity. The module is dual ported, and its front panel ECLport accepts data at up to 20 MB/sec. It may also be written to and read from as a standard FASTBUS Slave. The module records events as variable length records. Each record is accepted or rejected via front panel control signal. Circuitry to automate FASTBUS record readout and record skip is provided. In its ''linear'' mode, the module may be used as a single pass list. Alternatively, in the ''circular'' mode, the module's internal read pointer can follow its write pointer continuously around the memory. Circular mode is well suited to handling of a continuous data stream. Modules may be linked for larger memory capacity

  9. Designs of new plants of high capacity

    International Nuclear Information System (INIS)

    Borges R, Diego A

    1999-01-01

    The Caracas electricity in their desire to lend the best service to the community is doing the necessary projects of generation expansion to fulfill and requirements of demand of next decade in to the metropolitan area. The projects of the new plants of Recifes and El Sitio, have been conceptualized in way of executing the engineering and patterns construction of highest quality and once setting in service, to reach the highest indexes of operative. To reach these goals it is planned to use the most advanced technological designs that are in the market at the moment to world in generation and transmission of power

  10. Analysis of Program Obfuscation Schemes with Variable Encoding Technique

    Science.gov (United States)

    Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi

    Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.

  11. Investigation of schemes for incorporating generator Q limits in the ...

    Indian Academy of Sciences (India)

    Handling generator Q limits is one such important feature needed in any practical load flow method. This paper presents a comprehensive investigation of two classes of schemes intended to handle this aspect i.e. the bus type switching scheme and the sensitivity scheme. We propose two new sensitivity based schemes ...

  12. Sources of funding for community schemes

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-11-01

    There is an increasing level of interest amongst community groups in the UK to become involved in the development of renewable energy schemes. Often however these community groups have only limited funds of their own, so any additional funds that can be identified to help fund their renewable energy scheme can be very useful. There are a range of funding sources available that provide grants or loans for which community groups are eligible to apply. Few of these funding sources are targeted towards renewable energy specifically, nevertheless the funds may be applicable to renewable energy schemes under appropriate circumstances. To date, however, few of these funds have been accessed by community groups for renewable energy initiatives. One of the reasons for this low take-up of funds on offer could be that the funding sources may be difficult and time-consuming to identify, especially where the energy component of the fund is not readily apparent. This directory draws together details about many of the principal funding sources available in the UK that may consider providing funds to community groups wanting to develop a renewable energy scheme. (author)

  13. The QKD network: model and routing scheme

    Science.gov (United States)

    Yang, Chao; Zhang, Hongqi; Su, Jinhai

    2017-11-01

    Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.

  14. SYNTHESIS OF VISCOELASTIC MATERIAL MODELS (SCHEMES

    Directory of Open Access Journals (Sweden)

    V. Bogomolov

    2014-10-01

    Full Text Available The principles of structural viscoelastic schemes construction for materials with linear viscoelastic properties in accordance with the given experimental data on creep tests are analyzed. It is shown that there can be only four types of materials with linear visco-elastic properties.

  15. BPHZL-subtraction scheme and axial gauges

    Energy Technology Data Exchange (ETDEWEB)

    Kreuzer, M.; Rebhan, A.; Schweda, M.; Piguet, O.

    1986-03-27

    The application of the BPHZL subtraction scheme to Yang-Mills theories in axial gauges is presented. In the auxillary mass formulation we show the validity of the convergence theorems for subtracted momentum space integrals, and we give the integral formulae necessary for one-loop calculations. (orig.).

  16. The data cyclotron query processing scheme

    NARCIS (Netherlands)

    R.A. Goncalves (Romulo); M.L. Kersten (Martin)

    2010-01-01

    htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot

  17. THE DEVELOPMENT OF FREE PRIMARY EDUCATION SCHEME ...

    African Journals Online (AJOL)

    user

    Education scheme in Western Region and marked a radical departure from the hitherto ... academic symposia, lectures, debates, reputable journals and standard .... Enrolment in Primary Schools in the Western Region by Sex, 1953 – 1960. Year Boys .... “Possibly no single decision of the decade prior to independence had.

  18. High Order Semi-Lagrangian Advection Scheme

    Science.gov (United States)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  19. An HFB scheme in natural orbitals

    International Nuclear Information System (INIS)

    Reinhard, P.G.; Rutz, K.; Maruhn, J.A.

    1997-01-01

    We present a formulation of the Hartree-Fock-Bogoliubov (HFB) equations which solves the problem directly in the basis of natural orbitals. This provides a very efficient scheme which is particularly suited for large scale calculations on coordinate-space grids. (orig.)

  20. A classification scheme for LWR fuel assemblies

    Energy Technology Data Exchange (ETDEWEB)

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.

  1. The EU Greenhouse Gas Emissions Trading Scheme

    NARCIS (Netherlands)

    Woerdman, Edwin; Woerdman, Edwin; Roggenkamp, Martha; Holwerda, Marijn

    2015-01-01

    This chapter explains how greenhouse gas emissions trading works, provides the essentials of the Directive on the European Union Emissions Trading Scheme (EU ETS) and summarizes the main implementation problems of the EU ETS. In addition, a law and economics approach is used to discuss the dilemmas

  2. Study of 228Ac decay scheme

    International Nuclear Information System (INIS)

    Pinto, H.V.

    1976-02-01

    Calibration in energy and efficiency of the system used. Obtainement of singles gamma ray spectra of low and high energy. Reduction of the data obtained in the spectrometer by means of computer: localization and determination of the areas of the peaks, also the analysis of the shape of the peaks for identification of doublets. Checking of the decay scheme [pt

  3. Parallel knock-out schemes in networks

    NARCIS (Netherlands)

    Broersma, H.J.; Fomin, F.V.; Woeginger, G.J.

    2004-01-01

    We consider parallel knock-out schemes, a procedure on graphs introduced by Lampert and Slater in 1997 in which each vertex eliminates exactly one of its neighbors in each round. We are considering cases in which after a finite number of rounds, where the minimimum number is called the parallel

  4. Nonclassical lightstates in optical communication schemes

    International Nuclear Information System (INIS)

    Mattle, K. U.

    1997-11-01

    The present thesis is a result in theoretical and experimental work on quant information and quant communication. The first part describes a new high intense source for polarization entangled photon pairs. The high quality of the source is clearly demonstrated by violating a Bell-inequality in less than 5 minutes with 100 standard deviations. This new source is a genius tool for new experiments in the field of fundamental physics as well as applied physics. The next chapter shows an experimental implementation of an optical dense quantum coding scheme. The combination of Bell-state generation and analysis of this entangled states leads to a new nonclassical communication scheme, where the channel capacity is enhanced. A single two state photon can be used for coding and decoding 1.58 bit instead of 1 bit for classical two state systems. The following chapter discusses two photon interference effects for two independent light sources. In an experiment two independent fluorescence pulses show this kind of interference effects. The fifth chapter describes 3-photon interference effects. This nonclassical interference effect is the elementary process for the quantum teleportation scheme. In this scheme an unknown particle state is transmitted from A to B without sending the particle itself. (author)

  5. The complete flux scheme in cylindrical coordinates

    NARCIS (Netherlands)

    Anthonissen, M.J.H.; Thije Boonkkamp, ten J.H.M.

    2014-01-01

    We consider the complete ¿ux (CF) scheme, a ¿nite volume method (FVM) presented in [1]. CF is based on an integral representation for the ¿uxes, found by solving a local boundary value problem that includes the source term. It performs well (second order accuracy) for both diffusion and advection

  6. Traffic calming schemes : opportunities and implementation strategies.

    NARCIS (Netherlands)

    Schagen, I.N.L.G. van (ed.)

    2003-01-01

    Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and

  7. Harmonic generation with multiple wiggler schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bonifacio, R.; De Salvo, L.; Pierini, P. [Universita degli Studi, Milano (Italy)

    1995-02-01

    In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.

  8. Zero leakage quantization scheme for biometric verification

    NARCIS (Netherlands)

    Groot, de J.A.; Linnartz, J.P.M.G.

    2011-01-01

    Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new verification scheme, which protects the secrets of the enrolled users. We will show that zero leakage is achieved if

  9. A classification scheme for LWR fuel assemblies

    International Nuclear Information System (INIS)

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs

  10. Asynchronous schemes for CFD at extreme scales

    Science.gov (United States)

    Konduri, Aditya; Donzis, Diego

    2013-11-01

    Recent advances in computing hardware and software have made simulations an indispensable research tool in understanding fluid flow phenomena in complex conditions at great detail. Due to the nonlinear nature of the governing NS equations, simulations of high Re turbulent flows are computationally very expensive and demand for extreme levels of parallelism. Current large simulations are being done on hundreds of thousands of processing elements (PEs). Benchmarks from these simulations show that communication between PEs take a substantial amount of time, overwhelming the compute time, resulting in substantial waste in compute cycles as PEs remain idle. We investigate a novel approach based on widely used finite-difference schemes in which computations are carried out asynchronously, i.e. synchronization of data among PEs is not enforced and computations proceed regardless of the status of messages. This drastically reduces PE idle time and results in much larger computation rates. We show that while these schemes remain stable, their accuracy is significantly affected. We present new schemes that maintain accuracy under asynchronous conditions and provide a viable path towards exascale computing. Performance of these schemes will be shown for simple models like Burgers' equation.

  11. Generalization of binary tensor product schemes depends upon four parameters

    International Nuclear Information System (INIS)

    Bashir, R.; Bari, M.; Mustafa, G.

    2018-01-01

    This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)

  12. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  13. A novel secret image sharing scheme based on chaotic system

    Science.gov (United States)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  14. Simple Numerical Schemes for the Korteweg-deVries Equation

    International Nuclear Information System (INIS)

    McKinstrie, C. J.; Kozlov, M.V.

    2000-01-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves

  15. Simple Numerical Schemes for the Korteweg-deVries Equation

    Energy Technology Data Exchange (ETDEWEB)

    C. J. McKinstrie; M. V. Kozlov

    2000-12-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves.

  16. Electricity storage using a thermal storage scheme

    Energy Technology Data Exchange (ETDEWEB)

    White, Alexander, E-mail: ajw36@cam.ac.uk [Hopkinson Laboratory, Cambridge University Engineering Department, Trumpington Street, Cambridge. CB2 1PZ (United Kingdom)

    2015-01-22

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on “sensible heat” storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  17. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  18. New advection schemes for free surface flows

    International Nuclear Information System (INIS)

    Pavan, Sara

    2016-01-01

    The purpose of this thesis is to build higher order and less diffusive schemes for pollutant transport in shallow water flows or 3D free surface flows. We want robust schemes which respect the main mathematical properties of the advection equation with relatively low numerical diffusion and apply them to environmental industrial applications. Two techniques are tested in this work: a classical finite volume method and a residual distribution technique combined with a finite element method. For both methods we propose a decoupled approach since it is the most advantageous in terms of accuracy and CPU time. Concerning the first technique, a vertex-centred finite volume method is used to solve the augmented shallow water system where the numerical flux is computed through an Harten-Lax-Van Leer-Contact Riemann solver. Starting from this solution, a decoupled approach is formulated and is preferred since it allows to compute with a larger time step the advection of a tracer. This idea was inspired by Audusse, E. and Bristeau, M.O. [13]. The Monotonic Upwind Scheme for Conservation Law, combined with the decoupled approach, is then used for the second order extension in space. The wetting and drying problem is also analysed and a possible solution is presented. In the second case, the shallow water system is entirely solved using the finite element technique and the residual distribution method is applied to the solution of the tracer equation, focusing on the case of time-dependent problems. However, for consistency reasons the resolution of the continuity equation must be considered in the numerical discretization of the tracer. In order to get second order schemes for unsteady cases a predictor-corrector scheme is used in this work. A first order but less diffusive version of the predictor-corrector scheme is also introduced. Moreover, we also present a new locally semi-implicit version of the residual distribution method which, in addition to good properties in

  19. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  20. COLOUR IMAGE STEGANOGRAPHY USING MEDIAN MAINTENANCE

    Directory of Open Access Journals (Sweden)

    S. Arivazhagan

    2011-08-01

    Full Text Available Steganographic algorithms in the recent past have been producing stego images with perceptual invisibility, better secrecy and certain robustness against attacks like cropping, filtering etc. Recovering a good quality secret from a good quality stego image may not always be possible. The method proposed in this paper works in transform domain and attempts to extract the secret almost as same as the embedded one maintaining minimal changes to the cover image by using techniques like median maintenance, offset and quantization.