WorldWideScience

Sample records for intruder based states

  1. Tracking intruder states

    Energy Technology Data Exchange (ETDEWEB)

    Riedinger, L L; Mueller, W F; Yu, C H [Tennessee Univ., Knoxville, TN (United States). Dept. of Physics

    1992-08-01

    The deformation-driving effects of intruder states are studied by analysis of various types of data on rotational bands in rare-earth deformed nuclei. The sensitivity of four measurables (bandhead energy, B(E2) value, neutron i{sub 13/2} crossing frequency, and signature splitting) to increased deformation in an intruder band is shown. The analysis of signature splitting systematics is extended to known superdeformed bands. (author). 22 refs., 5 figs.

  2. Identification of low-lying proton-based intruder states in 189-193Pb

    International Nuclear Information System (INIS)

    Vel, K. van de; Andreyev, A.N.; Huyse, M.; Duppen, P. van; Cocks, J.F.C.; Dorvaux, O.; Greenlees, P.T.; Helariutta, K.; Jones, P.; Julin, R.; Juutinen, S.; Kettunen, H.; Kuusiniemi, P.; Leino, M.; Muikku, M.; Nieminen, P.; Eskola, K.; Wyss, R.

    2002-01-01

    Low-lying proton-based intruder states have been observed in the odd-mass isotopes 189,191,193 Pb in experiments at the RITU gas-filled recoil separator. The identification has been performed by observing the fine structure in the α decay of the parent 193,195,197 Po nuclei in prompt coincidence with conversion electrons and γ rays in the daughter lead isotopes. Along with the literature data these results establish a systematics of intruder states in the odd-mass lead isotopes from 197 Pb down to 185 Pb. Interpretation of these states involves the coupling of the 1i 13/2 or 3p 3/2 odd neutron to the 0 + state in the oblate minimum in the even-mass lead core. Conversion coefficients have been determined for some of the transitions, revealing mixing between the coexisting states. The experimental results are compared to potential energy surface calculations

  3. Intruder states at the N=20 shell closure

    International Nuclear Information System (INIS)

    Heyde, K.

    1991-01-01

    It is indicated that mp-mh (multiple) excitations across closed shells can occur at low energy throughout the nuclear mass region. Besides the 4p-4h, 8p-8h configurations, that are deformed, coexisting low-lying excitations are mainly observed for light N=Z nuclei. A new class of 2p-2h intruder O + state is shown to exist in nuclei where a neutron excess is present. In the latter cases, the proton-neutron interaction energy between the excited 2p-2h configuration and the open shell accounts for a very specific mass dependence in the intruder excitation energy. The experimental evidence that corroborates the idea of intruder states will be given. (G.P.) 28 refs.; 13 figs

  4. Towards a shell-model description of intruder states and the onset of deformation

    International Nuclear Information System (INIS)

    Heyde, K.; Van Isacker, P.; Casten, R.F.; Wood, J.L.

    1985-01-01

    Basing on the nuclear shell-model and concentrating on the monopole, pairing and quadrupole corrections originating from the nucleon-nucleon force, both the appearance of low-lying 0 + intruder states near major closed shells (Z = 50, 82) and sub-shell regions (Z = 40, 64) can be described. Moreover, a number of new facets related to the study of intruder states are presented. 19 refs., 3 figs

  5. Description of intruded states in a weak-coupling basis

    International Nuclear Information System (INIS)

    Arenas Peris, G.E.

    1989-01-01

    The systematics of intruder states is described in terms of a particle-hole weak-coupling basis, the first-order correction being then reduced to the monopole component of the interaction. The necessary matrix elements can be obtained from experimental data by using a model-consistent method. Calculations are performed for intruder states in the lead region as well as for the Zr isotopes. The agreement with the experimental data is striking in both cases. (Author) [es

  6. Intruder states and low energy nuclear spectroscopy

    International Nuclear Information System (INIS)

    Bengtsson, R.

    1991-01-01

    The crucial role intruder orbitals play is not limited to low spin and small deformations. In fact much of the physics at superdeformed shapes and at very high spin is a direct result of the presence of high-j intruder orbitals in the vicinity of the Fermi surface, including the introduction of intruder orbitals from still higher shells at extreme deformations. Since the intruder subshell has a larger angular momentum (j) than any other subshell close to the Fermi surface it plays an essential role for building up angular momentum in the nucleus, and the alignment of intruder shell (quasi) particles is responsible for a large variety of bandcrossings observed in discrete spectroscopy along or near the yrast line. Intruder shell orbitals are also associated with large quadrupole moments and the occupation of these orbitals may lead to significant changes of the deformation of the nucleus. Under favorable circumstances a nucleus may have totally different shapes depending on the occupation of the intruder orbitals, giving rise to a phenomenon which is usually referred to as shape coexistence. In this paper, shape coexistence in several mass regions will be discussed with specific attention focused on the relation between shape coexistence and the occupation of intruder shell levels. Shape effects associated both with spin aligned and non-aligned intruder orbitals will be investigated

  7. Intruder states in the cadmium isotopes and a simple schematic calculation

    International Nuclear Information System (INIS)

    Aprahamian, A.; Brenner, D.S.; Casten, R.F.; Heyde, K.

    1984-01-01

    Angular correlation studies of 118 120 Cd at TRISTAN have allowed the discovery and identification in each nucleus of two new 0 + states and their respective E2 decay properties. The results have been interpreted in terms of a simple schematic model based on the mixing of normal vibration-like and intruder rotation-like 2p-4h configurations

  8. Equivalence of the spherical and deformed shell-model approach to intruder states

    International Nuclear Information System (INIS)

    Heyde, K.; Coster, C. de; Ryckebusch, J.; Waroquier, M.

    1989-01-01

    We point out that the description of intruder states, incorporating particle-hole (p-h) excitation across a closed shell in the spherical shell model or a description starting from the Nilsson model are equivalent. We furthermore indicate that the major part of the nucleon-nucleon interaction, responsible for the low excitation energy of intruder states comes as a two-body proton-neutron quadrupole interaction in the spherical shell model. In the deformed shell model, quadrupole binding energy is gained mainly through the one-body part of the potential. (orig.)

  9. Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-10-01

    Full Text Available Given that entropy-based IT technology has been applied in homes, office buildings and elsewhere for IT security systems, diverse kinds of intelligent services are currently provided. In particular, IT security systems have become more robust and varied. However, access control systems still depend on tags held by building entrants. Since tags can be obtained by intruders, an approach to counter the disadvantages of tags is required. For example, it is possible to track the movement of tags in intelligent buildings in order to detect intruders. Therefore, each tag owner can be judged by analyzing the movements of their tags. This paper proposes a security approach based on the received signal strength indicators (RSSIs of beacon-based tags to detect intruders. The normal RSSI patterns of moving entrants are obtained and analyzed. Intruders can be detected when abnormal RSSIs are measured in comparison to normal RSSI patterns. In the experiments, one normal and one abnormal scenario are defined for collecting the RSSIs of a Bluetooth-based beacon in order to validate the proposed method. When the RSSIs of both scenarios are compared to pre-collected RSSIs, the RSSIs of the abnormal scenario are about 61% more different compared to the RSSIs of the normal scenario. Therefore, intruders in buildings can be detected by considering RSSI differences.

  10. Automated Inadvertent Intruder Application

    International Nuclear Information System (INIS)

    Koffman, Larry D.; Lee, Patricia L.; Cook, James R.; Wilhite, Elmer L.

    2008-01-01

    The Environmental Analysis and Performance Modeling group of Savannah River National Laboratory (SRNL) conducts performance assessments of the Savannah River Site (SRS) low-level waste facilities to meet the requirements of DOE Order 435.1. These performance assessments, which result in limits on the amounts of radiological substances that can be placed in the waste disposal facilities, consider numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. Inadvertent intruder analysis considers three distinct scenarios for exposure referred to as the agriculture scenario, the resident scenario, and the post-drilling scenario. Each of these scenarios has specific exposure pathways that contribute to the overall dose for the scenario. For the inadvertent intruder analysis, the calculation of dose for the exposure pathways is a relatively straightforward algebraic calculation that utilizes dose conversion factors. Prior to 2004, these calculations were performed using an Excel spreadsheet. However, design checks of the spreadsheet calculations revealed that errors could be introduced inadvertently when copying spreadsheet formulas cell by cell and finding these errors was tedious and time consuming. This weakness led to the specification of functional requirements to create a software application that would automate the calculations for inadvertent intruder analysis using a controlled source of input parameters. This software application, named the Automated Inadvertent Intruder Application, has undergone rigorous testing of the internal calculations and meets software QA requirements. The Automated Inadvertent Intruder Application was intended to replace the previous spreadsheet analyses with an automated application that was verified to produce the same calculations and

  11. AUTOMATED INADVERTENT INTRUDER APPLICATION

    International Nuclear Information System (INIS)

    Koffman, L; Patricia Lee, P; Jim Cook, J; Elmer Wilhite, E

    2007-01-01

    The Environmental Analysis and Performance Modeling group of Savannah River National Laboratory (SRNL) conducts performance assessments of the Savannah River Site (SRS) low-level waste facilities to meet the requirements of DOE Order 435.1. These performance assessments, which result in limits on the amounts of radiological substances that can be placed in the waste disposal facilities, consider numerous potential exposure pathways that could occur in the future. One set of exposure scenarios, known as inadvertent intruder analysis, considers the impact on hypothetical individuals who are assumed to inadvertently intrude onto the waste disposal site. Inadvertent intruder analysis considers three distinct scenarios for exposure referred to as the agriculture scenario, the resident scenario, and the post-drilling scenario. Each of these scenarios has specific exposure pathways that contribute to the overall dose for the scenario. For the inadvertent intruder analysis, the calculation of dose for the exposure pathways is a relatively straightforward algebraic calculation that utilizes dose conversion factors. Prior to 2004, these calculations were performed using an Excel spreadsheet. However, design checks of the spreadsheet calculations revealed that errors could be introduced inadvertently when copying spreadsheet formulas cell by cell and finding these errors was tedious and time consuming. This weakness led to the specification of functional requirements to create a software application that would automate the calculations for inadvertent intruder analysis using a controlled source of input parameters. This software application, named the Automated Inadvertent Intruder Application, has undergone rigorous testing of the internal calculations and meets software QA requirements. The Automated Inadvertent Intruder Application was intended to replace the previous spreadsheet analyses with an automated application that was verified to produce the same calculations and

  12. Energy of the 2p1h intruder state in $^{34}$Al

    CERN Multimedia

    The second 0$^{+}$ state in $^{34}$Si, of high importance for the understanding of the island of inversion at N=20, has been recently observed through the $\\beta$- decay of a predicted long-lived low-lying isomeric 1$^{+}$ state in $^{34}$Al. We intend to measure the unknown excitation energy of this isomer using the ISOLTRAP Penning-trap mass spectrometer. Since a recent experiment at ISOLDE (IS-530) showed that the full $\\beta$- strength in the decay of $^{34}$Mg goes through this 1$^{+}$ state in $^{34}$Al, we propose to perform a direct mass measurement of the daughter $^{34}$Al ions trapped after the decay of $^{34}$Mg. Mass measurements indicate that the 4$^{−}$ ground state in $^{34}$Al may be an excited state, the ground state being therefore the intruder 1$^{+}$ state. In another run, we propose to perform a remeasurement of the mass of the 4$^{−}$ ground state.

  13. APPROACH TO SYNTHESIS OF PASSIVE INFRARED DETECTORS BASED ON QUASI-POINT MODEL OF QUALIFIED INTRUDER

    Directory of Open Access Journals (Sweden)

    I. V. Bilizhenko

    2017-01-01

    Full Text Available Subject of Research. The paper deals with synthesis of passive infra red (PIR detectors with enhanced detection capability of qualified intruder who uses different types of detection countermeasures: the choice of specific movement direction and disguise in infrared band. Methods. We propose an approach based on quasi-point model of qualified intruder. It includes: separation of model priority parameters, formation of partial detection patterns adapted to those parameters and multi channel signal processing. Main Results. Quasi-pointmodel of qualified intruder consisting of different fragments was suggested. Power density difference was used for model parameters estimation. Criteria were formulated for detection pattern parameters choice on the basis of model parameters. Pyroelectric sensor with nine sensitive elements was applied for increasing the signal information content. Multi-channel processing with multiple partial detection patterns was proposed optimized for detection of intruder's specific movement direction. Practical Relevance. Developed functional device diagram can be realized both by hardware and software and is applicable as one of detection channels for dual technology passive infrared and microwave detectors.

  14. Simultaneous spectroscopy of $\\gamma$- rays and conversion electrons: Systematic study of EO transitions and intruder states in close vicinity of mid-shell point in odd-Au isotopes

    CERN Multimedia

    Venhart, M; Grant, A F; Petrik, K

    This proposal focuses on detailed systematic studies of the $\\beta$ /EC-decays of $^{179,181,183,185}$Hg leading to excited states in the neutron-deficient Au isotopes in the vicinity of the N=104 midshell. $\\gamma$-ray, X-ray and conversion electron de-excitations of odd-A Au isotopes will be studied simultaneously. These studies will address important structural questions such as the excitation energies of coexisting states, properties of multiple intruder states (i.e. intruder particles coupled to intruder cores) and mixing of coexisting structures. The unique combination of Hg beam purity and yields make ISOLDE a unique facility for these experiments.

  15. Oblate deformation and intruder configuration in 194,195Bi

    International Nuclear Information System (INIS)

    Mukherjee, G.; Banerjee, K.; Banerjee, S.R.; Basu, S.K.; Bhattacharya, C.; Bhattacharya, S.; Bhattacharya, Srijit; Bhattacharjee, T.; Chanda, S.; Dey, A.; Gupta, D.; Meena, J.K.; Mukhopadhyay, S.; Rana, T.K.; Bhattacharya, Sudeb; Ganguly, S.; Goswami, A.; Kshetri, R.; Pradhan, M.K.; Raut, R.; Dey, G.

    2006-01-01

    The experimental information on 194,195 Bi are very scarce compared to its neighbouring isotopes. Only 6 levels above the ground state band of 195 Bi, based on 9/2, are known with tentative spin parity assignments. Only two low energy gamma rays above the 10 isomeric state are known in 194 Bi. It is interesting not only to extend the presently known bands to higher spins, beyond band crossing but also to search for the intruder quasiparticle configurations to get a clear idea about the structure of these nuclei

  16. The behaviour of free-flowing granular intruders

    Directory of Open Access Journals (Sweden)

    Wyburn Edward

    2017-01-01

    Full Text Available Particle shape affects both the quasi-static and dynamic behaviour of granular media. There has been significant research devoted to the flowability of systems of irregularly shaped particles, as well as the flow of grains around fixed intruders, however the behaviour of free flowing intruders within granular flows remains comparatively unexplored. Here, the effect of the shape of these intruder particles is studied, looking at the kinematic behaviour of the intruders and in particular their tendency of orientation. Experiments are carried out within the Stadium Shear Device, which is a novel apparatus able to continuously apply simple shear conditions to two-dimensional grain analogues. It is found that the intruder shows different behaviour to that of the bulk flow, and that this behaviour is strongly shape dependent. These insights could lead to the development of admixtures that alter the flowability of granular materials.

  17. Optimizing the Configuration of Sensor Networks to Detect Intruders.

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Cornell Univ., Ithaca, NY (United States); Xu, Ningxiong [Cornell Univ., Ithaca, NY (United States)

    2015-03-01

    This paper focuses on optimizing the selection and configuration of detection technologies to protect a target of interest. The ability of an intruder to simply reach the target is assumed to be sufficient to consider the security system a failure. To address this problem, we develop a game theoretic model of the strategic interactions between the system owner and a knowledgeable intruder. A decomposition-based exact method is used to solve the resultant model.

  18. Pulse-train control of branching processes: Elimination of background and intruder state population

    International Nuclear Information System (INIS)

    Seidl, Markus; Uiberacker, Christoph; Jakubetz, Werner; Etinski, Mihajlo

    2008-01-01

    The authors introduce and describe pulse train control (PTC) of population branching in strongly coupled processes as a novel control tool for the separation of competing multiphoton processes. Control strategies are presented based on the different responses of processes with different photonicities and/or different frequency detunings to the pulse-to-pulse time delay and the pulse-to-pulse phase shift in pulse trains. The control efficiency is further enhanced by the property of pulse trains that complete population transfer can be obtained over an extended frequency range that replaces the resonance frequency of simple pulses. The possibility to freely tune the frequency assists the separation of the competing processes and reduces the number of subpulses required for full control. As a sample application, PTC of leaking multiphoton resonances is demonstrated by numerical simulations. In model systems exhibiting sizable background (intruder) state population if excited with single pulses, PTC leading to complete accumulation of population in the target state and elimination of background population is readily achieved. The analysis of the results reveals different mechanisms of control and provides clues on the mechanisms of the leaking process itself. In an alternative setup, pulse trains can be used as a phase-sensitive tool for level switching. By changing only the pulse-to-pulse phase shift of a train with otherwise unchanged parameters, population can be transferred to any of two different target states in a near-quantitative manner.

  19. Intruder states, coexistence, and approaches to deformation: The study of 120Xe and the N = 66 isotones

    International Nuclear Information System (INIS)

    Mantica, P.F. Jr.; Zimmerman, B.E.; Ford, C.E.; Walters, W.B.; Rikovska, J.; Stone, N.J.

    1989-01-01

    In this chapter, new results of γ-ray and conversion-electron spectroscopic studies of the structure of 119,121 Te and 126,127 Xe will be reported. These results will be described along with the results of previous studies of intruder structures in the Te and Xe mass region. The observed structures will be contrasted with other intruder structure identified in the Sn, Cd, and Pd isotopes. Results of IBM mixing calculations will be shown for the even-even Te nuclides. The role of intruder structures in the development of nuclear deformation will be discussed. 52 refs., 8 figs., 1 tab

  20. Deformed intruders and the onset of deformation at N=20 far from stability

    International Nuclear Information System (INIS)

    Poves, A.; Retamosa, J.

    1991-01-01

    Intruder states, built up of 2p-2h excitations are shown to exhibit rotational features. The combined effects of the reduction of the energy gap between major shells occurring far from stability, and the correlation energy of the valence nucleons, make the intruders dominant in the low energy spectrum of several nuclei. Many experimental puzzles may be solved in this way. (G.P.) 17 refs.; 10 figs

  1. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they \\meet". To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder ambients when the honest ambients can only perform a bounded number of steps and without path constraints in communication....

  2. Inadvertent Intruder Analysis For The Portsmouth On-Site Waste Disposal Facility (OSWDF)

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Frank G. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Phifer, Mark A. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2014-01-22

    constraints based on the intruder analysis are well above conservative estimates of the OSWDF inventory and, based on intruder disposal limits; about 7% of the disposal capacity is reached with the estimated OSWDF inventory.

  3. Intruder bands in Z = 51 nuclei

    International Nuclear Information System (INIS)

    LaFosse, D.R.

    1993-01-01

    Recent investigations of h 11/2 proton intruder bands in odd 51 Sb nuclei are reported. In addition to experiments performed at SUNY Stony Brook and Chalk River, data from Early Implementation of GAMMASPHERE (analysis in progress) are presented. In particular, the nuclei 109 Sb and 111 Sb are discussed. Rotational bands based on the πh 11/2 orbital coupled to a 2p2h deformed state of the 50 Sn core have been observed. These bands have been observed to high spin, and in the case of 109 Sb to a rotational frequency of 1.4 MeV, the highest frequency observed in a heavy nucleus. The dynamic moments of inertia in these bands decrease slowly with frequency, suggesting a gradual band termination. The systematics of such bands in 109-119 Sb will be discussed

  4. Reorganization of intruder Using Ad-Hoc Network And RFID

    Directory of Open Access Journals (Sweden)

    Vishakha Hagawane

    2014-05-01

    Full Text Available This system is to develop a centralized computer application that needs to identify moving person in a specific area using wireless network. In this paper, we develop a new indoor tracking algorithm using received signal strength. The RFID is able to detect the humans and provide information about the direction of the movement. The gathered information from the node is to be given to the base station for processing. . This application is able to detect and track person, and report direction of the intruder to a central base station. In this system we design nodes through which we are able to track the person. The human intruder is detected using Zigbee.

  5. Lazy Mobile Intruders

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Nielson, Flemming; Nielson, Hanne Riis

    2013-01-01

    We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching...... that by communication, the malicious code can learn new information that it can use in subsequent operations, or that we may have several pieces of malicious code that can exchange information if they “meet”. To formalize both the platform and the malicious code we use the mobile ambient calculus, since it provides...... a small, abstract formalism that models the essence of mobile code. We provide a decision procedure for security against arbitrary intruder processes when the honest processes can only perform a bounded number of steps and without path constraints in communication. We show that this problem is NP-complete....

  6. Low Cost Night Vision System for Intruder Detection

    Science.gov (United States)

    Ng, Liang S.; Yusoff, Wan Azhar Wan; R, Dhinesh; Sak, J. S.

    2016-02-01

    The growth in production of Android devices has resulted in greater functionalities as well as lower costs. This has made previously more expensive systems such as night vision affordable for more businesses and end users. We designed and implemented robust and low cost night vision systems based on red-green-blue (RGB) colour histogram for a static camera as well as a camera on an unmanned aerial vehicle (UAV), using OpenCV library on Intel compatible notebook computers, running Ubuntu Linux operating system, with less than 8GB of RAM. They were tested against human intruders under low light conditions (indoor, outdoor, night time) and were shown to have successfully detected the intruders.

  7. Long-term captures of low-mass intruders by binary stars

    International Nuclear Information System (INIS)

    Hills, J.G.

    1983-01-01

    Intensive computer simulations were made of three families of encounters between a binary star and a low-mass intruder which previous work indicated have a high probability of producing long-lived triple-star systems. For comparison, a fourth family which produces few long-lived trinaries was also studied. In the first two families, the binary components are equally massive and the closest approach of the intruder to the center of mass of the binary is about two times its semimajor axis, a 0 . In Family 1, the orbit of the original binary is circular, e = 0, while in Family 2, e 0 = 0.95. In Family 3 one binary component is 100 times as massive as the other, the orbit is circular, and the low-mass intruder enters the binary at nearly zero impact parameter. The probability that the intruder is trapped for at least one revolution around the binary is 0.24, 0.46, and 0.51, respectively, for these three families of encounters. The fraction of the intruders surviving successive revolutions drops rapidly. However, one encounter in Family 1 and two in Family 3 resulted in the intruder making more than 300 revolutions around the inner binary before escaping. Some intruders remained bound for more than 20 000 revolutions of the inner binary. The longest duration captures occur when the intruder is thrown into an orbit with a very large semimajor axis. About 20% of the encounters in the three families result in the intruder being thrown into an orbit with a semimajor axis a>100 a 0 , while about 2% result in the intruder going into an orbit with a>1000 a 0 . Intruders thrown into these large semimajor axis orbits have the best chance of having their orbits stabilized by passing stars

  8. Machine learning approach to detect intruders in database based on hexplet data structure

    Directory of Open Access Journals (Sweden)

    Saad M. Darwish

    2016-09-01

    Full Text Available Most of valuable information resources for any organization are stored in the database; it is a serious subject to protect this information against intruders. However, conventional security mechanisms are not designed to detect anomalous actions of database users. An intrusion detection system (IDS, delivers an extra layer of security that cannot be guaranteed by built-in security tools, is the ideal solution to defend databases from intruders. This paper suggests an anomaly detection approach that summarizes the raw transactional SQL queries into a compact data structure called hexplet, which can model normal database access behavior (abstract the user's profile and recognize impostors specifically tailored for role-based access control (RBAC database system. This hexplet lets us to preserve the correlation among SQL statements in the same transaction by exploiting the information in the transaction-log entry with the aim to improve detection accuracy specially those inside the organization and behave strange behavior. The model utilizes naive Bayes classifier (NBC as the simplest supervised learning technique for creating profiles and evaluating the legitimacy of a transaction. Experimental results show the performance of the proposed model in the term of detection rate.

  9. Energy-efficient area coverage for intruder detection in sensor networks

    CERN Document Server

    He, Shibo; Li, Junkun

    2014-01-01

    This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surveillance and security monitoring. The authors also provide the background and range of applications for area coverage and elaborate on system models such as the formal definition of area coverage and sensing models. Several chapters focus on energy-efficient intruder detection and intruder trapping under the well-known binary sensing model, along with intruder trapping under the probabilistic sens

  10. Intelligent Machine Vision for Automated Fence Intruder Detection Using Self-organizing Map

    Directory of Open Access Journals (Sweden)

    Veldin A. Talorete Jr.

    2017-03-01

    Full Text Available This paper presents an intelligent machine vision for automated fence intruder detection. A series of still captured images that contain fence events using Internet Protocol cameras was used as input data to the system. Two classifiers were used; the first is to classify human posture and the second one will classify intruder location. The system classifiers were implemented using Self-Organizing Map after the implementation of several image segmentation processes. The human posture classifier is in charge of classifying the detected subject’s posture patterns from subject’s silhouette. Moreover, the Intruder Localization Classifier is in charge of classifying the detected pattern’s location classifier will estimate the location of the intruder with respect to the fence using geometric feature from images as inputs. The system is capable of activating the alarm, display the actual image and depict the location of the intruder when an intruder is detected. In detecting intruder posture, the system’s success rate of 88%. Overall system accuracy for day-time intruder localization is 83% and an accuracy of 88% for night-time intruder localization

  11. Identification of deformed intruder states in semi-magic Ni70

    Energy Technology Data Exchange (ETDEWEB)

    Chiara, C. J.; Weisshaar, D.; Janssens, R. V. F.; Tsunoda, Y.; Otsuka, T.; Harker, J. L.; Walters, W. B.; Recchia, F.; Albers, M.; Alcorta, M.; Bader, V. M.; Baugher, T.; Bazin, D.; Berryman, J. S.; Bertone, P. F.; Campbell, C. M.; Carpenter, M. P.; Chen, J.; Crawford, H. L.; David, H. M.; Doherty, D. T.; Gade, A.; Hoffman, C. R.; Honma, M.; Kondev, F. G.; Korichi, A.; Langer, C.; Larson, N.; Lauritsen, T.; Liddick, S. N.; Lunderberg, E.; Macchiavelli, A. O.; Noji, S.; Prokop, C.; Rogers, A. M.; Seweryniak, D.; Shimizu, N.; Stroberg, S. R.; Suchyta, S.; Utsuno, Y.; Williams, S. J.; Wimmer, K.; Zhu, S.

    2015-04-01

    The structure of semi-magic Ni-70(28)42 was investigated following complementary multinucleon-transfer and secondary fragmentation reactions. Changes to the higher-spin, presumed negative-parity states based on observed gamma-ray coincidence relationships result in better agreement with shell-model calculations using effective interactions in the neutron f(5/2)pg(9/2) model space. The second 2(+) and (4(+)) states, however, can only be successfully described when proton excitations across the Z = 28 shell gap are included. Monte Carlo shell-model calculations suggest that the latter two states are part of a prolate-deformed intruder sequence, establishing an instance of shape coexistence at low excitation energies similar to that observed recently in neighboring Ni-68.

  12. On the submerging of a spherical intruder into granular beds

    Directory of Open Access Journals (Sweden)

    Wu Chuan-Yu

    2017-01-01

    Full Text Available Granular materials are complex systems and their mechanical behaviours are determined by the material properties of individual particles, the interaction between particles and the surrounding media, which are still incompletely understood. Using an advanced discrete element method (DEM, we simulate the submerging process of a spherical projectile (an intruder into granular materials of various properties with a zero penetration velocity (i.e. the intruder is touching the top surface of the granular bed and released from stationary and examine its settling behaviour. By systematically changing the density and size of the intruder and the particle density (i.e. the density of the particles in the granular bed, we find that the intruder can sink deep into the granular bed even with a zero penetration velocity. Furthermore, we confirm that under certain conditions the granular bed can behave like a Newtonian liquid and the submerging intruder can reach a constant velocity, i.e. the terminal velocity, identical to the settling of a sphere in a liquid, as observed experimentally. A mathematical model is also developed to predict the maximum penetration depth of the intruder. The model predictions are compared with experimental data reported in the literature,good agreement was obtained, demonstrating the model can accurately predict the submerging behaviour of the intruder in the granular media.

  13. Design and Implementation of an Embedded Smart Intruder Surveillance System

    Directory of Open Access Journals (Sweden)

    Sabri Naseer

    2018-01-01

    Full Text Available Remote and scattered valuable and sensitive locations such as labs and offices inside university campus need efficient monitoring and warning system. As well as scattered area and belonging. This research presents a Real-Time intruder Surveillance System based on a single board computer (SBC. Thus the design and development of a cost effective surveillance management system based SBC that can be deployed efficiently in remote and scattered locations such as universities belonging. The fusion of embedded Python codes with SBC that attached to cameras, Long distance sensors, alerting circuitry and wireless module presents a novel integration based effective cost solution and enhances SBC of much flexibility of improvement and development for pervasive remote locations. The system proves the high integrity of smooth working with web application, it’s cost effective and thus can be deployed as many of units to seize and concisely covered remote and scattered area as well as university belonging and departments. The system can be administrated by a remote user sparsely or geographically away from any networked workstation. The proposed solution offers efficient stand alone, flexibility to upgrade and cheap development and installation as well as cost effective ubiquitous surveillance solution. In conclusion, the system acceptable boundaries of successful intruder recognition and warning alert are computed between 1m and 3m distance of intruder from system camera. Recognition rate of 95% and 83% are achieved and the successful warning alert were in the range of 86-97%.

  14. Study of intruder band in 112Sn

    International Nuclear Information System (INIS)

    Ganguly, S.; Banerjee, P.; Ray, I.; Kshetri, R.; Raut, R.; Bhattacharya, S.; Saha-Sarkar, M.; Goswami, A.; Mukhopadhyay, S.; Mukherjee, A.; Mukherjee, G.; Basu, S.K.

    2007-01-01

    Excited states of the positive-parity intruder band in 112 Sn, populated in the 100 Mo( 20 Ne,α4n) reaction at a beam energy of 136 MeV, have been studied. The band has been observed up to 11570.0 keV with spin (24 + ). Mean lifetimes have been measured for six states up to the 22 + , 10335.1 keV level and an upper limit of the lifetime has been estimated for the 11570.0 keV (24 + ) state. The B(E2) values, derived from the present lifetime results, correspond to a moderate quadrupole deformation of β 2 ∼0.18 for states with spin J π >=12 + , and the decrease in B(E2) for the 14 + ->12 + transition is consistent with a ν(h 11/2 ) 2 alignment at ω∼0.35 MeV, predicted by a cranked shell-model calculation. Total Routhian surface calculations predict a triaxial shape following the alignment

  15. Intruder bands in odd-A {sup 109-115}Sb

    Energy Technology Data Exchange (ETDEWEB)

    Janzen, V P [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; [McMaster Univ., Hamilton, ON (Canada). Dept. of Physics; Andrews, H R; Galindo-Uribarri, A; Radford, D C; Ward, D [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; Omar, A; Mullins, S; Persson, L; Prevost, D; Rodriguez, J; Sawicki, M; Unrau, P; Waddington, J C [McMaster Univ., Hamilton, ON (Canada). Dept. of Physics; Drake, T E; Zwartz, G [Toronto Univ., ON (Canada). Dept. of Physics; Fossan, D B; Lafosse, D R; Hughes, J R; Schnare, H; Timmers, H; Vaska, P [State Univ. of New York, Stony Brook, NY (United States). Dept. of Physics; Haas, B [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; [Strasbourg-1 Univ., 67 (France). Centre de Recherches Nucleaires; Paul, E S; Wilson, J [Liverpool Univ. (United Kingdom). Oliver Lodge Lab.; Pilotte, S [Ottawa Univ., ON (Canada). Dept. of Physics; Wadsworth, R [York Univ. (United Kingdom). Dept. of Physics; Wyss, R [Joint Inst. for Heavy Ion Research, Oak Ridge, TN (United States)

    1992-08-01

    The existence of rotational structures in nuclei bordering on the spherical Z= 50 closed shell has been known for some time. Nevertheless, our understanding of collective effects in this region is remarkably incomplete; for example, before this work little high-spin data existed and there were no lifetime measurements to confirm the collectivity associated with the rotational bands observed in Sb (Z = 51) and Sn (Z = 50) nuclei. Furthermore, the role of the h{sub 11/2} orbital was virtually unknown, although it has the highest angular momentum of the orbitals in this mass region and therefore is expected to have the most influence on the properties of high-spin states. In the A {approx} 130 and A {approx} 180 mass regions, where highly deformed intruder bands have been observed, it is the neutron i{sub 13/2} orbitals, respectively, which are preferentially lowered in energy by a combination of large deformation and fast rotation In lighter nuclei the h{sub 11/2} orbital is expected to appear as an intruder configuration. (author). 11 refs., 1 tab., 4 figs.

  16. Evolution of the Collectivity around 68Ni: role of intruder states

    International Nuclear Information System (INIS)

    Dijon, A.

    2012-01-01

    The evolution of magic numbers as a function of the neutron number for a given chain of isotopes is one of the major goals of nuclear physics today. Changing magic numbers may lead to profound modifications in the structure of exotic nuclei and manifest themselves experimentally in rapid changes of collectivity and shapes. In this thesis we have studied nuclei around 68 Ni produced in deep inelastic collisions at GANIL. The nuclei of interest were selected and identified by the large acceptance VAMOS recoil spectrometer. Their structure was studied via the detection of the gamma rays emitted at the target point by the EXOGAM array. In one of the two experiments we also installed a specific setup dedicated to the measurements of the delayed gamma rays emitted by the nuclei after their implantation at the focal plane of VAMOS. In the first experiment we have observed a new isomeric state in 68 Ni with a proton intruder configuration at an excitation energy which sensitively depends on the Z=28 and N=40 shell gaps. New transitions were also identified in odd-mass isotopes of Co, Fe and Mn. In the second experiment we have measured the lifetimes of the first-excited states in 63,65 Co using the recoil distance Doppler shift method. From these lifetimes electromagnetic transition probabilities could be deduced, which in turn shed light on the collectivity of the studied isotopes. Comparisons with the shell model and with mean field calculations were carried and provided additional information on the proton-neutron interaction as well as on the evolution of the collectivity in this mass region. (author) [fr

  17. Intruder level and deformation in SD-pair shell model

    International Nuclear Information System (INIS)

    Luo Yan'an; Ning Pingzhi; Pan Feng

    2004-01-01

    The influence of intruder level on nuclear deformation is studied within the framework of the nucleon-pair shell model truncated to an SD-pair subspace. The results suggest that the intruder level has a tendency to reduce the deformation and plays an important role in determining the onset of rotational behavior. (authors)

  18. Detection of Intelligent Intruders in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Wang

    2016-01-01

    Full Text Available Most of the existing research works on the intrusion detection problem in a wireless sensor network (WSN assume linear or random mobility patterns in abstracting intruders’ models in traversing the WSN field. However, in real-life WSN applications, an intruder is usually an intelligent mobile robot with environment learning and detection avoidance capability (i.e., the capability to avoid surrounding sensors. Due to this, the literature results based on the linear or random mobility models may not be applied to the real-life WSN design and deployment for efficient and effective intrusion detection in practice. This motivates us to investigate the impact of intruder’s intelligence on the intrusion detection problem in a WSN for various applications. To be specific, we propose two intrusion algorithms, the pinball and flood-fill algorithms, to mimic the intelligent motion and behaviors of a mobile intruder in detecting and circumventing nearby sensors for detection avoidance while heading for its destination. The two proposed algorithms are integrated into a WSN framework for intrusion detection analysis in various circumstances. Monte Carlo simulations are conducted, and the results indicate that: (1 the performance of a WSN drastically changes as a result of the intruder’s intelligence in avoiding sensor detections and intrusion algorithms; (2 network parameters, including node density, sensing range and communication range, play a crucial part in the effectiveness of the intruder’s intrusion algorithms; and (3 it is imperative to integrate intruder’s intelligence in the WSN research for intruder detection problems under various application circumstances.

  19. Compensated intruder-detection systems

    Science.gov (United States)

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  20. Pulling an intruder from a granular material: a novel depinning experiment

    Directory of Open Access Journals (Sweden)

    Zhang Yue

    2017-01-01

    Full Text Available Two-dimensional impact experiments by Clark et al. [2] identified the source of inertial drag to be caused by ‘collisions’ with a latent force network, leading to large fluctuations of the force experienced by the impactor. These collisions provided the major drag on an impacting intruder until the intruder was nearly at rest. As a complement, we consider controlled pull-out experiments where a buried intruder is pulled out of a material, starting from rest. This provides a means to better understand the non-inertial part of the drag force, and to explore the mechanisms associated with the force fluctuations. To some extent, the pull out process is a time reversed version of the impact process. In order to visualize this pulling process, we use 2D photoelastic disks from which circular intruders of different radii are pulled out. We present results about the dynamics of the intruder and the structures of the force chains inside the granular system as captured by slow and high speed imaging.

  1. Consolidation of a WSN and Minimax method to rapidly neutralise intruders in strategic installations.

    Science.gov (United States)

    Conesa-Muñoz, Jesus; Ribeiro, Angela

    2012-01-01

    Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN). The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders' behaviour is inferred through sequences of sensors' activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final state of the intruders

  2. An i{sub 13/2} neutron intruder band in {sup 141}Gd

    Energy Technology Data Exchange (ETDEWEB)

    Mullins, S M; Omar, A; Persson, L; Prevost, D; Waddington, J C [McMaster Univ., Hamilton, ON (Canada); Andrews, H R; Ball, G C; Galindo-Uribarri, A; Janzen, V P; Radford, D C; Ward, D [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.; Drake, T E [Toronto Univ., ON (Canada). Dept. of Physics; Fossan, D B; Lafosse, D; Vaska, P; Waring, M [State Univ. of New York, Stony Brook, NY (United States). Dept. of Physics; Wadsworth, R [York Univ. (United Kingdom). Dept. of Physics

    1992-08-01

    The nucleus {sup 141}Gd has been investigated at high spins for the first time following the reactions {sup 112}Sn({sup 32}S,2pn){sup 141}Gd at 155 MeV and {sup 112}Sn({sup 33}S,2p2n){sup 141}Gd at 170 MeV. The methods of in-beam {gamma}-ray spectroscopy were used to establish a number of different structures, including a band which has been assigned as being based on the {nu}i{sub 13/2}[660]1/2{sup +} Nilsson intruder orbital. This is the heaviest nucleus thus far in which this type of intruder band has been identified. (author). 11 refs., 3 figs.

  3. Underwater Intruder Detection Sonar for Harbour Protection: State of the Art Review and Implications

    Science.gov (United States)

    2006-10-01

    intruder would appear as a small moving “ blob ” of energetic echo in the echograph, and the operator could judge whether the contact is a threat that calls...visually then as a small fluctuating “ blob ” against a fluctuating background of sound clutter and reverberation, making it difficult to visually...4. Non-random false alarms caused by genuine underwater contacts that happened not to be intruders—by large fish , or schools of fish , or marine

  4. Study of intruder band in {sup 112}Sn

    Energy Technology Data Exchange (ETDEWEB)

    Ganguly, S. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Banerjee, P. [Saha Institute of Nuclear Physics, Kolkata 700064 (India)]. E-mail: polash.banerjee@saha.ac.in; Ray, I. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Kshetri, R. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Raut, R. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Bhattacharya, S. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Saha-Sarkar, M. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Goswami, A. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Mukhopadhyay, S. [UGC-DAE-CSR, Kolkata 700098 (India); Mukherjee, A. [Saha Institute of Nuclear Physics, Kolkata 700064 (India); Mukherjee, G. [Variable Energy Cyclotron Centre, Kolkata 700064 (India); Basu, S.K. [Variable Energy Cyclotron Centre, Kolkata 700064 (India)

    2007-06-01

    Excited states of the positive-parity intruder band in {sup 112}Sn, populated in the {sup 100}Mo({sup 20}Ne,{alpha}4n) reaction at a beam energy of 136 MeV, have been studied. The band has been observed up to 11570.0 keV with spin (24{sup +}). Mean lifetimes have been measured for six states up to the 22{sup +}, 10335.1 keV level and an upper limit of the lifetime has been estimated for the 11570.0 keV (24{sup +}) state. The B(E2) values, derived from the present lifetime results, correspond to a moderate quadrupole deformation of {beta}{sub 2}{approx}0.18 for states with spin J{sup {pi}}>=12{sup +}, and the decrease in B(E2) for the 14{sup +}->12{sup +} transition is consistent with a {nu}(h{sub 11/2}){sup 2} alignment at {omega}{approx}0.35 MeV, predicted by a cranked shell-model calculation. Total Routhian surface calculations predict a triaxial shape following the alignment.

  5. Potential impact of DOE's performance objective for protection of inadvertent intruders on low-level waste disposals at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1993-01-01

    Performance objectives for disposal of low-level radioactive waste at Department of Energy (DOE) sites include limits on radiation dose to inadvertent intruders. This paper investigates the potential impact of DOE's performance objective for protection of inadvertent intruders on the acceptability of low-level waste disposals at Oak Ridge National Laboratory (ORNL). The analysis is based on waste volumes and radionuclide inventories for recent disposals and estimated doses to an inadvertent intruder for assumed exposure scenarios. The analysis indicates that more than 99% of the total volume of waste in recent disposals meets the performance objective for inadvertent intruders, and the volume of waste found to be unacceptable for disposal is only about 16 m 3 . Therefore, DOE's performance objective for protection of inadvertent intruders probably will not have unreasonably adverse impacts on acceptable waste disposals at ORNL

  6. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    Directory of Open Access Journals (Sweden)

    Shahaboddin Shamshirband

    Full Text Available Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean, Intruder Rear sensors active (boolean, Agent Front sensors active (boolean, Agent Rear sensors active (boolean, RSSI signal intensity/strength (integer, Elapsed time (in seconds, Distance between Agent and Intruder (m, Angle of Agent relative to Intruder (angle between vehicles °, Altitude difference between Agent and Intruder (m influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles ° is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  7. Adaptive Neuro-Fuzzy Determination of the Effect of Experimental Parameters on Vehicle Agent Speed Relative to Vehicle Intruder.

    Science.gov (United States)

    Shamshirband, Shahaboddin; Banjanovic-Mehmedovic, Lejla; Bosankic, Ivan; Kasapovic, Suad; Abdul Wahab, Ainuddin Wahid Bin

    2016-01-01

    Intelligent Transportation Systems rely on understanding, predicting and affecting the interactions between vehicles. The goal of this paper is to choose a small subset from the larger set so that the resulting regression model is simple, yet have good predictive ability for Vehicle agent speed relative to Vehicle intruder. The method of ANFIS (adaptive neuro fuzzy inference system) was applied to the data resulting from these measurements. The ANFIS process for variable selection was implemented in order to detect the predominant variables affecting the prediction of agent speed relative to intruder. This process includes several ways to discover a subset of the total set of recorded parameters, showing good predictive capability. The ANFIS network was used to perform a variable search. Then, it was used to determine how 9 parameters (Intruder Front sensors active (boolean), Intruder Rear sensors active (boolean), Agent Front sensors active (boolean), Agent Rear sensors active (boolean), RSSI signal intensity/strength (integer), Elapsed time (in seconds), Distance between Agent and Intruder (m), Angle of Agent relative to Intruder (angle between vehicles °), Altitude difference between Agent and Intruder (m)) influence prediction of agent speed relative to intruder. The results indicated that distance between Vehicle agent and Vehicle intruder (m) and angle of Vehicle agent relative to Vehicle Intruder (angle between vehicles °) is the most influential parameters to Vehicle agent speed relative to Vehicle intruder.

  8. Properties of low-lying intruder states in $^{34}$Al and $^{34}$Si sequentially populated in $\\beta$-decay of $^{34}$Mg

    CERN Multimedia

    A low-lying long-lived (26±1 ms) isomer in $^{34}$Al has been observed recently and assigned as 1$^{+}$ state of intruder character. It was populated in $^{36}$S fragmentation and feeds, in $\\beta$-decay, the 0$_{2}^{+}$ state in $^{34}$Si whose excitation energy and lifetime were determined in an electron-positron pairs spectroscopy experiment. In the present experiment we intend to measure for the first time the $\\gamma$-rays following the $\\beta$-decay of $^{34}$Mg. Despite the interest for $^{34}$Mg, the up-right corner of the “N$\\thicksim$20 island of inversion”, the only information on its $\\beta$-decay is the lifetime of 20±10 ms, determined from $\\beta$-neutron coincidences. As a result of the proposed experiment, we expect to place the first transitions in the level scheme of $^{34}$Al and to strongly populate the newly observed isomer, measuring its excitation energy, if the branching ratio to 4$^{−}$ ground state is significant. Theoretical estimations for the $\\beta$-decay of the new isome...

  9. Potential impact of DOE's performance objective for protection of inadvertent intruders on low-level waste disposals at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Kocher, D.C.

    1992-01-01

    The Department of Energy's Order 5820.2A, Chapter III, specifies performance objectives for disposal of low-level radioactive waste which include limits on effective dose equivalent for inadvertent intruders. This paper investigates the potential impact of the performance objective for protection of inadvertent intruders on the acceptability of waste disposals in Solid Waste Storage Area (SWSA) 6 at Oak Ridge National Laboratory (ORNL). The analysis is based on radionuclide inventories and waste volumes for recent disposals in SWSA 6 and calculated doses to an inadvertent intruder per unit concentration of radionuclides in disposed waste for assumed exposure scenarios

  10. Unexpected alignment patterns in high-j intruder bands evidence for a strong residual neutron proton interaction?

    International Nuclear Information System (INIS)

    Wyss, R.; Johnson, A.; Royal Inst. of Tech., Stockholm

    1990-01-01

    The alignment of h 11/12 protons in νi 13/2 intruder bands in mass A = 130 region is investigated. The lack of a clear h 11/12 band crossing is compared with the alignment pattern of i 13/2 neutrons in πi 13/2 intruder bands in mass A = 180 region. The very smooth rise in angular momentum in the intruder bands is related to a possible neutron proton interaction between the single intruder orbital and the aligned two-quasiparticle configuration. 36 refs., 3 figs

  11. Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations

    Directory of Open Access Journals (Sweden)

    Angela Ribeiro

    2012-03-01

    Full Text Available Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN. The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders’ behaviour is inferred through sequences of sensors’ activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final

  12. High spin spectroscopy of near spherical nuclei: Role of intruder orbitals

    Energy Technology Data Exchange (ETDEWEB)

    Bhattacharyya, S.; Bhattacharjee, T.; Mukherjee, G. [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064 (India); Chanda, S. [Fakir Chand College, Diamond Herbour, West Bengal (India); Banerjee, D.; Das, S. K.; Guin, R. [Radiochemistry Division, Variable Energy Cyclotron Centre, BARC, Kolkata - 700064 (India); Gupta, S. Das [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064, India and Saha Institute of Nuclear Physics, Kolkata-700064 (India); Pai, H. [Variable Energy Cyclotron Centre, 1/AF Bidhan Nagar, Kolkata - 700064, India and Institut für Kernphysik, Technische Universität Darmstadt, Schlossgartenstrasse 9, 64289 Darmstadt (Germany)

    2014-08-14

    High spin states of nuclei in the vicinity of neutron shell closure N = 82 and proton shell closure Z = 82 have been studied using the Clovere Ge detectors of Indian National Gamma Array. The shape driving effects of proton and neutron unique parity intruder orbitals for the structure of nuclei around the above shell closures have been investigated using light and heavy ion beams. Lifetime measurements of excited states in {sup 139}Pr have been done using pulsed-beam-γ coincidence technique. The prompt spectroscopy of {sup 207}Rn has been extended beyond the 181μs 13/2{sup +} isomer. Neutron-rich nuclei around {sup 132}Sn have been produced from proton induced fission of {sup 235}U and lifetime measurement of low-lying states of odd-odd {sup 132}I have been performed from offline decay.

  13. Motion patterns and phase-transition of a defender-intruder problem and optimal interception strategy of the defender

    Science.gov (United States)

    Wang, Jiangliu; Li, Wei

    2015-10-01

    In this paper, we consider a defense-intrusion interaction, in which an intruder is attracted by a protected stationary target but repulsed by a defender; while the defender tries to move towards an appropriate interception position (IP) between the intruder and the target in order to intercept the intruder and expel the intruder away from the target as maximum as possible. Intuitionally, to keep the intruder further away, one may wonder that: is it a better strategy for the defender trying to approach the intruder as near as possible? Unexpectedly and interestingly enough, this is not always the case. We first introduce the flexibility for IP selection, then investigate the system dynamics and the stable motion patterns, and characterize the phase-transition surface for the motion patterns. We show that, the phase-transition surface just defines the optimal interception strategy of the defender for IP selection; and from the perspective of mobility of agents, the optimal strategy just depends on relative mobility of the two agents.

  14. User's guide to the repository intrusion risk evaluation code INTRUDE

    International Nuclear Information System (INIS)

    Nancarrow, D.J.; Thorne, M.C.

    1986-05-01

    The report, commissioned by the Department of the Environment as part of its radioactive waste management research programme, constitutes the user's guide to the repository intrusion risk evaluation code INTRUDE. It provides an explanation of the mathematical basis of the code, the database used and the operation of the code. INTRUDE is designed to facilitate the estimation of individual risks arising from the possibility of intrusion into shallow land burial facilities for radioactive wastes. It considers a comprehensive inventory of up to 65 long-lived radionuclides and produces risk estimates for up to 20 modes of intrusion and up to 50 times of evaluation. (author)

  15. Intelligent Machine Vision for Automated Fence Intruder Detection Using Self-organizing Map

    OpenAIRE

    Veldin A. Talorete Jr.; Sherwin A Guirnaldo

    2017-01-01

    This paper presents an intelligent machine vision for automated fence intruder detection. A series of still captured images that contain fence events using Internet Protocol cameras was used as input data to the system. Two classifiers were used; the first is to classify human posture and the second one will classify intruder location. The system classifiers were implemented using Self-Organizing Map after the implementation of several image segmentation processes. The human posture classifie...

  16. The Star Wars Kid and the Bedroom Intruder

    DEFF Research Database (Denmark)

    Christensen, Jørgen Riber

    2011-01-01

    Jørgen Riber Christensen's article Star Wars Kid and the Bedroom Intruder looks at how people may unexpectedly become icons of the Internet, through a transgression of the private sphere. Surveillance and celebrity is revealed to be bound together with a disciplinary effect, at the same time...

  17. Lift on side by side intruders of various geometries within a granular flow

    Science.gov (United States)

    Acevedo-Escalante, M. F.; Caballero-Robledo, G. A.

    2017-06-01

    Obstacles within fluids have been widely used in engineering and in physics to study hydrodynamic interactions. In granular matter, objects within a granular flow have helped to understand fundamental features of drag and lift forces. In our group, we have studied numerically the flow mediated interaction between two static disks within a vertical granular flow in a two-dimensional container where the flow velocity and the distance between obstacles were varied. Attractive and repulsive forces were found depending on flow velocity and separation between intruders. The simulations evidenced a relationship between the average flow velocity in a specific section ahead of the obstacles and the attractive-repulsive lift. On the other hand, it was showed that the lift force on an object dragged within a granular medium depends on the shape of the intruder. Here we present experimental results of the interaction between two side-by-side intruders of different shapes within a vertical granular flow. We built a quasi-two-dimensional container in which we placed the intruders and using load cells we measured lift and drag forces during the discharge process for different flow velocities.

  18. Localization Capability of Cooperative Anti-Intruder Radar Systems

    Directory of Open Access Journals (Sweden)

    Mauro Montanari

    2008-06-01

    Full Text Available System aspects of an anti-intruder multistatic radar based on impulse radio ultrawideband (UWB technology are addressed. The investigated system is composed of one transmitting node and at least three receiving nodes, positioned in the surveillance area with the aim of detecting and locating a human intruder (target that moves inside the area. Such systems, referred to also as UWB radar sensor networks, must satisfy severe power constraints worldwide imposed by, for example, the Federal Communications Commission (FCC and by the European Commission (EC power spectral density masks. A single transmitter-receiver pair (bistatic radar is considered at first. Given the available transmitted power and the capability of the receiving node to resolve the UWB pulses in the time domain, the surveillance area regions where the target is detectable, and those where it is not, are obtained. Moreover, the range estimation error for the transmitter-receiver pair is discussed. By employing this analysis, a multistatic system is then considered, composed of one transmitter and three or four cooperating receivers. For this multistatic system, the impact of the nodes location on area coverage, necessary transmitted power and localization uncertainty is studied, assuming a circular surveillance area. It is highlighted how area coverage and transmitted power, on one side, and localization uncertainty, on the other side, require opposite criteria of nodes placement. Consequently, the need for a system compromising between these factors is shown. Finally, a simple and effective criterion for placing the transmitter and the receivers is drawn.

  19. Fully automated radiochemical preparation system for gamma-spectroscopy on fission products and the study of the intruder and vibrational levels in 83Se

    International Nuclear Information System (INIS)

    Lien, O.G. III.

    1983-10-01

    AUTOBATCH was developed to provide a usable source of short-lived neutron-rich nuclides through chemical preparation of the sample from fission products for detailed gamma-ray spectroscopy, which would complement the output of on-line isotope separators. With AUTOBATCH the gamma rays following the β - decay of 83 As were studied to determine the ground state spin and parity of 83 As to be 5/2 - ; the absolute intensity of the β - branch from 83 As to 83 Se/sup m/ to be 0.3%; the absolute intensity of the ground state β - branch from 83 Se/sup m/ to 83 Br to be 39%; the halflife of the 5/2 1 + level to be 3.2 ns; and the structure of 83 Se 49 . Results are used to show that the intruder structure which had been previously observed in the odd mass 49 In isotopes could be observed in the N = 49 isotones. The observed structure is discussed in terms of the unified model calculations of Heyde which has been used to describe the intruder structure in the indium nuclei. The intruder structure is most strongly developed, not at core mid-shell, 89 Zr 49 , but rather at core mid-sub-shell 83 Se. This difference is qualitatively understood to be due to the blocking of collectivity by the Z = 40 subshell closure which prevents the intruder structure from occurring in 87 Sr 49 and 89 Zr 49

  20. Friction force regimes and the conditions for endless penetration of an intruder into a granular medium.

    Science.gov (United States)

    López-Rodríguez, L A; Pacheco-Vázquez, F

    2017-09-01

    An intruder penetrating into a granular column experiences a depth-dependent friction force F(z). Different regimes of F(z) have been measured depending on the experimental design: a nearly linear dependence for shallow penetrations, total saturation at large depths, and an exponential increase when the intruder approaches the bottom of the granular bed. We report here an experiment that allows us to measure the different regimes in a single run during the quasistatic descent of a sphere in a light granular medium. From the analysis of the resistance in the saturation zone, it was found that F(z) follows a cube-power-law dependence on the intruder diameter and an exponential increase with the packing fraction of the bed. Moreover, we determine the critical mass m_{c} required to observe infinite penetration and its dependence on the above parameters. Finally, we use our results to estimate the final penetration depth reached by intruders of masses mintruder of any density (larger than the density of the granular bed) can sink indefinitely into the granular medium if the bed packing fraction is smaller than a critical value.

  1. Measuring virgin female aggression in the female intruder test (FIT): effects of oxytocin, estrous cycle, and anxiety.

    Science.gov (United States)

    de Jong, Trynke R; Beiderbeck, Daniela I; Neumann, Inga D

    2014-01-01

    The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT). We found that approximately 40% of un-manipulated adult (10-11 weeks old) female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old) female rats selected for high anxiety behavior (HABs) displayed significantly more aggression than non-selected (NAB) or low-anxiety (LAB) rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl) inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR) in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  2. Measuring virgin female aggression in the female intruder test (FIT: effects of oxytocin, estrous cycle, and anxiety.

    Directory of Open Access Journals (Sweden)

    Trynke R de Jong

    Full Text Available The costs of violence and aggression in our society have stimulated the scientific search for the predictors and causes of aggression. The majority of studies have focused on males, which are considered to be more aggressive than females in most species. However, rates of offensive behavior in girls and young women are considerable and are currently rising in Western society. The extrapolation of scientific results from males to young, non-maternal females is a priori limited, based on the profound sex differences in brain areas and functioning of neurotransmitters involved in aggression. Therefore, we established a paradigm to assess aggressive behavior in young virgin female rats, i.e. the female intruder test (FIT. We found that approximately 40% of un-manipulated adult (10-11 weeks old female Wistar rats attack an intruder female during the FIT, independent of their estrous phase or that of their intruder. In addition, adolescent (7-8 weeks old female rats selected for high anxiety behavior (HABs displayed significantly more aggression than non-selected (NAB or low-anxiety (LAB rats. Intracerebroventricular infusion of oxytocin (OXT, 0.1 µg/5 µl inhibited aggressive behavior in adult NAB and LAB, but not HAB females. Adolescent NAB rats that had been aggressive towards their intruder showed increased pERK immunoreactivity (IR in the hypothalamic attack area and reduced pERK-IR in OXT neurons in the paraventricular hypothalamic nucleus compared to non-aggressive NAB rats. Taken together, aggressive behavior in young virgin female rats is partly dependent on trait anxiety, and appears to be under considerable OXT control.

  3. Automated electronic intruder simulator for evaluation of ultrasonic intrusion detectors

    International Nuclear Information System (INIS)

    1979-01-01

    An automated electronic intruder simulator for testing ultrasonic intrusion detectors is described. This simulator is primarily intended for use in environmental chambers to determine the effects of temperature and humidity on the operation of ultrasonic intrusion detectors

  4. Optimal Randomized Surveillance Patterns to Detect Intruders Approaching a Military Installation

    National Research Council Canada - National Science Library

    McLemore, Trevor D

    2007-01-01

    .... The intruder attempts to penetrate the military installation by choosing one of its many entry points, each of which is monitored by a surveillance camera and may require a different amount of time to transit...

  5. Coupling Effect of Intruding Water and Inherent Gas on Coal Strength Based on the Improved (Mohr-Coulomb Failure Criterion

    Directory of Open Access Journals (Sweden)

    Yiyu Lu

    2016-11-01

    Full Text Available When employing hydraulic processes to increase gas drainage efficiency in underground coal mines, coal seams become a three-phase medium, containing water intruding into the coal pores with the inherent occurrence of gas. This can change the stress state of the coal and cause instability. This work studied the mechanical properties of coal containing water and gas and derived an appropriate failure criterion. Based on mixture theory of unsaturated porous media, the effective stress of coal, considering the interaction of water and gas, was analyzed, and the failure criterion established by combining this with the Mohr–Coulomb criterion. By introducing the stress factor of matrix suction and using fitted curves of experimentally determined matrix suction and moisture content, the relationships between coal strength, gas pressure, and moisture content were determined. To verify the established strength theory, a series of triaxial compression strength tests of coal containing water and gas were carried out on samples taken from the Songzao, Pingdingshan, and Tashan mines in China. The experimental results correlated well with the theoretical predictions. The results showed a linear decrease in the peak strength of coal with increasing gas pressure and an exponential reduction in peak strength with increasing moisture content. The strength theory of coal containing water and gas can become an important part of multiphase medium damage theory.

  6. Intruder scenarios for site-specific waste classification

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.

    1988-01-01

    The US Department of Energy (DOE) is currently revising its low-level radioactive waste (LLW) management requirements and guidelines for waste generated at its facilities that support defense missions. Specifically, draft DOE 5820.2A, Chapter 3, describes the purpose, policy, and requirements necessary for the management of defense LLW. The draft DOE policy calls for DOE LLW operations to be managed to protect the health and safety of the public, preserve the environment, and ensure that no remedial action will be necessary after termination of operations. The requirements and guidelines apply to radioactive wastes but are also intended to apply to mixed hazardous and radioactive wastes as defined in draft DOE 5400.5, Hazardous and Radioactive Mixed Waste. The basic approach used by DOE is to establish overall performance objectives in terms of ground-water protection and public radiation dose limits and to require site-specific performance assessments to determine compliance. As a result of these performance assessments, each site shall develop waste acceptance criteria that define the allowable quantities and concentrations of specific radioisotopes. Additional limitations on waste disposal design, waste form, and waste treatment shall also be developed on a site-specific basis. As a key step in the site-specific performance assessments, an evaluation must be conducted of potential radiation doses to intruders who may inadvertently move onto a closed DOE LLW disposal site after loss of institutional controls must be conducted. This paper describes the types of intruder scenarios that should be considered when performing this step of the site-specific performance assessment

  7. Restoration of an intruded maxillary central incisor with a uniquely designed dowel and core restoration: a case report.

    Science.gov (United States)

    Polat, Zelal Seyfioğlu; Tacir, Ibrahim Halil

    2007-01-01

    This article describes the restoration of an intruded root using a custom-made metal dowel and metal-ceramic veneer core restoration. The treatment plan for this patient consisted of restoring the missing esthetics and eliminating psychological trauma by utilizing the root of the intruded maxillary left central incisor to replace both missing central incisor crowns. This treatment will preserve space and bone until the patient is old enough for another prosthodontic restoration to be considered. As the lost fragments were not recovered, we considered this restoration of the intruded root to be the best therapeutic option, considering the effect on the patient's psyche. The patient was satisfied with the final result.

  8. Automated electronic intruder simulator for evaluation of odd frequency microwave detectors

    International Nuclear Information System (INIS)

    1979-01-01

    A microwave intruder simulator for testing motion detection sensors is described. This simulator can be used to evaluate a variety of microwave sensors regardless of the value of the center frequency of the signal utilized. Representative curves from the evaluation of one microwave sensor are also presented

  9. Sexual aggression by intruders in hooded crow Corvus cornix

    OpenAIRE

    Zduniak, Piotr; Kosicki, Jakub Z.; Yosef, Reuven

    2015-01-01

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We belie...

  10. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Science.gov (United States)

    Sequeira, Ana F.; Cardoso, Jaime S.

    2015-01-01

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system. PMID:26102491

  11. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Directory of Open Access Journals (Sweden)

    Ana F. Sequeira

    2015-06-01

    Full Text Available Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  12. Effect of intruder mass on collisions with hard binaries. II - Dependence on impact parameter and computations of the interaction cross sections

    Science.gov (United States)

    Hills, J. G.

    1992-06-01

    Over 125,000 encounters between a hard binary with equal mass, components and orbital eccentricity of 0, and intruders with solar masses ranging from 0.01 to 10,000 are simulated. Each encounter was followed up to a maximum of 5 x 10 exp 6 integration steps to allow long-term 'resonances', temporary trinary systems, to break into a binary and a single star. These simulations were done over a range of impact parameters to find the cross sections for various processes occurring in these encounters. A critical impact parameter found in these simulations is the one beyond which no exchange collisions can occur. The energy exchange between the binary and a massive intruder decreases greatly in collisions with Rmin of not less than Rc. The semimajor axes and orbital eccentricity of the surviving binary also drops rapidly at Rc in encounters with massive intruders. The formation of temporary trinary systems is important for all intruder masses.

  13. Resident intruder paradigm-induced aggression relieves depressive-like behaviors in male rats subjected to chronic mild stress

    Science.gov (United States)

    Wei, Sheng; Ji, Xiao-wei; Wu, Chun-ling; Li, Zi-fa; Sun, Peng; Wang, Jie-qiong; Zhao, Qi-tao; Gao, Jie; Guo, Ying-hui; Sun, Shi-guang; Qiao, Ming-qi

    2014-01-01

    Background Accumulating epidemiological evidence shows that life event stressors are major vulnerability factors for psychiatric diseases such as major depression. It is also well known that the resident intruder paradigm (RIP) results in aggressive behavior in male rats. However, it is not known how resident intruder paradigm-induced aggression affects depressive-like behavior in isolated male rats subjected to chronic mild stress (CMS), which is an animal model of depression. Material/Methods Male Wistar rats were divided into 3 groups: non-stressed controls, isolated rats subjected to the CMS protocol, and resident intruder paradigm-exposed rats subjected to the CMS protocol. Results In the sucrose intake test, ingestion of a 1% sucrose solution by rats in the CMS group was significantly lower than in control and CMS+RIP rats after 3 weeks of stress. In the open-field test, CMS rats had significantly lower open-field scores compared to control rats. Furthermore, the total scores given the CMS group were significantly lower than in the CMS+RIP rats. In the forced swimming test (FST), the immobility times of CMS rats were significantly longer than those of the control or CMS+RIP rats. However, no differences were observed between controls and CMS+RIP rats. Conclusions Our data show that aggressive behavior evoked by the resident intruder paradigm could relieve broad-spectrum depressive-like behaviors in isolated adult male rats subjected to CMS. PMID:24911067

  14. Sensing the intruder: a quantitative threshold for recognition cues perception in honeybees

    Science.gov (United States)

    Cappa, Federico; Bruschini, Claudia; Cipollini, Maria; Pieraccini, Giuseppe; Cervo, Rita

    2014-02-01

    The ability to discriminate among nestmates and non-nestmate is essential to defend social insect colonies from intruders. Over the years, nestmate recognition has been extensively studied in the honeybee Apis mellifera; nevertheless, the quantitative perceptual aspects at the basis of the recognition system represent an unexplored subject in this species. To test the existence of a cuticular hydrocarbons' quantitative perception threshold for nestmate recognition cues, we conducted behavioural assays by presenting different amounts of a foreign forager's chemical profile to honeybees at the entrance of their colonies. We found an increase in the explorative and aggressive responses as the amount of cues increased based on a threshold mechanism, highlighting the importance of the quantitative perceptual features for the recognition processes in A. mellifera.

  15. The resident-intruder paradigm : a standardized test for aggression, violence and social stress

    NARCIS (Netherlands)

    Koolhaas, Jacob; Coppens, Caroline M.; de Boer, Sietse F.; Buwalda, Bauke; Meerlo, Peter; Timmermans, Paul J. A.

    2013-01-01

    This video publication explains in detail the experimental protocol of the resident-intruder paradigm in rats. This test is a standardized method to measure offensive aggression and defensive behavior in a semi natural setting. The most important behavioral elements performed by the resident and the

  16. Sexual aggression by intruders in hooded crow Corvus cornix.

    Science.gov (United States)

    Zduniak, Piotr; Kosicki, Jakub Z; Yosef, Reuven

    The hooded crow Corvus cornix is a west Palaearctic, solitary nesting, monogamous corvid. In the breeding season, populations are characterized by a social organization wherein breeding pairs are territorial and non-breeding individuals, called floaters, live in flocks. During a study of the breeding ecology of the hooded crow, conducted in a protected flooded area, we monitored nests with video cameras. We recorded two separate incidents when intruders attacked a female at the nest. We believe that she remained in the nest in order to prevent the strangers cannibalizing the nestlings by mantling over the brood. The spatio-temporal occurrence of these attacks suggests that the observed behaviour is intraspecific sexual aggression wherein non-breeding males mounted an immobilized female.

  17. A study of the management of 55 traumatically intruded permanent incisor teeth in children.

    LENUS (Irish Health Repository)

    Stewart, C

    2009-01-01

    These were to examine the main presenting, treatment and outcome factors for intruded permanent incisors in children, the effect of apical development and degree of intrusion on decisions on repositioning, the effect of apical development status on the maintenance of pulp vitality and the time of pulp extirpation and to compare the decisions made to the advice given in existing clinical guidelines.

  18. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    International Nuclear Information System (INIS)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K.

    2016-01-01

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid’s thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  19. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Energy Technology Data Exchange (ETDEWEB)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K., E-mail: prodip.das@ncl.ac.uk [School of Mechanical and Systems Engineering Newcastle University Newcastle upon Tyne, NE1 7RU United Kingdom (United Kingdom)

    2016-07-12

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid’s thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  20. Mixed convection flow of nanofluid in a square enclosure with an intruded rectangular fin

    Science.gov (United States)

    Cong, Ran; Zhou, Xuanyu; De Souza Machado, Bruno; Das, Prodip K.

    2016-07-01

    Mixed convection flow in enclosures has been a subject of interest for many years due to their ever increasing applications in solar collectors, electronic cooling, lubrication technologies, food processing, and nuclear reactors. In comparison, little effort has been given to the problem of mixed convection in enclosures filled with nanofluids, while the addition of nanoparticles in a fluid base to alter specific material properties is considered a feasible solution for many heat transfer problems. Mixed convection of nanofluids is a challenging problem as the addition of nanoparticles changes the fluid's thermo-physical properties as well as due to the complex interactions among inertia, viscous, and buoyancy forces. In this study, a two-dimensional steady-state numerical model has been developed to investigate mixed convection flow of nanofluids in a square enclosure with an intruded rectangular fin and to optimize the fin geometry for maximizing the heat transfer using the Constructal design. The model has been developed using ANSYS-FLUENT for various fin geometries. Flow fields, temperature fields, and heat transfer rates are examined for different values of Rayleigh and Reynolds numbers for several geometries of the fin with the aim of maximizing the heat transfer from the fin to the surrounding flow. Outcome of this study provides important insight into the heat transfer behavior of nanofluids, which will help in developing novel geometries with enhanced and controlled heat transfer for solar collectors and electronic devices.

  1. Intruders: New Neighbors in "Dawn of the Planet of the Apes" and "The Hundred-Foot Journey"

    Science.gov (United States)

    Beck, Bernard

    2015-01-01

    Conflicts over territory are about the power to establish dominant cultures in territories and are often accompanied by cultural claims to legitimacy by each side. The cultural claims, or ideologies, are often expressed in terms of "homeland" dwellers versus "intruders." Two recent movies, "Dawn of the Planet of the…

  2. Influence of i13/2 proton and j15/2 neutron intruding orbitals on the behaviour of 190 mass region superdeformed nuclei

    International Nuclear Information System (INIS)

    Duprat, J.

    1995-01-01

    This work concerns the study of the nuclear superdeformation phenomenon in the A = 190 mass region. The superdeformed (SD) states in 193 Tl, 194 Tl 195 Tl were produced via heavy-ion induced reactions and studied with the EUROGAM gamma multidetector array. The analysis of high-multiplicity events allowed the study of the magnetic properties of the SD states in these nuclei. For the first time, the g-factor of a proton orbital in a SD nucleus in the A = 190 mass region has been extracted. This measurement indicates that the two known bands in 195 Tl-SD are built on the i 13/2 proton intruder orbital. A new SD band has been found in this isotope: it is the first SD band built on an excited proton state found in the A = 190 region. Finally an interaction between two pairs of bands has been established in 194 Tl; this interaction indicate the crossing of two neutron orbitals above the N = 112 gap. The magnetic properties of the states of the SD bands in 194 Tl reveals that these bands are built on configurations in which the single proton and neutron intrinsic spins are aligned. Comparison between different SD bands in the Thallium isotopes shows the prominent role of the i 13/2 proton and the j 15/2 neutron intruder orbitals in the smooth increase of the dynamical moment of inertia as a function of the rotational frequency. In addition, this work reports on the first observation of a SD rotational band produced in a (HI, αxn) reaction channel. The study of the maximum spin reached by the SD bands indicates both a competition between alpha emission and fission of the compound nucleus, and the limitation due to the fission process in the population of the SD nuclei in the A = 190 region. (author). 120 refs., 112 figs., 22 tabs., 2 ann

  3. Genotypic differences in intruder-evoked immediate early gene activation in male, but not female, vasopressin 1b receptor knockout mice.

    Science.gov (United States)

    Witchey, Shannah K; Stevenson, Erica L; Caldwell, Heather K

    2016-11-24

    The neuropeptide arginine vasopressin (Avp) modulates social behaviors via its two centrally expressed receptors, the Avp 1a receptor and the Avp 1b receptor (Avpr1b). Recent work suggests that, at least in mice, Avp signaling through Avpr1b within the CA2 region of the hippocampus is critical for normal aggressive behaviors and social recognition memory. However, this brain area is just one part of a larger neural circuit that is likely to be impacted in Avpr1b knockout (-/-) mice. To identify other brain areas that are affected by altered Avpr1b signaling, genotypic differences in immediate early gene activation, i.e. c-FOS and early growth response factor 1 (EGR-1), were quantified using immunocytochemistry following a single exposure to an intruder. In females, no genotypic differences in intruder-evoked c-FOS or EGR-1 immunoreactivity were observed in any of the brain areas measured. In males, while there were no intruder-evoked genotypic differences in c-FOS immunoreactivity, genotypic differences were observed in EGR-1 immunoreactivity within the ventral bed nucleus of the stria terminalis and the anterior hypothalamus; with Avpr1b -/- males having less EGR-1 immunoreactivity in these regions than controls. These data are the first to identify specific brain areas that may be a part of a neural circuit that includes Avpr1b-expressing cells in the CA2 region of the hippocampus. It is thought that this circuit, when working properly, plays a role in how an animal evaluates its social context.

  4. Human intruder dose assessment for deep geological disposal

    International Nuclear Information System (INIS)

    Smith, G. M.; Molinero, J.; Delos, A.; Valls, A.; Conesa, A.; Smith, K.; Hjerpe, T.

    2013-07-01

    For near-surface disposal, approaches to assessment of inadvertent human intrusion have been developed through international cooperation within the IAEA's ISAM programme. Other assessments have considered intrusion into deep geological disposal facilities, but comparable international cooperation to develop an approach for deep disposal has not taken place. Accordingly, the BIOPROTA collaboration project presented here (1) examined the technical aspects of why and how deep geological intrusion might occur; (2) considered how and to what degree radiation exposure would arise to the people involved in such intrusion; (3) identified the processes which constrain the uncertainties; and hence (4) developed and documented an approach for evaluation of human intruder doses which addresses the criteria adopted by the IAEA and takes account of other international guidance and human intrusion assessment experience. Models for radiation exposure of the drilling workers and geologists were developed and described together with compilation of relevant input data, taking into account relevant combinations of drilling technique, geological formation and repository material. Consideration has been given also to others who might be exposed to contaminated material left at the site after drilling work has ceased. The models have been designed to be simple and stylised, in accordance with international recommendations. The set of combinations comprises 58 different scenarios which cover a very wide range of human intrusion possibilities via deep drilling. (orig.)

  5. Central vasopressin V1a receptors modulate neural processing in mothers facing intruder threat to pups

    OpenAIRE

    Caffrey, Martha K.; Nephew, Benjamin C.; Febo, Marcelo

    2009-01-01

    Vasopressin V1a receptors in the rat brain have been studied for their role in modulating aggression and anxiety. In the current study blood-oxygen-level-dependent (BOLD) functional MRI was used to test whether V1a receptors modulate neural processing in the maternal brain when dams are exposed to a male intruder. Primiparous females were given an intracerebroventricular (ICV) injection of vehicle or V1a receptor antagonist ([deamino-Pen1, O-Me-Try, Arg8]-Vasopressin, 125 ng/10 μL) 90-120 min...

  6. New level schemes with high-spin states of 105,107,109Tc

    International Nuclear Information System (INIS)

    Luo, Y.X.; Rasmussen, J.O.; Lee, I.Y.; Fallon, P.; Hamilton, J.H.; Ramayya, A.V.; Hwang, J.K.; Gore, P.M.; Zhu, S.J.; Wu, S.C.; Ginter, T.N.; Ter-Akopian, G.M.; Daniel, A.V.; Stoyer, M.A.; Donangelo, R.; Gelberg, A.

    2004-01-01

    New level schemes of odd-Z 105,107,109 Tc are proposed based on the 252 Cf spontaneous-fission-gamma data taken with Gammasphere in 2000. Bands of levels are considerably extended and expanded to show rich spectroscopic information. Spin/parity and configuration assignments are made based on determinations of multipolarities of low-lying transitions and the level analogies to the previously reported levels, and to those of the neighboring Rh isotopes. A non-yrast negative-parity band built on the 3/2 - [301] orbital is observed for the first time in 105 Tc. A positive-parity band built on the 1/2 + [431] intruder orbital originating from the π(g 7/2 /d 5/2 ) subshells and having a strong deformation-driving effect is observed for the first time in 105 Tc, and assigned in 107 Tc. A positive-parity band built on the excited 11/2 + level, which has rather low excitation energy and predominantly decays into the 9/2 + level of the ground state band, provides evidence of triaxiality in 107,109 Tc, and probably also in 105 Tc. Rotational constants are calculated and discussed for the K=1/2 intruder bands using the Bohr-Mottelson formula. Level systematics are discussed in terms of the locations of proton Fermi levels and deformations. The band crossings of yrast positive-parity bands are observed, most likely related to h 11/2 neutron alignment. Triaxial-rotor-plus-particle model calculations performed with ε=0.32 and γ=-22.5 deg. on the prolate side of maximum triaxiality yielded the best reproduction of the excitation energies, signature splittings, and branching ratios of the positive-parity bands (except for the intruder bands) of these Tc isotopes. The significant discrepancies between the triaxial-rotor-plus-particle model calculations and experiment for the K=1/2 intruder bands in 105,107 Tc need further theoretical studies

  7. Quadrupole collectivity of angular-momentum projected states of nucleons in the high-j intruder single-particle states

    International Nuclear Information System (INIS)

    Raman, S.; Kahane, S.; Bhatt, K.H.

    1999-01-01

    Ever since the pioneering work of Elliott (Elliott J P 1958 London Series A 245 128, 562), quadrupole collectivity in deformed nuclei has been economically described in terms of SU 3 symmetry. Microscopic SU 3 symmetry is not present in the deformed intrinsic states of n nucleons in the abnormal-parity single-particle states j a . However, such (j a ) n states do possess some SU 3 -symmetry-like properties as shown in this work. (author)

  8. Evaluation of periodontal condition in intruded molars using miniscrews

    Directory of Open Access Journals (Sweden)

    Habib Ollah Ghanbari

    2015-12-01

    Full Text Available Introduction: The purpose of this preliminary study was to evaluate the periodontal condition of intruded molars in various phases of treatments. Methods: 30 patients with at least one overerupted upper first molar were selected. Upper molar bands with brackets were cemented. Two miniscrews were placed in the mesiopalatal and mesiobuccal aspect of the aforementioned teeth. A titanium molybdenum alloy (TMA spring was attached to the head of miniscrew in one end and ligated to the bracket in the other end to reach the predetermined force. Plaque index (PI, probing pocket depth (PPD, keratinized gingiva (KG, The distance between miniscrew (M.S and gingival level (GL, and bleeding on probing (BOP were recorded before loading and 1, 2, 3, 4 and 5 months post-loading .Results:  All patients completed the study and no complications were reported. Statistically significant intrusion (2.1 ± 0.9 mm was obtained during active treatment. Inserting miniscrews generally was presented with greater sulcus bleeding, plaque accumulation and plaque formation at follow-up visits. There was a statistically significant increase in PI, PPD and BOP indices. Furthermore, the results showed decrease in KG level and M.S to GL level. Conclusion: Miniscrews can provide a clinical benefit as an absolute anchorage device. However, keeping a good oral hygiene is essential to achieve ideal results, because the presence of miniscrews, as a foreign object in mouth, and intrusion force might be harmful for periodontal tissues

  9. States Stepping up Mandates for School Safety Drills

    Science.gov (United States)

    Shah, Nirvi

    2013-01-01

    Hundreds of U.S. schools will supplement fire drills and tornado training next fall with simulations of school shootings. In response to the December shootings by an intruder at Sandy Hook Elementary School in Newtown, Connecticut, several states have enacted or are considering laws that require more and new types of school safety drills, more…

  10. Flight Test Evaluation of AVOID I (Avionic Observation of Intruder Danger) Collision Avoidance System

    Science.gov (United States)

    1975-05-01

    memory registers A through G ( 2048 bit shift registers) for each of the basic altitude bands (1+26, 113 1+6) to store intruder responses. Since the 1...af EV 11z iIIV~ ~l~~ NADlC-75056-60_ _ _- 2 w< -I- LI- ~jw 0IU oo2 W I aJ W %L6fI9~~AVdI tVOV~ aN9Ao ccH % VdI I11813iA-di V GN Ed a3IV0 %AIII1IilV11W...tei mix ;;; c le z - Is’ %~~~~~~~~~~;s AJIiV1 VdI ~ %AIIV~ v~iO VIR 1ý 123 Lz NADC-7056-6 w, M w o ~2IV ONY Ed CIRNIGVNOO at p 00 CLt % 118I3iAVldSIC3

  11. A valence-universal coupled-cluster single- and double-excitations method for atoms: Pt. 3

    International Nuclear Information System (INIS)

    Jankowski, K.; Malinowski, P.

    1994-01-01

    To better understand the problems met when solving the equations of VU-CC approaches in the presence of intruder states, we are concerned with the following aspects of the solvability problem for sets of non-linear equations: the existence and properties of multiple solutions and the attainability of these solutions by means of various numerical methods. Our study is concentrated on the equations obtained for Be within the framework of the recently formulated atomically oriented form of the valence-universal coupled-cluster theory accounting for one- and two-electron excitations (VU-CCSD/R) and based on the complete model space (2s 2 , 2p 2 ). Six pairs of multiple solutions representing four 1 S states are found and discussed. Three of these solutions provide amplitudes describing the 2p 2 1 S state for which the intruder state problem has been considered as extremely serious. Several known numerical methods have been applied to solve the same set of non-linear equations for the two-valence cluster amplitudes. It is shown that these methods perform quite differently in the presence of intruder states, which seems to indicate that the intruder state problem for VU-CC methods is partly caused by the commonly used methods of solving the non-linear equations. (author)

  12. A proposed alternative approach for protection of inadvertent human intruders from buried Department of Energy low level radioactive wastes

    International Nuclear Information System (INIS)

    Cochran, J.R.

    1995-01-01

    The burial of radioactive wastes creates a legacy. To limit the impact of this legacy on future generations, we establish and comply with performance objectives. This paper reviews performance objectives for the long-term isolation of buried radioactive wastes; identifies regulatorly-defined performance objectives for protecting the inadvertent human intruder (IHI) from buried low-level radioactive waste (LLW); (3) discusses a shortcoming of the current approach; and (4) offers an alternative approach for protecting the IHI. This alternative approach is written specifically for the burial of US Department of Energy (DOE) wastes at the Nevada Test Site (NTS), although the approach might be applied at other DOE burial sites

  13. Face antispoofing based on frame difference and multilevel representation

    Science.gov (United States)

    Benlamoudi, Azeddine; Aiadi, Kamal Eddine; Ouafi, Abdelkrim; Samai, Djamel; Oussalah, Mourad

    2017-07-01

    Due to advances in technology, today's biometric systems become vulnerable to spoof attacks made by fake faces. These attacks occur when an intruder attempts to fool an established face-based recognition system by presenting a fake face (e.g., print photo or replay attacks) in front of the camera instead of the intruder's genuine face. For this purpose, face antispoofing has become a hot topic in face analysis literature, where several applications with antispoofing task have emerged recently. We propose a solution for distinguishing between real faces and fake ones. Our approach is based on extracting features from the difference between successive frames instead of individual frames. We also used a multilevel representation that divides the frame difference into multiple multiblocks. Different texture descriptors (local binary patterns, local phase quantization, and binarized statistical image features) have then been applied to each block. After the feature extraction step, a Fisher score is applied to sort the features in ascending order according to the associated weights. Finally, a support vector machine is used to differentiate between real and fake faces. We tested our approach on three publicly available databases: CASIA Face Antispoofing database, Replay-Attack database, and MSU Mobile Face Spoofing database. The proposed approach outperforms the other state-of-the-art methods in different media and quality metrics.

  14. Management of traumatically intruded permanent maxillary lateral incisor - Case report and review of literature

    Directory of Open Access Journals (Sweden)

    Deepak Sharma

    2016-01-01

    Full Text Available Primary etiologic factors of trauma in the permanent dentition are bicycle accidents, sports accidents, falls, and fights. From the standpoint of therapy, anatomy, and prognosis, five different types of luxation lesions are recognized: Concussion, subluxation, extrusive luxation, lateral luxation, and intrusive luxation. Intrusive luxation is apical displacement of tooth into the alveolar bone. The tooth is driven into the socket, compressing the periodontal ligament, and commonly causes a crushing fracture of the alveolar socket. It is considered one of the most severe luxation injuries to affect permanent teeth. Intrusion injuries are often associated with severe damage to the tooth, periodontium, and pulpal tissue. The rare occurrence of this injury, 0.3–1.9% in the permanent dentition, has resulted in limited studies to support suggested treatment regimens. Clinical treatment for intrusion is especially difficult because of the severe complications accompanying it. These complications include pulp necrosis or obliteration, inflammatory root resorption, ankylosis, replacement root resorption, and loss of marginal bone support. Hence, the aim of presenting this case report of intrusive luxation is to highlight the importance of prompt care and root canal dressing and discuss the several treatments proposed to reposition the intruded teeth.

  15. U-Pb SHRIMP data and geochemical characterization of granitoids intruded along the Coxixola shear zone, Provincia Borborema, NE Brazil

    Energy Technology Data Exchange (ETDEWEB)

    Guimaraes, Ignez de Pinho; Silva Filho, Adejardo Francisco da; Silva, Francis M.J.V. da, E-mail: ignez@ufpe.br [Universidade Federal de Pernanmbuco (UFPE), Recife, PE (Brazil). Dept. de Geologia; Armstrong, Richard [Australian National University (Australia)

    2011-07-01

    A large volume of granitic magmatism associated with large scale shear zone and metamorphism under high-T amphibolite facies conditions characterize the Brasiliano Orogeny in the Borborema Province, NE Brazil. Granitoids from two plutons and later dykes intruded along the Coxixola shear zone show distinct crystallization ages and geochemical signature. The oldest granitoids (618 ± 5 Ma), Serra de Inacio Pereira Pluton are coeval with the peak of regional metamorphism and they were probably originated by melting of a paleoproterozoic source. The granitoids from the Serra do Marinho Pluton show crystallization age of 563 ± 4 Ma and geochemical signature of post-collisional A-type granites. The later dykes have crystallization age of 526 ± 7 Ma, geochemical signature of A-type granitoids. (author)

  16. DIRECT USAGE OF MINISCREW ANCHORAGE TO INTRUDE OVERERUPTED MAXILLARY POSTERIOR TEETH BEFORE PROSTHODONTIC PREPARATION:A CASE REPORT

    Directory of Open Access Journals (Sweden)

    Yasemin Bahar Acar

    2016-01-01

    Full Text Available Overeruption of maxillary molars due loss of opposing teeth creates occlusal and functional interferences. Before reconstruction can be initiated, intrusion of overerupted molars becomes essential. This report illustrates treatment of overerupted maxillary premolar and molar via direct use of miniscrew anchorage. A 24-year old female had lost first and second left mandibular molars due to pulpal necrotizing agents, resulting with a large alveolar bone defect and overerupted maxillary premolar and molar. She had a history of unsuccessful alveolar distraction of mandibular left premolars to increase the alveolar bone height prior to implant placement. Patient was satisfied with her smile and refused comprehensive orthodontic treatment. Maxillary premolar and molar were intruded segmentally for 4mm in 8 months, using a combination of a mini-implant and partialfixed edgewise appliances. Biological responses of teeth and surrounding bony structures to intrusion appeared normal and acceptable in radiographic and clinical examination.

  17. Female song rates in response to simulated intruder are positively related to reproductive success.

    Directory of Open Access Journals (Sweden)

    Kristal E Cain

    2015-10-01

    Full Text Available Bird song is well studied in males as a sexually selected behavior. However, although song is also common among females, it is infrequently examined and poorly understood. Research suggests that song is often used as a resource defense behavior and is important in female-female competition for limited resources, e.g. mates and territories. If so, song should be positively related to fitness and related to other resource defense behaviors, but this possibility has rarely been explored. Here we examine fitness estimates in relation to spontaneous song rates and song rates in response to a simulated intruder (playback, in the superb fairy-wren (Malurus cyaneus, a cooperatively breeding songbird. We also determine how song rates relate to other territorial defense behaviors. Song rate in response to playback, but not spontaneous song rate, was positively related to nest success and the number of fledglings produced by successful females. Further, response song rate was also correlated with other territorial defense behaviors (latency to respond and flights. This evidence supports the hypothesis that female song may be used in the context of female-female competition to improve access to limited reproductive resources, and suggests that song may provide direct fitness benefits.

  18. Electromagnetic properties of low-spin states in 102,104Pd

    International Nuclear Information System (INIS)

    Luontama, M.; Julin, R.; Kantele, J.; Passoja, A.; Trzaska, W.; Baecklin, A.; Jonsson, N.G.; Westerberg, L.

    1985-12-01

    Electromagnetic transitions from low-lying 0 + , 2 + , 4 + and 3 - states in 102 , 104 Pd have been studied with (p,2n) and (p,p) reactions and with Coulomb excitation. The E2 transition probabilities from the 0 3 + state in 102 Pd (13 W.u.) and from the 0 2 + state in 104 Pd (14 W.u.) are somewhat low for two-phonon states. Generally, the E2 transition rates are reasonably well reproduced by the IBA-2 and by the boson-expansion description. The intruding 0 2 + state (tsub(1/2) = 14.3 ns) in 102 Pd is connected to the 2 2 + and 2 3 + states via strong E2 transitions: B(E2;0 2 + →2 2 + )=96+-40 W.u.; B(E2;2 3 + →0 2 + )=17+-8 W.u

  19. Intruder states in sd-shell nuclei: from 1p-1t to np-nt in Si isotopes

    International Nuclear Information System (INIS)

    Goasduff, A.

    2012-01-01

    New large-scale shell-model calculations with full 1ℎω valence space for the sd-nuclei has been used for the first time to predict lifetimes of positive and negative parity states in neutron rich Si isotopes. The predicted lifetimes (1 - 100 ps) fall in the range of the differential Doppler shift method. Using the demonstrator of the European next generation γ-ray array, AGATA, in coincidence with the large acceptance PRISMA magnetic spectrometer from LNL (Legnaro) and the differential plunger of the University of Cologne, lifetimes of excited states in 32;33 Si and 35;36 S nuclei were measured. In a second step, the nℎω structure in the stable 28 Si nucleus was also studied. 28 Si is an important nucleus in order to understand the competition between mean-field and cluster structures. It displays a wealth of structures in terms of deformation and clustering. Light heavy-ion resonant radiative capture 12 C+ 16 O has been performed at energies below the Coulomb barrier. The measure γ-spectra indicate for the first time at these energies that the strongest part of the resonance decay proceeds though intermediate states around 10 MeV. Comparisons with previous radiative capture studies above the Coulomb barrier have been performed and the results have been interpreted in terms of a favoured feeding of T=1 states in the 28 Si self-conjugate nucleus. (author)

  20. Shape Transitional Nuclei: What can we learn from the Yrare States? or Hello the Double Vacuum; Goodbye β-vibrations!

    International Nuclear Information System (INIS)

    Sharpey-Schafer, J. F.; Mullins, S. M.; Bark, R. A.; Gueorguieva, E.; Kau, J.; Komati, F.; Lawrie, J. J.; Murray, S. H. T.; Ncapayi, N. J.; Maine, P.; Minkova, A.; Vymers, P.

    2008-01-01

    The results of our measurements on the yrare states up to spin 20(ℎ/2π) in 152,154,155 Gd, using (α,xn) reactions and the AFRODITE γ-ray spectrometer, are presented. We find that in 155 Gd the decay scheme is divided into levels feeding the [505]11/2 - band, that is extruded by the prolate deformation from the h 11/2 orbital, and levels feeding the i 13/2 [651]3/2 + intruder orbital and the h 9/2 [521]3/2 - orbital. The decay scheme of 154 Gd is very complex. We find no evidence for the existence of β-vibrational levels below 1.5 MeV. We discover that the level scheme can be best understood as a set of collective states built on the ground state configuration |0 1 + > plus a 'congruent' set of collective states based on the |0 2 + > state at 681 keV. The data suggest that this second vacuum has reduced pairing. Our data do not support IBA and phonon interpretations of these transitional nuclei

  1. Shape Transitional Nuclei: What can we learn from the Yrare States? or Hello the Double Vacuum; Goodbye β-vibrations!

    Science.gov (United States)

    Sharpey-Schafer, J. F.; Mullins, S. M.; Bark, R. A.; Gueorguieva, E.; Kau, J.; Komati, F.; Lawrie, J. J.; Maine, P.; Minkova, A.; Murray, S. H. T.; Ncapayi, N. J.; Vymers, P.

    2008-05-01

    The results of our measurements on the yrare states up to spin 20ℏ in 152,154,155Gd, using (α,xn) reactions and the AFRODITE γ-ray spectrometer, are presented. We find that in 155Gd the decay scheme is divided into levels feeding the [505]11/2- band, that is extruded by the prolate deformation from the h11/2 orbital, and levels feeding the i13/2[651]3/2+ intruder orbital and the h9/2[521]3/2- orbital. The decay scheme of 154Gd is very complex. We find no evidence for the existence of β-vibrational levels below 1.5 MeV. We discover that the level scheme can be best understood as a set of collective states built on the ground state configuration |01+> plus a ``congruent'' set of collective states based on the |02+> state at 681 keV. The data suggest that this second vacuum has reduced pairing. Our data do not support IBA and phonon interpretations of these transitional nuclei.

  2. Anatomy of an intruded coal, I: Effect of contact metamorphism on whole-coal geochemistry, Springfield (No. 5) (Pennsylvanian) coal, Illinois Basin

    Energy Technology Data Exchange (ETDEWEB)

    Rimmer, Susan M. [Department of Geology, Southern Illinois University Carbondale, Carbondale, IL 62901 (United States); Yoksoulian, Lois E. [Department of Earth and Environmental Sciences, University of Kentucky, Lexington, KY 40506 (United States); Hower, James C. [Center for Applied Energy Research, University of Kentucky, 2540 Research Park Drive, Lexington, KY 40511 (United States)

    2009-08-01

    If time and heating rate are important agents in coal maturation, one might expect to see differences in chemical changes in response to maturation depending on the means of increased rank. Using a suite of samples obtained from an intruded Pennsylvanian-age coal in southern Illinois, we present whole-coal chemical data. Comparing these data to extant geochemical data for coals that have undergone normal burial maturation, we evaluated the hypothesis that if coal alteration occurs rapidly (due to intrusion) rather than gradually (burial maturation), then different relationships are seen in chemical composition (proximate and ultimate analyses) and vitrinite reflectance. The Pennsylvanian-age (Asturian [Westphalian D]) Springfield (No. 5) coal is mined at the Big Ridge Mine, near Eldorado, southern Illinois. This high volatile B bituminous coal was intruded by an ultramafic igneous intrusion during the early Permian. Alteration occurs out to {proportional_to} 1.2 x dike thickness and includes an increase in random vitrinite reflectance (R{sub m}) from levels {proportional_to} 0.7% to over 5.3%, loss of liptinites, and formation of devolatilization vacuoles and fine mosaic texture. Decreases in volatile matter (VM) and increases in fixed carbon (FC) appear to be less than would be expected for the level of reflectance seen within the alteration halo. Carbonate minerals have a major influence on proximate analyses but even following the removal of carbonates, the decrease in VM is still less than would be seen in coals of similar vitrinite reflectance that were altered by normal burial maturation. Carbonate mineralization also contributes to variability in ultimate analysis values approaching the intrusion, particularly for %C and %O. After carbonate removal, data for these coals do not appear to follow the normal burial coalification tracks when plotted on a van Krevelen diagram and on a Seyler chart. These differences suggest that a slightly different maturation

  3. A spin-adapted size-extensive state-specific multi-reference perturbation theory. I. Formal developments

    Science.gov (United States)

    Mao, Shuneng; Cheng, Lan; Liu, Wenjian; Mukherjee, Debashis

    2012-01-01

    We present in this paper a comprehensive formulation of a spin-adapted size-extensive state-specific multi-reference second-order perturbation theory (SA-SSMRPT2) as a tool for applications to molecular states of arbitrary complexity and generality. The perturbative theory emerges in the development as a result of a physically appealing quasi-linearization of a rigorously size-extensive state-specific multi-reference coupled cluster (SSMRCC) formalism [U. S. Mahapatra, B. Datta, and D. Mukherjee, J. Chem. Phys. 110, 6171 (1999), 10.1063/1.478523]. The formulation is intruder-free as long as the state-energy is energetically well-separated from the virtual functions. SA-SSMRPT2 works with a complete active space (CAS), and treats each of the model space functions on the same footing. This thus has the twin advantages of being capable of handling varying degrees of quasi-degeneracy and of ensuring size-extensivity. This strategy is attractive in terms of the applicability to bigger systems. A very desirable property of the parent SSMRCC theory is the explicit maintenance of size-extensivity under a variety of approximations of the working equations. We show how to generate both the Rayleigh-Schrödinger (RS) and the Brillouin-Wigner (BW) versions of SA-SSMRPT2. Unlike the traditional naive formulations, both the RS and the BW variants are manifestly size-extensive and both share the avoidance of intruders in the same manner as the parent SSMRCC. We discuss the various features of the RS as well as the BW version using several partitioning strategies of the hamiltonian. Unlike the other CAS based MRPTs, the SA-SSMRPT2 is intrinsically flexible in the sense that it is constructed in a manner that it can relax the coefficients of the reference function, or keep the coefficients frozen if we so desire. We delineate the issues pertaining to the spin-adaptation of the working equations of the SA-SSMRPT2, starting from SSMRCC, which would allow us to incorporate essentially

  4. Influence of i{sub 13/2} proton and j{sub 15/2} neutron intruding orbitals on the behaviour of 190 mass region superdeformed nuclei; Influence des orbitales intruses proton i{sub 13/2} et neutron j{sub 15/2} sur le comportement des noyaux superdeformes de la region de masse 190

    Energy Technology Data Exchange (ETDEWEB)

    Duprat, J

    1995-01-01

    This work concerns the study of the nuclear superdeformation phenomenon in the A = 190 mass region. The superdeformed (SD) states in {sup 193}Tl, {sup 194}Tl {sup 195}Tl were produced via heavy-ion induced reactions and studied with the EUROGAM gamma multidetector array. The analysis of high-multiplicity events allowed the study of the magnetic properties of the SD states in these nuclei. For the first time, the g-factor of a proton orbital in a SD nucleus in the A = 190 mass region has been extracted. This measurement indicates that the two known bands in {sup 195}Tl-SD are built on the i{sub 13/2} proton intruder orbital. A new SD band has been found in this isotope: it is the first SD band built on an excited proton state found in the A = 190 region. Finally an interaction between two pairs of bands has been established in {sup 194}Tl; this interaction indicate the crossing of two neutron orbitals above the N = 112 gap. The magnetic properties of the states of the SD bands in {sup 194}Tl reveals that these bands are built on configurations in which the single proton and neutron intrinsic spins are aligned. Comparison between different SD bands in the Thallium isotopes shows the prominent role of the i{sub 13/2} proton and the j{sub 15/2} neutron intruder orbitals in the smooth increase of the dynamical moment of inertia as a function of the rotational frequency. In addition, this work reports on the first observation of a SD rotational band produced in a (HI, {alpha}xn) reaction channel. The study of the maximum spin reached by the SD bands indicates both a competition between alpha emission and fission of the compound nucleus, and the limitation due to the fission process in the population of the SD nuclei in the A = 190 region. (author). 120 refs., 112 figs., 22 tabs., 2 ann.

  5. First excited states in doubly-odd 110Sb: Smooth band termination in the A ∼ 110 region

    International Nuclear Information System (INIS)

    Lane, G.J.; Fossan, D.B.; Thorslund, I.

    1996-01-01

    Excited states have been identified for the first time in 110 Sb in a comprehensive series of γ-spectroscopy experiments, including recoil-mass and neutron-field measurements. Three high-spin decoupled bands with configurations based on 2p-2h excitations across the Z = 50 shell gap, are observed to show the features of smooth band termination, the first such observation in an odd-odd nucleus. The yrast intruder band has been connected to the low spin levels and is tentatively identified up to its predicred termination at I π = (45 + ). Detailed configuration assignments are made through comparison with configuration-dependent cranked Nilsson-Strutinsky calculations; excellent agreement with experiment is obtained. The systematic occurrence of smoothly terminating bands in the neighboring isotopes is discussed

  6. Observations of high spin states in {sup 179}Au

    Energy Technology Data Exchange (ETDEWEB)

    Carpenter, M.P.; Ahmad, I.; Blumenthal, D.J. [and others

    1995-08-01

    As part of a current study on the properties of the {pi} i{sub 13/2} intruder state in the A = 175-190 region, we conducted an experiment at ATLAS to observe high spin states in {sup 179}Au utilizing the reaction {sup 144}Sm({sup 40}Ar,p4n) at beam energies of 207 MeV and 215 MeV. To aid in the identification of {sup 179}Au, and to filter out the large amount of events from fission by-products, the Fragment Mass Analyzer was utilized in conjunction with ten Compton-suppression germanium detectors. In total, 11 x 10{sup 6} {gamma}-{gamma} and 4 x 10{sup 5} {gamma}-recoil events were collected. By comparing {gamma}-rays in coincidence with an A = 179 recoil mass gate and {gamma}-rays in coincidence with Au K{alpha} and K{beta} X-rays, ten {gamma}-rays were identified as belonging to {sup 179}Au. Based on {gamma}-ray coincidence relationships and on comparisons with neighboring odd-A Au nuclei, we constructed a tentative level scheme and assigned a rotational-like sequence to the {pi} i{sub 13/2} proton configuration.

  7. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    Science.gov (United States)

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  8. Using state-of-the-art technology to evaluate saltwater intrusion in the Biscayne aquifer of Miami-Dade County, Florida

    Science.gov (United States)

    Prinos, Scott T.

    2014-01-01

    The fresh groundwater supplies of many communities have been adversely affected or limited by saltwater intrusion. An insufficient understanding of the origin of intruded saltwater may lead to inefficient or ineffective water-resource management. A 2008–2012 cooperative U.S. Geological Survey (USGS) and Miami-Dade County study of saltwater intrusion describes state-of-the art technology used to evaluate the origin and distribution of this saltwater.

  9. Discovery of the shape coexisting 0+ state in 32Mg

    International Nuclear Information System (INIS)

    Wimmer, Kathrin

    2010-01-01

    The evolution of shell structure in exotic nuclei as a function of proton (Z) and neutron (N) number is currently at the center of many theoretical and experimental investigations. It has been realized that the interaction of the last valence protons and neutrons, in particular the monopole component of the residual interaction between those nucleons, can lead to significant shifts in the single-particle energies, leading to the collapse of classic shell closures and the appearance of new shell gaps. The ''Island of Inversion'' around 32 Mg, which is one of the most studied phenomena in the nuclear chart, is a well known example for such changes in nuclear structure. In this region of neutron-rich nuclei around the magic number N=20 strongly deformed ground states in Ne, Na, and Mg isotopes have been observed. Due to the reduction of the N=20 shell gap quadrupole correlations can enable low-lying deformed 2p-2h intruder states from the fp-shell to compete with spherical normal neutron 0p-0h states of the sd-shell. In this situation the promotion of a neutron pair across the N=20 gap can result in deformed intruder ground states. Consequentially the two competing configurations can lead to the coexistence of spherical and deformed 0 + states in the neutron rich nuclei 30,32 Mg. In this work the shape coexistence in 32 Mg was studied by a two neutron transfer reaction at the REX-ISOLDE facility (CERN). The two neutron transfer reaction with a 30 Mg beam involved for the first time the use of a radioactive tritium target in combination with a radioactive heavy ion beam. Light charged particles emitted from the target were detected and identified by the T-REX particle detector while γ-rays were detected by the MINIBALL Germanium detector array. The shape of the angular distribution of the protons allows to unambiguously determine the angular momentum transfer ΔL of the reaction and thus to identify the 0 + states. The analysis of excitation energies and angular

  10. The state of the art of predicting noise-induced sleep disturbance in field settings

    OpenAIRE

    Sanford Fidell; Barbara Tabachnick; Karl S Pearsons

    2010-01-01

    Several relationships between intruding noises (largely aircraft) and sleep disturbance have been inferred from the findings of a handful of field studies. Comparisons of sleep disturbance rates predicted by the various relationships are complicated by inconsistent data collection methods and definitions of predictor variables and predicted quantities. None of the relationships is grounded in theory-based understanding, and some depend on questionable statistical assumptions and analysis proc...

  11. State-based versus reward-based motivation in younger and older adults.

    Science.gov (United States)

    Worthy, Darrell A; Cooper, Jessica A; Byrne, Kaileigh A; Gorlick, Marissa A; Maddox, W Todd

    2014-12-01

    Recent decision-making work has focused on a distinction between a habitual, model-free neural system that is motivated toward actions that lead directly to reward and a more computationally demanding goal-directed, model-based system that is motivated toward actions that improve one's future state. In this article, we examine how aging affects motivation toward reward-based versus state-based decision making. Participants performed tasks in which one type of option provided larger immediate rewards but the alternative type of option led to larger rewards on future trials, or improvements in state. We predicted that older adults would show a reduced preference for choices that led to improvements in state and a greater preference for choices that maximized immediate reward. We also predicted that fits from a hybrid reinforcement-learning model would indicate greater model-based strategy use in younger than in older adults. In line with these predictions, older adults selected the options that maximized reward more often than did younger adults in three of the four tasks, and modeling results suggested reduced model-based strategy use. In the task where older adults showed similar behavior to younger adults, our model-fitting results suggested that this was due to the utilization of a win-stay-lose-shift heuristic rather than a more complex model-based strategy. Additionally, within older adults, we found that model-based strategy use was positively correlated with memory measures from our neuropsychological test battery. We suggest that this shift from state-based to reward-based motivation may be due to age related declines in the neural structures needed for more computationally demanding model-based decision making.

  12. Ultrapotassic rocks geology from Salgueiro region, Pernambuco state, Brazil

    International Nuclear Information System (INIS)

    Silva Filho, A.F. da; Guimaraes, I.P.

    1990-01-01

    The Cachoeirinha-Salgueiro belt has Proterozoic age and is located in the Borborema Province, NE Brazil. The ultrapotassic rocks from Salgueiro region intrudes the Cachoeirinha-Salgueiro belt rocks. The ultrapotassics from Salgueiro region constitutes of three units; Serra do Livramento pluton, and two dyke swarms called respectively beige alkali feldspar granites and green alkali feldspar syenite/quartz-syenite. The Serra do Livramento pluton shows E-W direction, boudin shape, width between 0,15 and 2,10 km, and it is intruded into metamorphic rocks and into the Terra Nova complex. Detailed geological mapping at the Serra das Duas Irmas allowed us to establish the dyke swarm chronology. The mapping reveals seven intrusion episodes, into the Terra Nova pluton, of green alkali feldspar syenite/quartz-syenite and five episodes of bege alkali feldspar granite. They alternate between them in space and time, and there are evidence that they were intruded under the tectonic control of the Pernambuco lineament. A systematic whole-rock Rb-Sr geochronology was done in the green alkali feldspar syenite/quartz-syenite, and an age of 514,8 ± 20,3 Ma was obtained. The initial ratio is 0,710615 + 0,000441. The age obtained shows small error and an initial ratio compatible with a strong crustal contamination. (author)

  13. Discovery of the shape coexisting 0{sup +} state in {sup 32}Mg

    Energy Technology Data Exchange (ETDEWEB)

    Wimmer, Kathrin

    2010-08-16

    The evolution of shell structure in exotic nuclei as a function of proton (Z) and neutron (N) number is currently at the center of many theoretical and experimental investigations. It has been realized that the interaction of the last valence protons and neutrons, in particular the monopole component of the residual interaction between those nucleons, can lead to significant shifts in the single-particle energies, leading to the collapse of classic shell closures and the appearance of new shell gaps. The ''Island of Inversion'' around {sup 32}Mg, which is one of the most studied phenomena in the nuclear chart, is a well known example for such changes in nuclear structure. In this region of neutron-rich nuclei around the magic number N=20 strongly deformed ground states in Ne, Na, and Mg isotopes have been observed. Due to the reduction of the N=20 shell gap quadrupole correlations can enable low-lying deformed 2p-2h intruder states from the fp-shell to compete with spherical normal neutron 0p-0h states of the sd-shell. In this situation the promotion of a neutron pair across the N=20 gap can result in deformed intruder ground states. Consequentially the two competing configurations can lead to the coexistence of spherical and deformed 0{sup +} states in the neutron rich nuclei {sup 30,32}Mg. In this work the shape coexistence in {sup 32}Mg was studied by a two neutron transfer reaction at the REX-ISOLDE facility (CERN). The two neutron transfer reaction with a {sup 30}Mg beam involved for the first time the use of a radioactive tritium target in combination with a radioactive heavy ion beam. Light charged particles emitted from the target were detected and identified by the T-REX particle detector while {gamma}-rays were detected by the MINIBALL Germanium detector array. The shape of the angular distribution of the protons allows to unambiguously determine the angular momentum transfer {delta}L of the reaction and thus to identify the 0{sup

  14. Fiber-optic perimeter security system based on WDM technology

    Science.gov (United States)

    Polyakov, Alexandre V.

    2017-10-01

    Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.

  15. Intruder dose pathway analysis for the onsite disposal of radioactive wastes: the ONSITE/MAXI1 computer program. Supplement No. 1

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Peloquin, R.A.; Napier, B.A.; Neuder, S.M.

    1986-05-01

    The document entitled Intruder Dose Pathway Analysis of the Onsite Disposal of Radioactive Wastes: The ONSITE/MAXI1 Computer Program (1984) summarizes initial efforts to develop human-intrustion scenarios and a modified version of the MAXI computer program for potential use by the NRC in reviewing applications for onsite radioactive waste disposal. This document is a supplement to that document and summarizes efforts to further modify and improve the ONSITE/MAXI1 software package. To facilitate cross-referencing, it follows the same format. Notable improvements to the software package include the capability to account for shielding conditions that represent noncompacted trash wastes and the option to indicate alternative land-use condition;s. This supplement contains a description of the implementation of these modifications. In addition, a series of discussions are included in an attempt to increase the user's understanding of the scenarios and dose calculation methods. These discussions respond to frequently asked questions about the mathematical models and use of the software. Computer listings of the ONSITE/MAXI1 computer program are included as Appendices A and B of this document. Appendix C lists external exposure dose-rate factor libraries

  16. A Turn-Projected State-Based Conflict Resolution Algorithm

    Science.gov (United States)

    Butler, Ricky W.; Lewis, Timothy A.

    2013-01-01

    State-based conflict detection and resolution (CD&R) algorithms detect conflicts and resolve them on the basis on current state information without the use of additional intent information from aircraft flight plans. Therefore, the prediction of the trajectory of aircraft is based solely upon the position and velocity vectors of the traffic aircraft. Most CD&R algorithms project the traffic state using only the current state vectors. However, the past state vectors can be used to make a better prediction of the future trajectory of the traffic aircraft. This paper explores the idea of using past state vectors to detect traffic turns and resolve conflicts caused by these turns using a non-linear projection of the traffic state. A new algorithm based on this idea is presented and validated using a fast-time simulator developed for this study.

  17. The National Counterintelligence Strategy of the United States of America

    National Research Council Canada - National Science Library

    McConnell, J. M

    2007-01-01

    .... Our adversaries -- foreign intelligence services, terrorists, foreign criminal enterprises and cyber intruders -- use overt, covert, and clandestine activities to exploit and undermine US national security interests...

  18. Proposed Network Intrusion Detection System ‎In Cloud Environment Based on Back ‎Propagation Neural Network

    Directory of Open Access Journals (Sweden)

    Shawq Malik Mehibs

    2017-12-01

    Full Text Available Cloud computing is distributed architecture, providing computing facilities and storage resource as a service over the internet. This low-cost service fulfills the basic requirements of users. Because of the open nature and services introduced by cloud computing intruders impersonate legitimate users and misuse cloud resource and services. To detect intruders and suspicious activities in and around the cloud computing environment, intrusion detection system used to discover the illegitimate users and suspicious action by monitors different user activities on the network .this work proposed based back propagation artificial neural network to construct t network intrusion detection in the cloud environment. The proposed module evaluated with kdd99 dataset the experimental results shows promising approach to detect attack with high detection rate and low false alarm rate

  19. Agents Based e-Commerce and Securing Exchanged Information

    Science.gov (United States)

    Al-Jaljouli, Raja; Abawajy, Jemal

    Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.

  20. DISORDERS OF ACID-BASE STATE

    OpenAIRE

    P. F. Litvitskiy

    2011-01-01

    The lecture describes modern data on disorders of acid-base state (ABS): their types, etiology, key stages of pathogenesis, main symptoms, and principles of treatment. The first part of the lecture in present journal characterizes main conception, parameters of ABS in normal state, buffer systems, common mechanisms of BS shifts elimination, etiology and pathogenesis of gas-induced (respiratory) disorders of ABS. The second part of the lecture in following journal will describe not gas-induced...

  1. Parallel Representation of Value-Based and Finite State-Based Strategies in the Ventral and Dorsal Striatum.

    Directory of Open Access Journals (Sweden)

    Makoto Ito

    2015-11-01

    Full Text Available Previous theoretical studies of animal and human behavioral learning have focused on the dichotomy of the value-based strategy using action value functions to predict rewards and the model-based strategy using internal models to predict environmental states. However, animals and humans often take simple procedural behaviors, such as the "win-stay, lose-switch" strategy without explicit prediction of rewards or states. Here we consider another strategy, the finite state-based strategy, in which a subject selects an action depending on its discrete internal state and updates the state depending on the action chosen and the reward outcome. By analyzing choice behavior of rats in a free-choice task, we found that the finite state-based strategy fitted their behavioral choices more accurately than value-based and model-based strategies did. When fitted models were run autonomously with the same task, only the finite state-based strategy could reproduce the key feature of choice sequences. Analyses of neural activity recorded from the dorsolateral striatum (DLS, the dorsomedial striatum (DMS, and the ventral striatum (VS identified significant fractions of neurons in all three subareas for which activities were correlated with individual states of the finite state-based strategy. The signal of internal states at the time of choice was found in DMS, and for clusters of states was found in VS. In addition, action values and state values of the value-based strategy were encoded in DMS and VS, respectively. These results suggest that both the value-based strategy and the finite state-based strategy are implemented in the striatum.

  2. Parallel Representation of Value-Based and Finite State-Based Strategies in the Ventral and Dorsal Striatum.

    Science.gov (United States)

    Ito, Makoto; Doya, Kenji

    2015-11-01

    Previous theoretical studies of animal and human behavioral learning have focused on the dichotomy of the value-based strategy using action value functions to predict rewards and the model-based strategy using internal models to predict environmental states. However, animals and humans often take simple procedural behaviors, such as the "win-stay, lose-switch" strategy without explicit prediction of rewards or states. Here we consider another strategy, the finite state-based strategy, in which a subject selects an action depending on its discrete internal state and updates the state depending on the action chosen and the reward outcome. By analyzing choice behavior of rats in a free-choice task, we found that the finite state-based strategy fitted their behavioral choices more accurately than value-based and model-based strategies did. When fitted models were run autonomously with the same task, only the finite state-based strategy could reproduce the key feature of choice sequences. Analyses of neural activity recorded from the dorsolateral striatum (DLS), the dorsomedial striatum (DMS), and the ventral striatum (VS) identified significant fractions of neurons in all three subareas for which activities were correlated with individual states of the finite state-based strategy. The signal of internal states at the time of choice was found in DMS, and for clusters of states was found in VS. In addition, action values and state values of the value-based strategy were encoded in DMS and VS, respectively. These results suggest that both the value-based strategy and the finite state-based strategy are implemented in the striatum.

  3. Shape coexistence in the "island of inversion": Search for the $0^{+}_{2}$ state in $^{32}$Mg applying a two-neutron transfer reaction

    CERN Multimedia

    Blazhev, A A; Nardelli, S; Kruecken, R; Voulot, D; Hadinia, B; Kalkuehler, M; Clement, E; Habs, D; Diriken, J V J; Wady, P T; Angus, L J

    2008-01-01

    We aim to study the structure of neutron-rich nuclei in the "island of inversion" where intruder $\\textit{fp}$-orbitals favouring deformed states compete with the normal spherical $\\textit{sd}$-orbitals. In particular, we search for the spherical 0$^{+}_{2}$ state in $^{32}$Mg which should coexist with the deformed ground state but has not been observed so far. We propose to populate this state by a (t,p) two-neutron transfer reaction with a $^{30}$Mg beam at around 2 MeV/u from REX-ISOLDE impinging on a tritium-loaded Ti target. The $\\gamma$-rays are detected by MINIBALL and the particles by our new set-up of segmented Si detectors. The results will shed new light on the breaking of the shell closure at $\\textit{N}$ = 20 in this region.

  4. Low-lying intruder state of the unbound nucleus {sup 13}Be

    Energy Technology Data Exchange (ETDEWEB)

    Kondo, Y., E-mail: kondo@phys.titech.ac.j [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Nakamura, T.; Satou, Y. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Matsumoto, T.; Aoi, N. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Endo, N. [Department of Physics, Tohoku University, 2-1-1 Katahira, Aoba, Sendai, Miyagi 980-8577 (Japan); Fukuda, N.; Gomi, T. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Hashimoto, Y. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Ishihara, M. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Kawai, S. [Department of Physics, Rikkyo University, 3-34-1 Nishi-Ikebukuro, Toshima, Tokyo 171-8501 (Japan); Kitayama, M.; Kobayashi, T.; Matsuda, Y. [Department of Physics, Tohoku University, 2-1-1 Katahira, Aoba, Sendai, Miyagi 980-8577 (Japan); Matsui, N. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Motobayashi, T. [RIKEN Nishina Center, 2-1 Hirosawa, Wako, Saitama 351-0198 (Japan); Nakabayashi, T.; Okumura, T. [Department of Physics, Tokyo Institute of Technology, 2-12-1 Oh-Okayama, Meguro, Tokyo 152-8551 (Japan); Ong, H.J.; Onishi, T.K. [Department of Physics, University of Tokyo, 7-3-1 Hongo, Bunkyo, Tokyo 113-0033 (Japan)

    2010-06-21

    An experimental study for the unbound nucleus {sup 13}Be has been performed by means of the invariant mass method via the one-neutron removal reaction {sup 1}H({sup 14}Be,{sup 12}Be+n). A resonance has been observed at 0.51(1) MeV in the relative energy (E{sub rel}) spectrum of the {sup 12}Be+n system. The transverse momentum distribution of the {sup 12}Be+n system as well as the resonance width of 0.45(3) MeV gives evidence for the p-wave nature of the resonance. A d-wave resonance has also been observed at 2.39(5) MeV in the E{sub rel} spectrum. The observation of the low-lying p-wave resonance indicates the disappearance of the N=8 magicity in the vicinity of the neutron drip line region.

  5. Artificial emotional model based on finite state machine

    Institute of Scientific and Technical Information of China (English)

    MENG Qing-mei; WU Wei-guo

    2008-01-01

    According to the basic emotional theory, the artificial emotional model based on the finite state machine(FSM) was presented. In finite state machine model of emotion, the emotional space included the basic emotional space and the multiple emotional spaces. The emotion-switching diagram was defined and transition function was developed using Markov chain and linear interpolation algorithm. The simulation model was built using Stateflow toolbox and Simulink toolbox based on the Matlab platform.And the model included three subsystems: the input one, the emotion one and the behavior one. In the emotional subsystem, the responses of different personalities to the external stimuli were described by defining personal space. This model takes states from an emotional space and updates its state depending on its current state and a state of its input (also a state-emotion). The simulation model realizes the process of switching the emotion from the neutral state to other basic emotions. The simulation result is proved to correspond to emotion-switching law of human beings.

  6. DISORDERS OF ACID-BASE STATE

    Directory of Open Access Journals (Sweden)

    P. F. Litvitskiy

    2011-01-01

    Full Text Available The lecture describes modern data on disorders of acid-base state (ABS: their types, etiology, key stages of pathogenesis, main symptoms, and principles of treatment. The first part of the lecture in present journal characterizes main conception, parameters of ABS in normal state, buffer systems, common mechanisms of BS shifts elimination, etiology and pathogenesis of gas-induced (respiratory disorders of ABS. The second part of the lecture in following journal will describe not gas-induced (metabolic, excretory and exogenous disorders of ABS and principles of their treatment.

  7. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  8. State-Based Curriculum-Making, Part 2, the Tool-Kit for the State's Curriculum-Making

    Science.gov (United States)

    Westbury, Ian; Sivesind, Kirsten

    2016-01-01

    The paper identifies three tools that support the administrative instrument of a state-based curriculum commission: compartmentalization, licensing, and segmentation. These tools channel the state's curriculum-making towards forms of symbolic rather than regulatory action. The state curriculum becomes a framework for the ideological governance of…

  9. A consumption-based GHG inventory for the U.S. state of Oregon.

    Science.gov (United States)

    Erickson, Peter; Allaway, David; Lazarus, Michael; Stanton, Elizabeth A

    2012-04-03

    Many U.S. states conduct greenhouse gas (GHG) inventories to inform their climate change planning efforts. These inventories usually follow a production-based method adapted from the Intergovernmental Panel on Climate Change. States could also take a consumption-based perspective, however, and estimate all emissions released to support consumption in their state, regardless of where the emissions occur. In what may be the first such comprehensive inventory conducted for a U.S. state, we find that consumption-based emissions for Oregon are 47% higher than those released in-state. This finding implies that Oregon's contribution to global greenhouse gas emissions (carbon footprint) is considerably higher than traditional production-based methods would suggest. Furthermore, the consumption-based inventory helps highlight the role of goods and services (and associated purchasing behaviors) more so than do production-based methods. Accordingly, a consumption-based perspective opens new opportunities for many states and their local government partners to reduce GHG emissions, such as initiatives to advance lower-carbon public sector or household consumption, that are well within their sphere of influence. State and local governments should consider conducting consumption-based GHG inventories and adopting consumption-based emission reductions targets in order to broaden the reach and effectiveness of state and local actions in reducing global GHG emissions. Consumption-based frameworks should be viewed as a complement to, but not a substitute for, production-based (in-state) GHG emissions inventories and targets.

  10. Teleportation-based Toffoli gate on cluster states via the Bell state analysis

    International Nuclear Information System (INIS)

    Guo Ying; Huang Dazu; Lee, Moon Ho

    2013-01-01

    An optical Toffoli gate is demonstrated via teleportations on the six-qubit entangling cluster state generated from single-qubit photons. It is implemented on the basis of entanglement swapping of the combined quantum system with three independent Bell state measurements. The output of this gate is then restored by suitable local operations and classical communications. We evaluate the implementing performance of the Toffoli gate fidelity for the operation process in different computational bases. (paper)

  11. The state and nuclear power - conflict and control in the Western world

    International Nuclear Information System (INIS)

    Camilleri, J.A.

    1984-01-01

    A contribution to the debate on nuclear power, this book provides a comprehensive and systematic analysis of the political, ideological and economic dimensions of the conflict. It offers the first political study of the nuclear fuel cycle in the light of the complex and often contradictory functions the advanced capitalist state is called upon to perform. Since the late 1960s, the nuclear power controversy has intruded with increasing frequency and intensity into the political process of most Western countries, and had a greater polarising effect on the body politic than almost any other technological dispute this century. This book concentrates on three main areas of investigation - political management, social legitimation and international regulation. The scope and limitations of state intervention in all three areas are examined and it is concluded that such intervention is often less than effective. In order to achieve greater coherence and insight, the study concentrates on six countries: the United Kingdom, the United States, France, West Germany, Sweden and Brazil. It relates theory to empirical research and provides an international and comparative perspective on the crisis of economic and political management confronting modern capitalism. (author)

  12. Improving Protection Agains Intruders Using Passive Sonar

    NARCIS (Netherlands)

    Fillinger, L.; Hunter, A.J.; Zampolli, M.; Clarijs, M.C.; Verolme, J.L.

    2011-01-01

    Divers and small vessels are increasingly recognized as a potential threat to high value assets. Harbour and waterside surveillance systems that are used to counter the threat of divers are usually based on active sonar, whose performance can be limited by reverberation in a harbour environment.

  13. Quantum secret sharing based on Smolin states alone

    International Nuclear Information System (INIS)

    He Guangping; Wang, Z D; Bai, Yankui

    2008-01-01

    It was indicated (Yu 2007 Phys. Rev. A 75 066301) that a previously proposed quantum secret sharing (QSS) protocol based on Smolin states (Augusiak 2006 Phys. Rev. A 73 012318) is insecure against an internal cheater. Here we build a different QSS protocol with Smolin states alone, and prove it to be secure against known cheating strategies. Thus we open a promising venue for building secure QSS using merely Smolin states, which is a typical kind of bound entangled states. We also propose a feasible scheme to implement the protocol experimentally

  14. [Simultaneous intrusion and retraction of the anterior teeth using a three-piece base arch].

    Science.gov (United States)

    Liu, D; Bai, D; Wang, C; Sun, W; Guo, J; Xi, R

    2000-06-01

    To evaluate the effects of the three-piece base arch on overbite correction of Class II malocclusion. 20 patients with high angle, flared incisors were treated using a three-piece base arch appliance. The intrusion force of four upper incisors was adjusted to approximately 50 g. The line of force action was 2 mm distally to the resistant center(RC) and the retraction force was 20 g, the right and left posterior segments were joined by a palatal bar. Cephalograms were taken before treatment (T1) and six months after treatment (T2). The upper molars moved mesially 0.60 +/- 0.35 mm and the distance of the vertical extrusion was 0.80 +/- 0.52 mm. The distances of the upper central incisor retraction and intrusion were -4.20 +/- 2.12 mm and 3.10 +/- 0.54 mm respectively. The RC of the central incisor retracted -4.12 +/- 1.96 mm and intruded 3.20 +/- 0.66 mm. The axial inclination of the upper incisor-palatal plane changed from 123.21 degrees +/- 4.26 degrees to 116.00 degrees +/- 3.96 degrees. The three-piece segmented approach can effectively intrude and retract the upper anterior teeth for flared incisors and deep overbite.

  15. Representations of coherent states in non-orthogonal bases

    International Nuclear Information System (INIS)

    Ali, S Twareque; Roknizadeh, R; Tavassoly, M K

    2004-01-01

    Starting with the canonical coherent states, we demonstrate that all the so-called nonlinear coherent states, used in the physical literature, as well as large classes of other generalized coherent states, can be obtained by changes of bases in the underlying Hilbert space. This observation leads to an interesting duality between pairs of generalized coherent states, bringing into play a Gelfand triple of (rigged) Hilbert spaces. Moreover, it is shown that in each dual pair of families of nonlinear coherent states, at least one family is related to a (generally) non-unitary projective representation of the Weyl-Heisenberg group, which can then be thought of as characterizing the dual pair

  16. State space modeling of Memristor-based Wien oscillator

    KAUST Repository

    Talukdar, Abdul Hafiz Ibne; Radwan, Ahmed G.; Salama, Khaled N.

    2011-01-01

    State space modeling of Memristor based Wien 'A' oscillator has been demonstrated for the first time considering nonlinear ion drift in Memristor. Time dependant oscillating resistance of Memristor is reported in both state space solution and SPICE simulation which plausibly provide the basis of realizing parametric oscillation by Memristor based Wien oscillator. In addition to this part Memristor is shown to stabilize the final oscillation amplitude by means of its nonlinear dynamic resistance which hints for eliminating diode in the feedback network of conventional Wien oscillator. © 2011 IEEE.

  17. State space modeling of Memristor-based Wien oscillator

    KAUST Repository

    Talukdar, Abdul Hafiz Ibne

    2011-12-01

    State space modeling of Memristor based Wien \\'A\\' oscillator has been demonstrated for the first time considering nonlinear ion drift in Memristor. Time dependant oscillating resistance of Memristor is reported in both state space solution and SPICE simulation which plausibly provide the basis of realizing parametric oscillation by Memristor based Wien oscillator. In addition to this part Memristor is shown to stabilize the final oscillation amplitude by means of its nonlinear dynamic resistance which hints for eliminating diode in the feedback network of conventional Wien oscillator. © 2011 IEEE.

  18. Notes from the laboratories of democracy: state government enactments of market- and state-based health insurance reforms in the 1990s.

    Science.gov (United States)

    Barrilleaux, Charles; Brace, Paul

    2007-08-01

    We identify two policy strategies that state governments pursue to reduce uninsurance, and we classify policies as being either state based or market based. The two policy strategies are distinguished by whether states rely on the institutional capabilities of the state or market processes to provide insurance. We develop and test models to explain states' adoptions of each type of policy. Using Poisson regression, we evaluate hypotheses suggested by the two strategies with data from U.S. states in the 1990s. The results indicate that institutionally more-capable state governments with strong liberal-party presence in the legislature adopt more state-based policies and fewer market-based policies. By contrast, the model of market-based, business-targeted reforms reveals that government capability plays a smaller role. Instead, these policies are driven by economic affluence, political competition, higher incomes, greater uninsurance, and more previous attempts to address the uninsurance problem. These findings reveal distinct institutional, partisan, electoral and demographic influences that shape state-based and market-based strategies. First, policy choices can be driven by the presence or absence of state capability. The domain of feasible policy choices open to states with institutional capability may be decidedly different than that available to states with fewer institutional resources. Second, while market-based policy approaches may be the most feasible politically, they may be the least successful in remedying practical uninsurance issues. These results thus reveal that institutional characteristics of states create an important foundation for policy choice and policy success or failure. These results would suggest that the national government's strategy of pursuing market-based solutions to the problem will not result in its being solved.

  19. Simplifying decision making: a practical framework

    OpenAIRE

    Chaudhry, Muhammad Shirjeel Riaz; Sidek, Mohmad Safhree

    2014-01-01

    Approved for public release; distribution is unlimited This thesis proposes a decision-making model based on PESTEL (Political, Economic, Social, Technological, Environmental, and Legal) analysis, AHP (Analytical Hierarchical Process), and game theory. The case study used to demonstrate the concept is a 2013 Malaysian crisis wherein foreign intruders occupied a village in Sabah state. The Malaysian government, ultimately, launched a military operation to clear the area. The focus of our st...

  20. State-based Communication on Time-predictable Multicore Processors

    DEFF Research Database (Denmark)

    Sørensen, Rasmus Bo; Schoeberl, Martin; Sparsø, Jens

    2016-01-01

    Some real-time systems use a form of task-to-task communication called state-based or sample-based communication that does not impose any flow control among the communicating tasks. The concept is similar to a shared variable, where a reader may read the same value multiple times or may not read...... a given value at all. This paper explores time-predictable implementations of state-based communication in network-on-chip based multicore platforms through five algorithms. With the presented analysis of the implemented algorithms, the communicating tasks of one core can be scheduled independently...... of tasks on other cores. Assuming a specific time-predictable multicore processor, we evaluate how the read and write primitives of the five algorithms contribute to the worst-case execution time of the communicating tasks. Each of the five algorithms has specific capabilities that make them suitable...

  1. Probing intruder configurations in $^{186, 188}$Pb using Coulomb excitation

    CERN Multimedia

    Columb excitation measurements to study the shape coexistence, mixing and quadrupole collectivity of the low-lying levels in neutron-deficient $^{188}$Pb nuclei are proposed with a view to extending similar studies to the $^{186}$Pb midshell nucleus. The HIE-ISOLDE beam of $^{186,188}$Pb nuclei will be delivered to MINIBALL+SPEDE set-up for simultaneous in-beam $\\gamma$-ray and conversion electron spectroscopy. The proposed experiment will allow the sign of the quadrupole deformation parameter to be extracted for the two lowest 2$^{+}$ states in $^{188}$Pb. Moreover, the advent of SPEDE will allow probing of the bandhead 0$^{+}$ states via direct measurements of E0 transitions. Beam development is requested to provide pure and instense $^{186}$Pb beam.

  2. Teleportation of an arbitrary two-qudit state based on the non-maximally four-qudit cluster state

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Two different schemes are presented for quantum teleportation of an arbitrary two-qudit state using a non-maximally four-qudit cluster state as the quantum channel. The first scheme is based on the Bell-basis measurements and the re-ceiver may probabilistically reconstruct the original state by performing proper transformation on her particles and an auxiliary two-level particle; the second scheme is based on the generalized Bell-basis measurements and the probability of successfully teleporting the unknown state depends on those measurements which are adjusted by Alice. A comparison of the two schemes shows that the latter has a smaller probability than that of the former and contrary to the former, the channel information and auxiliary qubit are not necessary for the receiver in the latter.

  3. Contamination of mantle magmas by crustal contributions: evidence from the brasiliano mobile belt in the State of Espirito Santo, Brazil

    International Nuclear Information System (INIS)

    Wiedemann, Cristina M.; mendes, Julio C.; Ludka, Isabel P.

    1995-01-01

    In the beginning of the late orogenic phase of the Pan african/Brasiliano Mobile Belt, in Espirito Santo and Rio de Janeiro States, along the Brazilian coast, tholeiitic gabbros intruded the coast Small bodies of clinopyroxene -gabbro-norites, hornblendi-gabbros and clinoorthopyroxenes -pyroxenites/hornblendites typical tholeiitic AFM-trends. The series of rocks reveal evidence of crustal contamination, but no signs of in situ mixing with granitic melts. The geochemical characteristics of the tholeiitic series and suites of magmatites,- present in the different evolutionary stages of the post-collisional magmatic arc, in the Brasiliano Coastal Mobile belt, in the States of Espirito Santo and Rio de Janeiro-, are regarded as an important tool for the recognition of a further contamination process of an already enriched mantle, at crustal levels, during Late Proterozoic/Early Paleozoic times. 33 refs., 11 figs., 2 tabs

  4. An Energy-Based State Observer for Dynamical Subsystems with Inaccessible State Variables

    NARCIS (Netherlands)

    Khalil, I.S.M.; Sabanovic, Asif; Misra, Sarthak

    2012-01-01

    This work presents an energy-based state estimation formalism for a class of dynamical systems with inaccessible/unknown outputs, and systems at which sensor utilization is impractical, or when measurements can not be taken. The power-conserving physical interconnections among most of the dynamical

  5. Transportation legislative data base: State radioactive materials transportation statute compilation, 1989--1993

    International Nuclear Information System (INIS)

    1994-04-01

    The Transportation Legislative Data Base (TLDB) is a computer-based information service containing summaries of federal, state and certain local government statutes and regulations relating to the transportation of radioactive materials in the United States. The TLDB has been operated by the National Conference of State Legislatures (NCSL) under cooperative agreement with the US Department of Energy's (DOE) Office of Civilian Radioactive Waste Management since 1992. The data base system serves the legislative and regulatory information needs of federal, state, tribal and local governments, the affected private sector and interested members of the general public. Users must be approved by DOE and NCSL. This report is a state statute compilation that updates the 1989 compilation produced by Battelle Memorial Institute, the previous manager of the data base. This compilation includes statutes not included in the prior compilation, as well as newly enacted laws. Statutes not included in the prior compilation show an enactment date prior to 1989. Statutes that deal with low-level radioactive waste transportation are included in the data base as are statutes from the states of Alaska and Hawaii. Over 155 new entries to the data base are summarized in this compilation

  6. Effect of Insecurity of School Environment on the Academic Performance of Secondary School Students in Imo State

    Directory of Open Access Journals (Sweden)

    Ojukwu M.O.

    2017-01-01

    Full Text Available The major aim of this study was to investigate the effect of insecurity of school environment on the academic performance of secondary school students in Imo state, Nigeria. A total of 1000 made up of 500 each of male and female students responded to a self-structured validated questionnaire designed for the study. Two research questions and two hypotheses were formulated to guide the study. Means and standard deviations were calculated to answer the research questions and independent samples t-tests were used for testing the hypotheses. Major findings revealed that insecurity of school environment significantly affects the academic performance of secondary school students while students’ gangsterism, smoking of Indian hemp, abusing other hard drugs, cult and related violent activities were some of the factors that constituted insecurity of the school environment which eventually cause boys to leave school and join trading while leading girls to drop out and settle for marriage. Based on the findings, it was recommended that owners of schools and other stakeholders in education should take bold steps to fence and protect school environments from intruders to ensure safety of the students.

  7. Artificial Neural Network Based State Estimators Integrated into Kalmtool

    DEFF Research Database (Denmark)

    Bayramoglu, Enis; Ravn, Ole; Poulsen, Niels Kjølstad

    2012-01-01

    In this paper we present a toolbox enabling easy evaluation and comparison of dierent ltering algorithms. The toolbox is called Kalmtool and is a set of MATLAB tools for state estimation of nonlinear systems. The toolbox now contains functions for Articial Neural Network Based State Estimation as...

  8. Complexity in Simplicity: Flexible Agent-based State Space Exploration

    DEFF Research Database (Denmark)

    Rasmussen, Jacob Illum; Larsen, Kim Guldstrand

    2007-01-01

    In this paper, we describe a new flexible framework for state space exploration based on cooperating agents. The idea is to let various agents with different search patterns explore the state space individually and communicate information about fruitful subpaths of the search tree to each other...

  9. Designing and implementing the logical security framework for e-commerce based on service oriented architecture

    OpenAIRE

    Luhach, Ashish Kr.; Dwivedi, Sanjay K; Jha, C K

    2014-01-01

    Rapid evolution of information technology has contributed to the evolution of more sophisticated E- commerce system with the better transaction time and protection. The currently used E-commerce models lack in quality properties such as logical security because of their poor designing and to face the highly equipped and trained intruders. This editorial proposed a security framework for small and medium sized E-commerce, based on service oriented architecture and gives an analysis of the emin...

  10. A morphing approach to couple state-based peridynamics with classical continuum mechanics

    KAUST Repository

    Han, Fei

    2016-01-04

    A local/nonlocal coupling technique called the morphing method is developed to couple classical continuum mechanics with state-based peridynamics. State-based peridynamics, which enables the description of cracks that appear and propagate spontaneously, is applied to the key domain of a structure, where damage and fracture are considered to have non-negligible effects. In the rest of the structure, classical continuum mechanics is used to reduce computational costs and to simultaneously satisfy solution accuracy and boundary conditions. Both models are glued by the proposed morphing method in the transition region. The morphing method creates a balance between the stiffness tensors of classical continuum mechanics and the weighted coefficients of state-based peridynamics through the equivalent energy density of both models. Linearization of state-based peridynamics is derived by Taylor approximations based on vector operations. The discrete formulation of coupled models is also described. Two-dimensional numerical examples illustrate the validity and accuracy of the proposed technique. It is shown that the morphing method, originally developed for bond-based peridynamics, can be successfully extended to state-based peridynamics through the original developments presented here.

  11. A morphing approach to couple state-based peridynamics with classical continuum mechanics

    KAUST Repository

    Han, Fei; Lubineau, Gilles; Azdoud, Yan; Askari, Abe

    2016-01-01

    A local/nonlocal coupling technique called the morphing method is developed to couple classical continuum mechanics with state-based peridynamics. State-based peridynamics, which enables the description of cracks that appear and propagate spontaneously, is applied to the key domain of a structure, where damage and fracture are considered to have non-negligible effects. In the rest of the structure, classical continuum mechanics is used to reduce computational costs and to simultaneously satisfy solution accuracy and boundary conditions. Both models are glued by the proposed morphing method in the transition region. The morphing method creates a balance between the stiffness tensors of classical continuum mechanics and the weighted coefficients of state-based peridynamics through the equivalent energy density of both models. Linearization of state-based peridynamics is derived by Taylor approximations based on vector operations. The discrete formulation of coupled models is also described. Two-dimensional numerical examples illustrate the validity and accuracy of the proposed technique. It is shown that the morphing method, originally developed for bond-based peridynamics, can be successfully extended to state-based peridynamics through the original developments presented here.

  12. Fracture assessment for a dissimilar metal weld of low alloy steel and Ni-base alloy

    Energy Technology Data Exchange (ETDEWEB)

    Ogawa, Takuya, E-mail: takuya4.ogawa@toshiba.co.jp [Toshiba Corporation Power Systems Company, Power and Industrial Systems Research and Development Center, 8, Shinsugita-cho, Isogo-ku, Yokohama 235-8523 (Japan); Itatani, Masao; Saito, Toshiyuki; Hayashi, Takahiro; Narazaki, Chihiro; Tsuchihashi, Kentaro [Toshiba Corporation Power Systems Company, Power and Industrial Systems Research and Development Center, 8, Shinsugita-cho, Isogo-ku, Yokohama 235-8523 (Japan)

    2012-02-15

    Recently, instances of SCC in Ni-base alloy weld metal of light water reactor components have been reported. Despite the possibility of propagation of SCC crack to the fusion line between low alloy steel (LAS) of pressure vessel and Ni-base alloy of internal structure, a fracture assessment method of dissimilar metal welded joint has not been established. The objective of this study is to investigate a fracture mode of dissimilar metal weld of LAS and Ni-base alloy for development of a fracture assessment method for dissimilar metal weld. Fracture tests were conducted using two types of dissimilar metal weld test plates with semi-elliptical surface crack. In one of the test plates, the fusion line lies around the surface points of the surface crack and the crack tips at the surface points have intruded into LAS. Material ahead of the crack tip at the deepest point is Ni-base alloy. In the other, the fusion line lies around the deepest point of the surface crack and the crack tip at the deepest point has intruded into LAS. Material ahead of the crack tip at the deepest point is LAS. The results of fracture tests using the former type of test plate reveal that the collapse load considering the proportion of ligament area of each material gives a good estimation for fracture load. That is, fracture assessment based on plastic collapse mode is applicable to the former type of test plate. It is also understood that a fracture assessment method based on the elastic-plastic fracture mode is suitable for the latter type of test plate.

  13. Low temperature nuclear orientation studies of nuclei far from stability

    International Nuclear Information System (INIS)

    Brown, D.E.

    1990-01-01

    One of the major current interests in nuclear physics is to study transitional nuclei which lie between well known regions of spherical and deformed nuclei. The neutron deficient Tellurium and Iodine isotopes are examples of such nuclei. In both cases, the influence of a πg 9/2 intruder orbital is expected to be strong at low excitation energies and at A ∼120. The 120 Te decay scheme has been investigated in detail by LTNO supported by γ-γ coincidences and conversion electron spectroscopy. An interaction of the level scheme using an IBM-2 calculation which allows for mixing between the ground state and a (4p-2h) intruder state is made. The success of this calculation provides strong evidence for the existence of the intruder configuration in 120 Te. In addition, the relative electric quadrupole moments of the ground states in 120-123 I have been measured. The light Platinum isotopes are also transitional nuclei. The ground state magnetic dipole and electric quadrupole moments have been measured for 185,187 Pt which lie inside the region in which the shape transition is known to occur. An interpretation of nuclear moments and level structures in the range 179≤A≤193 using a particle plus triaxial core shows that the shape change takes place gradually via a broad region in which the nuclear shape is triaxial. (author)

  14. State Estimation-based Transmission line parameter identification

    Directory of Open Access Journals (Sweden)

    Fredy Andrés Olarte Dussán

    2010-01-01

    Full Text Available This article presents two state-estimation-based algorithms for identifying transmission line parameters. The identification technique used simultaneous state-parameter estimation on an artificial power system composed of several copies of the same transmission line, using measurements at different points in time. The first algorithm used active and reactive power measurements at both ends of the line. The second method used synchronised phasor voltage and current measurements at both ends. The algorithms were tested in simulated conditions on the 30-node IEEE test system. All line parameters for this system were estimated with errors below 1%.

  15. Method of sharing mobile unit state information between base station routers

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.; Polakos, Paul Anthony; Rajkumar, Ajay; Sundaram, Ganapathy S.

    2007-01-01

    The present invention provides a method of operating a first base station router. The method may include transmitting state information associated with at least one inactive mobile unit to at least one second base station router. The state information is usable to initiate an active session with the

  16. Method of sharing mobile unit state information between base station routers

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.; Polakos, Paul Anthony; Rajkumar, Ajay; Sundaram, Ganapathy S.

    2010-01-01

    The present invention provides a method of operating a first base station router. The method may include transmitting state information associated with at least one inactive mobile unit to at least one second base station router. The state information is usable to initiate an active session with the

  17. Watson-Crick base pairing controls excited-state decay in natural DNA.

    Science.gov (United States)

    Bucher, Dominik B; Schlueter, Alexander; Carell, Thomas; Zinth, Wolfgang

    2014-10-13

    Excited-state dynamics are essential to understanding the formation of DNA lesions induced by UV light. By using femtosecond IR spectroscopy, it was possible to determine the lifetimes of the excited states of all four bases in the double-stranded environment of natural DNA. After UV excitation of the DNA duplex, we detected a concerted decay of base pairs connected by Watson-Crick hydrogen bonds. A comparison of single- and double-stranded DNA showed that the reactive charge-transfer states formed in the single strands are suppressed by base pairing in the duplex. The strong influence of the Watson-Crick hydrogen bonds indicates that proton transfer opens an efficient decay path in the duplex that prohibits the formation or reduces the lifetime of reactive charge-transfer states. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Dreaming and Schizophrenia.

    Science.gov (United States)

    Stickney, Jeffrey L.

    Parallels between dream states and schizophrenia suggest that the study of dreams may offer some information about schizophrenia. A major theoretical assumption of the research on dreaming and schizophrenia is that, in schizophrenics, the dream state intrudes on the awake state creating a dreamlike symptomatology. This theory, called the REM…

  19. State of art in FE-based fuel performance codes

    International Nuclear Information System (INIS)

    Kim, Hyo Chan; Yang, Yong Sik; Kim, Dae Ho; Bang, Je Geon; Kim, Sun Ki; Koo, Yang Hyun

    2013-01-01

    Fuel performance codes approximate this complex behavior using an axisymmetric, axially-stacked, one-dimensional radial representation to save computation cost. However, the need for improved modeling of PCMI and, particularly, the importance of multidimensional capability for accurate fuel performance simulation has been identified as safety margin decreases. Finite element (FE) method that is reliable and proven solution in mechanical field has been introduced into fuel performance codes for multidimensional analysis. The present state of the art in numerical simulation of FE-based fuel performance predominantly involves 2-D axisymmetric model and 3-D volumetric model. The FRAPCON and FRAPTRAN own 1.5-D and 2-D FE model to simulate PCMI and cladding ballooning. In 2-D simulation, the FALCON code, developed by EPRI, is a 2-D (R-Z and R-θ) fully thermal-mechanically coupled steady-state and transient FE-based fuel behavior code. The French codes TOUTATIS and ALCYONE which are 3-D, and typically used to investigate localized behavior. In 2008, the Idaho National Laboratory (INL) has been developing multidimensional (2-D and 3-D) nuclear fuel performance code called BISON. In this paper, the current state of FE-based fuel performance code and their models are presented. Based on investigation into the codes, requirements and direction of development for new FE-based fuel performance code can be discussed. Based on comparison of models in FE-based fuel performance code, status of art in the codes can be discussed. A new FE-based fuel performance code should include typical pellet and cladding models which all codes own. In particular, specified pellet and cladding model such as gaseous swelling and high burnup structure (HBS) model should be developed to improve accuracy of code as well as consider AC condition. To reduce computation cost, the approximated gap and the optimized contact model should be also developed

  20. Fault-tolerant measurement-based quantum computing with continuous-variable cluster states.

    Science.gov (United States)

    Menicucci, Nicolas C

    2014-03-28

    A long-standing open question about Gaussian continuous-variable cluster states is whether they enable fault-tolerant measurement-based quantum computation. The answer is yes. Initial squeezing in the cluster above a threshold value of 20.5 dB ensures that errors from finite squeezing acting on encoded qubits are below the fault-tolerance threshold of known qubit-based error-correcting codes. By concatenating with one of these codes and using ancilla-based error correction, fault-tolerant measurement-based quantum computation of theoretically indefinite length is possible with finitely squeezed cluster states.

  1. Online Synchrophasor-Based Dynamic State Estimation using Real-Time Digital Simulator

    DEFF Research Database (Denmark)

    Khazraj, Hesam; Adewole, Adeyemi Charles; Udaya, Annakkage

    2018-01-01

    Dynamic state estimation is a very important control center application used in the dynamic monitoring of state variables. This paper presents and validates a time-synchronized phasor measurement unit (PMU)-based for dynamic state estimation by unscented Kalman filter (UKF) method using the real-...... using the RTDS (real-time digital simulator). The dynamic state variables of multi-machine systems are monitored and measured for the study on the transient behavior of power systems.......Dynamic state estimation is a very important control center application used in the dynamic monitoring of state variables. This paper presents and validates a time-synchronized phasor measurement unit (PMU)-based for dynamic state estimation by unscented Kalman filter (UKF) method using the real......-time digital simulator (RTDS). The dynamic state variables of the system are the rotor angle and speed of the generators. The performance of the UKF method is tested with PMU measurements as inputs using the IEEE 14-bus test system. This test system was modeled in the RSCAD software and tested in real time...

  2. Physics of high spin nuclear states

    Energy Technology Data Exchange (ETDEWEB)

    Wyss, R [Joint Inst. for Heavy Ion Research, Oak Ridge, TN (United States); [MSI, Frescativ, Stockholm (Sweden)

    1992-08-01

    High spin physics is a vast topic addressing the variety of nuclear excitation modes. In the present paper, some general aspects related to recent highlights of nuclear spectroscopy are discussed. The relation between signature splitting and shape changes in the unique parity orbitals is elucidated. The relevance of the Pseudo SU(3) symmetry in the understanding of rotational band structure is addressed. Specific features of rotational bands of intruder configurations are viewed as a probe of the neutron-proton interaction. (author). 36 refs., 5 figs.

  3. Resting-State Seed-Based Analysis: An Alternative to Task-Based Language fMRI and Its Laterality Index.

    Science.gov (United States)

    Smitha, K A; Arun, K M; Rajesh, P G; Thomas, B; Kesavadas, C

    2017-06-01

    Language is a cardinal function that makes human unique. Preservation of language function poses a great challenge for surgeons during resection. The aim of the study was to assess the efficacy of resting-state fMRI in the lateralization of language function in healthy subjects to permit its further testing in patients who are unable to perform task-based fMRI. Eighteen healthy right-handed volunteers were prospectively evaluated with resting-state fMRI and task-based fMRI to assess language networks. The laterality indices of Broca and Wernicke areas were calculated by using task-based fMRI via a voxel-value approach. We adopted seed-based resting-state fMRI connectivity analysis together with parameters such as amplitude of low-frequency fluctuation and fractional amplitude of low-frequency fluctuation (fALFF). Resting-state fMRI connectivity maps for language networks were obtained from Broca and Wernicke areas in both hemispheres. We performed correlation analysis between the laterality index and the z scores of functional connectivity, amplitude of low-frequency fluctuation, and fALFF. Pearson correlation analysis between signals obtained from the z score of fALFF and the laterality index yielded a correlation coefficient of 0.849 ( P laterality index yielded an R 2 value of 0.721, indicating that 72.1% of the variance in the laterality index of task-based fMRI could be predicted from the fALFF of resting-state fMRI. The present study demonstrates that fALFF can be used as an alternative to task-based fMRI for assessing language laterality. There was a strong positive correlation between the fALFF of the Broca area of resting-state fMRI with the laterality index of task-based fMRI. Furthermore, we demonstrated the efficacy of fALFF for predicting the laterality of task-based fMRI. © 2017 by American Journal of Neuroradiology.

  4. Failure diagnosis using deep belief learning based health state classification

    International Nuclear Information System (INIS)

    Tamilselvan, Prasanna; Wang, Pingfeng

    2013-01-01

    Effective health diagnosis provides multifarious benefits such as improved safety, improved reliability and reduced costs for operation and maintenance of complex engineered systems. This paper presents a novel multi-sensor health diagnosis method using deep belief network (DBN). DBN has recently become a popular approach in machine learning for its promised advantages such as fast inference and the ability to encode richer and higher order network structures. The DBN employs a hierarchical structure with multiple stacked restricted Boltzmann machines and works through a layer by layer successive learning process. The proposed multi-sensor health diagnosis methodology using DBN based state classification can be structured in three consecutive stages: first, defining health states and preprocessing sensory data for DBN training and testing; second, developing DBN based classification models for diagnosis of predefined health states; third, validating DBN classification models with testing sensory dataset. Health diagnosis using DBN based health state classification technique is compared with four existing diagnosis techniques. Benchmark classification problems and two engineering health diagnosis applications: aircraft engine health diagnosis and electric power transformer health diagnosis are employed to demonstrate the efficacy of the proposed approach

  5. Experience-based utility and own health state valuation for a health state classification system: why and how to do it.

    Science.gov (United States)

    Brazier, John; Rowen, Donna; Karimi, Milad; Peasgood, Tessa; Tsuchiya, Aki; Ratcliffe, Julie

    2017-10-11

    In the estimation of population value sets for health state classification systems such as the EuroQOL five dimensions questionnaire (EQ-5D), there is increasing interest in asking respondents to value their own health state, sometimes referred to as "experience-based utility values" or, more correctly, own rather than hypothetical health states. Own health state values differ to hypothetical health state values, and this may be attributable to many reasons. This paper critically examines whose values matter; why there is a difference between own and hypothetical values; how to measure own health state values; and why to use own health state values. Finally, the paper examines other ways that own health state values can be taken into account, such as including the use of informed general population preferences that may better take into account experience-based values.

  6. Backstepping Based Formation Control of Quadrotors with the State Transformation Technique

    Directory of Open Access Journals (Sweden)

    Keun Uk Lee

    2017-11-01

    Full Text Available In this paper, a backstepping-based formation control of quadrotors with the state transformation technique is proposed. First, the dynamics of a quadrotor is derived by using the Newton–Euler formulation. Next, a backstepping-based formation control for quadrotors using a state transformation technique is presented. In the position control, which is the basis of formation control, it is possible to derive the reference attitude angles employing a state transformation technique without the small angle assumption or the simplified dynamics usually used. Stability analysis based on the Lyapunov theorem shows that the proposed formation controller can provide a quadrotor formation error system that is asymptotically stabilized. Finally, we verify the performance of the proposed formation control method through comparison simulations.

  7. Excited state dynamics of DNA bases

    Czech Academy of Sciences Publication Activity Database

    Kleinermanns, K.; Nachtigallová, Dana; de Vries, M. S.

    2013-01-01

    Roč. 32, č. 2 (2013), s. 308-342 ISSN 0144-235X R&D Projects: GA ČR GAP208/12/1318 Grant - others:National Science Foundation(US) CHE-0911564; NASA (US) NNX12AG77G; Deutsche Forschungsgemeinschaft(DE) SFB 663; Deutsche Forschungsgemeinschaft(DE) KI 531-29 Institutional support: RVO:61388963 Keywords : DNA bases * nucleobases * excited state * dynamics * computations * gas phase * conical intersections Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 4.920, year: 2013

  8. A state-based probabilistic model for tumor respiratory motion prediction

    International Nuclear Information System (INIS)

    Kalet, Alan; Sandison, George; Schmitz, Ruth; Wu Huanmei

    2010-01-01

    This work proposes a new probabilistic mathematical model for predicting tumor motion and position based on a finite state representation using the natural breathing states of exhale, inhale and end of exhale. Tumor motion was broken down into linear breathing states and sequences of states. Breathing state sequences and the observables representing those sequences were analyzed using a hidden Markov model (HMM) to predict the future sequences and new observables. Velocities and other parameters were clustered using a k-means clustering algorithm to associate each state with a set of observables such that a prediction of state also enables a prediction of tumor velocity. A time average model with predictions based on average past state lengths was also computed. State sequences which are known a priori to fit the data were fed into the HMM algorithm to set a theoretical limit of the predictive power of the model. The effectiveness of the presented probabilistic model has been evaluated for gated radiation therapy based on previously tracked tumor motion in four lung cancer patients. Positional prediction accuracy is compared with actual position in terms of the overall RMS errors. Various system delays, ranging from 33 to 1000 ms, were tested. Previous studies have shown duty cycles for latencies of 33 and 200 ms at around 90% and 80%, respectively, for linear, no prediction, Kalman filter and ANN methods as averaged over multiple patients. At 1000 ms, the previously reported duty cycles range from approximately 62% (ANN) down to 34% (no prediction). Average duty cycle for the HMM method was found to be 100% and 91 ± 3% for 33 and 200 ms latency and around 40% for 1000 ms latency in three out of four breathing motion traces. RMS errors were found to be lower than linear and no prediction methods at latencies of 1000 ms. The results show that for system latencies longer than 400 ms, the time average HMM prediction outperforms linear, no prediction, and the more

  9. The reliability of assigning individuals to cognitive states using the Mini Mental-State Examination: a population-based prospective cohort study.

    Science.gov (United States)

    Marioni, Riccardo E; Chatfield, Mark; Brayne, Carol; Matthews, Fiona E

    2011-09-06

    Previous investigations of test re-test reliability of the Mini-Mental State Examination (MMSE) have used correlations and statistics such as Cronbach's α to assess consistency. In practice, the MMSE is usually used to group individuals into cognitive states. The reliability of this grouping (state based approach) has not been fully explored. MMSE data were collected on a subset of 2,275 older participants (≥ 65 years) from the population-based Medical Research Council Cognitive Function and Ageing Study. Two measurements taken approximately two months apart were used to investigate three state-based categorisations. Descriptive statistics were used to determine how many people remained in the same cognitive group or went up or down groups. Weighted logistic regression was used to identify predictive characteristics of those who moved group. The proportion of people who remained in the same MMSE group at screen and follow-up assessment ranged from 58% to 78%. The proportion of individuals who went up one or more groups was roughly equal to the proportion that went down one or more groups; most of the change occurred when measurements were close to the cut-points. There was no consistently significant predictor for changing cognitive group. A state-based approach to analysing the reliability of the MMSE provided similar results to correlation analyses. State-based models of cognitive change or individual trajectory models using raw scores need multiple waves to help overcome natural variation in MMSE scores and to help identify true cognitive change.

  10. Are Brazil nuts attractive?

    Science.gov (United States)

    Sanders, Duncan A; Swift, Michael R; Bowley, R M; King, P J

    2004-11-12

    We present event-driven simulation results for single and multiple intruders in a vertically vibrated granular bed. Under our vibratory conditions, the mean vertical position of a single intruder is governed primarily by a buoyancylike effect. Multiple intruders also exhibit buoyancy governed behavior; however, multiple neutrally buoyant intruders cluster spontaneously and undergo horizontal segregation. These effects can be understood by considering the dynamics of two neutrally buoyant intruders. We have measured an attractive force between such intruders which has a range of five intruder diameters, and we provide a mechanistic explanation for the origins of this force.

  11. Parameter retrieval of chiral metamaterials based on the state-space approach.

    Science.gov (United States)

    Zarifi, Davoud; Soleimani, Mohammad; Abdolali, Ali

    2013-08-01

    This paper deals with the introduction of an approach for the electromagnetic characterization of homogeneous chiral layers. The proposed method is based on the state-space approach and properties of a 4×4 state transition matrix. Based on this, first, the forward problem analysis through the state-space method is reviewed and properties of the state transition matrix of a chiral layer are presented and proved as two theorems. The formulation of a proposed electromagnetic characterization method is then presented. In this method, scattering data for a linearly polarized plane wave incident normally on a homogeneous chiral slab are combined with properties of a state transition matrix and provide a powerful characterization method. The main difference with respect to other well-established retrieval procedures based on the use of the scattering parameters relies on the direct computation of the transfer matrix of the slab as opposed to the conventional calculation of the propagation constant and impedance of the modes supported by the medium. The proposed approach allows avoiding nonlinearity of the problem but requires getting enough equations to fulfill the task which was provided by considering some properties of the state transition matrix. To demonstrate the applicability and validity of the method, the constitutive parameters of two well-known dispersive chiral metamaterial structures at microwave frequencies are retrieved. The results show that the proposed method is robust and reliable.

  12. Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

    Science.gov (United States)

    2016-12-01

    have begun discussing strategies for securing entities in cyberspace—includ- ing the files and software belonging to corporations , government...through the best strategies for deterring cyber-incursions. The immigration analogy is particularly useful for exploring how would-be intruders learn...analysis, evaluation, and refinement of professional expertise in war, strategy , operations, national security, resource management, and responsible

  13. The reliability of assigning individuals to cognitive states using the Mini Mental-State Examination: a population-based prospective cohort study

    OpenAIRE

    Marioni, Riccardo E.; Chatfield, Mark; Brayne, Carol; Matthews, Fiona E.; Med Res Council

    2011-01-01

    Abstract Background Previous investigations of test re-test reliability of the Mini-Mental State Examination (MMSE) have used correlations and statistics such as Cronbach's α to assess consistency. In practice, the MMSE is usually used to group individuals into cognitive states. The reliability of this grouping (state based approach) has not been fully explored. Methods MMSE data were collected on a subset of 2,275 older participants (≥ 65 years) from the population-based Medical Research Cou...

  14. Short-Term State Forecasting-Based Optimal Voltage Regulation in Distribution Systems: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Rui; Jiang, Huaiguang; Zhang, Yingchen

    2017-05-17

    A novel short-term state forecasting-based optimal power flow (OPF) approach for distribution system voltage regulation is proposed in this paper. An extreme learning machine (ELM) based state forecaster is developed to accurately predict system states (voltage magnitudes and angles) in the near future. Based on the forecast system states, a dynamically weighted three-phase AC OPF problem is formulated to minimize the voltage violations with higher penalization on buses which are forecast to have higher voltage violations in the near future. By solving the proposed OPF problem, the controllable resources in the system are optimally coordinated to alleviate the potential severe voltage violations and improve the overall voltage profile. The proposed approach has been tested in a 12-bus distribution system and simulation results are presented to demonstrate the performance of the proposed approach.

  15. The reliability of assigning individuals to cognitive states using the Mini Mental-State Examination: a population-based prospective cohort study

    Directory of Open Access Journals (Sweden)

    Brayne Carol

    2011-09-01

    Full Text Available Abstract Background Previous investigations of test re-test reliability of the Mini-Mental State Examination (MMSE have used correlations and statistics such as Cronbach's α to assess consistency. In practice, the MMSE is usually used to group individuals into cognitive states. The reliability of this grouping (state based approach has not been fully explored. Methods MMSE data were collected on a subset of 2,275 older participants (≥ 65 years from the population-based Medical Research Council Cognitive Function and Ageing Study. Two measurements taken approximately two months apart were used to investigate three state-based categorisations. Descriptive statistics were used to determine how many people remained in the same cognitive group or went up or down groups. Weighted logistic regression was used to identify predictive characteristics of those who moved group. Results The proportion of people who remained in the same MMSE group at screen and follow-up assessment ranged from 58% to 78%. The proportion of individuals who went up one or more groups was roughly equal to the proportion that went down one or more groups; most of the change occurred when measurements were close to the cut-points. There was no consistently significant predictor for changing cognitive group. Conclusion A state-based approach to analysing the reliability of the MMSE provided similar results to correlation analyses. State-based models of cognitive change or individual trajectory models using raw scores need multiple waves to help overcome natural variation in MMSE scores and to help identify true cognitive change.

  16. Towards Measuring the Abstractness of State Machines based on Mutation Testing

    Directory of Open Access Journals (Sweden)

    Thomas Baar

    2017-01-01

    Full Text Available Abstract. The notation of state machines is widely adopted as a formalism to describe the behaviour of systems. Usually, multiple state machine models can be developed for the very same software system. Some of these models might turn out to be equivalent, but, in many cases, different state machines describing the same system also differ in their level of abstraction. In this paper, we present an approach to actually measure the abstractness level of state machines w.r.t. a given implemented software system. A state machine is considered to be less abstract when it is conceptionally closer to the implemented system. In our approach, this distance between state machine and implementation is measured by applying coverage criteria known from software mutation testing. Abstractness of state machines can be considered as a new metric. As for other metrics as well, a known value for the abstractness of a given state machine allows to assess its quality in terms of a simple number. In model-based software development projects, the abstract metric can help to prevent model degradation since it can actually measure the semantic distance from the behavioural specification of a system in form of a state machine to the current implementation of the system. In contrast to other metrics for state machines, the abstractness cannot be statically computed based on the state machine’s structure, but requires to execute both state machine and corresponding system implementation. The article is published in the author’s wording. 

  17. Ontology and modeling patterns for state-based behavior representation

    Science.gov (United States)

    Castet, Jean-Francois; Rozek, Matthew L.; Ingham, Michel D.; Rouquette, Nicolas F.; Chung, Seung H.; Kerzhner, Aleksandr A.; Donahue, Kenneth M.; Jenkins, J. Steven; Wagner, David A.; Dvorak, Daniel L.; hide

    2015-01-01

    This paper provides an approach to capture state-based behavior of elements, that is, the specification of their state evolution in time, and the interactions amongst them. Elements can be components (e.g., sensors, actuators) or environments, and are characterized by state variables that vary with time. The behaviors of these elements, as well as interactions among them are represented through constraints on state variables. This paper discusses the concepts and relationships introduced in this behavior ontology, and the modeling patterns associated with it. Two example cases are provided to illustrate their usage, as well as to demonstrate the flexibility and scalability of the behavior ontology: a simple flashlight electrical model and a more complex spacecraft model involving instruments, power and data behaviors. Finally, an implementation in a SysML profile is provided.

  18. New particle-hole symmetries and the extended interacting boson model

    CERN Document Server

    De Coster, C; Decroix, B; Heyde, Kris L G; Oros, A M

    1998-01-01

    We describe shape coexistence and intruder many-particle-hole (mp-nh)excitations in the extended interacting boson model EIBM and EIBM-2,combining both the particle-hole and the charge degree of freedom.Besides the concept of I-spin multiplets and subsequently $SU(4)$ multiplets, we touch upon the existence of particle-hole mixed symmetry states. We furthermore describe regular and intrudermany-particle-hole excitations in one nucleus on an equal footing, creating (annihilating) particle-hole pairs using the K-spin operatorand studying possible mixing between these states. As a limiting case,we treat the coupling of two IBM-1 Hamiltonians, each decribing the regular and intruder excitations respectively, in particular lookingat the $U(5)$-$SU(3)$ dynamical symmetry coupling. We apply such coupling scheme to the Po isotopes.

  19. Distributed Tracing of Intruders

    National Research Council Canada - National Science Library

    Staniford-Chen, Stuart G

    1995-01-01

    .... One of the things that facilitates this malfeasance is that computer networks provide the ability for a user to log into multiple computer systems in sequence, changing identity with each step...

  20. Study of Neutron-Deficient $^{202-205}$Fr Isotopes with Collinear Resonance Ionization Spectroscopy

    CERN Document Server

    De Schepper, Stijn; Cocolios, Thomas; Budincevic, Ivan

    The scope of this master’s thesis is the study of neutron-deficient $^{202−205}$Fr isotopes. These isotopes are inside the neutron-deficient lead region, a region that has shown evidence of shape coexistence. For this thesis, this discussion is limited to the phenomenon where a low lying excited state has a different shape than the ground state. Shape coexistence is caused by intruder states. These are single-particle Shell Model states that are perturbed in energy due to the interaction with a deformed core. In the neutron-deficient lead region the main proton intruder orbit is the 3s$_{1/2}$orbit. When going towards more neutron-deficient isotopes, deformation increases. The $\\pi3s_{1/2}$orbit will rise in energy and will eventually become the ground state in odd- A bismuth (Z=83) isotopes. It is also observed in odd-A astatine (Z=85) isotopes, already in less neutron-deficient nuclei. The same phenomenon is expected to be present francium (Z=87) isotopes already at $^{199}$Fr. Although it is currently ...

  1. Generation of concatenated Greenberger-Horne-Zeilinger-type entangled coherent state based on linear optics

    Science.gov (United States)

    Guo, Rui; Zhou, Lan; Gu, Shi-Pu; Wang, Xing-Fu; Sheng, Yu-Bo

    2017-03-01

    The concatenated Greenberger-Horne-Zeilinger (C-GHZ) state is a new type of multipartite entangled state, which has potential application in future quantum information. In this paper, we propose a protocol of constructing arbitrary C-GHZ entangled state approximatively. Different from previous protocols, each logic qubit is encoded in the coherent state. This protocol is based on the linear optics, which is feasible in experimental technology. This protocol may be useful in quantum information based on the C-GHZ state.

  2. An accelerator based steady state neutron source

    International Nuclear Information System (INIS)

    Burke, R.J.; Johnson, D.L.

    1985-01-01

    Using high current, c.w. linear accelerator technology, a spallation neutron source can achieve much higher average intensities than existing or proposed pulsed spallation sources. With about 100 mA of 300 MeV protons or deuterons, the Accelerator Based Neutron Research Facility (ABNR) would initially achieve the 10 16 n/cm 2 .s thermal flux goal of the advanced steady state neutron source, and upgrading could provide higher steady state fluxes. The relatively low ion energy compared to other spallation sources has an important impact on R and D requirements as well as capital cost, for which a range of $300-450M is estimated by comparison to other accelerator-based neutron source facilities. The source is similar to a reactor source in most respects. It has some higher energy neutrons but fewer gamma rays, and the moderator region is free of many of the design constraints of a reactor, which helps to implement sources for various neutron energy spectra, many beam tubes, etc. With the development of multi-beam concept and the basis for currents greater than 100 mA that is assumed in the R and D plan, the ABNR would serve many additional uses, such as fusion materials development, production of proton-rich isotopes, and other energy and defense program needs

  3. Hybrid unscented particle filter based state-of-charge determination for lead-acid batteries

    International Nuclear Information System (INIS)

    Shen, Yanqing

    2014-01-01

    Accurate prediction of cell SOC (state of charge) is important for the safety and functional capabilities of the battery energy storage application system. This paper presents a hybrid UPF (unscented particle filter) based SOC determination combined model for batteries. To simulate the entire dynamic electrical characteristics of batteries, a novel combined state space model, which takes current as a control input and let SOC and two constructed parameters as state variables, is advanced to represent cell behavior. Besides that, an improved UPF method is used to evaluate cell SOC. Taking lead-acid batteries for example, we apply the established model for test. Results show that the evolved combined state space cell model simulates battery dynamics robustly with high accuracy and the prediction value based on the improved UPF method converges to the real SOC very quickly within the error of±2%. - Highlights: • This paper introduces a hybrid UPF based SOC determination model for batteries. • The evolved model takes SOC and two constructed parameters as state variables. • The combined state space cell model simulates battery dynamics robustly. • NLMS based method is employed to lessen search space and fasten convergence process. • Novel model converges to the real SOC robustly and quickly with fewer particles

  4. Disruption of the Glutamate–Glutamine Cycle Involving Astrocytes in an Animal Model of Depression for Males and Females

    Science.gov (United States)

    Rappeneau, Virginie; Blaker, Amanda; Petro, Jeff R.; Yamamoto, Bryan K.; Shimamoto, Akiko

    2016-01-01

    Background: Women are twice as likely as men to develop major depression. The brain mechanisms underlying this sex disparity are not clear. Disruption of the glutamate–glutamine cycle has been implicated in psychiatric disturbances. This study identifies sex-based impairments in the glutamate–glutamine cycle involving astrocytes using an animal model of depression. Methods: Male and female adult Long-Evans rats were exposed to chronic social defeat stress (CSDS) for 21 days, using a modified resident-intruder paradigm. Territorial aggression was used for males and maternal aggression was used for females to induce depressive-like deficits for intruders. The depressive-like phenotype was assessed with intake for saccharin solution, weight gain, estrous cycle, and corticosterone (CORT). Behaviors displayed by the intruders during daily encounters with residents were characterized. Rats with daily handling were used as controls for each sex. Ten days after the last encounter, both the intruders and controls were subjected to a no-net-flux in vivo microdialysis to assess glutamate accumulation and extracellular glutamine in the nucleus accumbens (NAc). The contralateral hemispheres were used for determining changes in astrocytic markers, including glial fibrillary acidic protein (GFAP) and glutamate transporter-1 (GLT-1). Results: Both male and female intruders reduced saccharin intake over the course of CSDS, compared to their pre-stress period and to their respective controls. Male intruders exhibited submissive/defensive behaviors to territorial aggression by receiving sideways threats and bites. These males showed reductions in striatal GLT-1 and spontaneous glutamine in the NAc, compared to controls. Female intruders exhibited isolated behaviors to maternal aggression, including immobility, rearing, and selfgrooming. Their non-reproductive days were extended. Also, they showed reductions in prefrontal and accumbal GFAP+ cells and prefrontal GLT-1, compared to

  5. Compressive sensing based ptychography image encryption

    Science.gov (United States)

    Rawat, Nitin

    2015-09-01

    A compressive sensing (CS) based ptychography combined with an optical image encryption is proposed. The diffraction pattern is recorded through ptychography technique further compressed by non-uniform sampling via CS framework. The system requires much less encrypted data and provides high security. The diffraction pattern as well as the lesser measurements of the encrypted samples serves as a secret key which make the intruder attacks more difficult. Furthermore, CS shows that the linearly projected few random samples have adequate information for decryption with a dramatic volume reduction. Experimental results validate the feasibility and effectiveness of our proposed technique compared with the existing techniques. The retrieved images do not reveal any information with the original information. In addition, the proposed system can be robust even with partial encryption and under brute-force attacks.

  6. Nickel-base superalloy powder metallurgy: state-of-the-art

    International Nuclear Information System (INIS)

    Allen, M.M.; Athey, R.L.; Moore, J.B.

    1975-01-01

    Development of powder metallurgical methods for fabrication of Ni-base superalloy turbine engine disks is reviewed. Background studies are summarized and current state-of-art is discussed for the F100 jet engine, advanced applications, and forging processes

  7. An ontology-based intrusion patterns classification system | Shonubi ...

    African Journals Online (AJOL)

    Studies have shown that computer intrusions have been on the increase in recent times. Many techniques and patterns are being used by intruders to gain access to data on host computer networks. In this work, intrusion patterns were identified and classified and inherent knowledge were represented using an ontology of ...

  8. A state-space-based prognostics model for lithium-ion battery degradation

    International Nuclear Information System (INIS)

    Xu, Xin; Chen, Nan

    2017-01-01

    This paper proposes to analyze the degradation of lithium-ion batteries with the sequentially observed discharging profiles. A general state-space model is developed in which the observation model is used to approximate the discharging profile of each cycle, the corresponding parameter vector is treated as the hidden state, and the state-transition model is used to track the evolution of the parameter vector as the battery ages. The EM and EKF algorithms are adopted to estimate and update the model parameters and states jointly. Based on this model, we construct prediction on the end of discharge times for unobserved cycles and the remaining useful cycles before the battery failure. The effectiveness of the proposed model is demonstrated using a real lithium-ion battery degradation data set. - Highlights: • Unifying model for Li-Ion battery SOC and SOH estimation. • Extended Kalman filter based efficient inference algorithm. • Using voltage curves in discharging to have wide validity.

  9. Motion state analysis of space target based on optical cross section

    Science.gov (United States)

    Tian, Qichen; Li, Zhi; Xu, Can; Liu, Chenghao

    2017-10-01

    In order to solve the problem that the movement state analysis method of the space target based on OCS is not related to the real motion state. This paper proposes a method based on OCS for analyzing the state of space target motion. This paper first establish a three-dimensional model of real STSS satellite, then change the satellite's surface into element, and assign material to each panel according to the actual conditions of the satellite. This paper set up a motion scene according to the orbit parameters of STSS satellite in STK, and the motion states are set to three axis steady state and slowly rotating unstable state respectively. In these two states, the occlusion condition of the surface element is firstly determined, and the effective face element is selected. Then, the coordinates of the observation station and the solar coordinates in the satellite body coordinate system are input into the OCS calculation program, and the OCS variation curves of the three axis steady state and the slow rotating unstable state STSS satellite are obtained. Combining the satellite surface structure and the load situation, the OCS change curve of the three axis stabilized satellite is analyzed, and the conclude that the OCS curve fluctuates up and down when the sunlight is irradiated to the load area; By using Spectral analysis method, autocorrelation analysis and the cross residual method, the rotation speed of OCS satellite in slow rotating unstable state is analyzed, and the rotation speed of satellite is successfully reversed. By comparing the three methods, it is found that the cross residual method is more accurate.

  10. Physical versus psychological social stress in male rats reveals distinct cardiovascular, inflammatory and behavioral consequences

    Science.gov (United States)

    Padi, Akhila R.; Moffitt, Casey M.; Wilson, L. Britt; Wood, Christopher S.; Wood, Susan K.

    2017-01-01

    Repeated exposure to social stress can precipitate the development of psychosocial disorders including depression and comorbid cardiovascular disease. While a major component of social stress often encompasses physical interactions, purely psychological stressors (i.e. witnessing a traumatic event) also fall under the scope of social stress. The current study determined whether the acute stress response and susceptibility to stress-related consequences differed based on whether the stressor consisted of physical versus purely psychological social stress. Using a modified resident-intruder paradigm, male rats were either directly exposed to repeated social defeat stress (intruder) or witnessed a male rat being defeated. Cardiovascular parameters, behavioral anhedonia, and inflammatory cytokines in plasma and the stress-sensitive locus coeruleus were compared between intruder, witness, and control rats. Surprisingly intruders and witnesses exhibited nearly identical increases in mean arterial pressure and heart rate during acute and repeated stress exposures, yet only intruders exhibited stress-induced arrhythmias. Furthermore, re-exposure to the stress environment in the absence of the resident produced robust pressor and tachycardic responses in both stress conditions indicating the robust and enduring nature of social stress. In contrast, the long-term consequences of these stressors were distinct. Intruders were characterized by enhanced inflammatory sensitivity in plasma, while witnesses were characterized by the emergence of depressive-like anhedonia, transient increases in systolic blood pressure and plasma levels of tissue inhibitor of metalloproteinase. The current study highlights that while the acute cardiovascular responses to stress were identical between intruders and witnesses, these stressors produced distinct differences in the enduring consequences to stress, suggesting that witness stress may be more likely to produce long-term cardiovascular

  11. Study of the Neutron Deficient Pb and Bi Isotopes by Simultaneous Atomic- and Nuclear-Spectroscopy

    CERN Multimedia

    Kessler, T

    2002-01-01

    We propose to study systematically nuclear properties of the neutron deficient lead $^{183-189}$Pb, $^{191g}$Pb, $^{193g}$Pb and bismuth isotopes $^{188-200}$Bi by atomic spectroscopy with the ISOLDE resonance ionisation laser ion source (RILIS) combined with simultaneous nuclear spectroscopy at the detection set-up. The main focus is the determination of the mean square charge radii of $^{183-190}$Pb and $^{188-193}$Bi from which the influence of low-lying intruder states should become obvious. Also the nuclear spin and magnetic moments of ground-states and long-lived isomers will be determined unambiguously through evaluation of the hyperfine structure, and new isomers could be discovered. The decay properties of these nuclei can be measured by $\\alpha$-$\\gamma$ and $\\beta$-$\\gamma$ spectroscopy. With this data at hand, possible shape transitions around mid-shell at N$\\sim$104 will be studied. This data is crucial for the direct test of nuclear theory in the context of intruder state influence (e.g. energy ...

  12. Collective properties of nucleons in the abnormal-parity states

    International Nuclear Information System (INIS)

    Bhatt, K. H.; Kahane, S.; Raman, S.

    2000-01-01

    In the first part of this work, we study the quadrupole collective properties of N a =2, 4, 6, and 8 nucleons occupying the abnormal-parity intruder single-particle states with high angular momenta j a =(9/2), (11/2), (13/2), and (15/2). This study is essential for a detailed understanding of the contribution made by these nucleons to the quadrupole collectivity of the yrast states of deformed nuclei. The properties studied include (i) the distribution of the angular momenta J contained in the intrinsic state of N a particles in the |j a k a > states, (ii) the relationship between the quadrupole moment Q 0 (j a ,N a ) of such an intrinsic state and the maximum angular momentum J max contained in it, (iii) the complete set of reduced quadrupole matrix elements (J ' ||Q||J) for transitions between all the states |J> and |J ' > projected from the intrinsic state, (iv) the B(E2:J→J-2) values, (v) the transition moments Q t (J), and (vi) the spectroscopic quadrupole moment Q(J). We compare these properties with similar properties of an intrinsic state having SU(3) symmetry which contains the same set of angular momenta as contained in the intrinsic state of a particular number of nucleons in a specific j a configuration. In the second part, we use the input from the first part to study the collective properties of the coupled system of protons and neutrons in abnormal-parity states. We show that the SU(3)-like features observed for the individual groups of abnormal-parity nucleons become stronger for the coupled system. Finally, in the third part, we consider the yrast bands of well-deformed nuclei projected from their Nilsson intrinsic states of valence nucleons in a major shell. We specify the structure of the wave function of each projected yrast state |J> in terms of the nucleons in both normal- and abnormal-parity states. These wave functions can be used to determine the individual contributions of the nucleons in normal- and abnormal-parity states to any

  13. Tracking Potentiating States of Dissociation: An Intensive Clinical Case Study of Sleep, Daydreaming, Mood, and Depersonalization/Derealization

    Science.gov (United States)

    Poerio, Giulia L.; Kellett, Stephen; Totterdell, Peter

    2016-01-01

    This study examined in real time the role of sleep and daydreaming as potentiating states for subsequent dissociation in depersonalization/derealization disorder (DDD). Research and theory suggests that dissociation may be exacerbated and maintained by a labile sleep-wake cycle in which “dream-like” mentation intrudes into waking life and fuels dissociative symptoms. We explore and extend this idea by examining the state of daydreaming in dissociation. Daydreaming is a state of consciousness between dreaming and waking cognition that involves stimulus-independent and task-unrelated mentation. We report the results of a unique intensive N = 1 study with an individual meeting diagnostic criteria for DDD. Using experience-sampling methodology, the participant rated (six times daily for 40 days) current daydreaming, mood, and dissociative symptoms. At the start of each day sleep quality and duration was also rated. Daydreaming was reported on 45% of occasions and significantly predicted greater dissociation, in particular when daydreams were repetitive and negative (but not fanciful) in content. These relationships were mediated by feelings of depression and anxiety. Sleep quality but not duration was a negative predictor of daily dissociation and also negatively predicted depression but not anxiety. Findings offer initial evidence that the occurrence and content of daydreams may act as potentiating states for heightened, in the moment, dissociation. The treatment implications of targeting sleep and daydreaming for dissociative disorders are discussed. PMID:27582722

  14. Tracking potentiating states of dissociation: An intensive clinical case study of sleep, daydreaming, mood, and depersonalization/derealization

    Directory of Open Access Journals (Sweden)

    Giulia Lara Poerio

    2016-08-01

    Full Text Available This study examined in real time the role of sleep and daydreaming as potentiating states for subsequent dissociation in depersonalization/derealization disorder (DDD. Research and theory suggests that dissociation may be exacerbated and maintained by a labile sleep-wake cycle in which ‘dream-like’ mentation intrudes into waking life and fuels dissociative symptoms. We explore and extend this idea by examining the state of daydreaming in dissociation. Daydreaming is a state of consciousness between dreaming and waking cognition that involves stimulus-independent and task-unrelated mentation. We report the results of a unique intensive N=1 study with an individual meeting diagnostic criteria for DDD. Using experience-sampling methodology, the participant rated (six times daily for 40 days current daydreaming, mood, and dissociative symptoms. At the start of each day sleep quality and duration was also rated. Daydreaming was reported on 45% of occasions and significantly predicted greater dissociation, in particular when daydreams were repetitive and negative (but not fanciful in content. These relationships were mediated by feelings of depression and anxiety. Sleep quality but not duration was a negative predictor of daily dissociation and also negatively predicted depression but not anxiety. Findings offer initial evidence that the occurrence and content of daydreams may act as potentiating states for heightened, in the moment, dissociation. The treatment implications of targeting sleep and daydreaming for dissociative disorders are discussed.

  15. A Novel Multisensor Traffic State Assessment System Based on Incomplete Data

    Directory of Open Access Journals (Sweden)

    Yiliang Zeng

    2014-01-01

    Full Text Available A novel multisensor system with incomplete data is presented for traffic state assessment. The system comprises probe vehicle detection sensors, fixed detection sensors, and traffic state assessment algorithm. First of all, the validity checking of the traffic flow data is taken as preprocessing of this method. And then a new method based on the history data information is proposed to fuse and recover the incomplete data. According to the characteristics of space complementary of data based on the probe vehicle detector and fixed detector, a fusion model of space matching is presented to estimate the mean travel speed of the road. Finally, the traffic flow data include flow, speed and, occupancy rate, which are detected between Beijing Deshengmen bridge and Drum Tower bridge, are fused to assess the traffic state of the road by using the fusion decision model of rough sets and cloud. The accuracy of experiment result can reach more than 98%, and the result is in accordance with the actual road traffic state. This system is effective to assess traffic state, and it is suitable for the urban intelligent transportation system.

  16. Iterative Observer-based Estimation Algorithms for Steady-State Elliptic Partial Differential Equation Systems

    KAUST Repository

    Majeed, Muhammad Usman

    2017-01-01

    the problems are formulated on higher dimensional space domains. However, in this dissertation, feedback based state estimation algorithms, known as state observers, are developed to solve such steady-state problems using one of the space variables as time

  17. Territorial Developments Based on Graffiti: a Statistical Mechanics Approach

    Science.gov (United States)

    2011-10-28

    Many animals, among which wolves , foxes and coyotes, are known to scent–mark their territories as a way of warning intruders of their presence and to...A. Lewis and R. L. Crabtree, Mechanistic home range models capture spatial patterns and dynamics of coyote territories in Yellowstone , Proc. Roy

  18. State of art in FE-based fuel performance codes

    International Nuclear Information System (INIS)

    Kim, Hyo Chan; Yang, Yong Sik; Kim, Dae Ho; Bang, Je Geon; Kim, Sun Ki; Koo, Yang Hyun

    2013-01-01

    Finite element (FE) method that is reliable and proven solution in mechanical field has been introduced into fuel performance codes for multidimensional analysis. The present state of the art in numerical simulation of FE-based fuel performance predominantly involves 2-D axisymmetric model and 3-D volumetric model. The FRAPCON and FRAPTRAN own 1.5-D and 2-D FE model to simulate PCMI and cladding ballooning. In 2-D simulation, the FALCON code, developed by EPRI, is a 2-D (R-Z and R-θ) fully thermal-mechanically coupled steady-state and transient FE-based fuel behavior code. The French codes TOUTATIS and ALCYONE which are 3-D, and typically used to investigate localized behavior. In 2008, the Idaho National Laboratory (INL) has been developing multidimensional (2-D and 3-D) nuclear fuel performance code called BISON. In this paper, the current state of FE-based fuel performance code and their models are presented. Based on investigation into the codes, requirements and direction of development for new FE-based fuel performance code can be discussed. Based on comparison of models in FE-based fuel performance code, status of art in the codes can be discussed. A new FE-based fuel performance code should include typical pellet and cladding models which all codes own. In particular, specified pellet and cladding model such as gaseous swelling and high burnup structure (HBS) model should be developed to improve accuracy of code as well as consider AC condition. To reduce computation cost, the approximated gap and the optimized contact model should be also developed. Nuclear fuel operates in an extreme environment that induces complex multiphysics phenomena, occurring over distances ranging from inter-atomic spacing to meters, and times scales ranging from microseconds to years. This multiphysics behavior is often tightly coupled, a well known example being the thermomechanical behavior. Adding to this complexity, important aspects of fuel behavior are inherently

  19. Defining Privacy Is Supposed to Be Easy

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Gross, Thomas; Viganò, Luca

    2013-01-01

    Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on the static equivalence of frames in the applied pi-calculus, basically asking whether or not the intruder is able to distinguish two given worlds. A subtle question is how we can be sure...... that we have specified all pairs of worlds to properly reflect our intuitive privacy goal. To address this problem, we introduce in this paper a novel and declarative way to specify privacy goals, called α-β privacy, and relate it to static equivalence. This new approach is based on specifying two...... formulae α and β in first-order logic with Herbrand universes, where α reflects the intentionally released information and β includes the actual cryptographic (“technical”) messages the intruder can see. Then α-β privacy means that the intruder cannot derive any “non-technical” statement from β that he...

  20. State Generation Method for Humanoid Motion Planning Based on Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Xuyang Wang

    2012-05-01

    Full Text Available A new approach to generate the original motion data for humanoid motion planning is presented in this paper. And a state generator is developed based on the genetic algorithm, which enables users to generate various motion states without using any reference motion data. By specifying various types of constraints such as configuration constraints and contact constraints, the state generator can generate stable states that satisfy the constraint conditions for humanoid robots. To deal with the multiple constraints and inverse kinematics, the state generation is finally simplified as a problem of optimizing and searching. In our method, we introduce a convenient mathematic representation for the constraints involved in the state generator, and solve the optimization problem with the genetic algorithm to acquire a desired state. To demonstrate the effectiveness and advantage of the method, a number of motion states are generated according to the requirements of the motion.

  1. State Generation Method for Humanoid Motion Planning Based on Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Xuyang Wang

    2008-11-01

    Full Text Available A new approach to generate the original motion data for humanoid motion planning is presented in this paper. And a state generator is developed based on the genetic algorithm, which enables users to generate various motion states without using any reference motion data. By specifying various types of constraints such as configuration constraints and contact constraints, the state generator can generate stable states that satisfy the constraint conditions for humanoid robots.To deal with the multiple constraints and inverse kinematics, the state generation is finally simplified as a problem of optimizing and searching. In our method, we introduce a convenient mathematic representation for the constraints involved in the state generator, and solve the optimization problem with the genetic algorithm to acquire a desired state. To demonstrate the effectiveness and advantage of the method, a number of motion states are generated according to the requirements of the motion.

  2. Radioactive waste produced by DEMO and commerical fusion reactors extrapolated from ITER and advanced data bases

    International Nuclear Information System (INIS)

    Stacey, W.M.; Hertel, N.E.; Hoffman, E.A.

    1994-01-01

    The potential for providing energy with minimal environmental impact is a powerful motivation for the development of fusion and is the long-term objective of most fusion programs. However, the societal acceptability of magnetic fusion may well be decided in the near-term when decisions are taken on the construction of DEMO to follow ITER (if not when the construction decision is taken on ITER). Component wastes were calculated for DEMOs based on each data base by first calculating reactor sizes needed to satisfy the physics, stress and radiation attenuation requirements, and then calculating component replacement rates based on radiation damage and erosion limits. Then, radioactive inventories were calculated and compared to a number of international criteria for open-quote near-surface close-quote burial. None of the components in either type of design would meet the Japanese LLW criterion ( 3 ) within 10 years of shutdown, although the advanced (V/Li) blanket would do so soon afterwards. The vanadium first wall, divertor and blanket would satisfy the IAEA LLW criterion (<2 mSv/h contact dose) within about 10 years after shutdown, but none of the stainless steel or copper components would. All the components in the advanced data base designs except the stainless steel vacuum vessel and shield readily satisfy the US extended 10CFR61 intruder dose criterion, but none of the components in the open-quotes ITER data baseclose quotes designs do so. It seems unlikely that a stainless steel first wall or a copper divertor plate could satisfy the US (class C) criterion for near surface burial, much less the more stringent international, criteria. On the other hand, the first wall, divertor and blanket of the V/Li system would still satisfy the intruder dose concentration limits even if the dose criterion was reduced by two orders of magnitude

  3. Power System Real-Time Monitoring by Using PMU-Based Robust State Estimation Method

    DEFF Research Database (Denmark)

    Zhao, Junbo; Zhang, Gexiang; Das, Kaushik

    2016-01-01

    Accurate real-time states provided by the state estimator are critical for power system reliable operation and control. This paper proposes a novel phasor measurement unit (PMU)-based robust state estimation method (PRSEM) to real-time monitor a power system under different operation conditions...... the system real-time states with good robustness and can address several kinds of BD.......-based bad data (BD) detection method, which can handle the smearing effect and critical measurement errors, is presented. We evaluate PRSEM by using IEEE benchmark test systems and a realistic utility system. The numerical results indicate that, in short computation time, PRSEM can effectively track...

  4. The structure of nuclei far from beta stability

    International Nuclear Information System (INIS)

    Zganjar, E.F.

    1992-01-01

    This report discusses: shape coexistence and intruder states; the electric monopole transition in nuclei; gold isotopes; platinum isotopes; iridium isotopes; search for superdeformation in 192 Hg; search for population of superformed states in 194 Pb using 194 Bi β + -decay; detailed nuclear structure studies far from stability; prototype internal pair spectrometer; and picosecond lifetime spectrometer

  5. Device-free object tracking using passive tags

    CERN Document Server

    Han, Jinsong; Zhao, Kun; Jiang, Zhiping

    2014-01-01

    This SpringerBrief examines the use of cheap commercial passive RFID tags to achieve accurate device-free object-tracking. It presents a sensitive detector, named Twins, which uses a pair of adjacent passive tags to detect uncooperative targets (such as intruders). Twins leverages a newly observed phenomenon called critical state that is caused by interference among passive tags.The author expands on the previous object tracking methods, which are mostly device-based, and reveals a new interference model and their extensive experiments for validation. A prototype implementation of the Twins-ba

  6. Big Data-Driven Based Real-Time Traffic Flow State Identification and Prediction

    Directory of Open Access Journals (Sweden)

    Hua-pu Lu

    2015-01-01

    Full Text Available With the rapid development of urban informatization, the era of big data is coming. To satisfy the demand of traffic congestion early warning, this paper studies the method of real-time traffic flow state identification and prediction based on big data-driven theory. Traffic big data holds several characteristics, such as temporal correlation, spatial correlation, historical correlation, and multistate. Traffic flow state quantification, the basis of traffic flow state identification, is achieved by a SAGA-FCM (simulated annealing genetic algorithm based fuzzy c-means based traffic clustering model. Considering simple calculation and predictive accuracy, a bilevel optimization model for regional traffic flow correlation analysis is established to predict traffic flow parameters based on temporal-spatial-historical correlation. A two-stage model for correction coefficients optimization is put forward to simplify the bilevel optimization model. The first stage model is built to calculate the number of temporal-spatial-historical correlation variables. The second stage model is present to calculate basic model formulation of regional traffic flow correlation. A case study based on a real-world road network in Beijing, China, is implemented to test the efficiency and applicability of the proposed modeling and computing methods.

  7. A generator for unique quantum random numbers based on vacuum states

    DEFF Research Database (Denmark)

    Gabriel, C.; Wittmann, C.; Sych, D.

    2010-01-01

    the purity of a continuous-variable quantum vacuum state to generate unique random numbers. We use the intrinsic randomness in measuring the quadratures of a mode in the lowest energy vacuum state, which cannot be correlated to any other state. The simplicity of our source, combined with its verifiably......Random numbers are a valuable component in diverse applications that range from simulations(1) over gambling to cryptography(2,3). The quest for true randomness in these applications has engendered a large variety of different proposals for producing random numbers based on the foundational...... unpredictability of quantum mechanics(4-11). However, most approaches do not consider that a potential adversary could have knowledge about the generated numbers, so the numbers are not verifiably random and unique(12-15). Here we present a simple experimental setup based on homodyne measurements that uses...

  8. A method for state of energy estimation of lithium-ion batteries based on neural network model

    International Nuclear Information System (INIS)

    Dong, Guangzhong; Zhang, Xu; Zhang, Chenbin; Chen, Zonghai

    2015-01-01

    The state-of-energy is an important evaluation index for energy optimization and management of power battery systems in electric vehicles. Unlike the state-of-charge which represents the residual energy of the battery in traditional applications, state-of-energy is integral result of battery power, which is the product of current and terminal voltage. On the other hand, like state-of-charge, the state-of-energy has an effect on terminal voltage. Therefore, it is hard to solve the nonlinear problems between state-of-energy and terminal voltage, which will complicate the estimation of a battery's state-of-energy. To address this issue, a method based on wavelet-neural-network-based battery model and particle filter estimator is presented for the state-of-energy estimation. The wavelet-neural-network based battery model is used to simulate the entire dynamic electrical characteristics of batteries. The temperature and discharge rate are also taken into account to improve model accuracy. Besides, in order to suppress the measurement noises of current and voltage, a particle filter estimator is applied to estimate cell state-of-energy. Experimental results on LiFePO_4 batteries indicate that the wavelet-neural-network based battery model simulates battery dynamics robustly with high accuracy and the estimation value based on the particle filter estimator converges to the real state-of-energy within an error of ±4%. - Highlights: • State-of-charge is replaced by state-of-energy to determine cells residual energy. • The battery state-space model is established based on a neural network. • Temperature and current influence are considered to improve the model accuracy. • The particle filter is used for state-of-energy estimation to improve accuracy. • The robustness of new method is validated under dynamic experimental conditions.

  9. Zirconia-based solid state chemical gas sensors

    CERN Document Server

    Zhuiykov, S

    2000-01-01

    This paper presents an overview of chemical gas sensors, based on solid state technology, that are sensitive to environmental gases, such as O sub 2 , SO sub x , NO sub x , CO sub 2 and hydrocarbons. The paper is focussed on performance of electrochemical gas sensors that are based on zirconia as a solid electrolyte. The paper considers sensor structures and selection of electrode materials. Impact of interfaces on sensor performance is discussed. This paper also provides a brief overview of electrochemical properties of zirconia and their effect on sensor performance. Impact of auxiliary materials on sensors performance characteristics, such as sensitivity, selectivity, response time and recovery time, is also discussed. Dual gas sensors that can be applied for simultaneous monitoring of the concentration of both oxygen and other gas phase components, are briefly considered

  10. Two-party quantum key agreement based on four-particle GHZ states

    Science.gov (United States)

    He, Ye-Feng; Ma, Wen-Ping

    2016-04-01

    Based on four-particle GHZ states, the double CNOT operation and the delayed measurement technique, a two-party quantum key agreement (QKA) protocols is proposed. The double CNOT operation makes each four-particle GHZ state collapse into two independent quantum states without any entanglement. Furthermore, one party can directly know the two quantum states and the other party can be aware of the two quantum states by using the corresponding measurement. According to the initial states of the two quantum states, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Then the protocol achieves the fair establishment of a shared key. The security analysis shows that the new protocol can resist against participant attacks, the Trojan horse attacks and other outsider attacks. Furthermore, the new protocol also has no information leakage problem and has high qubit efficiency.

  11. Quantum computing based on space states without charge transfer

    International Nuclear Information System (INIS)

    Vyurkov, V.; Filippov, S.; Gorelik, L.

    2010-01-01

    An implementation of a quantum computer based on space states in double quantum dots is discussed. There is no charge transfer in qubits during a calculation, therefore, uncontrolled entanglement between qubits due to long-range Coulomb interaction is suppressed. Encoding and processing of quantum information is merely performed on symmetric and antisymmetric states of the electron in double quantum dots. Other plausible sources of decoherence caused by interaction with phonons and gates could be substantially suppressed in the structure as well. We also demonstrate how all necessary quantum logic operations, initialization, writing, and read-out could be carried out in the computer.

  12. A displacement based FE formulation for steady state problems

    NARCIS (Netherlands)

    Yu, Y.

    2005-01-01

    In this thesis a new displacement based formulation is developed for elasto-plastic deformations in steady state problems. In this formulation the displacements are the primary variables, which is in contrast to the more common formulations in terms of the velocities as the primary variables. In a

  13. Iterative approach to effective interactions in nuclei

    International Nuclear Information System (INIS)

    Heiss, W.D.

    1982-01-01

    Starting from a non-linear equation for the effective interaction in a model space, various iteration procedures converge to a correct solution irrespective of the presence of intruder states. The physical significance of the procedures and the respective solution is discussed

  14. Study of the β- decay of 116m1In: A new interpretation of low-lying 0+ states in 116Sn

    Science.gov (United States)

    Pore, J. L.; Cross, D. S.; Andreoiu, C.; Ashley, R.; Ball, G. C.; Bender, P. C.; Chester, A. S.; Diaz Varela, A.; Demand, G. A.; Dunlop, R.; Garnsworthy, A. B.; Garrett, P. E.; Hackman, G.; Hadinia, B.; Jigmeddorj, B.; Laffoley, A. T.; Liblong, A.; Kanungo, R.; Noakes, B.; Petrache, C. M.; Rajabali, M. M.; Starosta, K.; Svensson, C. E.; Voss, P. J.; Wang, Z. M.; Wood, J. L.; Yates, S. W.

    2017-02-01

    The 116Sn nucleus contains a collective rotational band originating from proton π 2 p-2 h excitations across the proton Z=50 shell gap. Even though this nucleus has been extensively investigated in the past, there was still missing information on the low-energy interband transitions connecting the intruder and normal structures. The low-lying structure of 116Sn was investigated through a high-statistics study of the β- decay of 116m1In with the 8π spectrometer and its ancillary detectors at TRIUMF. These measurements are critical in order to properly characterize the π 2 p-2 h rotational band. Weak γ-decay branches are observed utilizing γ-γ coincidence spectroscopy methods, leading to the first direct observation of the 85 keV 22+→ 03+ γ ray with a transition strength of B(E2) = 99.7(84) W.u. The analysis of these results strongly suggests that the 2027 keV 03+ state should replace the previously assigned 1757 keV 02+ state as the band-head of the π 2 p-2 h rotational band.

  15. Web of Objects Based Ambient Assisted Living Framework for Emergency Psychiatric State Prediction

    Science.gov (United States)

    Alam, Md Golam Rabiul; Abedin, Sarder Fakhrul; Al Ameen, Moshaddique; Hong, Choong Seon

    2016-01-01

    Ambient assisted living can facilitate optimum health and wellness by aiding physical, mental and social well-being. In this paper, patients’ psychiatric symptoms are collected through lightweight biosensors and web-based psychiatric screening scales in a smart home environment and then analyzed through machine learning algorithms to provide ambient intelligence in a psychiatric emergency. The psychiatric states are modeled through a Hidden Markov Model (HMM), and the model parameters are estimated using a Viterbi path counting and scalable Stochastic Variational Inference (SVI)-based training algorithm. The most likely psychiatric state sequence of the corresponding observation sequence is determined, and an emergency psychiatric state is predicted through the proposed algorithm. Moreover, to enable personalized psychiatric emergency care, a service a web of objects-based framework is proposed for a smart-home environment. In this framework, the biosensor observations and the psychiatric rating scales are objectified and virtualized in the web space. Then, the web of objects of sensor observations and psychiatric rating scores are used to assess the dweller’s mental health status and to predict an emergency psychiatric state. The proposed psychiatric state prediction algorithm reported 83.03 percent prediction accuracy in an empirical performance study. PMID:27608023

  16. Disruption of the glutamate-glutamine cycle involving astrocytes in an animal model of depression for males and females

    Directory of Open Access Journals (Sweden)

    Virginie Rappeneau

    2016-12-01

    Full Text Available Background: Women are twice as likely as men to develop major depression (MD. The brain mechanisms underlying this sex disparity are not clear. Disruption of the glutamate-glutamine cycle has been implicated in psychiatric disturbances. This study identifies sex-based impairments in the glutamate-glutamine cycle involving astrocytes using an animal model of depression. Methods: Male and female adult Long-Evans rats were exposed to chronic social defeat stress (CSDS for 21 days, using a modified resident-intruder paradigm. Territorial aggression was used for males and maternal aggression was used for females to induce depressive-like deficits for intruders. The depressive-like phenotype was assessed with intake for saccharin solution, weight gain, estrous cycle, and corticosterone (CORT. Behaviors displayed by the intruders during daily encounters with residents were characterized. Rats with daily handling were used as controls for each sex. Ten days after the last encounter, both the intruders and controls were subjected to a no-net-flux in vivo microdialysis to assess glutamate accumulation and extracellular glutamine in the nucleus accumbens (NAc. The contralateral hemispheres were used for determining changes in astrocytic markers, including glial fibrillary acidic protein (GFAP and glutamate transporter-1 (GLT-1. Results: Both male and female intruders reduced saccharin intake over the course of CSDS, compared to their pre-stress period and to their respective controls. Male intruders exhibited submissive/defensive behaviors to territorial aggression by receiving sideways threats and bites. These males showed reductions in striatal GLT-1 and spontaneous glutamine in the NAc, compared to controls. Female intruders exhibited isolated behaviors to maternal aggression, including immobility, rearing, and self-grooming. Their non-reproductive days were extended. Also, they showed reductions in prefrontal and accumbal GFAP+ cells and prefrontal GLT

  17. Event-Based $H_\\infty $ State Estimation for Time-Varying Stochastic Dynamical Networks With State- and Disturbance-Dependent Noises.

    Science.gov (United States)

    Sheng, Li; Wang, Zidong; Zou, Lei; Alsaadi, Fuad E

    2017-10-01

    In this paper, the event-based finite-horizon H ∞ state estimation problem is investigated for a class of discrete time-varying stochastic dynamical networks with state- and disturbance-dependent noises [also called (x,v) -dependent noises]. An event-triggered scheme is proposed to decrease the frequency of the data transmission between the sensors and the estimator, where the signal is transmitted only when certain conditions are satisfied. The purpose of the problem addressed is to design a time-varying state estimator in order to estimate the network states through available output measurements. By employing the completing-the-square technique and the stochastic analysis approach, sufficient conditions are established to ensure that the error dynamics of the state estimation satisfies a prescribed H ∞ performance constraint over a finite horizon. The desired estimator parameters can be designed via solving coupled backward recursive Riccati difference equations. Finally, a numerical example is exploited to demonstrate the effectiveness of the developed state estimation scheme.

  18. Symmetric Informationally-Complete Quantum States as Analogues to Orthonormal Bases and Minimum-Uncertainty States

    Directory of Open Access Journals (Sweden)

    D. Marcus Appleby

    2014-03-01

    Full Text Available Recently there has been much effort in the quantum information community to prove (or disprove the existence of symmetric informationally complete (SIC sets of quantum states in arbitrary finite dimension. This paper strengthens the urgency of this question by showing that if SIC-sets exist: (1 by a natural measure of orthonormality, they are as close to being an orthonormal basis for the space of density operators as possible; and (2 in prime dimensions, the standard construction for complete sets of mutually unbiased bases and Weyl-Heisenberg covariant SIC-sets are intimately related: The latter represent minimum uncertainty states for the former in the sense of Wootters and Sussman. Finally, we contribute to the question of existence by conjecturing a quadratic redundancy in the equations for Weyl-Heisenberg SIC-sets.

  19. Transportation legislative data base : state radioactive materials transportation statute compilation, 1989-1993

    Science.gov (United States)

    1994-04-30

    The Transportation Legislative Data Base (TLDB) is a computer-based information service containing summaries of federal, state and certain local government statutes and regulations relating to the transportation of radioactive materials in the United...

  20. Hybrid fuzzy charged system search algorithm based state estimation in distribution networks

    Directory of Open Access Journals (Sweden)

    Sachidananda Prasad

    2017-06-01

    Full Text Available This paper proposes a new hybrid charged system search (CSS algorithm based state estimation in radial distribution networks in fuzzy framework. The objective of the optimization problem is to minimize the weighted square of the difference between the measured and the estimated quantity. The proposed method of state estimation considers bus voltage magnitude and phase angle as state variable along with some equality and inequality constraints for state estimation in distribution networks. A rule based fuzzy inference system has been designed to control the parameters of the CSS algorithm to achieve better balance between the exploration and exploitation capability of the algorithm. The efficiency of the proposed fuzzy adaptive charged system search (FACSS algorithm has been tested on standard IEEE 33-bus system and Indian 85-bus practical radial distribution system. The obtained results have been compared with the conventional CSS algorithm, weighted least square (WLS algorithm and particle swarm optimization (PSO for feasibility of the algorithm.

  1. Analytical scaling relations to evaluate leakage and intrusion in intermittent water supply systems

    Science.gov (United States)

    Slocum, Alexander H.; Whittle, Andrew J.

    2018-01-01

    Intermittent water supplies (IWS) deliver piped water to one billion people; this water is often microbially contaminated. Contaminants that accumulate while IWS are depressurized are flushed into customers’ homes when these systems become pressurized. In addition, during the steady-state phase of IWS, contaminants from higher-pressure sources (e.g., sewers) may continue to intrude where pipe pressure is low. To guide the operation and improvement of IWS, this paper proposes an analytic model relating supply pressure, supply duration, leakage, and the volume of intruded, potentially-contaminated, fluids present during flushing and steady-state. The proposed model suggests that increasing the supply duration may improve water quality during the flushing phase, but decrease the subsequent steady-state water quality. As such, regulators and academics should take more care in reporting if water quality samples are taken during flushing or steady-state operational conditions. Pipe leakage increases with increased supply pressure and/or duration. We propose using an equivalent orifice area (EOA) to quantify pipe quality. This provides a more stable metric for regulators and utilities tracking pipe repairs. Finally, we show that the volume of intruded fluid decreases in proportion to reductions in EOA. The proposed relationships are applied to self-reported performance indicators for IWS serving 108 million people described in the IBNET database and in the Benchmarking and Data Book of Water Utilities in India. This application shows that current high-pressure, continuous water supply targets will require extensive EOA reductions. For example, in order to achieve national targets, utilities in India will need to reduce their EOA by a median of at least 90%. PMID:29775462

  2. Analytical scaling relations to evaluate leakage and intrusion in intermittent water supply systems.

    Science.gov (United States)

    Taylor, David D J; Slocum, Alexander H; Whittle, Andrew J

    2018-01-01

    Intermittent water supplies (IWS) deliver piped water to one billion people; this water is often microbially contaminated. Contaminants that accumulate while IWS are depressurized are flushed into customers' homes when these systems become pressurized. In addition, during the steady-state phase of IWS, contaminants from higher-pressure sources (e.g., sewers) may continue to intrude where pipe pressure is low. To guide the operation and improvement of IWS, this paper proposes an analytic model relating supply pressure, supply duration, leakage, and the volume of intruded, potentially-contaminated, fluids present during flushing and steady-state. The proposed model suggests that increasing the supply duration may improve water quality during the flushing phase, but decrease the subsequent steady-state water quality. As such, regulators and academics should take more care in reporting if water quality samples are taken during flushing or steady-state operational conditions. Pipe leakage increases with increased supply pressure and/or duration. We propose using an equivalent orifice area (EOA) to quantify pipe quality. This provides a more stable metric for regulators and utilities tracking pipe repairs. Finally, we show that the volume of intruded fluid decreases in proportion to reductions in EOA. The proposed relationships are applied to self-reported performance indicators for IWS serving 108 million people described in the IBNET database and in the Benchmarking and Data Book of Water Utilities in India. This application shows that current high-pressure, continuous water supply targets will require extensive EOA reductions. For example, in order to achieve national targets, utilities in India will need to reduce their EOA by a median of at least 90%.

  3. Fundamentals of metasurface lasers based on resonant dark states

    International Nuclear Information System (INIS)

    Droulias, Sotiris; Technology - Hellas; Jain, Aditya; Koschny, Thomas; Soukoulis, Costas M.; Technology - Hellas; Ames Laboratory and Iowa State University, Ames, IA

    2017-01-01

    Recently, our group proposed a metamaterial laser design based on explicitly coupled dark resonant states in low-loss dielectrics, which conceptually separates the gain-coupled resonant photonic state responsible for macroscopic stimulated emission from the coupling to specific free-space propagating modes, allowing independent adjustment of the lasing state and its coherent radiation output. Due to this functionality, it is now possible to make lasers that can overcome the trade-off between system dimensions and Q factor, especially for surface emitting lasers with deeply subwavelength thickness. In this paper, we give a detailed discussion of the key functionality and benefits of this design, such as radiation damping tunability, directionality, subwavelength integration, and simple layer-by-layer fabrication. Finally, we examine in detail the fundamental design tradeoffs that establish the principle of operation and must be taken into account and give guidance for realistic implementations.

  4. State-Transition-Aware Spilling Heuristic for MLC STT-RAM-Based Registers

    Directory of Open Access Journals (Sweden)

    Yuanhui Ni

    2017-01-01

    Full Text Available Multilevel Cell Spin-Transfer Torque Random Access Memory (MLC STT-RAM is a promising nonvolatile memory technology to build registers for its natural immunity to electromagnetic radiation in rad-hard space environment. Unlike traditional SRAM-based registers, MLC STT-RAM exhibits unbalanced write state transitions due to the fact that the magnetization directions of hard and soft domains cannot be flipped independently. This feature leads to nonuniform costs of write states in terms of latency and energy. However, current SRAM-targeting register allocations do not have a clear understanding of the impact of the different write state-transition costs. As a result, those approaches heuristically select variables to be spilled without considering the spilling priority imposed by MLC STT-RAM. Aiming to address this limitation, this paper proposes a state-transition-aware spilling cost minimization (SSCM policy, to save power when MLC STT-RAM is employed in register design. Specifically, the spilling cost model is first constructed according to the linear combination of different state-transition frequencies. Directed by the proposed cost model, the compiler picks up spilling candidates to achieve lower power and higher performance. Experimental results show that the proposed SSCM technique can save energy by 19.4% and improve the lifetime by 23.2% of MLC STT-RAM-based register design.

  5. Component state-based integrated importance measure for multi-state systems

    International Nuclear Information System (INIS)

    Si, Shubin; Levitin, Gregory; Dui, Hongyan; Sun, Shudong

    2013-01-01

    Importance measures in reliability engineering are used to identify weak components and/or states in contributing to the reliable functioning of a system. Traditionally, importance measures do not consider the possible effect of groups of transition rates among different component states, which, however, has great effect on the component probability distribution and should therefore be taken into consideration. This paper extends the integrated importance measure (IIM) to estimate the effect of a component residing at certain states on the performance of the entire multi-state systems. This generalization of IIM describes in which state it is most worthy to keep the component to provide the desired level of system performance, and which component is the most important to keep in some state and above for improving the performance of the system. An application to an oil transportation system is presented to illustrate the use of the suggested importance measure

  6. University-Based Teleradiology in the United States.

    Science.gov (United States)

    Hunter, Tim B; Krupinski, Elizabeth A

    2014-04-15

    This article reviews the University of Arizona's more than 15 years of experience with teleradiology and provides an overview of university-based teleradiology practice in the United States (U.S.). In the U.S., teleradiology is a major economic enterprise with many private for-profit companies offering national teleradiology services (i.e., professional interpretation of radiologic studies of all types by American Board of Radiology certified radiologists). The initial thrust for teleradiology was for after-hours coverage of radiologic studies, but teleradiology has expanded its venue to include routine full-time or partial coverage for small hospitals, clinics, specialty medical practices, and urgent care centers. It also provides subspecialty radiologic coverage not available at smaller medical centers and clinics. Many U.S. university-based academic departments of radiology provide teleradiology services usually as an additional for-profit business to supplement departmental income. Since academic-based teleradiology providers have to compete in a very demanding marketplace, their success is not guaranteed. They must provide timely, high-quality professional services for a competitive price. Academic practices have the advantage of house officers and fellows who can help with the coverage, and they have excellent subspecialty expertise. The marketplace is constantly shifting, and university-based teleradiology practices have to be nimble and adjust to ever-changing situations.

  7. Short-Term Distribution System State Forecast Based on Optimal Synchrophasor Sensor Placement and Extreme Learning Machine

    Energy Technology Data Exchange (ETDEWEB)

    Jiang, Huaiguang; Zhang, Yingchen

    2016-11-14

    This paper proposes an approach for distribution system state forecasting, which aims to provide an accurate and high speed state forecasting with an optimal synchrophasor sensor placement (OSSP) based state estimator and an extreme learning machine (ELM) based forecaster. Specifically, considering the sensor installation cost and measurement error, an OSSP algorithm is proposed to reduce the number of synchrophasor sensor and keep the whole distribution system numerically and topologically observable. Then, the weighted least square (WLS) based system state estimator is used to produce the training data for the proposed forecaster. Traditionally, the artificial neural network (ANN) and support vector regression (SVR) are widely used in forecasting due to their nonlinear modeling capabilities. However, the ANN contains heavy computation load and the best parameters for SVR are difficult to obtain. In this paper, the ELM, which overcomes these drawbacks, is used to forecast the future system states with the historical system states. The proposed approach is effective and accurate based on the testing results.

  8. In-gap bound states induced by interstitial Fe impurities in iron-based superconductors

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Degang, E-mail: degangzhang@yahoo.com

    2015-12-15

    Highlights: • We provide an explanation for the interesting STM observation of the robust zero energy bound state on the interstitial Fe impurities in iron-based superconductors. - Abstract: Based on a two-orbit four-band tight binding model, we investigate the low-lying electronic states around the interstitial excess Fe ions in the iron-based superconductors by using T-matrix approach. It is shown that the local density of states at the interstitial Fe impurity (IFI) possesses a strong resonance inside the gap, which seems to be insensitive to the doping and the pairing symmetry in the Fe–Fe plane, while a single or two resonances appear at the nearest neighboring (NN) Fe sites. The location and height of the resonance peaks only depend on the hopping t and the pairing parameter Δ{sub I} between the IFI and the NN Fe sites. These in-gap resonances are originated in the Andreev’s bound states due to the quasiparticle tunneling through the IFI, leading to the change of the magnitude of the superconducting order parameter. When both t and Δ{sub I} are small, this robust zero-energy bound state near the IFI is consistent with recent scanning tunneling microscopy observations.

  9. Detecting brain dynamics during resting state: a tensor based evolutionary clustering approach

    Science.gov (United States)

    Al-sharoa, Esraa; Al-khassaweneh, Mahmood; Aviyente, Selin

    2017-08-01

    Human brain is a complex network with connections across different regions. Understanding the functional connectivity (FC) of the brain is important both during resting state and task; as disruptions in connectivity patterns are indicators of different psychopathological and neurological diseases. In this work, we study the resting state functional connectivity networks (FCNs) of the brain from fMRI BOLD signals. Recent studies have shown that FCNs are dynamic even during resting state and understanding the temporal dynamics of FCNs is important for differentiating between different conditions. Therefore, it is important to develop algorithms to track the dynamic formation and dissociation of FCNs of the brain during resting state. In this paper, we propose a two step tensor based community detection algorithm to identify and track the brain network community structure across time. First, we introduce an information-theoretic function to reduce the dynamic FCN and identify the time points that are similar topologically to combine them into a tensor. These time points will be used to identify the different FC states. Second, a tensor based spectral clustering approach is developed to identify the community structure of the constructed tensors. The proposed algorithm applies Tucker decomposition to the constructed tensors and extract the orthogonal factor matrices along the connectivity mode to determine the common subspace within each FC state. The detected community structure is summarized and described as FC states. The results illustrate the dynamic structure of resting state networks (RSNs), including the default mode network, somatomotor network, subcortical network and visual network.

  10. Equine-Facilitated Prison-Based Programs within the Context of Prison-Based Animal Programs: State of the Science Review

    Science.gov (United States)

    Bachi, Keren

    2013-01-01

    Equine-facilitated prison programs have become more prevalent and operate in correctional facilities in 13 states throughout the United States. However, there is a deficit of empirical knowledge to guide them. This article reviews 19 studies of prison-based animal programs and centers on patterns in the literature. It reveals how previous studies…

  11. Relationships among oxidation-reduction and acid-base properties of the actinides in high oxidation states

    International Nuclear Information System (INIS)

    Morss, L.R.

    1992-01-01

    The first chemical identification of plutonium, its subsequent isolation on the macroscopic scale, and more recent chemical separation schemes were achieved by taking advantage of the differences among the oxidation states of uranium, neptunium, and plutonium. Many acid-base properties modify the relative stabilities of oxidation states of the actinides. In the solid state, strongly basic compounds such as Cs 2 O yield complex oxides with oxidation states of Np(VII), Pu(VI), and Am(VI) whereas more acidic compounds such as CsF yield complex fluorides with lower oxidation states. In aqueous solution, high basicity and strongly covalent complexes favor high oxidation states. In nonaqueous solvent systems, high acidity generally favors low oxidation states. This paper elucidates and attempts to interpret the effects of these acid-base properties in a systematic fashion

  12. Toward demonstrating controlled-X operation based on continuous-variable four-partite cluster states and quantum teleporters

    International Nuclear Information System (INIS)

    Wang Yu; Su Xiaolong; Shen Heng; Tan Aihong; Xie Changde; Peng Kunchi

    2010-01-01

    One-way quantum computation based on measurement and multipartite cluster entanglement offers the ability to perform a variety of unitary operations only through different choices of measurement bases. Here we present an experimental study toward demonstrating the controlled-X operation, a two-mode gate in which continuous variable (CV) four-partite cluster states of optical modes are utilized. Two quantum teleportation elements are used for achieving the gate operation of the quantum state transformation from input target and control states to output states. By means of the optical cluster state prepared off-line, the homodyne detection and electronic feeding forward, the information carried by the input control state is transformed to the output target state. The presented scheme of the controlled-X operation based on teleportation can be implemented nonlocally and deterministically. The distortion of the quantum information resulting from the imperfect cluster entanglement is estimated with the fidelity.

  13. Shape coexistence at N=20 and N=28: Study of 0{sub 2}{sup +} states in {sup 34}Si and {sup 44}S

    Energy Technology Data Exchange (ETDEWEB)

    Grévy, S.; Rotaru, F.; Negoita, F.; Borcea, C.; Borcea, R.; Buta, A.; Calinescu, S.; Petrone, C. [Centre d' Etudes Nucléaire de Bordeaux Gradignan, CNRS/IN2P3, Chemin du Solarium, 33175 Gradignan Cedex (France); Stanoiu, M. [Horia Hulubei National Institute for Physics and Nuclear Engineering, IFIN-HH, P.O.B. MG-6, 077125 Magurele (Romania); Mrazek, J.; Lukyanov, S. [Nuclear Physics Institute, AS CR, CZ-25068 Rez (Czech Republic); Penionzhkevich, Y.; Cáceres, L.; De Oliveira, F.; Force, C.; Lebhertz, D.; Sorlin, O.; Stodel, C. [FLNR, JINR, 141980 Dubna, Moscow region (Russian Federation); Thomas, J. C.; Chevrier, R. [Grand Accélérateur National d' Ions Lourds (GANIL), CEA/DSM - CNRS/IN2P3, Bd Henri Becquerel, BP 55027, F-14076 Caen Cedex 5 (France); and others

    2014-08-14

    It is well known that the nuclear shell structure changes for the most exotic nuclei. One of the consequences of this phenomenon is the modification of the 'classical' magic numbers, as experimentally observed at N = 20 and N = 28. Nevertheless, the mechanisms responsible for such changes are still under discussion and more experimental information is needed to better constrain the theoretical models. In these proceedings, we report on the discovery and the experimental study by precise spectroscopy experiments of the 0{sub 2}{sup +} state in {sup 34}Si and {sup 44}S. The {sup 34}Si is located between the magic spherical {sup 36}S and the deformed {sup 32}Mg, member of the so-called island of inversion, whereas {sup 44}S is located between the magic spherical {sup 48}Ca and the deformed {sup 42}Si. Therefore, the structure of these nuclei, and in particular the phenomenon of shape coexistence, is of crucial importance to understand how the intruder configurations progressively dominate the ground state structure of the most exotic nuclei at both N = 20 and N = 28.

  14. Experiences with strain based limit state design in The Netherlands

    NARCIS (Netherlands)

    Gresnigt, A.M.; Foeken, R.J. van

    1996-01-01

    Limit state design differs from conventional design methods in that each failure mode is specifically addressed (e.g. burst, collapse, local buckling, fracture due to insufficient strain capacity of the pipe wall, fatigue). Based on an extensive theoretical and experimental research programme,

  15. Structural Phenomenon of Cement-Based Composite Elements in Ultimate Limit State

    Directory of Open Access Journals (Sweden)

    I. Iskhakov

    2016-01-01

    Full Text Available Cement-based composite materials have minimum of two components, one of which has higher strength compared to the other. Such materials include concrete, reinforced concrete (RC, and ferrocement, applied in single- or two-layer RC elements. This paper discusses experimental and theoretical results, obtained by the authors in the recent three decades. The authors have payed attention to a structural phenomenon that many design features (parameters, properties, etc. at ultimate limit state (ULS of a structure are twice higher (or lower than at initial loading state. This phenomenon is evident at material properties, structures (or their elements, and static and/or dynamic structural response. The phenomenon is based on two ideas that were developed by first author: quasi-isotropic state of a structure at ULS and minimax principle. This phenomenon is supported by experimental and theoretical results, obtained for various structures, like beams, frames, spatial structures, and structural joints under static or/and dynamic loadings. This study provides valuable indicators for experiments’ planning and estimation of structural state. The phenomenon provides additional equation(s for calculating parameters that are usually obtained experimentally and can lead to developing design concepts and RC theory, in which the number of empirical design coefficients will be minimal.

  16. Grading the Metrics: Performance-Based Funding in the Florida State University System

    Science.gov (United States)

    Cornelius, Luke M.; Cavanaugh, Terence W.

    2016-01-01

    A policy analysis of Florida's 10-factor Performance-Based Funding system for state universities. The focus of the article is on the system of performance metrics developed by the state Board of Governors and their impact on institutions and their missions. The paper also discusses problems and issues with the metrics, their ongoing evolution, and…

  17. H∞ state estimation of stochastic memristor-based neural networks with time-varying delays.

    Science.gov (United States)

    Bao, Haibo; Cao, Jinde; Kurths, Jürgen; Alsaedi, Ahmed; Ahmad, Bashir

    2018-03-01

    This paper addresses the problem of H ∞ state estimation for a class of stochastic memristor-based neural networks with time-varying delays. Under the framework of Filippov solution, the stochastic memristor-based neural networks are transformed into systems with interval parameters. The present paper is the first to investigate the H ∞ state estimation problem for continuous-time Itô-type stochastic memristor-based neural networks. By means of Lyapunov functionals and some stochastic technique, sufficient conditions are derived to ensure that the estimation error system is asymptotically stable in the mean square with a prescribed H ∞ performance. An explicit expression of the state estimator gain is given in terms of linear matrix inequalities (LMIs). Compared with other results, our results reduce control gain and control cost effectively. Finally, numerical simulations are provided to demonstrate the efficiency of the theoretical results. Copyright © 2018 Elsevier Ltd. All rights reserved.

  18. Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol

    International Nuclear Information System (INIS)

    Chen, I-C; Hwang Tzonelih; Li C-M

    2008-01-01

    On the basis of the modified four-coherent-state post-selection quantum key distribution protocol (Namiki and Hirano 2006 Preprint quant-ph/0608144v1), two 1-out-of-2 quantum oblivious transfer (QOT 2 1 ) protocols are proposed. The first proposed protocol (called the receiver-based QOT 2 1 protocol) requires the coherent states to be prepared by the receiver, whereas the second protocol (called the sender-based QOT 2 1 protocol) allows the coherent states to be generated by the sender. The main advantages of the proposed protocols are that (i) no quantum bit commitment schemes and the assumption of quantum memory are needed; (ii) less communication cost between participants is required, i.e. the receiver-based QOT 2 1 protocol requires only one quantum communication and one classical communication and the sender-based QOT 2 1 protocol requires only one quantum communication between participants during protocol execution; and (iii) the utilization of quantum states is very efficient, wherein the receiver-based and the sender-based QOT 2 1 protocols use only two coherent pulses and one coherent pulse respectively for sending the sender's two messages

  19. Response-based estimation of sea state parameters - Influence of filtering

    DEFF Research Database (Denmark)

    Nielsen, Ulrik Dam

    2007-01-01

    Reliable estimation of the on-site sea state parameters is essential to decision support systems for safe navigation of ships. The wave spectrum can be estimated from procedures based on measured ship responses. The paper deals with two procedures—Bayesian Modelling and Parametric Modelling...

  20. N-state random switching based on quantum tunnelling

    Science.gov (United States)

    Bernardo Gavito, Ramón; Jiménez Urbanos, Fernando; Roberts, Jonathan; Sexton, James; Astbury, Benjamin; Shokeir, Hamzah; McGrath, Thomas; Noori, Yasir J.; Woodhead, Christopher S.; Missous, Mohamed; Roedig, Utz; Young, Robert J.

    2017-08-01

    In this work, we show how the hysteretic behaviour of resonant tunnelling diodes (RTDs) can be exploited for new functionalities. In particular, the RTDs exhibit a stochastic 2-state switching mechanism that could be useful for random number generation and cryptographic applications. This behaviour can be scaled to N-bit switching, by connecting various RTDs in series. The InGaAs/AlAs RTDs used in our experiments display very sharp negative differential resistance (NDR) peaks at room temperature which show hysteresis cycles that, rather than having a fixed switching threshold, show a probability distribution about a central value. We propose to use this intrinsic uncertainty emerging from the quantum nature of the RTDs as a source of randomness. We show that a combination of two RTDs in series results in devices with three-state outputs and discuss the possibility of scaling to N-state devices by subsequent series connections of RTDs, which we demonstrate for the up to the 4-state case. In this work, we suggest using that the intrinsic uncertainty in the conduction paths of resonant tunnelling diodes can behave as a source of randomness that can be integrated into current electronics to produce on-chip true random number generators. The N-shaped I-V characteristic of RTDs results in a two-level random voltage output when driven with current pulse trains. Electrical characterisation and randomness testing of the devices was conducted in order to determine the validity of the true randomness assumption. Based on the results obtained for the single RTD case, we suggest the possibility of using multi-well devices to generate N-state random switching devices for their use in random number generation or multi-valued logic devices.

  1. Solid-State Quantum Computer Based on Scanning Tunneling Microscopy

    Energy Technology Data Exchange (ETDEWEB)

    Berman, G. P.; Brown, G. W.; Hawley, M. E.; Tsifrinovich, V. I.

    2001-08-27

    We propose a solid-state nuclear-spin quantum computer based on application of scanning tunneling microscopy (STM) and well-developed silicon technology. It requires the measurement of tunneling-current modulation caused by the Larmor precession of a single electron spin. Our envisioned STM quantum computer would operate at the high magnetic field ({approx}10 T) and at low temperature {approx}1 K .

  2. Solid-State Quantum Computer Based on Scanning Tunneling Microscopy

    International Nuclear Information System (INIS)

    Berman, G. P.; Brown, G. W.; Hawley, M. E.; Tsifrinovich, V. I.

    2001-01-01

    We propose a solid-state nuclear-spin quantum computer based on application of scanning tunneling microscopy (STM) and well-developed silicon technology. It requires the measurement of tunneling-current modulation caused by the Larmor precession of a single electron spin. Our envisioned STM quantum computer would operate at the high magnetic field (∼10 T) and at low temperature ∼1 K

  3. University-Based Teleradiology in the United States

    Directory of Open Access Journals (Sweden)

    Tim B. Hunter

    2014-04-01

    Full Text Available This article reviews the University of Arizona’s more than 15 years of experience with teleradiology and provides an overview of university-based teleradiology practice in the United States (U.S.. In the U.S., teleradiology is a major economic enterprise with many private for-profit companies offering national teleradiology services (i.e., professional interpretation of radiologic studies of all types by American Board of Radiology certified radiologists. The initial thrust for teleradiology was for after-hours coverage of radiologic studies, but teleradiology has expanded its venue to include routine full-time or partial coverage for small hospitals, clinics, specialty medical practices, and urgent care centers. It also provides subspecialty radiologic coverage not available at smaller medical centers and clinics. Many U.S. university-based academic departments of radiology provide teleradiology services usually as an additional for-profit business to supplement departmental income. Since academic-based teleradiology providers have to compete in a very demanding marketplace, their success is not guaranteed. They must provide timely, high-quality professional services for a competitive price. Academic practices have the advantage of house officers and fellows who can help with the coverage, and they have excellent subspecialty expertise. The marketplace is constantly shifting, and university-based teleradiology practices have to be nimble and adjust to ever-changing situations.

  4. Electrically tunable robust edge states in graphene-based topological photonic crystal slabs

    Science.gov (United States)

    Song, Zidong; Liu, HongJun; Huang, Nan; Wang, ZhaoLu

    2018-03-01

    Topological photonic crystals are optical structures supporting topologically protected unidirectional edge states that exhibit robustness against defects. Here, we propose a graphene-based all-dielectric photonic crystal slab structure that supports two-dimensionally confined topological edge states. These topological edge states can be confined in the out-of-plane direction by two parallel graphene sheets. In the structure, the excitation frequency range of topological edge states can be dynamically and continuously tuned by varying bias voltage across the two parallel graphene sheets. Utilizing this kind of architecture, we construct Z-shaped channels to realize topological edge transmission with diffrerent frequencies. The proposal provides a new degree of freedom to dynamically control topological edge states and potential applications for robust integrated photonic devices and optical communication systems.

  5. Prototype of smart office system using based security system

    Science.gov (United States)

    Prasetyo, T. F.; Zaliluddin, D.; Iqbal, M.

    2018-05-01

    Creating a new technology in the modern era gives a positive impact on business and industry. Internet of Things (IoT) as a new communication technology is very useful in realizing smart systems such as: smart home, smart office, smart parking and smart city. This study presents a prototype of the smart office system which was designed as a security system based on IoT. Smart office system development method used waterfall model. IoT-based smart office system used platform (project builder) cayenne so that. The data can be accessed and controlled through internet network from long distance. Smart office system used arduino mega 2560 microcontroller as a controller component. In this study, Smart office system is able to detect threats of dangerous objects made from metals, earthquakes, fires, intruders or theft and perform security monitoring outside the building by using raspberry pi cameras on autonomous robots in real time to the security guard.

  6. Collisional model for granular impact dynamics.

    Science.gov (United States)

    Clark, Abram H; Petersen, Alec J; Behringer, Robert P

    2014-01-01

    When an intruder strikes a granular material from above, the grains exert a stopping force which decelerates and stops the intruder. Many previous studies have used a macroscopic force law, including a drag force which is quadratic in velocity, to characterize the decelerating force on the intruder. However, the microscopic origins of the force-law terms are still a subject of debate. Here, drawing from previous experiments with photoelastic particles, we present a model which describes the velocity-squared force in terms of repeated collisions with clusters of grains. From our high speed photoelastic data, we infer that "clusters" correspond to segments of the strong force network that are excited by the advancing intruder. The model predicts a scaling relation for the velocity-squared drag force that accounts for the intruder shape. Additionally, we show that the collisional model predicts an instability to rotations, which depends on the intruder shape. To test this model, we perform a comprehensive experimental study of the dynamics of two-dimensional granular impacts on beds of photoelastic disks, with different profiles for the leading edge of the intruder. We particularly focus on a simple and useful case for testing shape effects by using triangular-nosed intruders. We show that the collisional model effectively captures the dynamics of intruder deceleration and rotation; i.e., these two dynamical effects can be described as two different manifestations of the same grain-scale physical processes.

  7. Stewart analysis of apparently normal acid-base state in the critically ill

    NARCIS (Netherlands)

    Moviat, M.; Boogaard, M. van den; Intven, F.; Voort, P. van der; Hoeven, H. van der; Pickkers, P.

    2013-01-01

    PURPOSE: This study aimed to describe Stewart parameters in critically ill patients with an apparently normal acid-base state and to determine the incidence of mixed metabolic acid-base disorders in these patients. MATERIALS AND METHODS: We conducted a prospective, observational multicenter study of

  8. The Potential of Online Respondent Data for Choice Modeling in Transportation Research: Evidence from Stated Preference Experiments using Web-based Samples: Evidence from Stated Preference Experiments using Web-based Samples

    OpenAIRE

    Hoffer, Brice

    2015-01-01

    The aim of this thesis is to analyze the potential of online survey services for conducting stated preference experiments in the field of transportation planning. Several web-products for hosting questionnaires are evaluated considering important features required when conducting a stated preference survey. Based on this evaluation, the open-source platform LimeSurvey is the most appropriated for this kind of research. A stated preference questionnaire about pedestrians’ route choice in a Sin...

  9. A pilot test of a new stated preference valuation method. Continuous attribute-based stated choice

    International Nuclear Information System (INIS)

    Ready, Richard; Fisher, Ann; Guignet, Dennis; Stedman, Richard; Wang, Junchao

    2006-01-01

    A new stated preference nonmarket valuation technique is developed. In an interactive computerized survey, respondents move continuous sliders to vary levels of environmental attributes. The total cost of the combination of attributes is calculated according to a preprogrammed cost function, continuously updated and displayed as respondents move the sliders. Each registered choice reveals the respondent's marginal willingness to pay for each of the attributes. The method is tested in a museum exhibit on global climate change. Two construct validity tests were conducted. Responses are sensitive to the shape of the cost function in ways that are consistent with expectations based on economic theory. Implied marginal willingness to pay values were similar to those estimated using a more traditional paired comparisons stated choice format. However, responses showed range effects that indicate potential cognitive biases. (author)

  10. State-specific Multi-reference Perturbation Theories with Relaxed Coefficients: Molecular Applications

    Directory of Open Access Journals (Sweden)

    Debashis Mukherjee

    2002-06-01

    Full Text Available Abstract: We present in this paper two new versions of Rayleigh-Schr¨odinger (RS and the Brillouin-Wigner (BW state-specific multi-reference perturbative theories (SSMRPT which stem from our state-specific multi-reference coupled-cluster formalism (SS-MRCC, developed with a complete active space (CAS. They are manifestly sizeextensive and are designed to avoid intruders. The combining coefficients cμ for the model functions φμ are completely relaxed and are obtained by diagonalizing an effective operator in the model space, one root of which is the target eigenvalue of interest. By invoking suitable partitioning of the hamiltonian, very convenient perturbative versions of the formalism in both the RS and the BW forms are developed for the second order energy. The unperturbed hamiltonians for these theories can be chosen to be of both Mφller-Plesset (MP and Epstein-Nesbet (EN type. However, we choose the corresponding Fock operator fμ for each model function φμ, whose diagonal elements are used to define the unperturbed hamiltonian in the MP partition. In the EN partition, we additionally include all the diagonal direct and exchange ladders. Our SS-MRPT thus utilizes a multi-partitioning strategy. Illustrative numerical applications are presented for potential energy surfaces (PES of the ground (1Σ+ and the first delta (1Δ states of CH+ which possess pronounced multi-reference character. Comparison of the results with the corresponding full CI values indicates the efficacy of our formalisms.

  11. Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    NARCIS (Netherlands)

    Pettorossi, Alberto; Delzanno, Giorgio; Etalle, Sandro

    2001-01-01

    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder

  12. An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key

    Energy Technology Data Exchange (ETDEWEB)

    Zaher, Ashraf A. [Physics Department, Science College, Kuwait University, P.O. Box 5969, Safat 13060 (Kuwait)], E-mail: ashraf.zaher@ku.edu.kw

    2009-12-15

    In this paper, a secure communication technique, using a chaotic system with a single adjustable parameter and a single observable time series, is proposed. The chosen chaotic system, which is a variant of the famous Rikitake model, has a special structure for which the adjustable parameter appears in the dynamic equation of the observable time series. This particular structure is used to build a synchronization-based state observer that is decoupled from the adaptive parameter identifier. A local Lyapunov function is used to design the parameter identifier, with an adjustable convergence rate that guarantees the stability of the overall system. A two-channel transmission method is used to exemplify the suggested technique where the secret message is encoded using a nonlinear function of both the chaotic states and the adjustable parameter of the chaotic system that acts as a secret key. Simulations show that, at the receiver, the signal can be efficiently retrieved only if the secret key is known, even when both the receiver and the transmitter are in perfect synchronization. The proposed technique is demonstrated to have improved security and privacy against intruders, when compared to other techniques reported in the literature, while being simple to implement using both analog and digital hardware. In addition, the chosen chaotic system is shown to be flexible in accommodating the transmission of signals with variable bandwidths, which promotes the superiority and versatility of the suggested secure communication technique.

  13. An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key

    International Nuclear Information System (INIS)

    Zaher, Ashraf A.

    2009-01-01

    In this paper, a secure communication technique, using a chaotic system with a single adjustable parameter and a single observable time series, is proposed. The chosen chaotic system, which is a variant of the famous Rikitake model, has a special structure for which the adjustable parameter appears in the dynamic equation of the observable time series. This particular structure is used to build a synchronization-based state observer that is decoupled from the adaptive parameter identifier. A local Lyapunov function is used to design the parameter identifier, with an adjustable convergence rate that guarantees the stability of the overall system. A two-channel transmission method is used to exemplify the suggested technique where the secret message is encoded using a nonlinear function of both the chaotic states and the adjustable parameter of the chaotic system that acts as a secret key. Simulations show that, at the receiver, the signal can be efficiently retrieved only if the secret key is known, even when both the receiver and the transmitter are in perfect synchronization. The proposed technique is demonstrated to have improved security and privacy against intruders, when compared to other techniques reported in the literature, while being simple to implement using both analog and digital hardware. In addition, the chosen chaotic system is shown to be flexible in accommodating the transmission of signals with variable bandwidths, which promotes the superiority and versatility of the suggested secure communication technique.

  14. Multi-agent cooperation rescue algorithm based on influence degree and state prediction

    Science.gov (United States)

    Zheng, Yanbin; Ma, Guangfu; Wang, Linlin; Xi, Pengxue

    2018-04-01

    Aiming at the multi-agent cooperative rescue in disaster, a multi-agent cooperative rescue algorithm based on impact degree and state prediction is proposed. Firstly, based on the influence of the information in the scene on the collaborative task, the influence degree function is used to filter the information. Secondly, using the selected information to predict the state of the system and Agent behavior. Finally, according to the result of the forecast, the cooperative behavior of Agent is guided and improved the efficiency of individual collaboration. The simulation results show that this algorithm can effectively solve the cooperative rescue problem of multi-agent and ensure the efficient completion of the task.

  15. Multi-state reliability for coolant pump based on dependent competitive failure model

    International Nuclear Information System (INIS)

    Shang Yanlong; Cai Qi; Zhao Xinwen; Chen Ling

    2013-01-01

    By taking into account the effect of degradation due to internal vibration and external shocks. and based on service environment and degradation mechanism of nuclear power plant coolant pump, a multi-state reliability model of coolant pump was proposed for the system that involves competitive failure process between shocks and degradation. Using this model, degradation state probability and system reliability were obtained under the consideration of internal vibration and external shocks for the degraded coolant pump. It provided an effective method to reliability analysis for coolant pump in nuclear power plant based on operating environment. The results can provide a decision making basis for design changing and maintenance optimization. (authors)

  16. State-space modelling for the ejector-based refrigeration system driven by low grade energy

    International Nuclear Information System (INIS)

    Xue, Binqiang; Cai, Wenjian; Wang, Xinli

    2015-01-01

    This paper presents a novel global state-space model to describe the ejector-based refrigeration system, which includes the dynamics of the two heat exchangers and the static properties of ejector, compressor and expansion valve. Different from the existing methods, the proposed method introduces some intermediate variables into the dynamic modelling in developing reduced order models of the heat exchangers (evaporator and condenser) based on the Number of Transfer Units (NTU) method. This global model with fewer dimensions is much simpler and can be more convenient for the real-time control system design, compared with other dynamic models. Finally, the proposed state-space model has been validated by dynamic response experiments on the ejector-based refrigeration cycle with refrigerant R134a.The experimental results indicate that the proposed model can predict well the dynamics of the ejector-based refrigeration system. - Highlights: • A low-order state-space model of ejector-based refrigeration system is presented. • Reduced-order models of heat exchangers are developed based on NTU method. • The variations of mass flow rates are introduced in multiple fluid phase regions. • Experimental results show the proposed model has a good performance

  17. State-space-based harmonic stability analysis for paralleled grid-connected inverters

    DEFF Research Database (Denmark)

    Wang, Yanbo; Wang, Xiongfei; Chen, Zhe

    2016-01-01

    This paper addresses a state-space-based harmonic stability analysis of paralleled grid-connected inverters system. A small signal model of individual inverter is developed, where LCL filter, the equivalent delay of control system, and current controller are modeled. Then, the overall small signal...... model of paralleled grid-connected inverters is built. Finally, the state space-based stability analysis approach is developed to explain the harmonic resonance phenomenon. The eigenvalue traces associated with time delay and coupled grid impedance are obtained, which accounts for how the unstable...... inverter produces the harmonic resonance and leads to the instability of whole paralleled system. The proposed approach reveals the contributions of the grid impedance as well as the coupled effect on other grid-connected inverters under different grid conditions. Simulation and experimental results...

  18. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism

    Science.gov (United States)

    Chen, Jun-xin; Zhu, Zhi-liang; Fu, Chong; Yu, Hai; Zhang, Li-bo

    2015-03-01

    In recent years, a variety of chaos-based image cryptosystems have been investigated to meet the increasing demand for real-time secure image transmission. Most of them are based on permutation-diffusion architecture, in which permutation and diffusion are two independent procedures with fixed control parameters. This property results in two flaws. (1) At least two chaotic state variables are required for encrypting one plain pixel, in permutation and diffusion stages respectively. Chaotic state variables produced with high computation complexity are not sufficiently used. (2) The key stream solely depends on the secret key, and hence the cryptosystem is vulnerable against known/chosen-plaintext attacks. In this paper, a fast chaos-based image encryption scheme with a dynamic state variables selection mechanism is proposed to enhance the security and promote the efficiency of chaos-based image cryptosystems. Experimental simulations and extensive cryptanalysis have been carried out and the results prove the superior security and high efficiency of the scheme.

  19. Has Therapy Intruded into Education?

    Science.gov (United States)

    Mintz, Avi

    2009-01-01

    For over fifty years, scholars have argued that a therapeutic ethos has begun to change how people think about themselves and others. There is also a growing concern that the therapeutic ethos has influenced educational theory and practice, perhaps to their detriment. This review article discusses three books, "The Dangerous Rise of Therapeutic…

  20. An Approach for State Observation in Dynamical Systems Based on the Twisting Algorithm

    DEFF Research Database (Denmark)

    Schmidt, Lasse; Andersen, Torben Ole; Pedersen, Henrik C.

    2013-01-01

    This paper discusses a novel approach for state estimation in dynamical systems, with the special focus on hydraulic valve-cylinder drives. The proposed observer structure is based on the framework of the so-called twisting algorithm. This algorithm utilizes the sign of the state being the target...

  1. Comparative policies of two national dental associations: Norway and the United States.

    Science.gov (United States)

    Helöe, L A

    1991-01-01

    The major issues and challenges confronting the dental professions in the United States and Norway were studied through speeches of and interviews with the presidents of the American Dental Association (ADA) and the Norwegian Dental Association (NDA) in the period 1980-86. The issues most frequently dealt with related to public authorities, particularly legislation and government involvement in dental practice. Anxiety concerning "busyness," the future dental market, and a drop in the quality of applicants to dental schools were also major subjects. The spokespersons of both associations were engaged in increasing the demand for dental services by marketing, but they were ambivalent regarding advertising, especially individual advertising. Both were concerned with protecting dentistry's autonomy. While the Norwegian presidents apparently feared the medical profession's influence upon dentistry, the Americans were concerned with the hygienists and denturists, and with the insurance companies which they suspected of intruding into the dentist-patient relationship. The presidents' statements, which frequently varied, were apparently influenced by the current domestic political climate, the basic socio-political principles of the two countries, and the different socio-demographic make-up of their memberships.

  2. Graph-based network analysis of resting-state functional MRI

    Directory of Open Access Journals (Sweden)

    Jinhui Wang

    2010-06-01

    Full Text Available In the past decade, resting-state functional MRI (R-fMRI measures of brain activity have attracted considerable attention. Based on changes in the blood oxygen level-dependent signal, R-fMRI offers a novel way to assess the brain’s spontaneous or intrinsic (i.e., task-free activity with both high spatial and temporal resolutions. The properties of both the intra- and inter-regional connectivity of resting-state brain activity have been well documented, promoting our understanding of the brain as a complex network. Specifically, the topological organization of brain networks has been recently studied with graph theory. In this review, we will summarize the recent advances in graph-based brain network analyses of R-fMRI signals, both in typical and atypical populations. Application of these approaches to R-fMRI data has demonstrated non-trivial topological properties of functional networks in the human brain. Among these is the knowledge that the brain’s intrinsic activity is organized as a small-world, highly efficient network, with significant modularity and highly connected hub regions. These network properties have also been found to change throughout normal development, aging and in various pathological conditions. The literature reviewed here suggests that graph-based network analyses are capable of uncovering system-level changes associated with different processes in the resting brain, which could provide novel insights into the understanding of the underlying physiological mechanisms of brain function. We also highlight several potential research topics in the future.

  3. Graph-based network analysis of resting-state functional MRI.

    Science.gov (United States)

    Wang, Jinhui; Zuo, Xinian; He, Yong

    2010-01-01

    In the past decade, resting-state functional MRI (R-fMRI) measures of brain activity have attracted considerable attention. Based on changes in the blood oxygen level-dependent signal, R-fMRI offers a novel way to assess the brain's spontaneous or intrinsic (i.e., task-free) activity with both high spatial and temporal resolutions. The properties of both the intra- and inter-regional connectivity of resting-state brain activity have been well documented, promoting our understanding of the brain as a complex network. Specifically, the topological organization of brain networks has been recently studied with graph theory. In this review, we will summarize the recent advances in graph-based brain network analyses of R-fMRI signals, both in typical and atypical populations. Application of these approaches to R-fMRI data has demonstrated non-trivial topological properties of functional networks in the human brain. Among these is the knowledge that the brain's intrinsic activity is organized as a small-world, highly efficient network, with significant modularity and highly connected hub regions. These network properties have also been found to change throughout normal development, aging, and in various pathological conditions. The literature reviewed here suggests that graph-based network analyses are capable of uncovering system-level changes associated with different processes in the resting brain, which could provide novel insights into the understanding of the underlying physiological mechanisms of brain function. We also highlight several potential research topics in the future.

  4. Application of State Analysis and Goal-based Operations to a MER Mission Scenario

    Science.gov (United States)

    Morris, John Richard; Ingham, Michel D.; Mishkin, Andrew H.; Rasmussen, Robert D.; Starbird, Thomas W.

    2006-01-01

    State Analysis is a model-based systems engineering methodology employing a rigorous discovery process which articulates operations concepts and operability needs as an integrated part of system design. The process produces requirements on system and software design in the form of explicit models which describe the system behavior in terms of state variables and the relationships among them. By applying State Analysis to an actual MER flight mission scenario, this study addresses the specific real world challenges of complex space operations and explores technologies that can be brought to bear on future missions. The paper first describes the tools currently used on a daily basis for MER operations planning and provides an in-depth description of the planning process, in the context of a Martian day's worth of rover engineering activities, resource modeling, flight rules, science observations, and more. It then describes how State Analysis allows for the specification of a corresponding goal-based sequence that accomplishes the same objectives, with several important additional benefits.

  5. The Contact State Monitoring for Seal End Faces Based on Acoustic Emission Detection

    Directory of Open Access Journals (Sweden)

    Xiaohui Li

    2016-01-01

    Full Text Available Monitoring the contact state of seal end faces would help the early warning of the seal failure. In the acoustic emission (AE detection for mechanical seal, the main difficulty is to reduce the background noise and to classify the dispersed features. To solve these problems and achieve higher detection rates, a new approach based on genetic particle filter with autoregression (AR-GPF and hypersphere support vector machine (HSSVM is presented. First, AR model is used to build the dynamic state space (DSS of the AE signal, and GPF is used for signal filtering. Then, multiple features are extracted, and a classification model based on HSSVM is constructed for state recognition. In this approach, AR-GPF is an excellent time-domain method for noise reduction, and HSSVM has advantage on those dispersed features. Finally experimental data shows that the proposed method can effectively detect the contact state of the seal end faces and has higher accuracy rates than some other existing methods.

  6. Recent state of CdTe-based radiation detectors

    International Nuclear Information System (INIS)

    Ohno, R.

    2004-01-01

    Recent state for development of CdTe-based radiation detectors is reviewed. The progress of the technologies such as the crystal growth of CdTe and CdZnTe, the deposition of electrodes on the crystal, the design of read out ASIC, and the bonding between crystal and ASIC, opened the way for the development of imaging devices for practical uses. A X-ray imager for non destructive inspections and a gamma ray imager for small animal radioisotope experiments or nuclear medicine are presented as examples. (author)

  7. Three-party quantum secret sharing of secure direct communication based on χ-type entangled states

    International Nuclear Information System (INIS)

    Yu-Guang, Yang; Wei-Feng, Cao; Qiao-Yan, Wen

    2010-01-01

    Based on χ-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on χ-type entangled states |χ 00 ) 3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed. (general)

  8. Public Entrepreneurs and the Adoption of Broad-Based Merit Aid beyond the Southeastern United States

    Science.gov (United States)

    Ingle, William Kyle; Petroff, Ruth Ann

    2013-01-01

    The concentration of broad-based merit aid adoption in the southeastern United States has been well noted in the literature. However, there are states that have adopted broad-based merit aid programs outside of the Southeast. Guided by multiple theoretical frameworks, including innovation diffusion theory (e.g., Gray, 1973, 1994; Rogers, 2003),…

  9. Extended state observer-based motion synchronisation control for hybrid actuation system of large civil aircraft

    Science.gov (United States)

    Wang, Xingjian; Shi, Cun; Wang, Shaoping

    2017-07-01

    Hybrid actuation system with dissimilar redundant actuators, which is composed of a hydraulic actuator (HA) and an electro-hydrostatic actuator (EHA), has been applied on modern civil aircraft to improve the reliability. However, the force fighting problem arises due to different dynamic performances between HA and EHA. This paper proposes an extended state observer (ESO)-based motion synchronisation control method. To cope with the problem of unavailability of the state signals, the well-designed ESO is utilised to observe the HA and EHA state variables which are unmeasured. In particular, the extended state of ESO can estimate the lumped effect of the unknown external disturbances acting on the control surface, the nonlinear dynamics, uncertainties, and the coupling term between HA and EHA. Based on the observed states of ESO, motion synchronisation controllers are presented to make HA and EHA to simultaneously track the desired motion trajectories, which are generated by a trajectory generator. Additionally, the unknown disturbances and the coupling terms can be compensated by using the extended state of the proposed ESO. Finally, comparative simulation results indicate that the proposed ESO-based motion synchronisation controller can achieve great force fighting reduction between HA and EHA.

  10. Derivation of upper bound concentration of LLW for land disposal in Taiwan

    International Nuclear Information System (INIS)

    Chang, F.D.; Liou, C.T.; Su, M.F.; Tsai, S.C.

    1989-01-01

    The upper bound concentrations of radionuclides in the low level waste to be disposed in Taiwan are investigated based on a proposed reference site with all of the scenarios and exposure pathways reflecting the local conditions and environmental characteristics. The analysis reveals that most of the upper bound concentrations are determined from the scenario of intruder-agriculture. It can also be found that the Transuranic radionuclides and those with long half-lives are the dominant radionuclides which result in major radiological impact to the environment in this intruder-agriculture scenario

  11. Wildlife based business activities in Ogbe–Ijaw market of Delta state ...

    African Journals Online (AJOL)

    Wildlife based business activities in Ogbe–Ijaw market of Delta state, Nigeria. ... of procuring the products, channels for marketing the products, and risks involved in procuring wildlife products sold in the market. ... AJOL African Journals Online.

  12. The U-Pb age of the Posselandia Diorite, Hidrolina, Goias State, Brazil

    International Nuclear Information System (INIS)

    Jost, Hardy; Pimentel, Marcio M.; Fuck, Reinhard A.; Danni, Jose C.M.

    1993-01-01

    The Posselandia Diorite intrudes Archean granite-greenstone terrains of the region of Hidrolina, Central Goias, Brazil. U-Pb radiometric determinations in two fractions of zircon crystals from the diorite yield an age of 2,146 ± 1,6 Ma, interpreted as the crystallization age of the intrusion. The lack of deformation in the intrusion demonstrates that consolidation of the granite-greenstone terrains in the Hidrolina-Pilar de Goias-Crixas area took place before 2,146 Ma. (author). 3 figs., 2 tabs

  13. Power system dynamic state estimation using prediction based evolutionary technique

    International Nuclear Information System (INIS)

    Basetti, Vedik; Chandel, Ashwani K.; Chandel, Rajeevan

    2016-01-01

    In this paper, a new robust LWS (least winsorized square) estimator is proposed for dynamic state estimation of a power system. One of the main advantages of this estimator is that it has an inbuilt bad data rejection property and is less sensitive to bad data measurements. In the proposed approach, Brown's double exponential smoothing technique has been utilised for its reliable performance at the prediction step. The state estimation problem is solved as an optimisation problem using a new jDE-self adaptive differential evolution with prediction based population re-initialisation technique at the filtering step. This new stochastic search technique has been embedded with different state scenarios using the predicted state. The effectiveness of the proposed LWS technique is validated under different conditions, namely normal operation, bad data, sudden load change, and loss of transmission line conditions on three different IEEE test bus systems. The performance of the proposed approach is compared with the conventional extended Kalman filter. On the basis of various performance indices, the results thus obtained show that the proposed technique increases the accuracy and robustness of power system dynamic state estimation performance. - Highlights: • To estimate the states of the power system under dynamic environment. • The performance of the EKF method is degraded during anomaly conditions. • The proposed method remains robust towards anomalies. • The proposed method provides precise state estimates even in the presence of anomalies. • The results show that prediction accuracy is enhanced by using the proposed model.

  14. Quantum-Secret-Sharing Scheme Based on Local Distinguishability of Orthogonal Seven-Qudit Entangled States

    Science.gov (United States)

    Liu, Cheng-Ji; Li, Zhi-Hui; Bai, Chen-Ming; Si, Meng-Meng

    2018-02-01

    The concept of judgment space was proposed by Wang et al. (Phys. Rev. A 95, 022320, 2017), which was used to study some important properties of quantum entangled states based on local distinguishability. In this study, we construct 15 kinds of seven-qudit quantum entangled states in the sense of permutation, calculate their judgment space and propose a distinguishability rule to make the judgment space more clearly. Based on this rule, we study the local distinguishability of the 15 kinds of seven-qudit quantum entangled states and then propose a ( k, n) threshold quantum secret sharing scheme. Finally, we analyze the security of the scheme.

  15. A Novel Flood Forecasting Method Based on Initial State Variable Correction

    Directory of Open Access Journals (Sweden)

    Kuang Li

    2017-12-01

    Full Text Available The influence of initial state variables on flood forecasting accuracy by using conceptual hydrological models is analyzed in this paper and a novel flood forecasting method based on correction of initial state variables is proposed. The new method is abbreviated as ISVC (Initial State Variable Correction. The ISVC takes the residual between the measured and forecasted flows during the initial period of the flood event as the objective function, and it uses a particle swarm optimization algorithm to correct the initial state variables, which are then used to drive the flood forecasting model. The historical flood events of 11 watersheds in south China are forecasted and verified, and important issues concerning the ISVC application are then discussed. The study results show that the ISVC is effective and applicable in flood forecasting tasks. It can significantly improve the flood forecasting accuracy in most cases.

  16. Evaluation of current state of amplification-based DDoS attacks

    NARCIS (Netherlands)

    Bohte, Edgar; Stamatogiannakis, Manolis; Bos, Herbert

    2018-01-01

    Amplification-based DDoS attacks are still a big threat to the availability of the internet. In quite some time there is no new paper published that gave an update on the current state of amplification DDoS attacks, taken into consideration it was a huge problem a few years ago. We performed

  17. Communication between United States-Based Firms and Mexican Production Facilities.

    Science.gov (United States)

    Waldman, Lila

    A study examined the types of communication technologies being used by United States-based corporations with operations in Mexico to determine the challenges these companies face when communicating across the border. A total of 703 U.S. corporations doing business with Mexico (culled from lists in two professional directories) were chosen for the…

  18. Thermochemical nonequilibrium analysis of O2+Ar based on state-resolved kinetics

    International Nuclear Information System (INIS)

    Kim, Jae Gang; Boyd, Iain D.

    2015-01-01

    Highlights: • Thermochemical nonequilibrium studies for three lowest lying electronic states of O 2 . • The complete sets of the rovibrational state-to-state transition rates of O 2 +Ar. • Rovibrational relaxations and coupled chemical reactions of O 2 . • Nonequilibrium reaction rates of O 2 derived from the quasi-steady state assumption. - Abstract: The thermochemical nonequilibrium of the three lowest lying electronic states of molecular oxygen, O 2 (X 3 Σ g - ,a 1 Δ g ,b 1 Σ g + ), through interactions with argon is studied in the present work. The multi-body potential energy surfaces of O 2 +Ar are evaluated from the semi-classical RKR potential of O 2 in each electronic state. The rovibrational states and energies of each electronic state are calculated by the quantum mechanical method based on the present inter-nuclear potential of O 2 . Then, the complete sets of the rovibrational state-to-state transition rate coefficients of O 2 +Ar are calculated by the quasi-classical trajectory method including the quasi-bound states. The system of master equations constructed by the present state-to-state transition rate coefficients are solved to analyze the thermochemical nonequilibrium of O 2 +Ar in various heat bath conditions. From these studies, it is concluded that the vibrational relaxation and coupled chemical reactions of each electronic state needs to be treated as a separate nonequilibrium process, and rotational nonequilibrium needs to be considered at translational temperatures above 10,000 K

  19. Pest repelling properties of ant pheromones

    DEFF Research Database (Denmark)

    Offenberg, Joachim

    2014-01-01

    Ants control pests via predation and physical deterrence; however, ant communication is based on chemical cues which may serve as warning signals to potential prey and other intruders. The presence of ant pheromones may, thus, be sufficient to repel pests from ant territories. This mini-review sh......-review shows that four out of five tested ant species deposit pheromones that repel herbivorous prey from their host plants.......Ants control pests via predation and physical deterrence; however, ant communication is based on chemical cues which may serve as warning signals to potential prey and other intruders. The presence of ant pheromones may, thus, be sufficient to repel pests from ant territories. This mini...

  20. Single input state, single–mode fiber–based polarization sensitive optical frequency domain imaging by eigenpolarization referencing

    Science.gov (United States)

    Lippok, Norman; Villiger, Martin; Jun, Chang–Su; Bouma, Brett E.

    2015-01-01

    Fiber–based polarization sensitive OFDI is more challenging than free–space implementations. Using multiple input states, fiber–based systems provide sample birefringence information with the benefit of a flexible sample arm but come at the cost of increased system and acquisition complexity, and either reduce acquisition speed or require increased acquisition bandwidth. Here we show that with the calibration of a single polarization state, fiber–based configurations can approach the conceptual simplicity of traditional free–space configurations. We remotely control the polarization state of the light incident at the sample using the eigenpolarization states of a wave plate as a reference, and determine the Jones matrix of the output fiber. We demonstrate this method for polarization sensitive imaging of biological samples. PMID:25927775

  1. State of charge estimation for lithium-ion pouch batteries based on stress measurement

    International Nuclear Information System (INIS)

    Dai, Haifeng; Yu, Chenchen; Wei, Xuezhe; Sun, Zechang

    2017-01-01

    State of charge (SOC) estimation is one of the important tasks of battery management system (BMS). Being different from other researches, a novel method of SOC estimation for pouch lithium-ion battery cells based on stress measurement is proposed. With a comprehensive experimental study, we find that, the stress of the battery during charge/discharge is composed of the static stress and the dynamic stress. The static stress, which is the measured stress in equilibrium state, corresponds to SOC, this phenomenon facilitates the design of our stress-based SOC estimation. The dynamic stress, on the other hand, is influenced by multiple factors including charge accumulation or depletion, current and historical operation, thus a multiple regression model of the dynamic stress is established. Based on the relationship between static stress and SOC, as well as the dynamic stress modeling, the SOC estimation method is founded. Experimental results show that the stress-based method performs well with a good accuracy, and this method offers a novel perspective for SOC estimation. - Highlights: • A State of Charge estimator based on stress measurement is proposed. • The stress during charge and discharge is investigated with comprehensive experiments. • Effects of SOC, current, and operation history on battery stress are well studied. • A multiple regression model of the dynamic stress is established.

  2. Antiferroic electronic structure in the nonmagnetic superconducting state of the iron-based superconductors.

    Science.gov (United States)

    Shimojima, Takahiro; Malaeb, Walid; Nakamura, Asuka; Kondo, Takeshi; Kihou, Kunihiro; Lee, Chul-Ho; Iyo, Akira; Eisaki, Hiroshi; Ishida, Shigeyuki; Nakajima, Masamichi; Uchida, Shin-Ichi; Ohgushi, Kenya; Ishizaka, Kyoko; Shin, Shik

    2017-08-01

    A major problem in the field of high-transition temperature ( T c ) superconductivity is the identification of the electronic instabilities near superconductivity. It is known that the iron-based superconductors exhibit antiferromagnetic order, which competes with the superconductivity. However, in the nonmagnetic state, there are many aspects of the electronic instabilities that remain unclarified, as represented by the orbital instability and several in-plane anisotropic physical properties. We report a new aspect of the electronic state of the optimally doped iron-based superconductors by using high-energy resolution angle-resolved photoemission spectroscopy. We find spectral evidence for the folded electronic structure suggestive of an antiferroic electronic instability, coexisting with the superconductivity in the nonmagnetic state of Ba 1- x K x Fe 2 As 2 . We further establish a phase diagram showing that the antiferroic electronic structure persists in a large portion of the nonmagnetic phase covering the superconducting dome. These results motivate consideration of a key unknown electronic instability, which is necessary for the achievement of high- T c superconductivity in the iron-based superconductors.

  3. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  4. School-based Yoga Programs in the United States: A Survey.

    Science.gov (United States)

    Butzer, Bethany; Ebert, Marina; Telles, Shirley; Khalsa, Sat Bir S

    2015-01-01

    Substantial interest has begun to emerge around the implementation of yoga interventions in schools. Researchers have found that yoga practices may enhance skills such as self-regulation and prosocial behavior, and lead to improvements in students' performance. These researchers, therefore, have proposed that contemplative practices have the potential to play a crucial role in enhancing the quality of US public education. The purpose of the present study was to provide a summary and comparison of school-based yoga programs in the United States. Online, listserv, and database searches were conducted to identify programs, and information was collected regarding each program's scope of work, curriculum characteristics, teacher-certification and training requirements, implementation models, modes of operation, and geographical regions. The online, listserv, and database searches took place in Boston, MA, USA, and New Haven, CT, USA. Thirty-six programs were identified that offer yoga in more than 940 schools across the United States, and more than 5400 instructors have been trained by these programs to offer yoga in educational settings. Despite some variability in the exact mode of implementation, training requirements, locations served, and grades covered, the majority of the programs share a common goal of teaching 4 basic elements of yoga: (1) physical postures, (2) breathing exercises, (3) relaxation techniques, and (4) mindfulness and meditation practices. The programs also teach a variety of additional educational, social-emotional, and didactic techniques to enhance students' mental and physical health and behavior. The fact that the present study was able to find a relatively large number of formal, school-based yoga programs currently being implemented in the United States suggests that the programs may be acceptable and feasible to implement. The results also suggest that the popularity of school-based yoga programs may continue to grow.

  5. School-based Yoga Programs in the United States: A Survey

    Science.gov (United States)

    Butzer, Bethany; Ebert, Marina; Telles, Shirley; Khalsa, Sat Bir S.

    2016-01-01

    Context Substantial interest has begun to emerge around the implementation of yoga interventions in schools. Researchers have found that yoga practices may enhance skills such as self-regulation and prosocial behavior, and lead to improvements in students’ performance. These researchers, therefore, have proposed that contemplative practices have the potential to play a crucial role in enhancing the quality of US public education. Objective The purpose of the present study was to provide a summary and comparison of school-based yoga programs in the United States. Design Online, listserv, and database searches were conducted to identify programs, and information was collected regarding each program’s scope of work, curriculum characteristics, teacher-certification and training requirements, implementation models, modes of operation, and geographical regions. Setting The online, listserv, and database searches took place in Boston, MA, USA, and New Haven, CT, USA. Results Thirty-six programs were identified that offer yoga in more than 940 schools across the United States, and more than 5400 instructors have been trained by these programs to offer yoga in educational settings. Despite some variability in the exact mode of implementation, training requirements, locations served, and grades covered, the majority of the programs share a common goal of teaching 4 basic elements of yoga: (1) physical postures, (2) breathing exercises, (3) relaxation techniques, and (4) mindfulness and meditation practices. The programs also teach a variety of additional educational, social-emotional, and didactic techniques to enhance students’ mental and physical health and behavior. Conclusions The fact that the present study was able to find a relatively large number of formal, school-based yoga programs currently being implemented in the United States suggests that the programs may be acceptable and feasible to implement. The results also suggest that the popularity of school-based

  6. Replacing HDDs with Solid-State Flash Disks in PXIbus-Based Systems

    International Nuclear Information System (INIS)

    Zhao, Z W; Zeng, L

    2006-01-01

    New security features, constantly decreasing prices, solid-state Flash disks are becoming a popular alternative for replacing failure-prone mechanical Hard Disk Drives (HDDs) in PXIbus-based military systems. The key component in high-capacity solid-state Flash disks is NAND Flash, but with a specification that shows only 100,000-300,000 write/erase cycles, engineers may be concerned that the lifetime of Flash disks cannot meet their application requirements. With the right Flash management, Flash disks are able to provide the reliability and endurance that military applications need

  7. Forensic analysis of tire rubbers based on their sulfur chemical states.

    Science.gov (United States)

    Funatsuki, Atsushi; Shiota, Kenji; Takaoka, Masaki; Tamenori, Yusuke

    2015-05-01

    The chemical states of sulfur in 11 tires were analyzed using X-ray absorption near-edge structure (XANES) in order to discriminate between various tire rubbers. All tires had peaks around 2471.5 and 2480.5eV, and the shapes and heights of these peaks differed among tires, suggesting that the sulfur chemical state could be used for discrimination between tire rubbers. Based on t-tests on the results of XANES, 43 of 55 combinations were different at a significance level of 5%. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  8. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Ding Qing-Yan; Zhang Shu-Hui; Chen Xiu-Bo

    2016-01-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. (paper)

  9. State of the States 2016: Arts Education State Policy Summary

    Science.gov (United States)

    Aragon, Stephanie

    2016-01-01

    The "State of the States 2016" summarizes state policies for arts education identified in statute or administrative code for all 50 states and the District of Columbia. Information is based on a comprehensive search of state education statute and codes on each state's relevant websites. Complete results from this review are available in…

  10. Utility evaluations for Markov states of lung cancer for PET-based disease management

    International Nuclear Information System (INIS)

    Papatheofanis, F.J.

    2000-01-01

    Utilities for the health outcomes states (Markov states) of non-small cell lung carcinoma (NSCLCL) should be measured to evaluate management options for patients because patients are key participants in the process of care, and their assessment of diagnostic and therapeutic value in the options presented to them ultimately impacts their net health outcomes. This investigation sought to measure utilities for stage-dependent outcomes states of NSCLC. Persons (n=23) with suspected NSCLC based on physical findings and computed tomography completed a short utilities survey. Utility valuations were obtained according to severity of morbidity and varied considerably. Respondents rated these health states according to accuracy measures for 18 flurodeoxyglucose ( 18 FDG) positron emission tomography (PET) imaging and mediastinoscopy. The results demonstrate that stage-dependent morbidity is an important consideration for patients with NSCLC and should be included in any decision analysis regarding the evaluation or treatment of NSCLC. Respondents valued the quality of information obtained from non-invasive mediastinoscopy comparably. The utilities obtained from this investigation are useful in clinical decision-making based on Markov processes because they provide an initial estimation of utility assessment for 18 FDG-based diagnostic evaluation of lung cancer. Consequently, these utilities will be useful in future decision analyses that require patient preference in the assignment of the evaluation of decision options (branches)

  11. UV excitation of single DNA and RNA strands produces high yields of exciplex states between two stacked bases.

    Science.gov (United States)

    Takaya, Tomohisa; Su, Charlene; de La Harpe, Kimberly; Crespo-Hernández, Carlos E; Kohler, Bern

    2008-07-29

    Excited electronic states created by UV excitation of the diribonucleoside monophosphates ApA, ApG, ApC, ApU, and CpG were studied by the femtosecond transient-absorption technique. Bleach recovery signals recorded at 252 nm show that long-lived excited states are formed in all five dinucleosides. The lifetimes of these states exceed those measured in equimolar mixtures of the constituent mononucleotides by one to two orders of magnitude, indicating that electronic coupling between proximal nucleobases dramatically slows the relaxation of excess electronic energy. The decay rates of the long-lived states decrease with increasing energy of the charge-transfer state produced by transferring an electron from one base to another. The charge-transfer character of the long-lived states revealed by this analysis supports their assignment to excimer or exciplex states. Identical bleach recovery signals were seen for ApA, (A)(4), and poly(A) at delay times >10 ps after photoexcitation. This indicates that excited states localized on a stack of just two bases are the common trap states independent of the number of stacked nucleotides. The fraction of initial excitations that decay to long-lived exciplex states is approximately equal to the fraction of stacked bases determined by NMR measurements. This supports a model in which excitations associated with two stacked bases decay to exciplex states, whereas excitations in unstacked bases decay via ultrafast internal conversion. These results establish the importance of charge transfer-quenching pathways for UV-irradiated RNA and DNA in room-temperature solution.

  12. Kalman-Filter-Based State Estimation for System Information Exchange in a Multi-bus Islanded Microgrid

    DEFF Research Database (Denmark)

    Wang, Yanbo; Tian, Yanjun; Wang, Xiongfei

    2014-01-01

    State monitoring and analysis of distribution systems has become an urgent issue, and state estimation serves as an important tool to deal with it. In this paper, a Kalman-Filter-based state estimation method for a multi-bus islanded microgrid is presented. First, an overall small signal model wi...

  13. Solid-state nuclear-spin quantum computer based on magnetic resonance force microscopy

    International Nuclear Information System (INIS)

    Berman, G. P.; Doolen, G. D.; Hammel, P. C.; Tsifrinovich, V. I.

    2000-01-01

    We propose a nuclear-spin quantum computer based on magnetic resonance force microscopy (MRFM). It is shown that an MRFM single-electron spin measurement provides three essential requirements for quantum computation in solids: (a) preparation of the ground state, (b) one- and two-qubit quantum logic gates, and (c) a measurement of the final state. The proposed quantum computer can operate at temperatures up to 1 K. (c) 2000 The American Physical Society

  14. State of the States, 2012: Arts Education State Policy Summary

    Science.gov (United States)

    Arts Education Partnership (NJ1), 2012

    2012-01-01

    The "State of the States 2012" summarizes state policies for arts education identified in statute or code for all 50 states and the District of Columbia. Information is based primarily on results from the AEP Arts Education State Policy Survey conducted in 2010-11, and updated in April 2012.

  15. Estimation of pump operational state with model-based methods

    International Nuclear Information System (INIS)

    Ahonen, Tero; Tamminen, Jussi; Ahola, Jero; Viholainen, Juha; Aranto, Niina; Kestilae, Juha

    2010-01-01

    Pumps are widely used in industry, and they account for 20% of the industrial electricity consumption. Since the speed variation is often the most energy-efficient method to control the head and flow rate of a centrifugal pump, frequency converters are used with induction motor-driven pumps. Although a frequency converter can estimate the operational state of an induction motor without external measurements, the state of a centrifugal pump or other load machine is not typically considered. The pump is, however, usually controlled on the basis of the required flow rate or output pressure. As the pump operational state can be estimated with a general model having adjustable parameters, external flow rate or pressure measurements are not necessary to determine the pump flow rate or output pressure. Hence, external measurements could be replaced with an adjustable model for the pump that uses estimates of the motor operational state. Besides control purposes, modelling the pump operation can provide useful information for energy auditing and optimization purposes. In this paper, two model-based methods for pump operation estimation are presented. Factors affecting the accuracy of the estimation methods are analyzed. The applicability of the methods is verified by laboratory measurements and tests in two pilot installations. Test results indicate that the estimation methods can be applied to the analysis and control of pump operation. The accuracy of the methods is sufficient for auditing purposes, and the methods can inform the user if the pump is driven inefficiently.

  16. All-solid-state flexible supercapacitors based on papers coated with carbon nanotubes and ionic-liquid-based gel electrolytes

    International Nuclear Information System (INIS)

    Kang, Yu Jin; Kim, Woong; Chung, Haegeun; Han, Chi-Hwan

    2012-01-01

    All-solid-state flexible supercapacitors were fabricated using carbon nanotubes (CNTs), regular office papers, and ionic-liquid-based gel electrolytes. Flexible electrodes were made by coating CNTs on office papers by a drop-dry method. The gel electrolyte was prepared by mixing fumed silica nanopowders with ionic liquid, 1-ethyl-3-methylimidazolium bis(trifluoromethylsulfonyl)imide ([EMIM][NTf 2 ]). This supercapacitor showed high power and energy performance as a solid-state flexible supercapacitor. The specific capacitance of the CNT electrodes was 135 F g −1 at a current density of 2 A g −1 , when considering the mass of active materials only. The maximum power and energy density of the supercapacitors were 164 kW kg −1 and 41 Wh kg −1 , respectively. Interestingly, the solid-state supercapacitor with the gel electrolyte showed comparable performance to the supercapacitors with ionic-liquid electrolyte. Moreover, the supercapacitor showed excellent stability and flexibility. The CNT/paper- and gel-based supercapacitors may hold great potential for low-cost and high-performance flexible energy storage applications. (paper)

  17. Resting State EEG-based biometrics for individual identification using convolutional neural networks.

    Science.gov (United States)

    Lan Ma; Minett, James W; Blu, Thierry; Wang, William S-Y

    2015-08-01

    Biometrics is a growing field, which permits identification of individuals by means of unique physical features. Electroencephalography (EEG)-based biometrics utilizes the small intra-personal differences and large inter-personal differences between individuals' brainwave patterns. In the past, such methods have used features derived from manually-designed procedures for this purpose. Another possibility is to use convolutional neural networks (CNN) to automatically extract an individual's best and most unique neural features and conduct classification, using EEG data derived from both Resting State with Open Eyes (REO) and Resting State with Closed Eyes (REC). Results indicate that this CNN-based joint-optimized EEG-based Biometric System yields a high degree of accuracy of identification (88%) for 10-class classification. Furthermore, rich inter-personal difference can be found using a very low frequency band (0-2Hz). Additionally, results suggest that the temporal portions over which subjects can be individualized is less than 200 ms.

  18. Anatomy of an Oil-Based Welfare State: Rent Distribution in Kuwait

    OpenAIRE

    El-Katiri, Laura; Fattouh, Bassam; Segal, Paul

    2011-01-01

    Oil wealth has transformed Kuwait within decades from a modest, trade-based desert emirate into a modern city-state. It has also created a relatively egalitarian economy based on an extensive distributive system that provides Kuwaiti citizens with essential services including free healthcare, education and social security. Therefore, the most important fact about Kuwait’s oil wealth is that it has been successfully used to benefit its citizens. This feat has been achieved through a broad dist...

  19. Thermoelectric Transport by Surface States in Bi2Se3-Based Topological Insulator Thin Films

    International Nuclear Information System (INIS)

    Li Long-Long; Xu Wen

    2015-01-01

    We develop a tractable theoretical model to investigate the thermoelectric (TE) transport properties of surface states in topological insulator thin films (TITFs) of Bi 2 Se 3 at room temperature. The hybridization between top and bottom surface states in the TITF plays a significant role. With the increasing hybridization-induced surface gap, the electrical conductivity and electron thermal conductivity decrease while the Seebeck coefficient increases. This is due to the metal-semiconductor transition induced by the surface-state hybridization. Based on these TE transport coefficients, the TE figure-of-merit ZT is evaluated. It is shown that ZT can be greatly improved by the surface-state hybridization. Our theoretical results are pertinent to the exploration of the TE transport properties of surface states in TITFs and to the potential application of Bi 2 Se 3 -based TITFs as high-performance TE materials and devices. (paper)

  20. Constraint-Based Abstraction of a Model Checker for Infinite State Systems

    DEFF Research Database (Denmark)

    Banda, Gourinath; Gallagher, John Patrick

    Abstract interpretation-based model checking provides an approach to verifying properties of infinite-state systems. In practice, most previous work on abstract model checking is either restricted to verifying universal properties, or develops special techniques for temporal logics such as modal t...... to implementation of abstract model checking algorithms for abstract domains based on constraints, making use of an SMT solver....

  1. Enthalpy-based equation of state for highly porous materials employing modified soft sphere fluid model

    Science.gov (United States)

    Nayak, Bishnupriya; Menon, S. V. G.

    2018-01-01

    Enthalpy-based equation of state based on a modified soft sphere model for the fluid phase, which includes vaporization and ionization effects, is formulated for highly porous materials. Earlier developments and applications of enthalpy-based approach had not accounted for the fact that shocked states of materials with high porosity (e.g., porosity more than two for Cu) are in the expanded fluid region. We supplement the well known soft sphere model with a generalized Lennard-Jones formula for the zero temperature isotherm, with parameters determined from cohesive energy, specific volume and bulk modulus of the solid at normal condition. Specific heats at constant pressure, ionic and electronic enthalpy parameters and thermal excitation effects are calculated using the modified approach and used in the enthalpy-based equation of state. We also incorporate energy loss from the shock due to expansion of shocked material in calculating porous Hugoniot. Results obtained for Cu, even up to initial porosities ten, show good agreement with experimental data.

  2. Work hardening correlation for monotonic loading based on state variables

    International Nuclear Information System (INIS)

    Huang, F.H.; Li, C.Y.

    1977-01-01

    An absolute work hardening correlation in terms of the hardness parameter and the internal stress based on the state variable approach was developed. It was found applicable to a variety of metals and alloys. This correlation predicts strain rate insensitive work hardening properties at low homologous temperatures and produces strain rate effects at higher homologous temperatures without involving thermally induced recovery processes

  3. A Semi-Continuous State-Transition Probability HMM-Based Voice Activity Detector

    Directory of Open Access Journals (Sweden)

    H. Othman

    2007-02-01

    Full Text Available We introduce an efficient hidden Markov model-based voice activity detection (VAD algorithm with time-variant state-transition probabilities in the underlying Markov chain. The transition probabilities vary in an exponential charge/discharge scheme and are softly merged with state conditional likelihood into a final VAD decision. Working in the domain of ITU-T G.729 parameters, with no additional cost for feature extraction, the proposed algorithm significantly outperforms G.729 Annex B VAD while providing a balanced tradeoff between clipping and false detection errors. The performance compares very favorably with the adaptive multirate VAD, option 2 (AMR2.

  4. Moving State Marine SINS Initial Alignment Based on High Degree CKF

    Directory of Open Access Journals (Sweden)

    Yong-Gang Zhang

    2014-01-01

    Full Text Available A new moving state marine initial alignment method of strap-down inertial navigation system (SINS is proposed based on high-degree cubature Kalman filter (CKF, which can capture higher order Taylor expansion terms of nonlinear alignment model than the existing third-degree CKF, unscented Kalman filter and central difference Kalman filter, and improve the accuracy of initial alignment under large heading misalignment angle condition. Simulation results show the efficiency and advantage of the proposed initial alignment method as compared with existing initial alignment methods for the moving state SINS initial alignment with large heading misalignment angle.

  5. A Semi-Continuous State-Transition Probability HMM-Based Voice Activity Detector

    Directory of Open Access Journals (Sweden)

    Othman H

    2007-01-01

    Full Text Available We introduce an efficient hidden Markov model-based voice activity detection (VAD algorithm with time-variant state-transition probabilities in the underlying Markov chain. The transition probabilities vary in an exponential charge/discharge scheme and are softly merged with state conditional likelihood into a final VAD decision. Working in the domain of ITU-T G.729 parameters, with no additional cost for feature extraction, the proposed algorithm significantly outperforms G.729 Annex B VAD while providing a balanced tradeoff between clipping and false detection errors. The performance compares very favorably with the adaptive multirate VAD, option 2 (AMR2.

  6. An Energy-Based Limit State Function for Estimation of Structural Reliability in Shock Environments

    Directory of Open Access Journals (Sweden)

    Michael A. Guthrie

    2013-01-01

    Full Text Available limit state function is developed for the estimation of structural reliability in shock environments. This limit state function uses peak modal strain energies to characterize environmental severity and modal strain energies at failure to characterize the structural capacity. The Hasofer-Lind reliability index is briefly reviewed and its computation for the energy-based limit state function is discussed. Applications to two degree of freedom mass-spring systems and to a simple finite element model are considered. For these examples, computation of the reliability index requires little effort beyond a modal analysis, but still accounts for relevant uncertainties in both the structure and environment. For both examples, the reliability index is observed to agree well with the results of Monte Carlo analysis. In situations where fast, qualitative comparison of several candidate designs is required, the reliability index based on the proposed limit state function provides an attractive metric which can be used to compare and control reliability.

  7. CORE-COLLAPSE SUPERNOVA EQUATIONS OF STATE BASED ON NEUTRON STAR OBSERVATIONS

    International Nuclear Information System (INIS)

    Steiner, A. W.; Hempel, M.; Fischer, T.

    2013-01-01

    Many of the currently available equations of state for core-collapse supernova simulations give large neutron star radii and do not provide large enough neutron star masses, both of which are inconsistent with some recent neutron star observations. In addition, one of the critical uncertainties in the nucleon-nucleon interaction, the nuclear symmetry energy, is not fully explored by the currently available equations of state. In this article, we construct two new equations of state which match recent neutron star observations and provide more flexibility in studying the dependence on nuclear matter properties. The equations of state are also provided in tabular form, covering a wide range in density, temperature, and asymmetry, suitable for astrophysical simulations. These new equations of state are implemented into our spherically symmetric core-collapse supernova model, which is based on general relativistic radiation hydrodynamics with three-flavor Boltzmann neutrino transport. The results are compared with commonly used equations of state in supernova simulations of 11.2 and 40 M ☉ progenitors. We consider only equations of state which are fitted to nuclear binding energies and other experimental and observational constraints. We find that central densities at bounce are weakly correlated with L and that there is a moderate influence of the symmetry energy on the evolution of the electron fraction. The new models also obey the previously observed correlation between the time to black hole formation and the maximum mass of an s = 4 neutron star

  8. Proof of the insecurity of quantum secret sharing based on the Smolin bound entangled states

    International Nuclear Information System (INIS)

    Ya-Fei, Yu; Zhi-Ming, Zhang

    2009-01-01

    This paper reconsiders carefully the possibility of using the Smolin bound entangled states as the carrier for sharing quantum secret. It finds that the process of quantum secret sharing based on Smolin states has insecurity though the Smolin state was reported to violate maximally the two-setting Bell-inequality. The general proof is given. (general)

  9. Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state

    International Nuclear Information System (INIS)

    Ye, Tian-Yu; Jiang, Li-Zhen

    2014-01-01

    In order to avoid the risk of information leakage during the information mutual transmission between two authorized participants, i.e. Alice and Bob, a quantum dialogue protocol based on the entanglement swapping between any two Bell states and the shared secret Bell state is proposed. The proposed protocol integrates the ideas of block transmission, two-step transmission and unitary operation encoding together using the Bell states as the information carriers. Besides the entanglement swapping between any two Bell states, a shared secret Bell state is also used to overcome the information leakage problem, which not only makes Bob aware of the prepared initial state but also is used for Bob's encoding and entanglement swapping. Security analysis shows that the proposed protocol can resist the general active attacks from an outside eavesdropper Eve. Moreover, the relation between the maximal amount of information Eve can gain and the detection probability is derived. (paper)

  10. Metallographic Index-Based Quantification of the Homogenization State in Extrudable Aluminum Alloys

    Directory of Open Access Journals (Sweden)

    Panagiota I. Sarafoglou

    2016-05-01

    Full Text Available Extrudability of aluminum alloys of the 6xxx series is highly dependent on the microstructure of the homogenized billets. It is therefore very important to characterize quantitatively the state of homogenization of the as-cast billets. The quantification of the homogenization state was based on the measurement of specific microstructural indices, which describe the size and shape of the intermetallics and indicate the state of homogenization. The indices evaluated were the following: aspect ratio (AR, which is the ratio of the maximum to the minimum diameter of the particles, feret (F, which is the maximum caliper length, and circularity (C, which is a measure of how closely a particle resembles a circle in a 2D metallographic section. The method included extensive metallographic work and the measurement of a large number of particles, including a statistical analysis, in order to investigate the effect of homogenization time. Among the indices examined, the circularity index exhibited the most consistent variation with homogenization time. The lowest value of the circularity index coincided with the metallographic observation for necklace formation. Shorter homogenization times resulted in intermediate homogenization stages involving rounding of edges or particle pinching. The results indicated that the index-based quantification of the homogenization state could provide a credible method for the selection of homogenization process parameters towards enhanced extrudability.

  11. A Neural-Network-Based Nonlinear Adaptive State-Observer for Pressurized Water Reactors

    Directory of Open Access Journals (Sweden)

    Zhe Dong

    2013-10-01

    Full Text Available Although there have been some severe nuclear accidents such as Three Mile Island (USA, Chernobyl (Ukraine and Fukushima (Japan, nuclear fission energy is still a source of clean energy that can substitute for fossil fuels in a centralized way and in a great amount with commercial availability and economic competitiveness. Since the pressurized water reactor (PWR is the most widely used nuclear fission reactor, its safe, stable and efficient operation is meaningful to the current rebirth of the nuclear fission energy industry. Power-level regulation is an important technique which can deeply affect the operation stability and efficiency of PWRs. Compared with the classical power-level controllers, the advanced power-level regulators could strengthen both the closed-loop stability and control performance by feeding back the internal state-variables. However, not all of the internal state variables of a PWR can be obtained directly by measurements. To implement advanced PWR power-level control law, it is necessary to develop a state-observer to reconstruct the unmeasurable state-variables. Since a PWR is naturally a complex nonlinear system with parameters varying with power-level, fuel burnup, xenon isotope production, control rod worth and etc., it is meaningful to design a nonlinear observer for the PWR with adaptability to system uncertainties. Due to this and the strong learning capability of the multi-layer perceptron (MLP neural network, an MLP-based nonlinear adaptive observer is given for PWRs. Based upon Lyapunov stability theory, it is proved theoretically that this newly-built observer can provide bounded and convergent state-observation. This observer is then applied to the state-observation of a special PWR, i.e., the nuclear heating reactor (NHR, and numerical simulation results not only verify its feasibility but also give the relationship between the observation performance and observer parameters.

  12. Linear Extended State Observer-Based Motion Synchronization Control for Hybrid Actuation System of More Electric Aircraft

    Directory of Open Access Journals (Sweden)

    Xingjian Wang

    2017-10-01

    Full Text Available Moving towards the more electric aircraft (MEA, a hybrid actuator configuration provides an opportunity to introduce electromechanical actuator (EMA into primary flight control. In the hybrid actuation system (HAS, an electro-hydraulic servo actuator (EHSA and an EMA operate on the same control surface. In order to solve force fighting problem in HAS, this paper proposes a novel linear extended state observer (LESO-based motion synchronization control method. To cope with the problem of unavailability of the state signals required by the motion synchronization controller, LESO is designed for EHSA and EMA to observe the state variables. Based on the observed states of LESO, motion synchronization controllers could enable EHSA and EMA to simultaneously track the desired motion trajectories. Additionally, nonlinearities, uncertainties and unknown disturbances as well as the coupling term between EHSA and EMA can be estimated and compensated by using the extended state of the proposed LESO. Finally, comparative simulation results indicate that the proposed LESO-based motion synchronization controller could reduce significant force fighting between EHSA and EMA.

  13. Linear Extended State Observer-Based Motion Synchronization Control for Hybrid Actuation System of More Electric Aircraft

    Science.gov (United States)

    Liao, Rui; Shi, Cun; Wang, Shaoping

    2017-01-01

    Moving towards the more electric aircraft (MEA), a hybrid actuator configuration provides an opportunity to introduce electromechanical actuator (EMA) into primary flight control. In the hybrid actuation system (HAS), an electro-hydraulic servo actuator (EHSA) and an EMA operate on the same control surface. In order to solve force fighting problem in HAS, this paper proposes a novel linear extended state observer (LESO)-based motion synchronization control method. To cope with the problem of unavailability of the state signals required by the motion synchronization controller, LESO is designed for EHSA and EMA to observe the state variables. Based on the observed states of LESO, motion synchronization controllers could enable EHSA and EMA to simultaneously track the desired motion trajectories. Additionally, nonlinearities, uncertainties and unknown disturbances as well as the coupling term between EHSA and EMA can be estimated and compensated by using the extended state of the proposed LESO. Finally, comparative simulation results indicate that the proposed LESO-based motion synchronization controller could reduce significant force fighting between EHSA and EMA. PMID:29068392

  14. Shell model description of band structure in 48Cr

    International Nuclear Information System (INIS)

    Vargas, Carlos E.; Velazquez, Victor M.

    2007-01-01

    The band structure for normal and abnormal parity bands in 48Cr are described using the m-scheme shell model. In addition to full fp-shell, two particles in the 1d3/2 orbital are allowed in order to describe intruder states. The interaction includes fp-, sd- and mixed matrix elements

  15. Compendium of Materials on Zero-Base Budgeting in the States. 95th Congress; 1st Session. Committee Print.

    Science.gov (United States)

    Congress of the U.S. , Washington, DC. Senate Committee on Government Operations.

    This is a collection of 16 articles on zero-based budgeting (ZBB), dealing primarily with the practice as it occurs in the states. Included is a lengthy report on ZBB practices in the states based on a survey conducted by the National Association of State Budget Officers and the Congressional Research Service. (IRT)

  16. Motivational states influence effort-based decision making in rats: the role of dopamine in the nucleus accumbens.

    Science.gov (United States)

    Mai, Bettina; Sommer, Susanne; Hauber, Wolfgang

    2012-03-01

    Decision-making policies are subject to modulation by changing motivational states. However, so far, little is known about the neurochemical mechanisms that bridge motivational states with decision making. Here we examined whether dopamine (DA) in the nucleus accumbens core (AcbC) modulates the effects of motivational states on effort-based decision making. Using a cost-benefit T-maze task in rats, we examined the effects of AcbC DA depletions on effort-based decision making, in particular on the sensitivity of effort-based decision making to a shift from a hungry to a sated state. The results demonstrated that, relative to sham controls, rats with AcbC DA depletion in a hungry as well as in a sated state had a reduced preference for effortful but large-reward action. This finding provides further support for the notion that AcbC DA regulates how much effort to invest for rewards. Importantly, our results further revealed that effort-based decision making in lesioned rats, as in sham controls, was still sensitive to a shift from a hungry to a sated state; that is, their preferences for effortful large-reward actions became lower after a shift from a restricted to a free-feeding regimen. These finding indicate that AcbC DA is not necessarily involved in mediating the effects of a shift in motivational state on decision-making policies.

  17. Residency in white-eared hummingbirds (Hylocharis leucotis and its effect in territorial contest resolution

    Directory of Open Access Journals (Sweden)

    Verónica Mendiola-Islas

    2016-10-01

    Full Text Available Background Territory owners usually defeat intruders. One explanation for this observation is the uncorrelated asymmetry hypothesis which argues that contests might be settled by an arbitrary convention such as “owners win.” We studied the effect of territorial residency on contest asymmetries in the white-eared hummingbird (Hylocharis leucotis in a fir forest from central Mexico. Methods Twenty white-eared male adult hummingbird territories were monitored during a winter season, recording the territorial behavior of the resident against intruding hummingbirds. The size and quality of the territory were related to the probability that the resident would allow the use of flowers by the intruder. Various generalized models (logistical models were generated to describe the probabilities of victory for each individual resident depending on the different combinations of three predictor variables (territory size, territory quality, and intruder identity. Results In general, small and low quality territory owners tend to prevent conspecific intruders from foraging at a higher rate, while they frequently fail to exclude heterospecific intruders such as the magnificent hummingbird (Eugenes fulgens or the green violetear hummingbird (Colibri thalassinus on any territory size. Our results showed that the identity of the intruder and the size and quality of the territory determined the result of the contests, but not the intensity of defense. Discussion Initially, the rule that “the resident always wins” was supported, since no resident was expelled from its territory during the study. Nevertheless, the resident-intruder asymmetries during the course of a day depended on different factors, such as the size and quality of the territory and, mainly, the identity of the intruders. Our results showed that flexibility observed in contest tactics suggests that these tactics are not fixed but are socially plastic instead and they can be adjusted to

  18. Residency in white-eared hummingbirds (Hylocharis leucotis) and its effect in territorial contest resolution.

    Science.gov (United States)

    Mendiola-Islas, Verónica; Lara, Carlos; Corcuera, Pablo; Valverde, Pedro Luis

    2016-01-01

    Territory owners usually defeat intruders. One explanation for this observation is the uncorrelated asymmetry hypothesis which argues that contests might be settled by an arbitrary convention such as "owners win." We studied the effect of territorial residency on contest asymmetries in the white-eared hummingbird ( Hylocharis leucotis ) in a fir forest from central Mexico. Twenty white-eared male adult hummingbird territories were monitored during a winter season, recording the territorial behavior of the resident against intruding hummingbirds. The size and quality of the territory were related to the probability that the resident would allow the use of flowers by the intruder. Various generalized models (logistical models) were generated to describe the probabilities of victory for each individual resident depending on the different combinations of three predictor variables (territory size, territory quality, and intruder identity). In general, small and low quality territory owners tend to prevent conspecific intruders from foraging at a higher rate, while they frequently fail to exclude heterospecific intruders such as the magnificent hummingbird ( Eugenes fulgens ) or the green violetear hummingbird ( Colibri thalassinus ) on any territory size. Our results showed that the identity of the intruder and the size and quality of the territory determined the result of the contests, but not the intensity of defense. Initially, the rule that "the resident always wins" was supported, since no resident was expelled from its territory during the study. Nevertheless, the resident-intruder asymmetries during the course of a day depended on different factors, such as the size and quality of the territory and, mainly, the identity of the intruders. Our results showed that flexibility observed in contest tactics suggests that these tactics are not fixed but are socially plastic instead and they can be adjusted to specific circumstances.

  19. Effect of a culture-based screening algorithm on tuberculosis incidence in immigrants and refugees bound for the United States: a population-based cross-sectional study.

    Science.gov (United States)

    Liu, Yecai; Posey, Drew L; Cetron, Martin S; Painter, John A

    2015-03-17

    Before 2007, immigrants and refugees bound for the United States were screened for tuberculosis (TB) by a smear-based algorithm that could not diagnose smear-negative/culture-positive TB. In 2007, the Centers for Disease Control and Prevention implemented a culture-based algorithm. To evaluate the effect of the culture-based algorithm on preventing the importation of TB to the United States by immigrants and refugees from foreign countries. Population-based, cross-sectional study. Panel physician sites for overseas medical examination. Immigrants and refugees with TB. Comparison of the increase of smear-negative/culture-positive TB cases diagnosed overseas among immigrants and refugees by the culture-based algorithm with the decline of reported cases among foreign-born persons within 1 year after arrival in the United States from 2007 to 2012. Of the 3 212 421 arrivals of immigrants and refugees from 2007 to 2012, a total of 1 650 961 (51.4%) were screened by the smear-based algorithm and 1 561 460 (48.6%) were screened by the culture-based algorithm. Among the 4032 TB cases diagnosed by the culture-based algorithm, 2195 (54.4%) were smear-negative/culture-positive. Before implementation (2002 to 2006), the annual number of reported cases among foreign-born persons within 1 year after arrival was relatively constant (range, 1424 to 1626 cases; mean, 1504 cases) but decreased from 1511 to 940 cases during implementation (2007 to 2012). During the same period, the annual number of smear-negative/culture-positive TB cases diagnosed overseas among immigrants and refugees bound for the United States by the culture-based algorithm increased from 4 to 629. This analysis did not control for the decline in new arrivals of nonimmigrant visitors to the United States and the decrease of incidence of TB in their countries of origin. Implementation of the culture-based algorithm may have substantially reduced the incidence of TB among newly arrived, foreign-born persons in

  20. Polycarbonate-based polyurethane as a polymer electrolyte matrix for all-solid-state lithium batteries

    Science.gov (United States)

    Bao, Junjie; Shi, Gaojian; Tao, Can; Wang, Chao; Zhu, Chen; Cheng, Liang; Qian, Gang; Chen, Chunhua

    2018-06-01

    Four kinds of polycarbonate-based polyurethane with 8-14 wt% hard segments content are synthesized via reactions of polycarbonatediol, hexamethylene diisocyanate and diethylene glycol. The mechanical strength of the polyurethanes increase with the increase of hard segments content. Solid polymer electrolytes composed of the polycarbonate-based polyurethanes and LiTFSI exhibits fascinating characteristics for all-solid-state lithium batteries with a high ionic conductivity of 1.12 × 10-4 S cm-1 at 80 °C, an electrochemical stability window up to 4.5 V (vs. Li+/Li), excellent mechanical strength and superior interfacial stability against lithium metal. The all-solid-state batteries using LiFePO4 cathode can deliver high discharge capacities (161, 158, 134 and 93 mAh g-1 at varied rates of 0.2, 0.5, 1 and 2 C) at 80 °C and excellent cycling performance (with 91% capacity retention after 600 cycles at 1 C). All the results indicate that such a polyurethane-based solid polymer electrolyte can be a promising candidate for all-solid-state lithium batteries.

  1. A rule-based approach to model checking of UML state machines

    Science.gov (United States)

    Grobelna, Iwona; Grobelny, Michał; Stefanowicz, Łukasz

    2016-12-01

    In the paper a new approach to formal verification of control process specification expressed by means of UML state machines in version 2.x is proposed. In contrast to other approaches from the literature, we use the abstract and universal rule-based logical model suitable both for model checking (using the nuXmv model checker), but also for logical synthesis in form of rapid prototyping. Hence, a prototype implementation in hardware description language VHDL can be obtained that fully reflects the primary, already formally verified specification in form of UML state machines. Presented approach allows to increase the assurance that implemented system meets the user-defined requirements.

  2. Vertical displacement during late-collisional escape tectonics (Brasiliano Orogeny) in the Ribeira Belt, São Paulo State, Brazil

    Science.gov (United States)

    Hackspacher, P. C.; Godoy, A. M.

    1999-07-01

    During the Brasiliano-Pan-African Orogeny, West Gondwana formed by collisional processes around the São Francisco-Congo Craton. The Ribeira belt, in southeastern Brazil, resulted from northwestward collision (650-600 Ma), followed by large-scale northeast-southwest dextral strike-slip shear movements related to late-collisional escape tectonics ( ca 600 Ma). In São Paulo State, three groups, also interpreted as terranes, are recognised in the Ribeira Belt, the Embu, Itapira and São Roque Groups. The Embu and Itapira Groups are formed of sillimanite-gneisses, schists and migmatites intruded by Neoproterozoic calc-alkaline granitoids, all thrusted northwestward. The São Roque Group is composed of metasediments and metavolcanics in greenschist-facies. Its deformation indicates a transpressional regime associated with tectonic escape. Sub-alkaline granites were emplaced in shallow levels during this regime. Microstructural studies along the Itu, Moreiras and Taxaquara Shear Zones demonstrate the coexistence of horizontal and vertical displacement components during the transpressional regime. The vertical component is regarded as responsible for the lateral juxtaposition of different crustal levels.

  3. Asthma Management in Educational Settings: Implementing Guideline-Based Care in Washington State Schools.

    Science.gov (United States)

    Evans-Agnew, Robin A; Klein, Nicole; Lecce, Sally

    2015-11-01

    Managing asthma in the schools is complex and requires careful planning. This article highlights key steps in implementing guideline-based care for children with asthma in Washington State schools: assessing students, establishing acuity, communicating with parents, and training staff. Advance planning can improve outcomes for students, parents, and school staff in managing this complex and prevalent disease. NASN recently developed asthma management guidelines. Developing state-specific guidelines provides an opportunity to speak specifically to state laws and nurse practice acts while also reinforcing the importance of specialized practice to school nurses, school administrators and teachers, parents, and students. © 2015 The Author(s).

  4. Multilayer quantum secret sharing based on GHZ state and generalized Bell basis measurement in multiparty agents

    Science.gov (United States)

    Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen

    2017-10-01

    A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.

  5. Sensitivity of boundary-layer stability to base-state distortions at high Mach numbers

    Science.gov (United States)

    Park, Junho; Zaki, Tamer

    2017-11-01

    The stability diagram of high-speed boundary layers has been established by evaluating the linear instability modes of the similarity profile, over wide ranges of Reynolds and Mach numbers. In real flows, however, the base state can deviate from the similarity profile. Both the base velocity and temperature can be distorted, for example due to roughness and thermal wall treatments. We review the stability problem of high-speed boundary layer, and derive a new formulation of the sensitivity to base-state distortion using forward and adjoint parabolized stability equations. The new formulation provides qualitative and quantitative interpretations on change in growth rate due to modifications of mean-flow and mean-temperature in heated high-speed boundary layers, and establishes the foundation for future control strategies. This work has been funded by the Air Force Office of Scientific Research (AFOSR) Grant: FA9550-16-1-0103.

  6. Implementation and Optimization of GPU-Based Static State Security Analysis in Power Systems

    Directory of Open Access Journals (Sweden)

    Yong Chen

    2017-01-01

    Full Text Available Static state security analysis (SSSA is one of the most important computations to check whether a power system is in normal and secure operating state. It is a challenge to satisfy real-time requirements with CPU-based concurrent methods due to the intensive computations. A sensitivity analysis-based method with Graphics processing unit (GPU is proposed for power systems, which can reduce calculation time by 40% compared to the execution on a 4-core CPU. The proposed method involves load flow analysis and sensitivity analysis. In load flow analysis, a multifrontal method for sparse LU factorization is explored on GPU through dynamic frontal task scheduling between CPU and GPU. The varying matrix operations during sensitivity analysis on GPU are highly optimized in this study. The results of performance evaluations show that the proposed GPU-based SSSA with optimized matrix operations can achieve a significant reduction in computation time.

  7. Quantum dialogue using non-maximally entangled states based on entanglement swapping

    International Nuclear Information System (INIS)

    Xia Yan; Song Jie; Song Heshan

    2007-01-01

    We present a secure quantum dialogue protocol using non-maximally entangled two-particle states via entanglement swapping at first, and then discuss the requirements for a real quantum dialogue. Within the present version two authorized users can exchange their faithful secret messages securely and simultaneously based on the method of entanglement purification

  8. Home range defense in the red fox, Vulpes vulpes L

    Science.gov (United States)

    Preston, E.M.

    1975-01-01

    This paper describes the home range defense behavior observed when nonresident male red foxes were introduced into established home ranges of resident male-female pairs. In 12 observation periods, four intruders were introduced to each of three mated pairs which had been given three weeks to acclimate to a 4.05-hectare, fenced enclosure. The residents centered their activities around a natural den and the frequency of intruder-resident encounters decreased rapidly with increasing distance from the den. The primary home range defense was continual harassment of the intruders by the resident males through agonistic displays and chases. Physical contact was rare. Even though the resident males were dominant in less than a majority of the interactions observed, they were usually successful in displacing the intruders within a few hours. The resident females seldom interacted with the intruders.

  9. Benchmarking road safety of U.S. states: a DEA-based Malmquist productivity index approach.

    Science.gov (United States)

    Egilmez, Gokhan; McAvoy, Deborah

    2013-04-01

    In this study, a DEA based Malmquist index model was developed to assess the relative efficiency and productivity of U.S. states in decreasing the number of road fatalities. Even though the national trend in fatal crashes has reached to the lowest level since 1949 (Traffic Safety Annual Assessment Highlights, 2010), a state-by-state analysis and comparison has not been studied considering other characteristics of the holistic national road safety assessment problem in any work in the literature or organizational reports. In this study, a DEA based Malmquist index model was developed to assess the relative efficiency and productivity of 50 U.S. states in reducing the number of fatal crashes. The single output, fatal crashes, and five inputs were aggregated into single road safety score and utilized in the DEA-based Malmquist index mathematical model. The period of 2002-2008 was considered due to data availability for the inputs and the output considered. According to the results, there is a slight negative productivity (an average of -0.2 percent productivity) observed in the U.S. on minimizing the number of fatal crashes along with an average of 2.1 percent efficiency decline and 1.8 percent technological improvement. The productivity in reducing the fatal crashes can only be attributed to the technological growth since there is a negative efficiency growth is occurred. It can be concluded that even though there is a declining trend observed in the fatality rates, the efficiency of states in utilizing societal and economical resources towards the goal of zero fatality is not still efficient. More effective policy making towards increasing safety belt usage and better utilization of safety expenditures to improve road condition are derived as the key areas to focus on for state highway safety agencies from the scope of current research. Published by Elsevier Ltd.

  10. Characteristics of States' Alternate Assessments Based on Modified Academic Achievement Standards in 2008. Synthesis Report 72

    Science.gov (United States)

    Albus, Deb; Lazarus, Sheryl S.; Thurlow, Martha L.; Cormier, Damien

    2009-01-01

    In April 2007, Federal No Child Left Behind regulations were finalized that provided states with additional flexibility for assessing some students with disabilities. The regulations allowed states to offer another assessment option, alternate assessments based on modified academic achievement standards (AA-MAS). States are not required to have…

  11. Experimental study on the plant state estimation for the condition-based maintenance

    International Nuclear Information System (INIS)

    Harada, J. I.; Takahashi, M.; Kitamura, M.; Wakabayashi, T.

    2006-01-01

    A framework of maintenance support system based on the plant state estimation using diverse methods has been proposed and the validity of the plant state estimation methods has been experimentally evaluated. The focus has been set on the construction of the BN for the objective system with the scale and complexity as same as real world systems. Another focus has been set on the other functions for maintenance support system such as signal processing tool and similarity matching. The validity of the proposed inference method has been confirmed through numerical experiments. (authors)

  12. Study of the β{sup -} decay of {sup 116m1}In: A new interpretation of low-lying 0{sup +} states in {sup 116}Sn

    Energy Technology Data Exchange (ETDEWEB)

    Pore, J.L.; Cross, D.S.; Andreoiu, C.; Ashley, R.; Chester, A.S.; Noakes, B.; Starosta, K.; Voss, P.J. [Simon Fraser University, Department of Chemistry, Burnaby BC (Canada); Ball, G.C.; Bender, P.C.; Garnsworthy, A.B.; Hackman, G.; Rajabali, M.M. [TRIUMF, Vancouver BC (Canada); Diaz Varela, A.; Demand, G.A.; Dunlop, R.; Garrett, P.E.; Hadinia, B.; Jigmeddorj, B.; Laffoley, A.T.; Liblong, A.; Svensson, C.E. [University of Guelph, Department of Physics, Guelph ON (Canada); Kanungo, R. [Saint Mary' s University, Department of Astronomy and Physics, Halifax NS (Canada); Petrache, C.M. [Universite Paris-Saclay, CSNSM, CNRS-IN2P3, Orsay Cedex (France); Wang, Z.M. [Simon Fraser University, Department of Chemistry, Burnaby BC (Canada); TRIUMF, Vancouver BC (Canada); Wood, J.L. [Georgia Institute of Technology, School of Physics, Atlanta, GA (United States); Yates, S.W. [University of Kentucky, Departments of Chemistry and Physics and Astronomy, Lexington, KY (United States)

    2017-02-15

    The {sup 116}Sn nucleus contains a collective rotational band originating from proton π 2p-2h excitations across the proton Z = 50 shell gap. Even though this nucleus has been extensively investigated in the past, there was still missing information on the low-energy interband transitions connecting the intruder and normal structures. The low-lying structure of {sup 116}Sn was investigated through a high-statistics study of the β{sup -} decay of {sup 116m1}In with the 8π spectrometer and its ancillary detectors at TRIUMF. These measurements are critical in order to properly characterize the π 2p-2h rotational band. Weak γ-decay branches are observed utilizing γ-γ coincidence spectroscopy methods, leading to the first direct observation of the 85 keV 2{sub 2}{sup +} → 0{sub 3}{sup +} γ ray with a transition strength of B(E2) = 99.7(84) W.u. The analysis of these results strongly suggests that the 2027 keV 0{sub 3}{sup +} state should replace the previously assigned 1757 keV 0{sub 2}{sup +} state as the band-head of the π 2p-2h rotational band. (orig.)

  13. Distributed Graph-Based State Space Generation

    NARCIS (Netherlands)

    Blom, Stefan; Kant, Gijs; Rensink, Arend; De Lara, J.; Varro, D.

    LTSMIN provides a framework in which state space generation can be distributed easily over many cores on a single compute node, as well as over multiple compute nodes. The tool works on the basis of a vector representation of the states; the individual cores are assigned the task of computing all

  14. Iterative Observer-based Estimation Algorithms for Steady-State Elliptic Partial Differential Equation Systems

    KAUST Repository

    Majeed, Muhammad Usman

    2017-07-19

    Steady-state elliptic partial differential equations (PDEs) are frequently used to model a diverse range of physical phenomena. The source and boundary data estimation problems for such PDE systems are of prime interest in various engineering disciplines including biomedical engineering, mechanics of materials and earth sciences. Almost all existing solution strategies for such problems can be broadly classified as optimization-based techniques, which are computationally heavy especially when the problems are formulated on higher dimensional space domains. However, in this dissertation, feedback based state estimation algorithms, known as state observers, are developed to solve such steady-state problems using one of the space variables as time-like. In this regard, first, an iterative observer algorithm is developed that sweeps over regular-shaped domains and solves boundary estimation problems for steady-state Laplace equation. It is well-known that source and boundary estimation problems for the elliptic PDEs are highly sensitive to noise in the data. For this, an optimal iterative observer algorithm, which is a robust counterpart of the iterative observer, is presented to tackle the ill-posedness due to noise. The iterative observer algorithm and the optimal iterative algorithm are then used to solve source localization and estimation problems for Poisson equation for noise-free and noisy data cases respectively. Next, a divide and conquer approach is developed for three-dimensional domains with two congruent parallel surfaces to solve the boundary and the source data estimation problems for the steady-state Laplace and Poisson kind of systems respectively. Theoretical results are shown using a functional analysis framework, and consistent numerical simulation results are presented for several test cases using finite difference discretization schemes.

  15. The Sundown of the United States Marine Corps Naval Flight Officer Military Occupational Specialties

    Science.gov (United States)

    2010-04-20

    EIA-6B Electronics Warfare Officer (EWO) will complete their training in FY2015 and FY2017, respectively, with the last Fl A-18D and El A-6B squadrons...Capability (IOC) of the F-4 Phantom, A-6 Intruder, and the OV -10 Bronco introduced the requirement for Naval Flight Officers and Aerial Observers (AO...Officer (ECMO) to target Surface to Air Radars during the Vietnam War and was subsequently replaced by the four-seat E/A-6B. The OV-10 Bronco , roc in

  16. Base technology development enhances state-of-the-art in meeting performance requirements

    International Nuclear Information System (INIS)

    Freedman, J.M.; Allen, G.C. Jr.; Luna, R.E.

    1987-01-01

    Sandia National Laboratories (SNL) has responsibility to the United States Department of Energy (DOE) for baseline technology to support the design of radioactive material transportation packages. To fulfill this responsibility, SNL works with industry, government agencies, and national laboratories to identify and develop state-of-the-art technology required to design and test safe, cost-effective radioactive materials packages. Principal elements of the base technology program include: 1) analysis techniques, 2) testing, 3) subsystem and component development, 4) packaging systems development support, and 5) technical support for policy development. These program elements support a systems approach for meeting performance requirements and assure that there is a sound underlying technical basis for both transportation packaging design and associated policy decisions. Highlights from the base technology program included in this paper are testing, design and analysis methods, advanced materials, risk assessment and logistics models, and transportation package support

  17. The Blood Donor Anxiety Scale: a six-item state anxiety measure based on the Spielberger State-Trait Anxiety Inventory.

    Science.gov (United States)

    Chell, Kathleen; Waller, Daniel; Masser, Barbara

    2016-06-01

    Research demonstrates that anxiety elevates the risk of blood donors experiencing adverse events, which in turn deters the performance of repeat blood donations. Identifying donors suffering from heightened state anxiety is important to assess the impact of evidence-based interventions. This study analyzed the appropriateness of a shortened version of the state subscale of the State-Trait Anxiety Inventory (STAI) in a blood donation context. STAI-State questionnaire data were collected from two separate samples of Australian blood donors (n = 919 and n = 824 after cleaning). Responses to demographic, donation history, and adverse reaction questions were also obtained. Identification of items and analysis was performed systematically to assess and compare internal reliability and content, construct, convergent, and criterion validity of three potential short-form state anxiety scales. Of the three short-form scales tested, STAI-State six-item scale demonstrated the best metric properties with the least number of items across both sample groups. Cronbach's alpha was acceptable (α = 0.844 and α = 0.820), correlated positively with the original measure (r = 0.927 and r = 0.931) and criterion-related variables, and maintained the two-dimension factorial structure of the original measure. The six-item short version of the STAI-State subscale presented the most reliable and valid scale for use with blood donors. A validated donor anxiety tool provides a standardized assessment and record of donor anxiety to gauge the effectiveness of ongoing efforts to enhance the donation experience. © 2016 AABB.

  18. Research on Health State Perception Algorithm of Mining Equipment Based on Frequency Closeness

    Directory of Open Access Journals (Sweden)

    Gang Wang

    2014-06-01

    Full Text Available The health state perception of mining equipment is intended to have an online real- time knowledge and analysis of the running conditions of large mining equipments. Due to its unknown failure mode, a challenge was raised to the traditional fault diagnosis of mining equipments. A health state perception algorithm of mining equipment was introduced in this paper, and through continuous sampling of the machine vibration data, the time-series data set was set up; subsequently, the mode set based on the frequency closeness was constructed by the d neighborhood method combined with the TSDM algorithm, thus the forecast method on the basis of the dual mode set was eventually formed. In the calculation of the frequency closeness, the Goertzel algorithm was introduced to effectively decrease the computation amount. It was indicated through the simulation test on the vibration data of the drum shaft base that the health state of the device could be effectively distinguished. The algorithm has been successfully applied to equipment monitoring in the Huoer Xinhe Coal Mine of Shanxi Coal Imp&Exp. Group Co., Ltd.

  19. Noise-based logic hyperspace with the superposition of 2 states in a single wire

    Science.gov (United States)

    Kish, Laszlo B.; Khatri, Sunil; Sethuraman, Swaminathan

    2009-05-01

    In the introductory paper [L.B. Kish, Phys. Lett. A 373 (2009) 911], about noise-based logic, we showed how simple superpositions of single logic basis vectors can be achieved in a single wire. The superposition components were the N orthogonal logic basis vectors. Supposing that the different logic values have “on/off” states only, the resultant discrete superposition state represents a single number with N bit accuracy in a single wire, where N is the number of orthogonal logic vectors in the base. In the present Letter, we show that the logic hyperspace (product) vectors defined in the introductory paper can be generalized to provide the discrete superposition of 2 orthogonal system states. This is equivalent to a multi-valued logic system with 2 logic values per wire. This is a similar situation to quantum informatics with N qubits, and hence we introduce the notion of noise-bit. This system has major differences compared to quantum informatics. The noise-based logic system is deterministic and each superposition element is instantly accessible with the high digital accuracy, via a real hardware parallelism, without decoherence and error correction, and without the requirement of repeating the logic operation many times to extract the probabilistic information. Moreover, the states in noise-based logic do not have to be normalized, and non-unitary operations can also be used. As an example, we introduce a string search algorithm which is O(√{M}) times faster than Grover's quantum algorithm (where M is the number of string entries), while it has the same hardware complexity class as the quantum algorithm.

  20. Flexible all solid-state supercapacitors based on chemical vapor deposition derived graphene fibers.

    Science.gov (United States)

    Li, Xinming; Zhao, Tianshuo; Chen, Qiao; Li, Peixu; Wang, Kunlin; Zhong, Minlin; Wei, Jinquan; Wu, Dehai; Wei, Bingqing; Zhu, Hongwei

    2013-11-07

    Flexible all-solid-state supercapacitors based on graphene fibers are demonstrated in this study. Surface-deposited oxide nanoparticles are used as pseudo-capacitor electrodes to achieve high capacitance. This supercapacitor electrode has an areal capacitance of 42 mF cm(-2), which is comparable to the capacitance for fiber-based supercapacitors reported to date. During the bending and cycling of the fiber-based supercapacitor, the stability could be maintained without sacrificing the electrochemical performance, which provides a novel and simple way to develop flexible, lightweight and efficient graphene-based devices.

  1. Convergence properties of the effective interaction

    International Nuclear Information System (INIS)

    Ellis, P.J.; Engeland, T.; Hjorth-Jensen, M.; Holt, A.; Osnes, E.

    1994-01-01

    The convergence properties of two perturbative schemes to sum the so-called folded diagrams are critically reviewed in this work, with an emphasis on the intruder state problem. The methods we study are the approaches of Kuo and co-workers and Lee and Suzuki. The suitability of the two schemes for shell-model calculations is discussed. ((orig.))

  2. Convergence properties of the effective interaction

    International Nuclear Information System (INIS)

    Ellis, P.J.; Engeland, T.; Hjorth-Jensen, M.; Holt, A.; Osnes, E.

    1993-10-01

    The convergence properties of two perturbative schemes to sum the so called folded diagrams are critically reviewed with an emphasis on the intruder state problem. The methods studied are the approaches of Kuo and co-workers and Lee and Suzuki. The suitability of the two schemes for shell-model calculations is discussed. 11 refs., 3 figs., 1 tab

  3. An Authenticated Key Agreement Scheme Based on Cyclic Automorphism Subgroups of Random Orders

    Directory of Open Access Journals (Sweden)

    Yang Jun

    2017-01-01

    Full Text Available Group-based cryptography is viewed as a modern cryptographic candidate solution to blocking quantum computer attacks, and key exchange protocols on the Internet are one of the primitives to ensure the security of communication. In 2016 Habeeb et al proposed a “textbook” key exchange protocol based on the semidirect product of two groups, which is insecure for use in real-world applications. In this paper, after discarding the unnecessary disguising notion of semidirect product in the protocol, we establish a simplified yet enhanced authenticated key agreement scheme based on cyclic automorphism subgroups of random orders by making hybrid use of certificates and symmetric-key encryption as challenge-and-responses in the public-key setting. Its passive security is formally analyzed, which is relative to the cryptographic hardness assumption of a computational number-theoretic problem. Cryptanalysis of this scheme shows that it is secure against the intruder-in-the-middle attack even in the worst case of compromising the signatures, and provides explicit key confirmation to both parties.

  4. Transitions in the computational power of thermal states for measurement-based quantum computation

    International Nuclear Information System (INIS)

    Barrett, Sean D.; Bartlett, Stephen D.; Jennings, David; Doherty, Andrew C.; Rudolph, Terry

    2009-01-01

    We show that the usefulness of the thermal state of a specific spin-lattice model for measurement-based quantum computing exhibits a transition between two distinct 'phases' - one in which every state is a universal resource for quantum computation, and another in which any local measurement sequence can be simulated efficiently on a classical computer. Remarkably, this transition in computational power does not coincide with any phase transition, classical, or quantum in the underlying spin-lattice model.

  5. Data fusion concept in multispectral system for perimeter protection of stationary and moving objects

    Science.gov (United States)

    Ciurapiński, Wieslaw; Dulski, Rafal; Kastek, Mariusz; Szustakowski, Mieczyslaw; Bieszczad, Grzegorz; Życzkowski, Marek; Trzaskawka, Piotr; Piszczek, Marek

    2009-09-01

    The paper presents the concept of multispectral protection system for perimeter protection for stationary and moving objects. The system consists of active ground radar, thermal and visible cameras. The radar allows the system to locate potential intruders and to control an observation area for system cameras. The multisensor construction of the system ensures significant improvement of detection probability of intruder and reduction of false alarms. A final decision from system is worked out using image data. The method of data fusion used in the system has been presented. The system is working under control of FLIR Nexus system. The Nexus offers complete technology and components to create network-based, high-end integrated systems for security and surveillance applications. Based on unique "plug and play" architecture, system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provides high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering.

  6. Gamma-ray spectroscopy of 120-130Te nuclei

    International Nuclear Information System (INIS)

    Vanhoy, J.R.; Champine, B.R.; Coleman, R.T.; Crandell, K.A.; Tanyi, J.A.; Hicks, S.F.; Alexander, G.K.; Burkett, P.G.; Burns, M.C.; Collard, C.J.

    2000-01-01

    Complete text of publication follows. Structure of the even 120-130 Te nuclei have been investigated with prompt gamma-ray spectroscopy following the 122-126,nat Te(n,n'γ) reactions and the (α,2nγ) 120,124,126 Te reactions. Gamma-ray excitation functions, angular distributions, γγ-coincidences, and Doppler shifts have been measured. Level schemes have been constructed to approximately 3.3 MeV excitation energy, and spectroscopic information including level spins and parities, branching and multipole-mixing ratios, and lifetimes have been extracted. Three different types of structure are thought to play an important role in these low-lying excitations. These are: collective, two-particle, and 4p-2h intruder excitations. Because there are seven stable even-even Te nuclei, the evolution of these excitation modes over this wide range in neutron number is investigated. Level sequences and transition rates obtained from these measurements are compared to IBM-2 model calculations both with and without intruder-state mixing by Rikovska et al. (1), and to particle-vibrational coupling model calculations by Lopac (2). The IBM-2 model calculations with intruder mixing well reproduce the level energies in the low-mass Te; however, examination of the electromagnetic transition rates reveals that there is no clear improvement in the description of these nuclei by adding the intruder configurations. Additionally, no evidence of the 2 + mixed-symmetry strength is observed in the 2 3 + and 2 4 + levels in these nuclei. The particle-vibration model calculations appear to do a good job describing both the level scheme and the transition rates in the heavier nuclei investigated. (author)

  7. Dextran based highly conductive hydrogel polysulfide electrolyte for efficient quasi-solid-state quantum dot-sensitized solar cells

    International Nuclear Information System (INIS)

    Chen, Hong-Yan; Lin, Ling; Yu, Xiao-Yun; Qiu, Kang-Qiang; Lü, Xian-Yong; Kuang, Dai-Bin; Su, Cheng-Yong

    2013-01-01

    Highlights: ► Dextran based hydrogel is first used to prepare quasi-solid-state polysulfide electrolyte for quantum dot-sensitized solar cells. ► The ion conductivity of hydrogel electrolyte shows almost the same value as the liquid electrolyte. ► The liquid state at elevated temperature of hydrogel electrolyte allows for a good contact between electrolyte and CdS/CdSe co-sensitized TiO 2 photoanode. ► The hydrogel electrolyte based cell exhibits slightly lower power conversion efficiency than that of liquid electrolyte based cell. ► The dynamic electron transfer mechanism in hydrogel electrolyte based cell is examined in detail by EIS and CIMPS/IMVS. -- Abstract: Highly conductive hydrogel polysulfide electrolyte is first fabricated using dextran as gelator and used as quasi-solid-state electrolyte for quantum dot-sensitized solar cells (QDSSCs). The hydrogel electrolyte with gelator concentration of 15 wt% shows almost the same conductivity as the liquid one. Moreover, its liquid state at elevated temperature allow for the well penetration into the pores in electrodeposited CdS/CdSe co-sensitized TiO 2 photoanode. This gel electrolyte based QDSSC exhibits power conversion efficiency (η) of 3.23% under AG 1.5 G one sun (100 mW cm −2 ) illumination, slightly lower than that of liquid electrolyte based cell (3.69%). The dynamic electron transfer mechanism of the gel and liquid electrolyte based QDSSC are examined by electrochemical impedance spectroscopy (EIS) and controlled intensity modulated photocurrent/photovoltage spectroscopy (CIMPS/IMVS). It is found that the electron transport in gel electrolyte based cell is much faster than the liquid electrolyte based cell but it tends to recombine more easily than the latter. However, these differences fade away with increasing the light intensity, showing declining electron collection efficiency at higher light intensity illumination. As a result, a conversion efficiency of 4.58% is obtained for the gel

  8. How to achieve proper overbite—Lessons from natural dentoalveolar compensation

    Directory of Open Access Journals (Sweden)

    Jenny Zwei-Chieng Chang

    2013-12-01

    Conclusion: For orthodontically closing the open bite, intruding upper posteriors and extruding lower anteriors are appropriate ways to simulate the natural occurring compensation. To eliminate deep bite in a low mandibular plane patient, intruding upper and lower anteriors and proclining anteriors will achieve good overbite. Imitating the natural dentoalveolar compensation by using temporary anchorage devices at appropriate sites for intruding teeth helps to resolve orthodontic vertical problems.

  9. An Improved Abstract State Machine Based Choreography Specification and Execution Algorithm for Semantic Web Services

    Directory of Open Access Journals (Sweden)

    Shahin Mehdipour Ataee

    2018-01-01

    Full Text Available We identify significant weaknesses in the original Abstract State Machine (ASM based choreography algorithm of Web Service Modeling Ontology (WSMO, which make it impractical for use in semantic web service choreography engines. We present an improved algorithm which rectifies the weaknesses of the original algorithm, as well as a practical, fully functional choreography engine implementation in Flora-2 based on the improved algorithm. Our improvements to the choreography algorithm include (i the linking of the initial state of the ASM to the precondition of the goal, (ii the introduction of the concept of a final state in the execution of the ASM and its linking to the postcondition of the goal, and (iii modification to the execution of the ASM so that it stops when the final state condition is satisfied by the current configuration of the machine. Our choreography engine takes as input semantic web service specifications written in the Flora-2 dialect of F-logic. Furthermore, we prove the equivalence of ASMs (evolving algebras and evolving ontologies in the sense that one can simulate the other, a first in literature. Finally, we present a visual editor which facilitates the design and deployment of our F-logic based web service and goal specifications.

  10. Group-SMA Algorithm Based Joint Estimation of Train Parameter and State

    Directory of Open Access Journals (Sweden)

    Wei Zheng

    2015-03-01

    Full Text Available The braking rate and train arresting operation is important in the train braking performance. It is difficult to obtain the states of the train on time because of the measurement noise and a long calculation time. A type of Group Stochastic M-algorithm (GSMA based on Rao-Blackwellization Particle Filter (RBPF algorithm and Stochastic M-algorithm (SMA is proposed in this paper. Compared with RBPF, GSMA based estimation precisions for the train braking rate and the control accelerations were improved by 78% and 62%, respectively. The calculation time of the GSMA was decreased by 70% compared with SMA.

  11. An empirically based steady state friction law and implications for fault stability.

    Science.gov (United States)

    Spagnuolo, E; Nielsen, S; Violay, M; Di Toro, G

    2016-04-16

    Empirically based rate-and-state friction laws (RSFLs) have been proposed to model the dependence of friction forces with slip and time. The relevance of the RSFL for earthquake mechanics is that few constitutive parameters define critical conditions for fault stability (i.e., critical stiffness and frictional fault behavior). However, the RSFLs were determined from experiments conducted at subseismic slip rates ( V   0.1 m/s) remains questionable on the basis of the experimental evidence of (1) large dynamic weakening and (2) activation of particular fault lubrication processes at seismic slip rates. Here we propose a modified RSFL (MFL) based on the review of a large published and unpublished data set of rock friction experiments performed with different testing machines. The MFL, valid at steady state conditions from subseismic to seismic slip rates (0.1 µm/s fault frictional stability with implications for slip event styles and relevance for models of seismic rupture nucleation, propagation, and arrest.

  12. A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques

    OpenAIRE

    Mrs. Manisha Bharati; Dr. Santosh Lomte

    2016-01-01

    The extensive use of virtualization in implementing cloud infrastructure brings unrivaled security concerns for cloud tenants or customers and introduces an additional layer that itself must be completely configured and secured. Intruders can exploit the large amount of cloud resources for their attacks. This paper discusses two approaches In the first three features namely ongoing attacks, autonomic prevention actions, and risk measure are Integrated to our Autonomic Cloud Intrus...

  13. 40 CFR 745.327 - State or Indian Tribal lead-based paint compliance and enforcement programs.

    Science.gov (United States)

    2010-07-01

    ... must have authority to take samples and review records as part of the lead-based paint activities... devote to the administration of its lead-based paint compliance and enforcement program. (C) Agree to... identifies what resources the State or Indian Tribe intends to devote to the administration of its lead-based...

  14. Four Thermochromic o-Hydroxy Schiff Bases of α-Aminodiphenylmethane: Solution and Solid State Study

    Directory of Open Access Journals (Sweden)

    Marija Zbačnik

    2017-01-01

    Full Text Available More than a hundred years after the first studies of the photo- and thermochromism of o-hydroxy Schiff bases (imines, it is still an intriguing topic that fascinates several research groups around the world. The reasons for such behavior are still under investigation, and this work is a part of it. We report the solution-based and mechanochemical synthesis of four o-hydroxy imines derived from α-aminodiphenylmethane. The thermochromic properties were studied for the single crystal and polycrystalline samples of the imines. The supramolecular impact on the keto-enol tautomerism in the solid state was studied using SCXRD and NMR, while NMR spectroscopy was used for the solution state. All four imines are thermochromic, although the color changes of the single crystals are not as strong as of the polycrystalline samples. One of the imines shows negative thermochromism, and that one is in keto-amine tautomeric form, both in the solid state as in solution.

  15. A Novel ARX-Based Approach for the Steady-State Identification Analysis of Industrial Depropanizer Column Datasets

    Directory of Open Access Journals (Sweden)

    Franklin D. Rincón

    2015-04-01

    Full Text Available This paper introduces a novel steady-state identification (SSI method based on the auto-regressive model with exogenous inputs (ARX. This method allows the SSI with reduced tuning by analyzing the identifiability properties of the system. In particular, the singularity of the model matrices is used as an index for steady-state determination. In this contribution, the novel SSI method is compared to other available techniques, namely the F-like test, wavelet transform and a polynomial-based approach. These methods are implemented for SSI of three different case studies. In the first case, a simulated dataset is used for calibrating the output-based SSI methods. The second case corresponds to a literature nonlinear continuous stirred-tank reactor (CSTR example running at different steady states in which the ARX-based approach is tuned with the available input-output data. Finally, an industrial case with real data of a depropanizer column from PETROBRAS S.A. considering different pieces of equipment is analyzed. The results for a reflux drum case indicate that the wavelet and the F-like test can satisfactorily detect the steady-state periods after careful tuning and when respecting their hypothesis, i.e., smooth data for the wavelet method and the presence of variance in the data for the F-like test. Through a heat exchanger case with different measurement frequencies, we demonstrate the advantages of using the ARX-based method over the other techniques, which include the aspect of online implementation.

  16. Population-based cancer survival in the United States: Data, quality control, and statistical methods.

    Science.gov (United States)

    Allemani, Claudia; Harewood, Rhea; Johnson, Christopher J; Carreira, Helena; Spika, Devon; Bonaventure, Audrey; Ward, Kevin; Weir, Hannah K; Coleman, Michel P

    2017-12-15

    Robust comparisons of population-based cancer survival estimates require tight adherence to the study protocol, standardized quality control, appropriate life tables of background mortality, and centralized analysis. The CONCORD program established worldwide surveillance of population-based cancer survival in 2015, analyzing individual data on 26 million patients (including 10 million US patients) diagnosed between 1995 and 2009 with 1 of 10 common malignancies. In this Cancer supplement, we analyzed data from 37 state cancer registries that participated in the second cycle of the CONCORD program (CONCORD-2), covering approximately 80% of the US population. Data quality checks were performed in 3 consecutive phases: protocol adherence, exclusions, and editorial checks. One-, 3-, and 5-year age-standardized net survival was estimated using the Pohar Perme estimator and state- and race-specific life tables of all-cause mortality for each year. The cohort approach was adopted for patients diagnosed between 2001 and 2003, and the complete approach for patients diagnosed between 2004 and 2009. Articles in this supplement report population coverage, data quality indicators, and age-standardized 5-year net survival by state, race, and stage at diagnosis. Examples of tables, bar charts, and funnel plots are provided in this article. Population-based cancer survival is a key measure of the overall effectiveness of services in providing equitable health care. The high quality of US cancer registry data, 80% population coverage, and use of an unbiased net survival estimator ensure that the survival trends reported in this supplement are robustly comparable by race and state. The results can be used by policymakers to identify and address inequities in cancer survival in each state and for the United States nationally. Cancer 2017;123:4982-93. Published 2017. This article is a U.S. Government work and is in the public domain in the USA. Published 2017. This article is a U

  17. Investigation of the Residual Stress State in an Epoxy Based Specimen

    DEFF Research Database (Denmark)

    Baran, Ismet; Jakobsen, Johnny; Andreasen, Jens Henrik

    2015-01-01

    Abstract. Process induced residual stresses may play an important role under service loading conditions for fiber reinforced composite. They may initiate premature cracks and alter the internal stress level. Therefore, the developed numerical models have to be validated with the experimental...... observations. In the present work, the formation of the residual stresses/strains are captured from experimental measurements and numerical models. An epoxy/steel based sample configuration is considered which creates an in-plane biaxial stress state during curing of the resin. A hole drilling process...... material models, i.e. cure kinetics, elastic modulus, CTE, chemical shrinkage, etc. together with the drilling process using the finite element method. The measured and predicted in-plane residual strain states are compared for the epoxy/metal biaxial stress specimen....

  18. Supervised chaos genetic algorithm based state of charge determination for LiFePO4 batteries in electric vehicles

    Science.gov (United States)

    Shen, Yanqing

    2018-04-01

    LiFePO4 battery is developed rapidly in electric vehicle, whose safety and functional capabilities are influenced greatly by the evaluation of available cell capacity. Added with adaptive switch mechanism, this paper advances a supervised chaos genetic algorithm based state of charge determination method, where a combined state space model is employed to simulate battery dynamics. The method is validated by the experiment data collected from battery test system. Results indicate that the supervised chaos genetic algorithm based state of charge determination method shows great performance with less computation complexity and is little influenced by the unknown initial cell state.

  19. Classification of schizophrenia patients based on resting-state functional network connectivity

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Arbabshirani

    2013-07-01

    Full Text Available There is a growing interest in automatic classification of mental disorders based on neuroimaging data. Small training data sets (subjects and very large amount of high dimensional data make it a challenging task to design robust and accurate classifiers for heterogeneous disorders such as schizophrenia. Most previous studies considered structural MRI, diffusion tensor imaging and task-based fMRI for this purpose. However, resting-state data has been rarely used in discrimination of schizophrenia patients from healthy controls. Resting data are of great interest, since they are relatively easy to collect, and not confounded by behavioral performance on a task. Several linear and non-linear classification methods were trained using a training dataset and evaluate with a separate testing dataset. Results show that classification with high accuracy is achievable using simple non-linear discriminative methods such as k-nearest neighbors which is very promising. We compare and report detailed results of each classifier as well as statistical analysis and evaluation of each single feature. To our knowledge our effects represent the first use of resting-state functional network connectivity features to classify schizophrenia.

  20. Correlation between arterial blood gas analysis and peripheral blood gas analysis in acid-base unbalance state

    Directory of Open Access Journals (Sweden)

    Hyun Lee Kim

    2012-06-01

    Full Text Available Acid-base unbalance is most common problem in severe ill patient, especially in condition of abnormal renal function state. Acid-base unbalances are respiratory acidosis, respiratory alkalosis, metabolic acidosis, and metabolic alkalosis. Metabolic acidosis is frequently appeared in clinical state. Arterial blood gas analysis is considered as a basic test to the intensive care unit patient and emergency state. Recently some researches were done, comparing with arterial blood gas analysis and venous blood gas analysis. Because of venous blood sampling is safer than arterial blood gas analysis, and beside not so different among them for detecting pH, pCO2, HCO3, except pO2 measuring. This research was done in emergency room, and for explaining no different between arterial blood gas analysis and peripheral blood gas analysis result in acid-base unbalance state patient. Especially in kidney functions decreased state. : The study was done from March, 2010 to January, 2011. The object was 89 peoples who came to emergency room for treating internal medicine problem. (Women 53, average age: 66.7±12.1 Then compare between arterial blood gas analysis and peripheral blood gas analysis. Result: The mean arterial minus venous difference for pH, pCO2, and bicarbonate was −0.0170, 2.6528, and 0.6124. Bland-Altman plot was done for predicting agreement of two groups, and the scale was pH −2.95 to 4.17, pCO2 −4.45 to 9.76, bicarbonate −2.95 to 4.16, in 95% relative. Conclusion: The peripheral blood gas pH, pCO2, bicarbonate level is almost same as arterial blood gas analysis results. And enough to measuring acid-base unbalance state, in absent of arterial blood testing.

  1. Voltage and Current Regulators Design of Power Converters in Islanded Microgrids based on State Feedback Decoupling

    DEFF Research Database (Denmark)

    Federico, de Bosio; de Sousa Ribeiro, Luiz Antonio; Freijedo Fernandez, Francisco Daniel

    2016-01-01

    In stand-alone microgrids based on voltage source inverters state feedback coupling between the capacitor voltage and inductor current degrades significantly the dynamics performance of voltage and current regulators. The decoupling of the controlled states is proposed, considering the limitations...

  2. Commonwealth Edison captures intruders on screen

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Commonwealth Edison has developed three software programs, with the supporting hardware, that significantly upgrade security monitoring capabilities at nuclear power stations. These are Video Capture, the Alternate Perimeter Alarm Reporting System, and the Redundant Access Control System. Conventional video systems only display what is happening at the moment and rewinding a VCR to discover what occurred earlier takes time. With Video Capture the images can be instantly restored to the monitor screen and printed out. When one of the security devices used to monitor the perimeter of a Commonwealth Edison nuclear power station is tripped, the Video Capture program stores the visual image digitally. This is done using similar technology to the employed in fax machines. The security staff are thus able to distinguish immediately between disturbances taking place simultaneously at different security zones. They can magnify and compare the stored images and print them out. The Alternate Perimeter Alarm Reporting System was developed to speed the transmission of alarm signals from the security sensors to the security computer. The Redundant Access Control System (RACS) was originally developed to meet the requirement of the Nuclear Regulatory Commission (NRC) for a secondary computer-operated security measure to monitor employee access to a nuclear power station. When employee drug testing became an additional NRC requirement, the Nuclear Division of Commonwealth Edison asked their programmers to modify RACS to generate a random list of personnel to be tested for substance abuse. RACS was then further modified to produce numerous station operating reports that had been previously compiled manually. (author)

  3. Assessing Capacity to Promote Science-Based Programs: A Key Informant Study of State Teen Pregnancy Prevention Organizations

    Science.gov (United States)

    Saunders, Edward; Sabri, Bushra; Huberman, Barbara; Klaus, T. W.; Davis, Laura

    2011-01-01

    The purpose of this qualitative study was to identify significant external and internal challenges that state organization leaders face in promoting science-based teen pregnancy prevention programs within their states. The state organization administrators were chosen because their organizations were funded by the U.S. Centers for Disease Control…

  4. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    Science.gov (United States)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  5. Experimental evaluation of optimal Vehicle Dynamic Control based on the State Dependent Riccati Equation technique

    NARCIS (Netherlands)

    Alirezaei, M.; Kanarachos, S.A.; Scheepers, B.T.M.; Maurice, J.P.

    2013-01-01

    Development and experimentally evaluation of an optimal Vehicle Dynamic Control (VDC) strategy based on the State Dependent Riccati Equation (SDRE) control technique is presented. The proposed nonlinear controller is based on a nonlinear vehicle model with nonlinear tire characteristics. A novel

  6. Virtual age model for equipment aging plant based on operation environment and service state

    International Nuclear Information System (INIS)

    Zhang Liming; Cai Qi; Zhao Xinwen; Chen Ling

    2010-01-01

    The accelerated life model based on the operation environment and service state was established by taking the virtual age as the equipment aging indices. The effect of different operation environments and service states on the reliability and virtual age under the continuum operation conditions and cycle operation conditions were analyzed, and the sensitivities of virtual age on operational environments and service states were studied. The results of the example application show that the effect of NPP equipment lifetime and the key parameters related to the reliability can be quantified by this model, and the result is in accordance with the reality.(authors)

  7. Invariants-based shortcuts for fast generating Greenberger–Horne–Zeilinger state among three superconducting qubits

    International Nuclear Information System (INIS)

    Xu Jing; Yu Lin; Wu Jin-Lei; Ji Xin

    2017-01-01

    As one of the most promising candidates for implementing quantum computers, superconducting qubits (SQs) are adopted for fast generating the Greenberger–Horne–Zeilinger (GHZ) state by using invariants-based shortcuts. Three SQs are separated and connected by two coplanar waveguide resonators (CPWRs) capacitively. The complicated system is skillfully simplified to a three-state system, and a GHZ state among three SQs is fast generated with a very high fidelity and simple driving pulses. Numerical simulations indicate the scheme is insensitive to parameter deviations. Besides, the robustness of the scheme against decoherence is discussed in detail. (paper)

  8. State of the art in HGPT (Heuristically Based Generalized Perturbation) methodology

    International Nuclear Information System (INIS)

    Gandini, A.

    1993-01-01

    A distinctive feature of heuristically based generalized perturbation theory (HGPT) methodology consists in the systematic use of importance conservation concepts. As well known, this use leads to fundamental reciprocity relationships from which perturbation, or sensitivity, expressions can be derived. The state of the art of the HGPT methodology is here illustrated. The application to a number of specific nonlinear fields of interest is commented. (author)

  9. Stress evaluation of metallic material under steady state based on nonlinear critically refracted longitudinal wave

    Science.gov (United States)

    Mao, Hanling; Zhang, Yuhua; Mao, Hanying; Li, Xinxin; Huang, Zhenfeng

    2018-06-01

    This paper presents the study of applying the nonlinear ultrasonic wave to evaluate the stress state of metallic materials under steady state. The pre-stress loading method is applied to guarantee components with steady stress. Three kinds of nonlinear ultrasonic experiments based on critically refracted longitudinal wave are conducted on components which the critically refracted longitudinal wave propagates along x, x1 and x2 direction. Experimental results indicate the second and third order relative nonlinear coefficients monotonically increase with stress, and the normalized relationship is consistent with simplified dislocation models, which indicates the experimental result is logical. The combined ultrasonic nonlinear parameter is proposed, and three stress evaluation models at x direction are established based on three ultrasonic nonlinear parameters, which the estimation error is below 5%. Then two stress detection models at x1 and x2 direction are built based on combined ultrasonic nonlinear parameter, the stress synthesis method is applied to calculate the magnitude and direction of principal stress. The results show the prediction error is within 5% and the angle deviation is within 1.5°. Therefore the nonlinear ultrasonic technique based on LCR wave could be applied to nondestructively evaluate the stress of metallic materials under steady state which the magnitude and direction are included.

  10. Quantum private comparison protocol based on the entanglement swapping between χ ^+ state and W-Class state

    Science.gov (United States)

    Xu, Ling; Zhao, Zhiwen

    2017-12-01

    Quantum private comparison (QPC) protocol, including Alice, Bob and the third party Charlie, aims at comparing Alice and Bob's secret inputs correctly without leaking them. Firstly, χ ^+ state and W-Class state are used to conduct the entanglement swapping in this protocol. Either the basis {|φ ^± > ,|ψ ^± >} or the basis {|χ ^± > ,|ω ^± > } is chosen by Alice and Bob based on the predetermined value to measure the particle pairs. And three bits of secret inputs can be compared in this protocol in every comparison time, while most of previous QPC protocols can only compare one or two bits. The qubit efficiency of this protocol is 60% more than others, which are 50% at most. Secondly, if the eavesdropper intends to obtain the secret inputs, it is important and primary to get the measurement results of particle pairs. In this protocol, even if the eavesdropper gets the accurate particle pairs, he cannot get the right measurement results without the right basis. Finally, this protocol is analyzed to be able to defend the secret inputs against various kinds of attack.

  11. Exploring the island of inversion with the d({sup 30}Mg,p){sup 31}Mg reaction

    Energy Technology Data Exchange (ETDEWEB)

    Bildstein, Vinzenz

    2010-12-07

    In this thesis the results of a d({sup 30}Mg,p){sup 31}Mg experiment at REX-ISOLDE are presented. {sup 31}Mg is located directly on the border of the so-called ''Island of Inversion'', a region of the nuclear chart around {sup 32}Mg where deformed intruder states of the fp shell form the ground states of the nuclei instead of the normal spherical states of the sd shell. A recent experiment has shown the ground state of {sup 31}Mg to be a 1/2{sup +} state and indicates more than 90% intruder configuration. The question whether the low-lying excited states of {sup 31}Mg are deformed intruder states as well or rather spherical states from the sd shell, indicating shape coexistence, is still open. The d({sup 30}Mg,p) {sup 31}Mg reaction is thus a good tool to gain more insight into the nature of the Island of Inversion. In the framework of this thesis the angular distribution of protons was measured for the second excited state at 221 keV in coincidence with de-excitation {gamma}-rays. The angular distribution was compared to DWBA calculations for different transferred orbital momenta, identifying the state for the first time as an l=1 state. The experiment was performed with the new charged particle detector setup T-REX. The setup is optimized for transfer reactions with radioactive beams in inverse kinematics. T-REX was developed, built, installed, and used for this first one neutron transfer experiment in the context of this thesis. The T-REX setup consists of {delta}E-E{sub Rest} telescopes made out of position sensitive silicon detectors that cover almost 4{pi} of the solid angle and can be combined with the MINIBALL {gamma}-ray detector array. It has a large solid angle for the detection and identification of the light recoils from transfer reactions. T-REX allows in combination with the MINIBALL Germanium detector array the tagging of the excited states by their characteristic {gamma}-rays. The combination of T-REX and MINIBALL achieves an

  12. The Incidence and Wage Consequences of Home-Based Work in the United States, 1980-2000

    Science.gov (United States)

    Oettinger, Gerald S.

    2011-01-01

    This study documents the rapid growth in home-based wage and salary employment and the sharp decline in the home-based wage penalty in the United States between 1980 and 2000. These twin patterns, observed for both men and women in most occupation groups, suggest that employer costs of providing home-based work arrangements have decreased.…

  13. Threshold quantum state sharing based on entanglement swapping

    Science.gov (United States)

    Qin, Huawang; Tso, Raylin

    2018-06-01

    A threshold quantum state sharing scheme is proposed. The dealer uses the quantum-controlled-not operations to expand the d-dimensional quantum state and then uses the entanglement swapping to distribute the state to a random subset of participants. The participants use the single-particle measurements and unitary operations to recover the initial quantum state. In our scheme, the dealer can share different quantum states among different subsets of participants simultaneously. So the scheme will be very flexible in practice.

  14. Can state-of-the-art HVS-based objective image quality criteria be used for image reconstruction techniques based on ROI analysis?

    Science.gov (United States)

    Dostal, P.; Krasula, L.; Klima, M.

    2012-06-01

    Various image processing techniques in multimedia technology are optimized using visual attention feature of the human visual system. Spatial non-uniformity causes that different locations in an image are of different importance in terms of perception of the image. In other words, the perceived image quality depends mainly on the quality of important locations known as regions of interest. The performance of such techniques is measured by subjective evaluation or objective image quality criteria. Many state-of-the-art objective metrics are based on HVS properties; SSIM, MS-SSIM based on image structural information, VIF based on the information that human brain can ideally gain from the reference image or FSIM utilizing the low-level features to assign the different importance to each location in the image. But still none of these objective metrics utilize the analysis of regions of interest. We solve the question if these objective metrics can be used for effective evaluation of images reconstructed by processing techniques based on ROI analysis utilizing high-level features. In this paper authors show that the state-of-the-art objective metrics do not correlate well with subjective evaluation while the demosaicing based on ROI analysis is used for reconstruction. The ROI were computed from "ground truth" visual attention data. The algorithm combining two known demosaicing techniques on the basis of ROI location is proposed to reconstruct the ROI in fine quality while the rest of image is reconstructed with low quality. The color image reconstructed by this ROI approach was compared with selected demosaicing techniques by objective criteria and subjective testing. The qualitative comparison of the objective and subjective results indicates that the state-of-the-art objective metrics are still not suitable for evaluation image processing techniques based on ROI analysis and new criteria is demanded.

  15. The structure of nuclei far from beta stability

    International Nuclear Information System (INIS)

    Zganjar, E.F.

    1991-01-01

    This report discusses the structural of nuclei for from beta stability of the following isotopes: thallium isotopes; mercury isotopes; gold isotopes; platinum isotopes; iridium isotopes; the neutron deficient rare-earth, Z = 57-72 region, and the neutron deficient Z = 50-56 region; also discussed are in-beam spectroscopy in the A = 70 region and shape coexistence, intruder states, and EO transitions

  16. Novel thixotropic gel electrolytes based on dicationic bis-imidazolium salts for quasi-solid-state dye-sensitized solar cells

    Science.gov (United States)

    Kim, Jun Young; Kim, Tae Ho; Kim, Dong Young; Park, Nam-Gyu; Ahn, Kwang-Duk

    Novel thixotropic gel electrolytes have been successfully prepared by utilizing oligomeric poly(ethylene oxide) (PEO)-based bis-imidazolium diiodide salts and hydrophilic silica nanoparticles for application in quasi-solid-state dye-sensitized solar cells (DSSCs). The thixotropic gel-state of the ionic liquid-based composite electrolytes is confirmed by observing the typical hysteresis loop and temporary hydrogen bonding. On using the PEO-based composite electrolyte, a quasi-solid-state DSSC exhibited highly improved properties such as easy penetration of the electrolyte into the cell without leakage, long-term stability, high open-circuit voltage without the use of 4- tert-butylpyridine, and a high energy-conversion efficiency of 5.25% under AM 1.5 illumination (100 mW cm -2).

  17. Asymmetries in body condition and order of arrival influence competitive ability and survival in a coral reef fish.

    Science.gov (United States)

    Poulos, Davina E; McCormick, Mark I

    2015-11-01

    Trade-offs between traits that influence an individual's competitive ability are important in determining community assembly and coexistence of individuals sharing the same resources. Populations of coral reef fish are structurally complex, so it is important to understand how these populations are shaped as a result of an individual's suite of traits and those of its competitors. We conducted a 2 × 2 factorial field experiment that manipulated body condition (high or low, manipulated through a feeding regime) and residency (resident or intruder, where the resident arrived at the habitat 3 h before the intruder) to evaluate effects on competitive ability and survival. Prior residency alleviated the disadvantage of a low body condition with respect to aggression, which was similar between low-condition residents and high-condition intruders. However, high-condition residents displayed a significantly greater level of aggression than intruders, regardless of whether intruders were from high- or low-condition treatments. For intruders to have a high probability of becoming dominant, they needed to have a large body condition advantage. Mortality trajectories suggested that body condition modified the effect of prior residency, and intruders were more likely to suffer mortality if they had a low body condition because residents pushed them away from shelter. Our results highlight that the negative effects of some traits may be compensated for by the positive effects of other traits, and that the specific ecological context an individual faces (such as the characteristics of its competitors) can have a major influence on successful establishment and persistence.

  18. Direct Power Control for Three-Phase Two-Level Voltage-Source Rectifiers Based on Extended-State Observation

    DEFF Research Database (Denmark)

    Song, Zhanfeng; Tian, Yanjun; Yan, Zhuo

    2016-01-01

    This paper proposed a direct power control strategy for three-phase two-level voltage-source rectifiers based on extended-state observation. Active and reactive powers are directly regulated in the stationary reference frame. Similar to the family of predictive controllers whose inherent characte......This paper proposed a direct power control strategy for three-phase two-level voltage-source rectifiers based on extended-state observation. Active and reactive powers are directly regulated in the stationary reference frame. Similar to the family of predictive controllers whose inherent...

  19. State insurance exchanges face challenges in offering standardized choices alongside innovative value-based insurance.

    Science.gov (United States)

    Corlette, Sabrina; Downs, David; Monahan, Christine H; Yondorf, Barbara

    2013-02-01

    Value-based insurance is a relatively new approach to health insurance in which financial barriers, such as copayments, are lowered for clinical services that are considered high value, while consumer cost sharing may be increased for services considered to be of uncertain value. Such plans are complex and do not easily fit into the simplified, consumer-friendly comparison tools that many state health insurance exchanges are formulating for use in 2014. Nevertheless some states and plans are attempting to strike the right balance between a streamlined health exchange shopping experience and innovative, albeit complex, benefit design that promotes value. For example, agencies administering exchanges in Vermont and Oregon are contemplating offering value-based insurance plans as an option in addition to a set of standardized plans. In the postreform environment, policy makers must find ways to present complex value-based insurance plans in a way that consumers and employers can more readily understand.

  20. Multiple-state based power control for multi-radio multi-channel wireless mesh networks

    CSIR Research Space (South Africa)

    Olwal, TO

    2009-01-01

    Full Text Available Multi-Radio Multi-Channel (MRMC) systems are key to power control problems in wireless mesh networks (WMNs). In this paper, we present asynchronous multiple-state based power control for MRMC WMNs. First, WMN is represented as a set of disjoint...

  1. Evaluation for Bearing Wear States Based on Online Oil Multi-Parameters Monitoring

    Science.gov (United States)

    Hu, Hai-Feng

    2018-01-01

    As bearings are critical components of a mechanical system, it is important to characterize their wear states and evaluate health conditions. In this paper, a novel approach for analyzing the relationship between online oil multi-parameter monitoring samples and bearing wear states has been proposed based on an improved gray k-means clustering model (G-KCM). First, an online monitoring system with multiple sensors for bearings is established, obtaining oil multi-parameter data and vibration signals for bearings through the whole lifetime. Secondly, a gray correlation degree distance matrix is generated using a gray correlation model (GCM) to express the relationship of oil monitoring samples at different times and then a KCM is applied to cluster the matrix. Analysis and experimental results show that there is an obvious correspondence that state changing coincides basically in time between the lubricants’ multi-parameters and the bearings’ wear states. It also has shown that online oil samples with multi-parameters have early wear failure prediction ability for bearings superior to vibration signals. It is expected to realize online oil monitoring and evaluation for bearing health condition and to provide a novel approach for early identification of bearing-related failure modes. PMID:29621175

  2. Noise-based logic hyperspace with the superposition of 2N states in a single wire

    International Nuclear Information System (INIS)

    Kish, Laszlo B.; Khatri, Sunil; Sethuraman, Swaminathan

    2009-01-01

    In the introductory paper [L.B. Kish, Phys. Lett. A 373 (2009) 911], about noise-based logic, we showed how simple superpositions of single logic basis vectors can be achieved in a single wire. The superposition components were the N orthogonal logic basis vectors. Supposing that the different logic values have 'on/off' states only, the resultant discrete superposition state represents a single number with N bit accuracy in a single wire, where N is the number of orthogonal logic vectors in the base. In the present Letter, we show that the logic hyperspace (product) vectors defined in the introductory paper can be generalized to provide the discrete superposition of 2 N orthogonal system states. This is equivalent to a multi-valued logic system with 2 2 N logic values per wire. This is a similar situation to quantum informatics with N qubits, and hence we introduce the notion of noise-bit. This system has major differences compared to quantum informatics. The noise-based logic system is deterministic and each superposition element is instantly accessible with the high digital accuracy, via a real hardware parallelism, without decoherence and error correction, and without the requirement of repeating the logic operation many times to extract the probabilistic information. Moreover, the states in noise-based logic do not have to be normalized, and non-unitary operations can also be used. As an example, we introduce a string search algorithm which is O(√(M)) times faster than Grover's quantum algorithm (where M is the number of string entries), while it has the same hardware complexity class as the quantum algorithm.

  3. On the validity of microscopic calculations of double-quantum-dot spin qubits based on Fock-Darwin states

    Science.gov (United States)

    Chan, GuoXuan; Wang, Xin

    2018-04-01

    We consider two typical approximations that are used in the microscopic calculations of double-quantum dot spin qubits, namely, the Heitler-London (HL) and the Hund-Mulliken (HM) approximations, which use linear combinations of Fock-Darwin states to approximate the two-electron states under the double-well confinement potential. We compared these results to a case in which the solution to a one-dimensional Schr¨odinger equation was exactly known and found that typical microscopic calculations based on Fock-Darwin states substantially underestimate the value of the exchange interaction, which is the key parameter that controls the quantum dot spin qubits. This underestimation originates from the lack of tunneling of Fock-Darwin states, which is accurate only in the case with a single potential well. Our results suggest that the accuracies of the current two-dimensional molecular- orbit-theoretical calculations based on Fock-Darwin states should be revisited since underestimation could only deteriorate in dimensions that are higher than one.

  4. Chronic kidney disease risk reduction in a Hispanic population through pharmacist-based disease-state management.

    Science.gov (United States)

    Leal, Sandra; Soto, Marisa

    2008-04-01

    The purpose of this study was to evaluate the ability of a pharmacist-based disease-state management service to improve the care of indigent, predominately Spanish-speaking patients with diabetes mellitus and common comorbid conditions at high risk for the development of chronic kidney disease (CKD). Patients at high risk for developing CKD who have diabetes at a community health center were placed in a pharmacist-based disease state management service for CKD risk reduction. A residency-trained, bilingual, certified diabetes educator, with a PharmD served as the patient's provider using diagnostic, educational, and therapeutic management services under a medical staff approved collaborative practice agreement. Outcomes were assessed by using national standards of care for disease control and prevention screening. The impact on CKD was shown with a mean A1C decrease of 2% and improvement in the proportion of patients at target goals for blood pressure, A1C, and cholesterol levels and receiving aspirin and angiotensin-converting enzyme inhibitor/angiotensin receptor blocker. A pharmacist-based disease-state management service for CKD risk reduction, care of diabetes, and frequently associated comorbid conditions improved compliance with national standards for diabetes care in a high-risk population.

  5. Cost and utilisation of hospital based delivery care in Empowered Action Group (EAG) states of India.

    Science.gov (United States)

    Mohanty, Sanjay K; Srivastava, Akanksha

    2013-10-01

    Large scale investment in the National Rural Health Mission is expected to increase the utilization and reduce the cost of maternal care in public health centres in India. The objective of this paper is to examine recent trends in the utilization and cost of hospital based delivery care in the Empowered Action Group (EAG) states of India. The unit data from the District Level Household Survey 3, 2007-2008 is used in the analyses. The coverage and the cost of hospital based delivery at constant price is analyzed for five consecutive years preceding the survey. Descriptive and multivariate analyses are used to understand the socio-economic differentials in cost and utilization of delivery care. During 2004-2008, the utilization of delivery care from public health centres has increased in all the eight EAG states. Adjusting for inflation, the household cost of delivery care has declined for the poor, less educated and in public health centres in the EAG states. The cost of delivery care in private health centres has not shown any significant changes across the states. Results of the multivariate analyses suggest that time, state, place of residence, economic status; educational attainment and delivery characteristics of mother are significant predictors of hospital based delivery care in India. The study demonstrates the utility of public spending on health care and provides a thrust to the ongoing debate on universal health coverage in India.

  6. Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine

    Directory of Open Access Journals (Sweden)

    Ming-Hung Wang

    2017-01-01

    Full Text Available With the rapid development of the Internet, several emerging technologies are adopted to construct fancy, interactive, and user-friendly websites. Among these technologies, HTML5 is a popular one and is widely used in establishing modern sites. However, the security issues in the new web technologies are also raised and are worthy of investigation. For vulnerability investigation, many previous studies used fuzzing and focused on generation-based approaches to produce test cases for fuzzing; however, these methods require a significant amount of knowledge and mental efforts to develop test patterns for generating test cases. To decrease the entry barrier of conducting fuzzing, in this study, we propose a test pattern generation algorithm based on the concept of finite state machines. We apply graph analysis techniques to extract paths from finite state machines and use these paths to construct test patterns automatically. According to the proposal, fuzzing can be completed through inputting a regular expression corresponding to the test target. To evaluate the performance of our proposal, we conduct an experiment in identifying vulnerabilities of the input attributes in HTML5. According to the results, our approach is not only efficient but also effective for identifying weak validators in HTML5.

  7. An Idle-State Detection Algorithm for SSVEP-Based Brain-Computer Interfaces Using a Maximum Evoked Response Spatial Filter.

    Science.gov (United States)

    Zhang, Dan; Huang, Bisheng; Wu, Wei; Li, Siliang

    2015-11-01

    Although accurate recognition of the idle state is essential for the application of brain-computer interfaces (BCIs) in real-world situations, it remains a challenging task due to the variability of the idle state. In this study, a novel algorithm was proposed for the idle state detection in a steady-state visual evoked potential (SSVEP)-based BCI. The proposed algorithm aims to solve the idle state detection problem by constructing a better model of the control states. For feature extraction, a maximum evoked response (MER) spatial filter was developed to extract neurophysiologically plausible SSVEP responses, by finding the combination of multi-channel electroencephalogram (EEG) signals that maximized the evoked responses while suppressing the unrelated background EEGs. The extracted SSVEP responses at the frequencies of both the attended and the unattended stimuli were then used to form feature vectors and a series of binary classifiers for recognition of each control state and the idle state were constructed. EEG data from nine subjects in a three-target SSVEP BCI experiment with a variety of idle state conditions were used to evaluate the proposed algorithm. Compared to the most popular canonical correlation analysis-based algorithm and the conventional power spectrum-based algorithm, the proposed algorithm outperformed them by achieving an offline control state classification accuracy of 88.0 ± 11.1% and idle state false positive rates (FPRs) ranging from 7.4 ± 5.6% to 14.2 ± 10.1%, depending on the specific idle state conditions. Moreover, the online simulation reported BCI performance close to practical use: 22.0 ± 2.9 out of the 24 control commands were correctly recognized and the FPRs achieved as low as approximately 0.5 event/min in the idle state conditions with eye open and 0.05 event/min in the idle state condition with eye closed. These results demonstrate the potential of the proposed algorithm for implementing practical SSVEP BCI systems.

  8. Competing States in the t-J Model: Uniform d-Wave State versus Stripe State versus Stripe State

    NARCIS (Netherlands)

    Corboz, P.R.; Rice, T.M.; Troyer, M.

    2014-01-01

    Variational studies of the t-J model on the square lattice based on infinite projected-entangled pair states confirm an extremely close competition between a uniform d-wave superconducting state and different stripe states. The site-centered stripe with an in-phase d-wave order has an equal or only

  9. Least mean square fourth based microgrid state estimation algorithm using the internet of things technology.

    Science.gov (United States)

    Rana, Md Masud

    2017-01-01

    This paper proposes an innovative internet of things (IoT) based communication framework for monitoring microgrid under the condition of packet dropouts in measurements. First of all, the microgrid incorporating the renewable distributed energy resources is represented by a state-space model. The IoT embedded wireless sensor network is adopted to sense the system states. Afterwards, the information is transmitted to the energy management system using the communication network. Finally, the least mean square fourth algorithm is explored for estimating the system states. The effectiveness of the developed approach is verified through numerical simulations.

  10. Low-field Switching Four-state Nonvolatile Memory Based on Multiferroic Tunnel Junctions

    Science.gov (United States)

    Yau, H. M.; Yan, Z. B.; Chan, N. Y.; Au, K.; Wong, C. M.; Leung, C. W.; Zhang, F. Y.; Gao, X. S.; Dai, J. Y.

    2015-08-01

    Multiferroic tunneling junction based four-state non-volatile memories are very promising for future memory industry since this kind of memories hold the advantages of not only the higher density by scaling down memory cell but also the function of magnetically written and electrically reading. In this work, we demonstrate a success of this four-state memory in a material system of NiFe/BaTiO3/La0.7Sr0.3MnO3 with improved memory characteristics such as lower switching field and larger tunneling magnetoresistance (TMR). Ferroelectric switching induced resistive change memory with OFF/ON ratio of 16 and 0.3% TMR effect have been achieved in this multiferroic tunneling structure.

  11. GaN based nanorods for solid state lighting

    Energy Technology Data Exchange (ETDEWEB)

    Li Shunfeng; Waag, Andreas [Institute of Semiconductor Technology, Braunschweig University of Technology, 38106 Braunschweig (Germany)

    2012-04-01

    In recent years, GaN nanorods are emerging as a very promising novel route toward devices for nano-optoelectronics and nano-photonics. In particular, core-shell light emitting devices are thought to be a breakthrough development in solid state lighting, nanorod based LEDs have many potential advantages as compared to their 2 D thin film counterparts. In this paper, we review the recent developments of GaN nanorod growth, characterization, and related device applications based on GaN nanorods. The initial work on GaN nanorod growth focused on catalyst-assisted and catalyst-free statistical growth. The growth condition and growth mechanisms were extensively investigated and discussed. Doping of GaN nanorods, especially p-doping, was found to significantly influence the morphology of GaN nanorods. The large surface of 3 D GaN nanorods induces new optical and electrical properties, which normally can be neglected in layered structures. Recently, more controlled selective area growth of GaN nanorods was realized using patterned substrates both by metalorganic chemical vapor deposition (MOCVD) and by molecular beam epitaxy (MBE). Advanced structures, for example, photonic crystals and DBRs are meanwhile integrated in GaN nanorod structures. Based on the work of growth and characterization of GaN nanorods, GaN nanoLEDs were reported by several groups with different growth and processing methods. Core/shell nanoLED structures were also demonstrated, which could be potentially useful for future high efficient LED structures. In this paper, we will discuss recent developments in GaN nanorod technology, focusing on the potential advantages, but also discussing problems and open questions, which may impose obstacles during the future development of a GaN nanorod based LED technology.

  12. Non-Religion-Based State Constitutional Challenges to Educational Voucher and Tax Credit Programs

    Science.gov (United States)

    Green, Preston C., III

    2016-01-01

    This article provides an overview of non-religion-based state constitutional challenges to educational voucher and tax credit/scholarship programs. The first section discusses litigation examining whether education voucher programs violate constitutional provisions requiring the legislature to provide an efficient system of public schools. The…

  13. Oxygen isotope regional pattern in granitoids from the Cachoeirinha Belt, northeast Brazil

    International Nuclear Information System (INIS)

    Sial, A.N.

    1984-01-01

    Four groups of granitoids are present within the Cachoeirinha belt and in the adjacent migmatitic basement, between 37 0 and 40 0 W long. and 7 0 and 8 0 15' S lat., States of Pernambuco and Paraiba: a) K 2 O - enriched, very porphyritic; b) a calc-alkalic slightly porphyritic group; c) group with trondjemitic affinities; and d) peralkalic group. Petrology and oxygen isotope geochemistry for over 100 samples from these groups were studied. Almost all plutons for which 5 or more samples were analyzed, exhibit a total range of gamma 18 O less than 2% o. A broad range of mean oxygen isotope composition is observed, varying from 6.93 to 12.79% o. There is a systematic regional trend in which the calc-alkalic granitoids (conceicao-type) found within the Cachoeirinha space are the most 18 O - enriched rocks (10.6 to 12.9% o) while the lowest mean gamma 18 O values (4.5 to 9.7% o) are found in the K 2 O - enriched granitoids (Itaporanga-type). Intermediate gamma 18 O values were recorded in the bodies with trondhjemitic affinities (8.9 to 9.8% o) which intruded metasediments of the Salgueiro Group and in the peralkalic granitoids of Catingueira (8.1 to 9.8% o) which intruded Cachoeirinha metamorphics. Among the potassic granitoids, mean gamma 18 O increases from Bodoco to Itaporanga (from west to east). As a whole, the W.R. gamma 18 O of these plutons correlate with the type of grade of metamorphism of the host rocks and, therefore, with the tectonic framework, increasing from those which intruded the gneiss-migmatites to those which intruded the low-grade metamorphics of the Cachoeirinha Group. The possible origin of each rock group is discussed in light of the oxygen isotope geochemistry. (Author) [pt

  14. Optical encryption of multiple three-dimensional objects based on multiple interferences and single-pixel digital holography

    Science.gov (United States)

    Wang, Ying; Liu, Qi; Wang, Jun; Wang, Qiong-Hua

    2018-03-01

    We present an optical encryption method of multiple three-dimensional objects based on multiple interferences and single-pixel digital holography. By modifying the Mach–Zehnder interferometer, the interference of the multiple objects beams and the one reference beam is used to simultaneously encrypt multiple objects into a ciphertext. During decryption, each three-dimensional object can be decrypted independently without having to decrypt other objects. Since the single-pixel digital holography based on compressive sensing theory is introduced, the encrypted data of this method is effectively reduced. In addition, recording fewer encrypted data can greatly reduce the bandwidth of network transmission. Moreover, the compressive sensing essentially serves as a secret key that makes an intruder attack invalid, which means that the system is more secure than the conventional encryption method. Simulation results demonstrate the feasibility of the proposed method and show that the system has good security performance. Project supported by the National Natural Science Foundation of China (Grant Nos. 61405130 and 61320106015).

  15. Evaluation of Model Based State of Charge Estimation Methods for Lithium-Ion Batteries

    Directory of Open Access Journals (Sweden)

    Zhongyue Zou

    2014-08-01

    Full Text Available Four model-based State of Charge (SOC estimation methods for lithium-ion (Li-ion batteries are studied and evaluated in this paper. Different from existing literatures, this work evaluates different aspects of the SOC estimation, such as the estimation error distribution, the estimation rise time, the estimation time consumption, etc. The equivalent model of the battery is introduced and the state function of the model is deduced. The four model-based SOC estimation methods are analyzed first. Simulations and experiments are then established to evaluate the four methods. The urban dynamometer driving schedule (UDDS current profiles are applied to simulate the drive situations of an electrified vehicle, and a genetic algorithm is utilized to identify the model parameters to find the optimal parameters of the model of the Li-ion battery. The simulations with and without disturbance are carried out and the results are analyzed. A battery test workbench is established and a Li-ion battery is applied to test the hardware in a loop experiment. Experimental results are plotted and analyzed according to the four aspects to evaluate the four model-based SOC estimation methods.

  16. Resilient Coordination of Networked Multiagent Systems Based on Distributed State Emulators

    OpenAIRE

    Yucelen, Tansel; De La Torre, Gerardo

    2014-01-01

    This note studies resilient coordination of networked multiagent systems in the presence of misbehaving agents, i.e., agents that are subject to adversaries modeled as exogenous disturbances. Apart from the existing relevant literature that make specific assumptions on the graph topology and/or the fraction of misbehaving agents, we present an adaptive control architecture based on distributed state emulators and show that the nominal networked multiagent system behavior can be retrieved even...

  17. Novel thixotropic gel electrolytes based on dicationic bis-imidazolium salts for quasi-solid-state dye-sensitized solar cells

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jun Young [Department of Polymer Science and Engineering, SungKyunKwan University, Suwon, Kyunggi-do 440-746 (Korea); Functional Polymer Lab., Korea Institute of Science and Technology, Seoul 136-791 (Korea); Kim, Tae Ho [Department of Polymer Science and Engineering, SungKyunKwan University, Suwon, Kyunggi-do 440-746 (Korea); Kim, Dong Young; Park, Nam-Gyu [Energy Materials Research Center, Korea Institute of Science and Technology, Seoul 136-791 (Korea); Ahn, Kwang-Duk [Functional Polymer Lab., Korea Institute of Science and Technology, Seoul 136-791 (Korea)

    2008-01-03

    Novel thixotropic gel electrolytes have been successfully prepared by utilizing oligomeric poly(ethylene oxide) (PEO)-based bis-imidazolium diiodide salts and hydrophilic silica nanoparticles for application in quasi-solid-state dye-sensitized solar cells (DSSCs). The thixotropic gel-state of the ionic liquid-based composite electrolytes is confirmed by observing the typical hysteresis loop and temporary hydrogen bonding. On using the PEO-based composite electrolyte, a quasi-solid-state DSSC exhibited highly improved properties such as easy penetration of the electrolyte into the cell without leakage, long-term stability, high open-circuit voltage without the use of 4-tert-butylpyridine, and a high energy-conversion efficiency of 5.25% under AM 1.5 illumination (100 mW cm{sup -2}). (author)

  18. The effects of valence-based and discrete emotional states on aesthetic response.

    Science.gov (United States)

    Cheng, Yin-Hui

    2013-01-01

    There is increasing recognition that consumer aesthetics--the responses of consumers to the aesthetic or appearance aspects of products--has become an important area of marketing in recent years. Consumer aesthetic responses to a product are a source of pleasure for the consumer. Previous research into the aesthetic responses to products has often emphasized exterior factors and visual design, but studies have seldom considered the psychological aesthetic experience of consumers, and in particular their emotional state. This study attempts to bridge this gap by examining the link between consumers' emotions and their aesthetic response to a product. Thus, the major goal of this study was to determine how valence-based and discrete emotional states influence choice. In Studies 1 and 2, positive and negative emotions were manipulated to implement two different induction techniques and explore the effect of emotions on participants' choices in two separate experiments. The results of both experiments confirmed the predictions, indicating that aesthetic responses and purchase intention are functions of emotional valence, such that both are stronger for people in a positive emotional state than for those in a negative emotional state. Study 2 also used a neutral affective state to establish the robustness of this observed effect of incidental affect. The results of Study 3 demonstrate that aesthetic response and purchase intention are not only a function of affect valence, but also are affected by the certainty appraisal associated with specific affective states. This research, therefore, contributes to the literature by offering empirical evidence that incidental affect is a determinant of aesthetic response.

  19. A Tensor Decomposition-Based Approach for Detecting Dynamic Network States From EEG.

    Science.gov (United States)

    Mahyari, Arash Golibagh; Zoltowski, David M; Bernat, Edward M; Aviyente, Selin

    2017-01-01

    Functional connectivity (FC), defined as the statistical dependency between distinct brain regions, has been an important tool in understanding cognitive brain processes. Most of the current works in FC have focused on the assumption of temporally stationary networks. However, recent empirical work indicates that FC is dynamic due to cognitive functions. The purpose of this paper is to understand the dynamics of FC for understanding the formation and dissolution of networks of the brain. In this paper, we introduce a two-step approach to characterize the dynamics of functional connectivity networks (FCNs) by first identifying change points at which the network connectivity across subjects shows significant changes and then summarizing the FCNs between consecutive change points. The proposed approach is based on a tensor representation of FCNs across time and subjects yielding a four-mode tensor. The change points are identified using a subspace distance measure on low-rank approximations to the tensor at each time point. The network summarization is then obtained through tensor-matrix projections across the subject and time modes. The proposed framework is applied to electroencephalogram (EEG) data collected during a cognitive control task. The detected change-points are consistent with a priori known ERN interval. The results show significant connectivities in medial-frontal regions which are consistent with widely observed ERN amplitude measures. The tensor-based method outperforms conventional matrix-based methods such as singular value decomposition in terms of both change-point detection and state summarization. The proposed tensor-based method captures the topological structure of FCNs which provides more accurate change-point-detection and state summarization.

  20. Mapping of trophic states based on nutrients concentration and phytoplankton abundance in Jatibarang Reservoir

    Science.gov (United States)

    Rudiyanti, Siti; Anggoro, Sutrisno; Rahman, Arif

    2018-02-01

    Jatibarang Reservoir is one of the Indonesian Reservoirs, which used for human activities such as tourism and agriculture. These activities will provide input of organic matter and nutrients into the water. These materials will impact water quality and eutrophication process. Eutrophication is the water enrichment by nutrients, especially nitrogen and phosphorus which can promote the growth of phytoplankton. Some indicators of eutrophication are increasing nutrients, trophic states, and change of phytoplankton composition. The relationship between water quality and phytoplankton community can be used as an indicator of trophic states in Jatibarang Reservoir. The aim of this study was to analyze the effect of nutrients concentration and phytoplankton abundance to the trophic states and mapping trophic states based on nutrients concentration and phytoplankton in Jatibarang Reservoir. This study was conducted in June and July 2017 at 9 stations around Jatibarang Reservoir. The results showed that average concentration of nitrate, phosphate, and chlorophyll-a in Jatibarang Reservoir was 0.69 mg/L, 0.27 mg/L, and 1.66 mg/m3, respectively. The phytoplankton abundance ranged 16-62,200 cells/L, consists of 21 genera of four classes, i.e. Chlorophyceae, Cyanophyceae, Bacillariophyceae, and Dinophyceae. Cyanophyceae was a dominant phytoplankton group based on the composition of abundance (>80%). High nutrient concentrations and phytoplankton dominated by Anabaena (Cyanophyceae) which indicated that the waters in Jatibarang Reservoir were eutrophic.

  1. Fractal-Based Methods and Inverse Problems for Differential Equations: Current State of the Art

    Directory of Open Access Journals (Sweden)

    Herb E. Kunze

    2014-01-01

    Full Text Available We illustrate, in this short survey, the current state of the art of fractal-based techniques and their application to the solution of inverse problems for ordinary and partial differential equations. We review several methods based on the Collage Theorem and its extensions. We also discuss two innovative applications: the first one is related to a vibrating string model while the second one considers a collage-based approach for solving inverse problems for partial differential equations on a perforated domain.

  2. Preparation of Forest Inventory and Analysis (FIA) and State Soil Geographic Data Base (STATSGO) data for global change research in the Eastern United States

    Science.gov (United States)

    Loius R. Iverson; Anantha M. G. Prasad; Charles T. Scott

    1996-01-01

    The USDA Forest Service's Forest Inventory and Analysis (FIA) and the Natural Resource Conservation Service's State Soil Geographic (STATSGO) data bases provide valuable natural resource data that can be analyzed at the national scale. When coupled with other data (e.g., climate), these data bases can provide insights into factors associated with current and...

  3. Optimization-based particle filter for state and parameter estimation

    Institute of Scientific and Technical Information of China (English)

    Li Fu; Qi Fei; Shi Guangming; Zhang Li

    2009-01-01

    In recent years, the theory of particle filter has been developed and widely used for state and parameter estimation in nonlinear/non-Gaussian systems. Choosing good importance density is a critical issue in particle filter design. In order to improve the approximation of posterior distribution, this paper provides an optimization-based algorithm (the steepest descent method) to generate the proposal distribution and then sample particles from the distribution. This algorithm is applied in 1-D case, and the simulation results show that the proposed particle filter performs better than the extended Kalman filter (EKF), the standard particle filter (PF), the extended Kalman particle filter (PF-EKF) and the unscented particle filter (UPF) both in efficiency and in estimation precision.

  4. Integrating Faith-Based Organizations into State-Funded Pre-K Programs: Resolving Constitutional Conflict. Pre-K Policy Brief Series

    Science.gov (United States)

    Goldman, Dan; Boylan, Ellen

    2010-01-01

    This policy brief addresses federal and state constitutional issues that arise when faith-based organizations participate in state prekindergarten (pre-k) programs and recommends safeguards to ensure that public funding of those programs complies with constitutional principles respecting the separation of church and state and freedom of religion.…

  5. Evolution from vibration to rotation in 108Cd nucleus within microscopic theory

    International Nuclear Information System (INIS)

    Ni Shaoyong; Tong Hong; Zhao Xingzhi; Shi Zhuyi; The Secon Northwest Inst. for Minority, Yinchuan; Zhang Chunmei; Lei Yuxi

    2008-01-01

    Based on the microscopic sdIBM-F max model and the single-particle energies from experiment, with the use of the most general Hamiltonian, the vibrational band and rotational band in 108 Cd nucleus as well as its evolutional process were reproduced very well by two different groups of nucleon-nucleon effective interaction parameters. And phenomenological study identifies that: 1) The coexisting region of two excitation models is on the interval between the state 8+ and state 14 1 + (this is a interval with E x =3.683-5.503 MeV), and the 8 1 + state is a state preponderant in the vibrational model, the 14 1 + state is one predominant in the rotational model, while the state 10 1 + is a cross- bencher state relative to the two models; 2) The yrast states from the ground-state up to the 24 1 + state all are collective states, hereafter the first breaking up and aligning state maybe is a two-quasiparticle state of neutron on the intruder orbits h 11/2 ; 3) This structure evolution has been achieved via the moderate changes of the pair coupling probability of valence nucleons in the coexisting region, and thus is not very rapidly. (authors)

  6. QM/MM studies on the excited-state relaxation mechanism of a semisynthetic dTPT3 base.

    Science.gov (United States)

    Guo, Wei-Wei; Zhang, Teng-Shuo; Fang, Wei-Hai; Cui, Ganglong

    2018-02-14

    Semisynthetic alphabets can potentially increase the genetic information stored in DNA through the formation of unusual base pairs. Recent experiments have shown that near-visible-light irradiation of the dTPT3 chromophore could lead to the formation of a reactive triplet state and of singlet oxygen in high quantum yields. However, the detailed excited-state relaxation paths that populate the lowest triplet state are unclear. Herein, we have for the first time employed the QM(MS-CASPT2//CASSCF)/MM method to explore the spectroscopic properties and excited-state relaxation mechanism of the aqueous dTPT3 chromophore. On the basis of the results, we have found that (1) the S 2 ( 1 ππ*) state of dTPT3 is the initially populated excited singlet state upon near-visible light irradiation; and (2) there are two efficient relaxation pathways to populate the lowest triplet state, i.e. T 1 ( 3 ππ*). In the first one, the S 2 ( 1 ππ*) system first decays to the S 1 ( 1 nπ*) state near the S 2 /S 1 conical intersection, which is followed by an efficient S 1 → T 1 intersystem crossing process at the S 1 /T 1 crossing point; in the second one, an efficient S 2 → T 2 intersystem crossing takes place first, and then, the T 2 ( 3 nπ*) system hops to the T 1 ( 3 ππ*) state through an internal conversion process at the T 2 /T 1 conical intersection. Moreover, an S 2 /S 1 /T 2 intersection region is found to play a vital role in the excited-state relaxation. These new mechanistic insights help in understanding the photophysics and photochemistry of unusual base pairs.

  7. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    Science.gov (United States)

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  8. Model Based Mission Assurance in a Model Based Systems Engineering (MBSE) Framework: State-of-the-Art Assessment

    Science.gov (United States)

    Cornford, Steven L.; Feather, Martin S.

    2016-01-01

    This report explores the current state of the art of Safety and Mission Assurance (S&MA) in projects that have shifted towards Model Based Systems Engineering (MBSE). Its goal is to provide insight into how NASA's Office of Safety and Mission Assurance (OSMA) should respond to this shift. In MBSE, systems engineering information is organized and represented in models: rigorous computer-based representations, which collectively make many activities easier to perform, less error prone, and scalable. S&MA practices must shift accordingly. The "Objective Structure Hierarchies" recently developed by OSMA provide the framework for understanding this shift. Although the objectives themselves will remain constant, S&MA practices (activities, processes, tools) to achieve them are subject to change. This report presents insights derived from literature studies and interviews. The literature studies gleaned assurance implications from reports of space-related applications of MBSE. The interviews with knowledgeable S&MA and MBSE personnel discovered concerns and ideas for how assurance may adapt. Preliminary findings and observations are presented on the state of practice of S&MA with respect to MBSE, how it is already changing, and how it is likely to change further. Finally, recommendations are provided on how to foster the evolution of S&MA to best fit with MBSE.

  9. DNA-based identification of Armillaria isolates from peach orchards in Mexico state

    Science.gov (United States)

    Ruben Damian Elias Roman; Ned B. Klopfenstein; Dionicio Alvarado Rosales; Mee-Sook Kim; Anna E. Case; Sara M. Ashiglar; John W. Hanna; Amy L. Ross-Davis; Remigio A. Guzman Plazola

    2012-01-01

    A collaborative project between the Programa de Fitopatología, Colegio de Postgraduados, Texcoco, Estado de Mexico and the USDA Forest Service - RMRS, Moscow Forest Pathology Laboratory has begun this year (2011) to assess which species of Armillaria are causing widespread and severe damage to the peach orchards from México state, Mexico. We are employing a DNA-based...

  10. Hugoniot-based equations of state for two filled EPDM rubbers

    Science.gov (United States)

    Pacheco, Adam; Dattelbaum, Dana; Orler, E.; Gustavsen, R.

    2013-06-01

    The shock response of silica filled and Kevlar filled ethylene-propylene-diene (EPDM) rubbers was studied using gas gun-driven plate impact experiments. Both materials are proprietary formulations made by Kirkhill-TA, Brea CA USA, and are used for ablative internal rocket motor insulation. Two types of experiments were performed. In the first, the filled-EPDM sample was mounted on the front of the projectile and impacted a Lithium Fluoride (LiF) window. The Hugoniot state was determined from the measured projectile velocity, the EPDM/LiF interface velocity (measured using VISAR) and impedance matching to LiF. In the second type of experiment, electromagnetic particle velocity gauges were embedded between layers of filled-EPDM. These provided in situ particle velocity and shock velocity measurements. Experiments covered a pressure range of 0.34 - 14 GPa. Hugoniot-based equations of state were obtained for both materials, and will be compared to those of other filled elastomers such as silica-filled polydimethylsiloxane and adiprene. Work performed while at Los Alamos National Laboratory.

  11. Cryptanalysis of the Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State

    Science.gov (United States)

    Gao, Xiang; Zhang, Shi-Bin; Chang, Yan; Yang, Fan; Zhang, Yan

    2018-06-01

    Recently, Li et al. (Int. J. Theor. Phys. 55, 1710-1718, 2016) proposed a Quantum Private Comparison (QPC) protocol based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State. Two parties can check whether their secret information is equal or not with the help of the semi-honest third party (TP). However in this paper, we will point out this kind of semi-honest TP is unreasonable. If we relax the constraint of the semi-honest TP, by using the fake signal attack, TP can know the whole secret information illegally. At last, we give our improvement, which can make this protocol more secure.

  12. Empirical study of travel mode forecasting improvement for the combined revealed preference/stated preference data–based discrete choice model

    Directory of Open Access Journals (Sweden)

    Yanfu Qiao

    2016-01-01

    Full Text Available The combined revealed preference/stated preference data–based discrete choice model has provided the actual choice-making restraints as well as reduced the prediction errors. But the random error variance of alternatives belonging to different data would impact its universality. In this article, we studied the traffic corridor between Chengdu and Longquan with the revealed preference/stated preference joint model, and the single stated preference data model separately predicted the choice probability of each mode. We found the revealed preference/stated preference joint model is universal only when there is a significant difference between the random error terms in different data. The single stated preference data would amplify the travelers’ preference and cause prediction error. We proposed a universal way that uses revealed preference data to modify the single stated preference data parameter estimation results to achieve the composite utility and reduce the prediction error. And the result suggests that prediction results are more reasonable based on the composite utility than the results based on the single stated preference data, especially forecasting the mode share of bus. The future metro line will be the main travel mode in this corridor, and 45% of passenger flow will transfer to the metro.

  13. Collinear resonant ionization laser spectroscopy of rare francium isotopes

    CERN Multimedia

    Neyens, G; Flanagan, K; Rajabali, M M; Le blanc, F M; Ware, T; Procter, T J

    2008-01-01

    We propose a programme of collinear resonant ionization spectroscopy (CRIS) of the francium isotopes up to and including $^{201}$Fr and $^{218,219}$Fr. This work aims at answering questions on the ordering of quantum states, and effect of the ($\\pi s_{1/2}^{-1}$)1/2$^{+}$ intruder state, which is currently believed to be the ground state of $^{199}$Fr. This work will also study the edge of the region of reflection asymmetry through measurement of the moments and radii of $^{218,219}$Fr. This proposal forms the first part of a series of experiments that will study nuclei in this region of the nuclear chart. Based on the success of this initial proposal it is the intention of the collaboration to perform high resolution measurements on the isotopes of radium and radon that surround $^{201}$Fr and $^{218}$Fr and thus providing a comprehensive description of the ground state properties of this region of the nuclear chart. Recent in-source spectroscopy measurements of lead, bismuth and polonium have demonstrated a...

  14. Control or non-control state: that is the question! An asynchronous visual P300-based BCI approach

    Science.gov (United States)

    Pinegger, Andreas; Faller, Josef; Halder, Sebastian; Wriessnegger, Selina C.; Müller-Putz, Gernot R.

    2015-02-01

    Objective. Brain-computer interfaces (BCI) based on event-related potentials (ERP) were proven to be a reliable synchronous communication method. For everyday life situations, however, this synchronous mode is impractical because the system will deliver a selection even if the user is not paying attention to the stimulation. So far, research into attention-aware visual ERP-BCIs (i.e., asynchronous ERP-BCIs) has led to variable success. In this study, we investigate new approaches for detection of user engagement. Approach. Classifier output and frequency-domain features of electroencephalogram signals as well as the hybridization of them were used to detect the user's state. We tested their capabilities for state detection in different control scenarios on offline data from 21 healthy volunteers. Main results. The hybridization of classifier output and frequency-domain features outperformed the results of the single methods, and allowed building an asynchronous P300-based BCI with an average correct state detection accuracy of more than 95%. Significance. Our results show that all introduced approaches for state detection in an asynchronous P300-based BCI can effectively avoid involuntary selections, and that the hybrid method is the most effective approach.

  15. Self-association and infrared spectres of some heterocyclic compounds based on pyrrol in solid state

    International Nuclear Information System (INIS)

    Mulloev, N.; Nurulloev, M.; Narziev, B.N.

    1993-01-01

    Present article is devoted to self-association and infrared spectres of some heterocyclic compounds based on pyrrol in solid state. The study results of self-association specified by molecular hydrogen bonds of some heterocyclic compounds based on pyrrol on spectres of infrared absorption of stretching vibrations of N-H group were considered.

  16. Generation of Atomic Greenberger-Horne-Zeilinger States Based on Faraday Rotation

    International Nuclear Information System (INIS)

    Liang Honghui; Li Xinghua

    2010-01-01

    Based on the input-output relation of the cavity and the Faraday Rotation mechanism, we propose a scheme for generating the n-atom Greenberger-Horne-Zeilinger state. In the scheme, the n-atom trapped respectively in n spatially separate cavities would be entangled with the photons going through the atom-cavity system. The successful probabilities of our protocol approach unity in the ideal case. What is more, no requirement for separately addressing further lowers experimental difficulties. (general)

  17. Synthesis of POSS-based ionic conductors with low glass transition temperatures for efficient solid-state dye-sensitized solar cells.

    Science.gov (United States)

    Zhang, Wei; Wang, Zhong-Sheng

    2014-07-09

    Replacing liquid-state electrolytes with solid-state electrolytes has been proven to be an effective way to improve the durability of dye-sensitized solar cells (DSSCs). We report herein the synthesis of amorphous ionic conductors based on polyhedral oligomeric silsesquioxane (POSS) with low glass transition temperatures for solid-state DSSCs. As the ionic conductor is amorphous and in the elastomeric state at the operating temperature of DSSCs, good pore filling in the TiO2 film and good interfacial contact between the solid-state electrolyte and the TiO2 film can be guaranteed. When the POSS-based ionic conductor containing an allyl group is doped with only iodine as the solid-state electrolyte without any other additives, power conversion efficiency of 6.29% has been achieved with good long-term stability under one-sun soaking for 1000 h.

  18. Raman Scattering as a Probe of the Magnetic State of BEDT-TTF Based Mott Insulators

    Directory of Open Access Journals (Sweden)

    Nora Hassan

    2018-05-01

    Full Text Available Quasi-two-dimensional Mott insulators based on BEDT-TTF molecules have recently demonstrated a variety of exotic states, which originate from electron–electron correlations and geometrical frustration of the lattice. Among those states are a triangular S = 1/2 spin liquid and quantum dipole liquid. In this article, we show the power of Raman scattering technique to characterize magnetic and electronic excitations of these states. Our results demonstrate a distinction between a spectrum of magnetic excitations in a simple Mott insulator with antiferromagnetic interactions, and a spectrum of an insulator with an additional on-site charge degree of freedom.

  19. Least mean square fourth based microgrid state estimation algorithm using the internet of things technology.

    Directory of Open Access Journals (Sweden)

    Md Masud Rana

    Full Text Available This paper proposes an innovative internet of things (IoT based communication framework for monitoring microgrid under the condition of packet dropouts in measurements. First of all, the microgrid incorporating the renewable distributed energy resources is represented by a state-space model. The IoT embedded wireless sensor network is adopted to sense the system states. Afterwards, the information is transmitted to the energy management system using the communication network. Finally, the least mean square fourth algorithm is explored for estimating the system states. The effectiveness of the developed approach is verified through numerical simulations.

  20. Evaluation for Bearing Wear States Based on Online Oil Multi-Parameters Monitoring

    Directory of Open Access Journals (Sweden)

    Si-Yuan Wang

    2018-04-01

    Full Text Available As bearings are critical components of a mechanical system, it is important to characterize their wear states and evaluate health conditions. In this paper, a novel approach for analyzing the relationship between online oil multi-parameter monitoring samples and bearing wear states has been proposed based on an improved gray k-means clustering model (G-KCM. First, an online monitoring system with multiple sensors for bearings is established, obtaining oil multi-parameter data and vibration signals for bearings through the whole lifetime. Secondly, a gray correlation degree distance matrix is generated using a gray correlation model (GCM to express the relationship of oil monitoring samples at different times and then a KCM is applied to cluster the matrix. Analysis and experimental results show that there is an obvious correspondence that state changing coincides basically in time between the lubricants’ multi-parameters and the bearings’ wear states. It also has shown that online oil samples with multi-parameters have early wear failure prediction ability for bearings superior to vibration signals. It is expected to realize online oil monitoring and evaluation for bearing health condition and to provide a novel approach for early identification of bearing-related failure modes.

  1. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  2. 6p-2h core excitations in 20O

    International Nuclear Information System (INIS)

    Amusa, A.

    1991-02-01

    The effects of intruder states arising from general positive deformations on the excitation energies, the two-neutron transfer spectroscopic amplitudes for the reaction 18 O(t,p) 20 O, and some electric quadrupole transition amplitudes between some low-lying positive parity states in 20 O are presented. The Hamiltonian matrix elements that reproduce experimental data best are also presented along with a general comparison of the results with experiment and with pure (sd) 4 shell model results. (author). 19 refs, 2 figs, 5 tabs

  3. A GIS-based assessment of coal-based hydrogen infrastructure deployment in the state of Ohio

    International Nuclear Information System (INIS)

    Johnson, Nils; Yang, Christopher; Ogden, Joan

    2008-01-01

    Hydrogen infrastructure costs will vary by region as geographic characteristics and feedstocks differ. This paper proposes a method for optimizing regional hydrogen infrastructure deployment by combining detailed spatial data in a geographic information system (GIS) with a technoeconomic model of hydrogen infrastructure components. The method is applied to a case study in Ohio in which coal-based hydrogen infrastructure with carbon capture and storage (CCS) is modeled for two distribution modes at several steady-state hydrogen vehicle market penetration levels. The paper identifies the optimal infrastructure design at each market penetration as well as the costs, CO 2 emissions, and energy use associated with each infrastructure pathway. The results indicate that aggregating infrastructure at the regional-scale yields lower levelized costs of hydrogen than at the city-level at a given market penetration level, and centralized production with pipeline distribution is the favored pathway even at low market penetration. Based upon the hydrogen infrastructure designs evaluated in this paper, coal-based hydrogen production with CCS can significantly reduce transportation-related CO 2 emissions at a relatively low infrastructure cost and levelized fuel cost. (author)

  4. A Physics-Based Rock Friction Constitutive Law: Steady State Friction

    Science.gov (United States)

    Aharonov, Einat; Scholz, Christopher H.

    2018-02-01

    Experiments measuring friction over a wide range of sliding velocities find that the value of the friction coefficient varies widely: friction is high and behaves according to the rate and state constitutive law during slow sliding, yet markedly weakens as the sliding velocity approaches seismic slip speeds. We introduce a physics-based theory to explain this behavior. Using conventional microphysics of creep, we calculate the velocity and temperature dependence of contact stresses during sliding, including the thermal effects of shear heating. Contacts are assumed to reach a coupled thermal and mechanical steady state, and friction is calculated for steady sliding. Results from theory provide good quantitative agreement with reported experimental results for quartz and granite friction over 11 orders of magnitude in velocity. The new model elucidates the physics of friction and predicts the connection between friction laws to independently determined material parameters. It predicts four frictional regimes as function of slip rate: at slow velocity friction is either velocity strengthening or weakening, depending on material parameters, and follows the rate and state friction law. Differences between surface and volume activation energies are the main control on velocity dependence. At intermediate velocity, for some material parameters, a distinct velocity strengthening regime emerges. At fast sliding, shear heating produces thermal softening of friction. At the fastest sliding, melting causes further weakening. This theory, with its four frictional regimes, fits well previously published experimental results under low temperature and normal stress.

  5. Metaevaluation of National Weatherization Assistance Program Based on State Studies, 1993-2002

    Energy Technology Data Exchange (ETDEWEB)

    Berry, L

    2003-04-02

    The National Weatherization Assistance Program, sponsored by the U.S. Department of Energy (DOE) and implemented by state and local agencies throughout the United States, weatherizes homes for low-income residents in order to increase their energy efficiency and lower utility bills. Research staff members at Oak Ridge National Laboratory (ORNL) have performed two previous metaevaluations of this program (Berry, 1997; Schweitzer and Berry, 1999). Both of these earlier metaevaluations involved synthesizing the results from individual studies of state weatherization efforts completed during a several year period. This report is the third in a series of metaevaluations of state-level studies. It is built on the foundation developed by the previous two metaevaluations. The purpose of this report, like that of the two earlier ORNL metaevaluations, is to provide a current estimate of the average national energy savings per home weatherized for the Weatherization Assistance Program based on the relevant state-level studies. All three of the metaevaluations, including this one, were designed to be updates to the findings of a national evaluation of the Weatherization Assistance Program, which examined a representative national sample of several thousand structures weatherized in 1989 (Brown, Berry, Balzer, and Faby 1993). Although the first and second metaevaluations used separate sets of state-level studies, completed during different time periods, there was little difference in their findings about the typical national energy savings per weatherized home for homes that heat with natural gas. Our initial analysis efforts for this report involved repeating the same procedures that had been used in the previous two reports. In particular, we collected and examined only the state-level evaluations that had become available between September of 1998 and August of 2002. Once again, we found little difference in the average energy savings estimates per weatherized home that were

  6. Support to Civil Authorities: Protecting the Homeland Newsletter, Number 10-52, July 2010

    Science.gov (United States)

    2010-07-01

    to these strategic issues, the tyranny of daily operational demands was also present. During the Christmas holiday season, intelligence indicators... holiday season ended uneventfully, but operational concerns continued to intrude because of the need to refine security procedures. Slowly and subtly...U.S. Army Forces Command, JTF–6’s area of responsibility was expanded to include the entire continental United States, Puerto Rico, and the Virgin

  7. Loss less real-time data compression based on LZO for steady-state Tokamak DAS

    International Nuclear Information System (INIS)

    Pujara, H.D.; Sharma, Manika

    2008-01-01

    The evolution of data acquisition system (DAS) for steady-state operation of Tokamak has been technology driven. Steady-state Tokamak demands a data acquisition system which is capable enough to acquire data losslessly from diagnostics. The needs of loss less continuous acquisition have a significant effect on data storage and takes up a greater portion of any data acquisition systems. Another basic need of steady state of nature of operation demands online viewing of data which loads the LAN significantly. So there is strong demand for something that would control the expansion of both these portion by a way of employing compression technique in real time. This paper presents a data acquisition systems employing real-time data compression technique based on LZO. It is a data compression library which is suitable for data compression and decompression in real time. The algorithm used favours speed over compression ratio. The system has been rigged up based on PXI bus and dual buffer mode architecture is implemented for loss less acquisition. The acquired buffer is compressed in real time and streamed to network and hard disk for storage. Observed performance of measure on various data type like binary, integer float, types of different type of wave form as well as compression timing overheads has been presented in the paper. Various software modules for real-time acquiring, online viewing of data on network nodes have been developed in LabWindows/CVI based on client server architecture

  8. Spin, quadrupole moment, and deformation of the magnetic-rotational band head in Pb193

    Science.gov (United States)

    Balabanski, D. L.; Ionescu-Bujor, M.; Iordachescu, A.; Bazzacco, D.; Brandolini, F.; Bucurescu, D.; Chmel, S.; Danchev, M.; de Poli, M.; Georgiev, G.; Haas, H.; Hübel, H.; Marginean, N.; Menegazzo, R.; Neyens, G.; Pavan, P.; Rossi Alvarez, C.; Ur, C. A.; Vyvey, K.; Frauendorf, S.

    2011-01-01

    The spectroscopic quadrupole moment of the T1/2=9.4(5) ns isomer in Pb193 at an excitation energy Eex=(2585+x) keV is measured by the time-differential perturbed angular distribution method as |Qs|=2.6(3) e b. Spin and parity Iπ=27/2- are assigned to it based on angular distribution measurements. This state is the band head of a magnetic-rotational band, described by the 1i13/2 subshell with the (3s1/2-21h9/21i13/2)11- proton excitation. The pairing-plus-quadrupole tilted-axis cranking calculations reproduce the measured quadrupole moment with a moderate oblate deformation ɛ2=-0.11, similar to that of the 11-proton intruder states, which nuclei in the region. This is the first direct measurement of a quadrupole moment and thus of the deformation of a magnetic-rotational band head.

  9. Renormalization of total sets of states into generalized bases with a resolution of the identity

    International Nuclear Information System (INIS)

    Vourdas, A

    2017-01-01

    A total set of states for which we have no resolution of the identity (a ‘pre-basis’), is considered in a finite dimensional Hilbert space. A dressing formalism renormalizes them into density matrices which resolve the identity, and makes them a ‘generalized basis’, which is practically useful. The dresssing mechanism is inspired by Shapley’s methodology in cooperative game theory, and it uses Möbius transforms. There is non-independence and redundancy in these generalized bases, which is quantified with a Shannon type of entropy. Due to this redundancy, calculations based on generalized bases are sensitive to physical changes and robust in the presence of noise. For example, the representation of an arbitrary vector in such generalized bases, is robust when noise is inserted in the coefficients. Also in a physical system with a ground state which changes abruptly at some value of the coupling constant, the proposed methodology detects such changes, even when noise is added to the parameters in the Hamiltonian of the system. (paper)

  10. State Synchronization Approaches in Web-based Applications

    Directory of Open Access Journals (Sweden)

    Grocevs Aleksejs

    2014-12-01

    Full Text Available The main objective of the article is to provide insight into technologies and approaches available to maintain consistent state on both client and server sides. The article describes basic RIA application state persistence difficulties and offers approaches to overcoming such problems using asynchronous data transmission synchronization channels and other user-available browser abilities.

  11. Conventional, hybrid, plug-in hybrid or electric vehicles? State-based comparative carbon and energy footprint analysis in the United States

    International Nuclear Information System (INIS)

    Onat, Nuri Cihat; Kucukvar, Murat; Tatari, Omer

    2015-01-01

    Highlights: • Driving patterns and electricity generation mix influence vehicle preferences. • EVs are found to be least carbon-intensive vehicle option in 24 states. • HEVs are found to be the most energy-efficient option in 45 states. • EVs across the board are unfavorable in the marginal electricity mix scenario. • Use of renewable energy to power EVs/PHEVs is crucial. - Abstract: Electric vehicles (EVs), plug-in hybrid electric vehicles (PHEVs), and hybrid electric vehicles (HEVs) are often considered as better options in terms of greenhouse gas emissions and energy consumption compared to internal combustion vehicles. However, making any decision among these vehicle options is not a straightforward process due to temporal and spatial variations, such as the sources of the electricity used and regional driving patterns. In this study, we compared these vehicle options across 50 states, taking into account state-specific average and marginal electricity generation mixes, regional driving patterns, and vehicle and battery manufacturing impacts. Furthermore, a policy scenario proposing the widespread use of solar energy to charge EVs and PHEVs is evaluated. Based on the average electricity generation mix scenario, EVs are found to be least carbon-intensive vehicle option in 24 states, while HEVs are found to be the most energy-efficient option in 45 states. In the marginal electricity mix scenario, widespread adoption of EVs is found to be an unwise strategy given the existing and near-future marginal electricity generation mix. On the other hand, EVs can be superior to other alternatives in terms of energy-consumption, if the required energy to generate 1 kW h of electricity is below 1.25 kW h

  12. Roles of the State Asthma Program in Implementing Multicomponent, School-Based Asthma Interventions

    Science.gov (United States)

    Hester, Laura L.; Wilce, Maureen A.; Gill, Sarah A.; Disler, Sheri L.; Collins, Pamela; Crawford, Gregory

    2013-01-01

    Background: Asthma is a leading chronic childhood disease in the United States and a major contributor to school absenteeism. Evidence suggests that multicomponent, school-based asthma interventions are a strategic way to address asthma among school-aged children. The Centers for Disease Control and Prevention (CDC) encourages the 36 health…

  13. Link-state-estimation-based transmission power control in wireless body area networks.

    Science.gov (United States)

    Kim, Seungku; Eom, Doo-Seop

    2014-07-01

    This paper presents a novel transmission power control protocol to extend the lifetime of sensor nodes and to increase the link reliability in wireless body area networks (WBANs). We first experimentally investigate the properties of the link states using the received signal strength indicator (RSSI). We then propose a practical transmission power control protocol based on both short- and long-term link-state estimations. Both the short- and long-term link-state estimations enable the transceiver to adapt the transmission power level and target the RSSI threshold range, respectively, to simultaneously satisfy the requirements of energy efficiency and link reliability. Finally, the performance of the proposed protocol is experimentally evaluated in two experimental scenarios-body posture change and dynamic body motion-and compared with the typical WBAN transmission power control protocols, a real-time reactive scheme, and a dynamic postural position inference mechanism. From the experimental results, it is found that the proposed protocol increases the lifetime of the sensor nodes by a maximum of 9.86% and enhances the link reliability by reducing the packet loss by a maximum of 3.02%.

  14. Reliability modelling and analysis of a multi-state element based on a dynamic Bayesian network

    Science.gov (United States)

    Li, Zhiqiang; Xu, Tingxue; Gu, Junyuan; Dong, Qi; Fu, Linyu

    2018-04-01

    This paper presents a quantitative reliability modelling and analysis method for multi-state elements based on a combination of the Markov process and a dynamic Bayesian network (DBN), taking perfect repair, imperfect repair and condition-based maintenance (CBM) into consideration. The Markov models of elements without repair and under CBM are established, and an absorbing set is introduced to determine the reliability of the repairable element. According to the state-transition relations between the states determined by the Markov process, a DBN model is built. In addition, its parameters for series and parallel systems, namely, conditional probability tables, can be calculated by referring to the conditional degradation probabilities. Finally, the power of a control unit in a failure model is used as an example. A dynamic fault tree (DFT) is translated into a Bayesian network model, and subsequently extended to a DBN. The results show the state probabilities of an element and the system without repair, with perfect and imperfect repair, and under CBM, with an absorbing set plotted by differential equations and verified. Through referring forward, the reliability value of the control unit is determined in different kinds of modes. Finally, weak nodes are noted in the control unit.

  15. Agreement and repeatability of vascular reactivity estimates based on a breath-hold task and a resting state scan.

    Science.gov (United States)

    Lipp, Ilona; Murphy, Kevin; Caseras, Xavier; Wise, Richard G

    2015-06-01

    FMRI BOLD responses to changes in neural activity are influenced by the reactivity of the vasculature. By complementing a task-related BOLD acquisition with a vascular reactivity measure obtained through breath-holding or hypercapnia, this unwanted variance can be statistically reduced in the BOLD responses of interest. Recently, it has been suggested that vascular reactivity can also be estimated using a resting state scan. This study aimed to compare three breath-hold based analysis approaches (block design, sine-cosine regressor and CO2 regressor) and a resting state approach (CO2 regressor) to measure vascular reactivity. We tested BOLD variance explained by the model and repeatability of the measures. Fifteen healthy participants underwent a breath-hold task and a resting state scan with end-tidal CO2 being recorded during both. Vascular reactivity was defined as CO2-related BOLD percent signal change/mmHg change in CO2. Maps and regional vascular reactivity estimates showed high repeatability when the breath-hold task was used. Repeatability and variance explained by the CO2 trace regressor were lower for the resting state data based approach, which resulted in highly variable measures of vascular reactivity. We conclude that breath-hold based vascular reactivity estimations are more repeatable than resting-based estimates, and that there are limitations with replacing breath-hold scans by resting state scans for vascular reactivity assessment. Copyright © 2015. Published by Elsevier Inc.

  16. Hospital-based shootings in the United States: 2000 to 2011.

    Science.gov (United States)

    Kelen, Gabor D; Catlett, Christina L; Kubit, Joshua G; Hsieh, Yu-Hsiang

    2012-12-01

    Workplace violence in health care settings is a frequent occurrence. Emergency departments (EDs) are considered particularly vulnerable. Gunfire in hospitals is of particular concern; however, information about such workplace violence is limited. Therefore, we characterize US hospital-based shootings from 2000 to 2011. Using LexisNexis, Google, Netscape, PubMed, and ScienceDirect, we searched reports for acute care hospital shooting events in the United States for 2000 through 2011. All hospital-based shootings with at least 1 injured victim were analyzed. Of 9,360 search "hits," 154 hospital-related shootings were identified, 91 (59%) inside the hospital and 63 (41%) outside on hospital grounds. Shootings occurred in 40 states, with 235 injured or dead victims. Perpetrators were overwhelmingly men (91%) but represented all adult age groups. The ED environs were the most common site (29%), followed by the parking lot (23%) and patient rooms (19%). Most events involved a determined shooter with a strong motive as defined by grudge (27%), suicide (21%), "euthanizing" an ill relative (14%), and prisoner escape (11%). Ambient society violence (9%) and mentally unstable patients (4%) were comparatively infrequent. The most common victim was the perpetrator (45%). Hospital employees composed 20% of victims; physician (3%) and nurse (5%) victims were relatively infrequent. Event characteristics that distinguished the ED from other sites included younger perpetrator, more likely in custody, and unlikely to have a personal relationship with the victim (ill relative, grudge, coworker). In 23% of shootings within the ED, the weapon was a security officer's gun taken by the perpetrator. Case fatality inside the hospital was much lower in the ED setting (19%) than other sites (73%). Although it is likely that not every hospital-based shooting was identified, such events are relatively rare compared with other forms of workplace violence. The unpredictable nature of this type of

  17. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    Directory of Open Access Journals (Sweden)

    Malik N Ahmed

    Full Text Available Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  18. Who Goes There?

    Science.gov (United States)

    Vail, Kathleen

    1995-01-01

    Biometrics (hand geometry, iris and retina scanners, voice and facial recognition, signature dynamics, facial thermography, and fingerprint readers) identifies people based on physical characteristics. Administrators worried about kidnapping, vandalism, theft, and violent intruders might welcome these security measures when they become more…

  19. A physics-based fractional order model and state of energy estimation for lithium ion batteries. Part II: Parameter identification and state of energy estimation for LiFePO4 battery

    Science.gov (United States)

    Li, Xiaoyu; Pan, Ke; Fan, Guodong; Lu, Rengui; Zhu, Chunbo; Rizzoni, Giorgio; Canova, Marcello

    2017-11-01

    State of energy (SOE) is an important index for the electrochemical energy storage system in electric vehicles. In this paper, a robust state of energy estimation method in combination with a physical model parameter identification method is proposed to achieve accurate battery state estimation at different operating conditions and different aging stages. A physics-based fractional order model with variable solid-state diffusivity (FOM-VSSD) is used to characterize the dynamic performance of a LiFePO4/graphite battery. In order to update the model parameter automatically at different aging stages, a multi-step model parameter identification method based on the lexicographic optimization is especially designed for the electric vehicle operating conditions. As the battery available energy changes with different applied load current profiles, the relationship between the remaining energy loss and the state of charge, the average current as well as the average squared current is modeled. The SOE with different operating conditions and different aging stages are estimated based on an adaptive fractional order extended Kalman filter (AFEKF). Validation results show that the overall SOE estimation error is within ±5%. The proposed method is suitable for the electric vehicle online applications.

  20. Deformation and shape coexistence in medium mass nuclei

    International Nuclear Information System (INIS)

    Meyer, R.A.

    1985-01-01

    Emerging evidence for deformed structures in medium mass nuclei is reviewed. Included in this review are both nuclei that are ground state symmetric rotors and vibrational nuclei where there are deformed structures at excited energies (shape coexistence). For the first time, Nilsson configurations in odd-odd nuclei within the region of deformation are identified. Shape coexistence in nuclei that abut the medium mass region of deformation is also examined. Recent establishment of a four-particle, four-hole intruder band in the double subshell closure nucleus 96 Zr 56 is presented and its relation to the nuclear vibron model is discussed. Special attention is given to the N=59 nuclei where new data have led to the reanalysis of 97 Sr and 99 Zr and the presence of the [404 9/2] hole intruder state as isomers in these nuclei. The low energy levels of the N=59 nuclei from Z=38 to 50 are compared with recent quadrupole-phonon model calculations that can describe their transition from near-rotational to single closed shell nuclei. The odd-odd N=59 nuclei are discussed in the context of coexisting shape isomers based on the (p[303 5/2]n[404 9/2])2 - configuration. Ongoing in-beam (t,p conversion-electron) multiparameter measurements that have led to the determination of monopole matrix elements for even-even 42 Mo nuclei are presented, and these are compared with initial estimates using IBA-2 calculations that allow mixing of normal and cross subshell excitations. Lastly, evidence for the neutron-proton 3 S 1 force's influence on the level structure of these nuclei is discussed within the context of recent quadrupole-phonon model calculations. (Auth.)

  1. A SVM-based quantitative fMRI method for resting-state functional network detection.

    Science.gov (United States)

    Song, Xiaomu; Chen, Nan-kuei

    2014-09-01

    Resting-state functional magnetic resonance imaging (fMRI) aims to measure baseline neuronal connectivity independent of specific functional tasks and to capture changes in the connectivity due to neurological diseases. Most existing network detection methods rely on a fixed threshold to identify functionally connected voxels under the resting state. Due to fMRI non-stationarity, the threshold cannot adapt to variation of data characteristics across sessions and subjects, and generates unreliable mapping results. In this study, a new method is presented for resting-state fMRI data analysis. Specifically, the resting-state network mapping is formulated as an outlier detection process that is implemented using one-class support vector machine (SVM). The results are refined by using a spatial-feature domain prototype selection method and two-class SVM reclassification. The final decision on each voxel is made by comparing its probabilities of functionally connected and unconnected instead of a threshold. Multiple features for resting-state analysis were extracted and examined using an SVM-based feature selection method, and the most representative features were identified. The proposed method was evaluated using synthetic and experimental fMRI data. A comparison study was also performed with independent component analysis (ICA) and correlation analysis. The experimental results show that the proposed method can provide comparable or better network detection performance than ICA and correlation analysis. The method is potentially applicable to various resting-state quantitative fMRI studies. Copyright © 2014 Elsevier Inc. All rights reserved.

  2. Noise-based logic hyperspace with the superposition of 2{sup N} states in a single wire

    Energy Technology Data Exchange (ETDEWEB)

    Kish, Laszlo B. [Texas A and M University, Department of Electrical and Computer Engineering, College Station, TX 77843-3128 (United States)], E-mail: laszlo.kish@ece.tamu.edu; Khatri, Sunil; Sethuraman, Swaminathan [Texas A and M University, Department of Electrical and Computer Engineering, College Station, TX 77843-3128 (United States)

    2009-05-11

    In the introductory paper [L.B. Kish, Phys. Lett. A 373 (2009) 911], about noise-based logic, we showed how simple superpositions of single logic basis vectors can be achieved in a single wire. The superposition components were the N orthogonal logic basis vectors. Supposing that the different logic values have 'on/off' states only, the resultant discrete superposition state represents a single number with N bit accuracy in a single wire, where N is the number of orthogonal logic vectors in the base. In the present Letter, we show that the logic hyperspace (product) vectors defined in the introductory paper can be generalized to provide the discrete superposition of 2{sup N} orthogonal system states. This is equivalent to a multi-valued logic system with 2{sup 2{sup N}} logic values per wire. This is a similar situation to quantum informatics with N qubits, and hence we introduce the notion of noise-bit. This system has major differences compared to quantum informatics. The noise-based logic system is deterministic and each superposition element is instantly accessible with the high digital accuracy, via a real hardware parallelism, without decoherence and error correction, and without the requirement of repeating the logic operation many times to extract the probabilistic information. Moreover, the states in noise-based logic do not have to be normalized, and non-unitary operations can also be used. As an example, we introduce a string search algorithm which is O({radical}(M)) times faster than Grover's quantum algorithm (where M is the number of string entries), while it has the same hardware complexity class as the quantum algorithm.

  3. Knowledge-Based Natural Language Understanding: A AAAI-87 Survey Talk

    Science.gov (United States)

    1991-01-01

    easily transformed into a regrettable mistake (don’t cry over spilt milk ) if G is not characterized as a fleeting goal and a recovery plan therefore...technical literature is characterized by very dry and literal language. If there is one place where metaphors might not intrude, it must be when people...from the point of view of both evidential support and falsification ? I ask it because you didn’t say anything about it. A: Well, I think there’s a lot

  4. Static Object Detection Based on a Dual Background Model and a Finite-State Machine

    Directory of Open Access Journals (Sweden)

    Heras Evangelio Rubén

    2011-01-01

    Full Text Available Detecting static objects in video sequences has a high relevance in many surveillance applications, such as the detection of abandoned objects in public areas. In this paper, we present a system for the detection of static objects in crowded scenes. Based on the detection of two background models learning at different rates, pixels are classified with the help of a finite-state machine. The background is modelled by two mixtures of Gaussians with identical parameters except for the learning rate. The state machine provides the meaning for the interpretation of the results obtained from background subtraction; it can be implemented as a look-up table with negligible computational cost and it can be easily extended. Due to the definition of the states in the state machine, the system can be used either full automatically or interactively, making it extremely suitable for real-life surveillance applications. The system was successfully validated with several public datasets.

  5. Changes in Resting-State Connectivity following Melody-Based Therapy in a Patient with Aphasia

    OpenAIRE

    Bitan, Tali; Simic, Tijana; Saverino, Cristina; Jones, Cheryl; Glazer, Joanna; Collela, Brenda; Wiseman-Hakes, Catherine; Green, Robin; Rochon, Elizabeth

    2018-01-01

    Melody-based treatments for patients with aphasia rely on the notion of preserved musical abilities in the RH, following left hemisphere damage. However, despite evidence for their effectiveness, the role of the RH is still an open question. We measured changes in resting-state functional connectivity following melody-based intervention, to identify lateralization of treatment-related changes. A patient with aphasia due to left frontal and temporal hemorrhages following traumatic brain injuri...

  6. A facile method to prepare a high performance solid-state flexible paper-based supercapacitor

    Energy Technology Data Exchange (ETDEWEB)

    Shieh, Jen-Yu; Zhang, Sheng-Hui; Wu, Cheng-Hung [Institute of Electro-Optical and Materials Science, National Formosa University, 64 Wenhua Road, Huwei, Yunlin 63208, Taiwan (China); Yu, Hsin Her, E-mail: hhyu@nfu.edu.tw [Department of Biotechnology, National Formosa University, 64 Wenhua Road, Huwei, Yunlin 63208, Taiwan (China)

    2014-09-15

    Graphical abstract: A flexible paper-based supercapacitor was assembled into a sandwich structure, which exhibits well-retained triangular-shaped curves. The cycle life stability of this device still retains about 96% of the initial capacitance after 2000 cycles at a scan rate of 400 mV/s. An as-fabricated paper-based supercapacitor could light a red LED well after charging at constant potential of 3 V. - Highlights: • A facile approach is proposed to fabricate paper-based supercapacitors. • Apple pectin is an excellent dispersant for MWCNTs. • Paper provides a strong binding and flexible characteristic for electrode. • A paper-based supercapacitor could light a red LED after charging. • This device shows excellent electrochemical performance and cycling stability. - Abstract: We propose a low cost and simple method to prepare a paper-based supercapacitor in this study. Multi-walled carbon nanotubes (MWCNTs) were dispersed with a pectin solution under an ultrasonic homogenizer. Carbon nanotube suspension was prepared using a centrifuge to eliminate impurities. The dispersed MWCNTs suspension was dropped and dried onto the shallow surface of commercial copy paper. A paper-based conductive paper was formed as the electrodes. The electrical conductivity and dispersed morphology of the paper-based conductive paper were examined by four probes, atomic force microscope (AFM), scanning electron microscope (SEM) and transmission electron microscope (TEM). The solid-state electrolyte was prepared by casting a solution of phosphoric acid and polyvinyl alcohol onto a glass plate. The paper-based supercapacitor was constructed with one solid-state electrolyte inserted between two electrodes, which were assembled into a sandwich structure by hot press. The specific capacitance and cycle-life stability of the paper-based supercapacitor was investigated by cyclic voltammetry analysis.

  7. Sinking during earthquakes: Critical acceleration criteria control drained soil liquefaction

    Science.gov (United States)

    Clément, C.; Toussaint, R.; Stojanova, M.; Aharonov, E.

    2018-02-01

    This article focuses on liquefaction of saturated granular soils, triggered by earthquakes. Liquefaction is defined here as the transition from a rigid state, in which the granular soil layer supports structures placed on its surface, to a fluidlike state, in which structures placed initially on the surface sink to their isostatic depth within the granular layer. We suggest a simple theoretical model for soil liquefaction and show that buoyancy caused by the presence of water inside a granular medium has a dramatic influence on the stability of an intruder resting at the surface of the medium. We confirm this hypothesis by comparison with laboratory experiments and discrete-element numerical simulations. The external excitation representing ground motion during earthquakes is simulated via horizontal sinusoidal oscillations of controlled frequency and amplitude. In the experiments, we use particles only slightly denser than water, which as predicted theoretically increases the effect of liquefaction and allows clear depth-of-sinking measurements. In the simulations, a micromechanical model simulates grains using molecular dynamics with friction between neighbors. The effect of the fluid is captured by taking into account buoyancy effects on the grains when they are immersed. We show that the motion of an intruder inside a granular medium is mainly dependent on the peak acceleration of the ground motion and establish a phase diagram for the conditions under which liquefaction happens, depending on the soil bulk density, friction properties, presence of water, and peak acceleration of the imposed large-scale soil vibrations. We establish that in liquefaction conditions, most cases relax toward an equilibrium position following an exponential in time. We also show that the equilibrium position itself, for most liquefaction regimes, corresponds to the isostatic equilibrium of the intruder inside a medium of effective density. The characteristic time to relaxation is

  8. Research on Turbofan Engine Model above Idle State Based on NARX Modeling Approach

    Science.gov (United States)

    Yu, Bing; Shu, Wenjun

    2017-03-01

    The nonlinear model for turbofan engine above idle state based on NARX is studied. Above all, the data sets for the JT9D engine from existing model are obtained via simulation. Then, a nonlinear modeling scheme based on NARX is proposed and several models with different parameters are built according to the former data sets. Finally, the simulations have been taken to verify the precise and dynamic performance the models, the results show that the NARX model can well reflect the dynamics characteristic of the turbofan engine with high accuracy.

  9. Multi-party Measurement-Device-Independent Quantum Key Distribution Based on Cluster States

    Science.gov (United States)

    Liu, Chuanqi; Zhu, Changhua; Ma, Shuquan; Pei, Changxing

    2018-03-01

    We propose a novel multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on cluster states. A four-photon analyzer which can distinguish all the 16 cluster states serves as the measurement device for four-party MDI-QKD. Any two out of four participants can build secure keys after the analyzers obtains successful outputs and the two participants perform post-processing. We derive a security analysis for the protocol, and analyze the key rates under different values of polarization misalignment. The results show that four-party MDI-QKD is feasible over 280 km in the optical fiber channel when the key rate is about 10- 6 with the polarization misalignment parameter 0.015. Moreover, our work takes an important step toward a quantum communication network.

  10. Measurement of lifetimes of high spin states in the N = 106 nuclei {sup 183}Ir and {sup 182}Os

    Energy Technology Data Exchange (ETDEWEB)

    Ahmad, I.; Blumenthal, D.; Carpenter, M.P. [and others

    1995-08-01

    Lifetimes of high spin states in the isotones {sup 183}Ir and {sup 182}Os were measured using the Notre Dame plunger device in conjunction with the Argonne Notre Dame {gamma}-ray facility. The aim of these measurements was to determine the deformation-driving properties of the h{sub 9/2} proton intruder orbital by comparing the values of the intrinsic quadrupole moments in the ground state bands in the odd-mass Ir nucleus and the even-even Os core. Levels in these nuclei were populated by the {sup 150}Nd ({sup 37}Cl,4n) and {sup 150}Nd ({sup 36}S,4n) reactions using a {sup 37}Cl beam of 169 MeV and 164-Mev {sup 36}S beam. The {sup 150}Nd target was 0.9-g/cm{sup 2} thick and was prepared by evaporating enriched {sup 150}Nd onto a stretched 1.5-mg/cm{sup 2} gold foil. The target was covered with a layer of a 60-{mu}g/cm{sup 2} Au to prevent its oxidation. Gamma-ray spectra were accumulated for approximately 4 hours for each target-stopper distance. Data were collected for 20 target-stopper distances ranging from 16 {mu}m to 10.4 mm. Preliminary analysis indicates that it will be possible to extract the lifetimes of the levels in the yrast bands up to and including part of the backbending region with sufficient accuracy. Detailed analysis of the data is in progress.

  11. Symmetric minimally entangled typical thermal states, grand-canonical ensembles, and the influence of the collapse bases

    Science.gov (United States)

    Binder, Moritz; Barthel, Thomas

    Based on DMRG, strongly correlated quantum many-body systems at finite temperatures can be simulated by sampling over a certain class of pure matrix product states (MPS) called minimally entangled typical thermal states (METTS). Here, we show how symmetries of the system can be exploited to considerably reduce computation costs in the METTS algorithm. While this is straightforward for the canonical ensemble, we introduce a modification of the algorithm to efficiently simulate the grand-canonical ensemble under utilization of symmetries. In addition, we construct novel symmetry-conserving collapse bases for the transitions in the Markov chain of METTS that improve the speed of convergence of the algorithm by reducing autocorrelations.

  12. A state-based national network for effective wildlife conservation

    Science.gov (United States)

    Meretsky, Vicky J.; Maguire, Lynn A.; Davis, Frank W.; Stoms, David M.; Scott, J. Michael; Figg, Dennis; Goble, Dale D.; Griffith, Brad; Henke, Scott E.; Vaughn, Jacqueline; Yaffee, Steven L.

    2012-01-01

    State wildlife conservation programs provide a strong foundation for biodiversity conservation in the United States, building on state wildlife action plans. However, states may miss the species that are at the most risk at rangewide scales, and threats such as novel diseases and climate change increasingly act at regional and national levels. Regional collaborations among states and their partners have had impressive successes, and several federal programs now incorporate state priorities. However, regional collaborations are uneven across the country, and no national counterpart exists to support efforts at that scale. A national conservation-support program could fill this gap and could work across the conservation community to identify large-scale conservation needs and support efforts to meet them. By providing important information-sharing and capacity-building services, such a program would advance collaborative conservation among the states and their partners, thus increasing both the effectiveness and the efficiency of conservation in the United States.

  13. Smoothing-based compressed state Kalman filter for joint state-parameter estimation: Applications in reservoir characterization and CO2 storage monitoring

    Science.gov (United States)

    Li, Y. J.; Kokkinaki, Amalia; Darve, Eric F.; Kitanidis, Peter K.

    2017-08-01

    The operation of most engineered hydrogeological systems relies on simulating physical processes using numerical models with uncertain parameters and initial conditions. Predictions by such uncertain models can be greatly improved by Kalman-filter techniques that sequentially assimilate monitoring data. Each assimilation constitutes a nonlinear optimization, which is solved by linearizing an objective function about the model prediction and applying a linear correction to this prediction. However, if model parameters and initial conditions are uncertain, the optimization problem becomes strongly nonlinear and a linear correction may yield unphysical results. In this paper, we investigate the utility of one-step ahead smoothing, a variant of the traditional filtering process, to eliminate nonphysical results and reduce estimation artifacts caused by nonlinearities. We present the smoothing-based compressed state Kalman filter (sCSKF), an algorithm that combines one step ahead smoothing, in which current observations are used to correct the state and parameters one step back in time, with a nonensemble covariance compression scheme, that reduces the computational cost by efficiently exploring the high-dimensional state and parameter space. Numerical experiments show that when model parameters are uncertain and the states exhibit hyperbolic behavior with sharp fronts, as in CO2 storage applications, one-step ahead smoothing reduces overshooting errors and, by design, gives physically consistent state and parameter estimates. We compared sCSKF with commonly used data assimilation methods and showed that for the same computational cost, combining one step ahead smoothing and nonensemble compression is advantageous for real-time characterization and monitoring of large-scale hydrogeological systems with sharp moving fronts.

  14. In-situ, In-Memory Stateful Vector Logic Operations based on Voltage Controlled Magnetic Anisotropy.

    Science.gov (United States)

    Jaiswal, Akhilesh; Agrawal, Amogh; Roy, Kaushik

    2018-04-10

    Recently, the exponential increase in compute requirements demanded by emerging applications like artificial intelligence, Internet of things, etc. have rendered the state-of-art von-Neumann machines inefficient in terms of energy and throughput owing to the well-known von-Neumann bottleneck. A promising approach to mitigate the bottleneck is to do computations as close to the memory units as possible. One extreme possibility is to do in-situ Boolean logic computations by using stateful devices. Stateful devices are those that can act both as a compute engine and storage device, simultaneously. We propose such stateful, vector, in-memory operations using voltage controlled magnetic anisotropy (VCMA) effect in magnetic tunnel junctions (MTJ). Our proposal is based on the well known manufacturable 1-transistor - 1-MTJ bit-cell and does not require any modifications in the bit-cell circuit or the magnetic device. Instead, we leverage the very physics of the VCMA effect to enable stateful computations. Specifically, we exploit the voltage asymmetry of the VCMA effect to construct stateful IMP (implication) gate and use the precessional switching dynamics of the VCMA devices to propose a massively parallel NOT operation. Further, we show that other gates like AND, OR, NAND, NOR, NIMP (complement of implication) can be implemented using multi-cycle operations.

  15. Economical multiparty simultaneous quantum identity authentication based on Greenberger–Horne–Zeilinger states

    International Nuclear Information System (INIS)

    Yu-Guang, Yang; Qiao-Yan, Wen

    2009-01-01

    A multiparty simultaneous quantum identity authentication protocol based on Greenberger–Horne–Zeilinger (GHZ) states is proposed. The multi-user can be authenticated by a trusted third party (TTP) simultaneously. Compared with the scheme proposed recently (Wang et al 2006 Chin. Phys. Lett. 23(9) 2360), the proposed scheme has the advantages of consuming fewer quantum and classical resources and lessening the difficulty and intensity of necessary operations. (general)

  16. Background information for the development of a low-level waste performance assessment methodology

    International Nuclear Information System (INIS)

    Shipers, L.R.

    1989-12-01

    This document identifies and describes the potential postclosure pathways of radionuclide release, migration, and exposure from low-level radioactive waste disposal facilities. Each pathway identified is composed of a combination of migration pathways (air, surface water, ground water, food chain) and exposure pathways (direct gamma, inhalation, ingestion, surface contact). The pathway identification is based on a review and evaluation of existing information, and not all pathways presented in the document would necessarily be of importance at a given low-level waste disposal site. This document presents pathways associated with undisturbed (ground water, gas generation), naturally disturbed (erosion, bathtubbing, earth creep, frost heave, plant and animal intruder), and inadvertent intruder (construction, agriculture) scenarios of a low-level waste disposal facility. 20 refs., 1 fig

  17. Routing protocol for wireless quantum multi-hop mesh backbone network based on partially entangled GHZ state

    Science.gov (United States)

    Xiong, Pei-Ying; Yu, Xu-Tao; Zhang, Zai-Chen; Zhan, Hai-Tao; Hua, Jing-Yu

    2017-08-01

    Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multihop teleportation for wireless mesh backbone networks. Based on an analysis of quantum multi-hop protocols, a partially entangled Greenberger-Horne-Zeilinger (GHZ) state is selected as the quantum channel for the proposed protocol. Both quantum and classical wireless channels exist between two neighboring nodes along the route. With the proposed routing protocol, quantum information can be transmitted hop by hop from the source node to the destination node. Based on multi-hop teleportation based on the partially entangled GHZ state, a quantum route established with the minimum number of hops. The difference between our routing protocol and the classical one is that in the former, the processes used to find a quantum route and establish quantum channel entanglement occur simultaneously. The Bell state measurement results of each hop are piggybacked to quantum route finding information. This method reduces the total number of packets and the magnitude of air interface delay. The deduction of the establishment of a quantum channel between source and destination is also presented here. The final success probability of quantum multi-hop teleportation in wireless mesh backbone networks was simulated and analyzed. Our research shows that quantum multi-hop teleportation in wireless mesh backbone networks through a partially entangled GHZ state is feasible.

  18. Model-Based State Feedback Controller Design for a Turbocharged Diesel Engine with an EGR System

    Directory of Open Access Journals (Sweden)

    Tianpu Dong

    2015-05-01

    Full Text Available This paper describes a method for the control of transient exhaust gas recirculation (EGR systems. Firstly, a state space model of the air system is developed by simplifying a mean value model. The state space model is linearized by using linearization theory and validated by the GT-Power data with an operating point of the diesel engine. Secondly, a state feedback controller based on the intake oxygen mass fraction is designed for EGR control. Since direct measurement of the intake oxygen mass fraction is unavailable on the engine, the estimation method for intake oxygen mass fraction has been proposed in this paper. The control strategy is analyzed by using co-simulation with the Matlab/Simulink and GT-Powers software. Finally, the whole control system is experimentally validated against experimental data of a turbocharged diesel engine. The control effect of the state feedback controller compared with PID controller proved to be further verify the feasibility and advantages of the proposed state feedback controller.

  19. Application of State Quantization-Based Methods in HEP Particle Transport Simulation

    Science.gov (United States)

    Santi, Lucio; Ponieman, Nicolás; Jun, Soon Yung; Genser, Krzysztof; Elvira, Daniel; Castro, Rodrigo

    2017-10-01

    Simulation of particle-matter interactions in complex geometries is one of the main tasks in high energy physics (HEP) research. An essential aspect of it is an accurate and efficient particle transportation in a non-uniform magnetic field, which includes the handling of volume crossings within a predefined 3D geometry. Quantized State Systems (QSS) is a family of numerical methods that provides attractive features for particle transportation processes, such as dense output (sequences of polynomial segments changing only according to accuracy-driven discrete events) and lightweight detection and handling of volume crossings (based on simple root-finding of polynomial functions). In this work we present a proof-of-concept performance comparison between a QSS-based standalone numerical solver and an application based on the Geant4 simulation toolkit, with its default Runge-Kutta based adaptive step method. In a case study with a charged particle circulating in a vacuum (with interactions with matter turned off), in a uniform magnetic field, and crossing up to 200 volume boundaries twice per turn, simulation results showed speedups of up to 6 times in favor of QSS while it being 10 times slower in the case with zero volume boundaries.

  20. The Tile-map Based Vulnerability Assessment Code of a Physical Protection System: SAPE (Systematic Analysis of Protection Effectiveness)

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Kwak, Sung Woo; Yoo, Ho Sik; Kim, Jung Soo; Yoon, Wan Ki

    2008-01-01

    Increasing threats on nuclear facilities demands stronger physical protection system (PPS) within the limited budget. For this reason we need an efficient physical protection system and before making an efficient PPS we need to evaluate it. This evaluation process should faithfully reflect real situation, reveal weak points and unnecessary protection elements, and give comparable quantitative values. Performance based analysis helps to build an efficient physical protection system. Instead of regulating the number of sensors and barriers, the performance based analysis evaluates a PPS fit to the situation of a facility. The analysis assesses delay (sensors) and detection (barriers) of a PPS against an intrusion, and judges whether a response force arrives before intruders complete their job. Performance based analysis needs complicated calculation and, hence, several assessment codes have been developed. A code called the estimation of adversary sequence interruption (EASI) was developed to analyze vulnerability along a single intrusion path. The systematic analysis of vulnerability to intrusion (SAVI) code investigates multi-paths to a valuable asset in an actual facility. SAVI uses adversary sequence diagram to describe multi-paths

  1. Adaptive Energy-Efficient Target Detection Based on Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Tengyue Zou

    2017-05-01

    Full Text Available Target detection is a widely used application for area surveillance, elder care, and fire alarms; its purpose is to find a particular object or event in a region of interest. Usually, fixed observing stations or static sensor nodes are arranged uniformly in the field. However, each part of the field has a different probability of being intruded upon; if an object suddenly enters an area with few guardian devices, a loss of detection will occur, and the stations in the safe areas will waste their energy for a long time without any discovery. Thus, mobile wireless sensor networks may benefit from adaptation and pertinence in detection. Sensor nodes equipped with wheels are able to move towards the risk area via an adaptive learning procedure based on Bayesian networks. Furthermore, a clustering algorithm based on k-means++ and an energy control mechanism is used to reduce the energy consumption of nodes. The extended Kalman filter and a voting data fusion method are employed to raise the localization accuracy of the target. The simulation and experimental results indicate that this new system with adaptive energy-efficient methods is able to achieve better performance than the traditional ones.

  2. Adaptive Energy-Efficient Target Detection Based on Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Zou, Tengyue; Li, Zhenjia; Li, Shuyuan; Lin, Shouying

    2017-05-04

    Target detection is a widely used application for area surveillance, elder care, and fire alarms; its purpose is to find a particular object or event in a region of interest. Usually, fixed observing stations or static sensor nodes are arranged uniformly in the field. However, each part of the field has a different probability of being intruded upon; if an object suddenly enters an area with few guardian devices, a loss of detection will occur, and the stations in the safe areas will waste their energy for a long time without any discovery. Thus, mobile wireless sensor networks may benefit from adaptation and pertinence in detection. Sensor nodes equipped with wheels are able to move towards the risk area via an adaptive learning procedure based on Bayesian networks. Furthermore, a clustering algorithm based on k -means++ and an energy control mechanism is used to reduce the energy consumption of nodes. The extended Kalman filter and a voting data fusion method are employed to raise the localization accuracy of the target. The simulation and experimental results indicate that this new system with adaptive energy-efficient methods is able to achieve better performance than the traditional ones.

  3. Implementing nonprojective measurements via linear optics: An approach based on optimal quantum-state discrimination

    International Nuclear Information System (INIS)

    Loock, Peter van; Nemoto, Kae; Munro, William J.; Raynal, Philippe; Luetkenhaus, Norbert

    2006-01-01

    We discuss the problem of implementing generalized measurements [positive operator-valued measures (POVMs)] with linear optics, either based upon a static linear array or including conditional dynamics. In our approach, a given POVM shall be identified as a solution to an optimization problem for a chosen cost function. We formulate a general principle: the implementation is only possible if a linear-optics circuit exists for which the quantum mechanical optimum (minimum) is still attainable after dephasing the corresponding quantum states. The general principle enables us, for instance, to derive a set of necessary conditions for the linear-optics implementation of the POVM that realizes the quantum mechanically optimal unambiguous discrimination of two pure nonorthogonal states. This extends our previous results on projection measurements and the exact discrimination of orthogonal states

  4. Optimization of Aero Engine Acceleration Control in Combat State Based on Genetic Algorithms

    Science.gov (United States)

    Li, Jie; Fan, Ding; Sreeram, Victor

    2012-03-01

    In order to drastically exploit the potential of the aero engine and improve acceleration performance in the combat state, an on-line optimized controller based on genetic algorithms is designed for an aero engine. For testing the validity of the presented control method, detailed joint simulation tests of the designed controller and the aero engine model are performed in the whole flight envelope. Simulation test results show that the presented control algorithm has characteristics of rapid convergence speed, high efficiency and can fully exploit the acceleration performance potential of the aero engine. Compared with the former controller, the designed on-line optimized controller (DOOC) can improve the security of the acceleration process and greatly enhance the aero engine thrust in the whole range of the flight envelope, the thrust increases an average of 8.1% in the randomly selected working states. The plane which adopts DOOC can acquire better fighting advantage in the combat state.

  5. All-solid-state reference electrodes based on conducting polymers.

    Science.gov (United States)

    Kisiel, Anna; Marcisz, Honorata; Michalska, Agata; Maksymiuk, Krzysztof

    2005-12-01

    A novel construction of solution free (pseudo)reference electrodes, compatible with all-solid-state potentiometric indicator electrodes, has been proposed. These electrodes use conducting polymers (CP): polypyrrole (PPy) or poly(3,4-ethylenedioxythiophene) (PEDOT). Two different arrangements have been tested: solely based on CP and those where the CP phase is covered with a poly(vinyl chloride) based outer membrane of tailored composition. The former arrangement was designed to suppress or compensate cation- and anion-exchange, using mobile perchlorate ions and poly(4-styrenesulfonate) or dodecylbenzenesulfonate anions as immobilized dopants. The following systems were used: (i) polypyrrole layers doped simultaneously by two kinds of anions, both mobile and immobilized in the polymer layer; (ii) bilayers of polypyrrole with anion exchanging inner layer and cation-exchanging outer layer; (iii) polypyrrole doped by surfactant dodecylbenzenesulfonate ions, which inhibit ion exchange on the polymer/solution interface. For the above systems, recorded potentials have been found to be practically independent of electrolyte concentration. The best results, profound stability of potentials, have been obtained for poly(3,4-ethylenedioxythiophene) or polypyrrole doped by poly(4-styrenesulfonate) anions covered by a poly(vinyl chloride) based membrane, containing both anion- and cation-exchangers as well as solid potassium chloride and silver chloride with metallic silver. Differently to the cases (i)-(iii) these electrodes are much less sensitive to the influence of redox and pH interferences. This arrangement has been also characterized using electrochemical impedance spectroscopy and chronopotentiometry.

  6. Prediction of slope stability based on numerical modeling of stress–strain state of rocks

    Science.gov (United States)

    Kozhogulov Nifadyev, KCh, VI; Usmanov, SF

    2018-03-01

    The paper presents the developed technique for the estimation of rock mass stability based on the finite element modeling of stress–strain state of rocks. The modeling results on the pit wall landslide as a flow of particles along a sloped surface are described.

  7. Active measurement-based quantum feedback for preparing and stabilizing superpositions of two cavity photon number states

    Science.gov (United States)

    Berube-Lauziere, Yves

    The measurement-based quantum feedback scheme developed and implemented by Haroche and collaborators to actively prepare and stabilize specific photon number states in cavity quantum electrodynamics (CQED) is a milestone achievement in the active protection of quantum states from decoherence. This feat was achieved by injecting, after each weak dispersive measurement of the cavity state via Rydberg atoms serving as cavity sensors, a low average number classical field (coherent state) to steer the cavity towards the targeted number state. This talk will present the generalization of the theory developed for targeting number states in order to prepare and stabilize desired superpositions of two cavity photon number states. Results from realistic simulations taking into account decoherence and imperfections in a CQED set-up will be presented. These demonstrate the validity of the generalized theory and points to the experimental feasibility of preparing and stabilizing such superpositions. This is a further step towards the active protection of more complex quantum states than number states. This work, cast in the context of CQED, is also almost readily applicable to circuit QED. YBL acknowledges financial support from the Institut Quantique through a Canada First Research Excellence Fund.

  8. Immobilizing Organic-Based Molecular Switches into Metal-Organic Frameworks: A Promising Strategy for Switching in Solid State.

    Science.gov (United States)

    Gui, Bo; Meng, Yi; Xie, Yang; Du, Ke; Sue, Andrew C-H; Wang, Cheng

    2018-01-01

    Organic-based molecular switches (OMS) are essential components for the ultimate miniaturization of nanoscale electronics and devices. For practical applications, it is often necessary for OMS to be incorporated into functional solid-state materials. However, the switching characteristics of OMS in solution are usually not transferrable to the solid state, presumably because of spatial confinement or inefficient conversion in densely packed solid phase. A promising way to circumvent this issue is harboring the functional OMS within the robust and porous environment of metal-organic frameworks (MOFs) as their organic components. In this feature article, recent research progress of OMS-based MOFs is briefly summarized. The switching behaviors of OMS under different stimuli (e.g., light, redox, pH, etc.) in the MOF state are first introduced. After that, the technological applications of these OMS-based MOFs in different areas, including CO 2 adsorption, gas separation, drug delivery, photodynamic therapy, and sensing, are outlined. Finally, perspectives and future challenges are discussed in the conclusion. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  9. Qutrit magic state distillation

    International Nuclear Information System (INIS)

    Anwar, Hussain; Browne, Dan E; Campbell, Earl T

    2012-01-01

    Magic state distillation (MSD) is a purification protocol that plays an important role in fault-tolerant quantum computation. Repeated iteration of the steps of an MSD protocol generates pure single non-stabilizer states, or magic states, from multiple copies of a mixed resource state using stabilizer operations only. Thus mixed resource states promote the stabilizer operations to full universality. MSD was introduced for qubit-based quantum computation, but little has been known concerning MSD in higher-dimensional qudit-based computation. Here, we describe a general approach for studying MSD in higher dimensions. We use it to investigate the features of a qutrit MSD protocol based on the five-qutrit stabilizer code. We show that this protocol distils non-stabilizer magic states, and identify two types of states that are attractors of this iteration map. Finally, we show how these states may be converted, via stabilizer circuits alone, into a state suitable for state-injected implementation of a non-Clifford phase gate, enabling non-Clifford unitary computation. (paper)

  10. Flexible solid-state supercapacitors based on three-dimensional graphene hydrogel films.

    Science.gov (United States)

    Xu, Yuxi; Lin, Zhaoyang; Huang, Xiaoqing; Liu, Yuan; Huang, Yu; Duan, Xiangfeng

    2013-05-28

    Flexible solid-state supercapacitors are of considerable interest as mobile power supply for future flexible electronics. Graphene or carbon nanotubes based thin films have been used to fabricate flexible solid-state supercapacitors with high gravimetric specific capacitances (80-200 F/g), but usually with a rather low overall or areal specific capacitance (3-50 mF/cm(2)) due to the ultrasmall electrode thickness (typically a few micrometers) and ultralow mass loading, which is not desirable for practical applications. Here we report the exploration of a three-dimensional (3D) graphene hydrogel for the fabrication of high-performance solid-state flexible supercapacitors. With a highly interconnected 3D network structure, graphene hydrogel exhibits exceptional electrical conductivity and mechanical robustness to make it an excellent material for flexible energy storage devices. Our studies demonstrate that flexible supercapacitors with a 120 μm thick graphene hydrogel thin film can exhibit excellent capacitive characteristics, including a high gravimetric specific capacitance of 186 F/g (up to 196 F/g for a 42 μm thick electrode), an unprecedented areal specific capacitance of 372 mF/cm(2) (up to 402 mF/cm(2) for a 185 μm thick electrode), low leakage current (10.6 μA), excellent cycling stability, and extraordinary mechanical flexibility. This study demonstrates the exciting potential of 3D graphene macrostructures for high-performance flexible energy storage devices.

  11. Geoecology: a county-level environmental data base for the conterminous United States

    Energy Technology Data Exchange (ETDEWEB)

    Olson, R.J.; Emerson, C.J.; Nungesser, M.K.

    1980-09-01

    The Geoecology Data Base represents a unique compilation of computerized environmental data for research and development needs. Environmental assessment and planning for energy development require rapid access to data at appropriate spatial and temporal scales. In the Environmental Sciences Division (ESD) at Oak Ridge National Laboratory (ORNL), we have developed an integrated data base of diverse environmental resource information from extant sources. Data are stored at the county level of resolution for the conterminous United States with some data available for subcounty units within larger, more diverse eastern counties. The Geoecology Data Base contains selected data on terrain and soils, water resources, forestry, vegetation, agriculture, land use, wildlife, air quality, climate, natural areas, and endangered species. Basic files on human population are also included to complement the environmental files. Data are stored in metric-SI units. The Geoecology Data Base is currently fulfilling diverse ongoing research needs while it is being expanded and updated as needs and new data are identified. This report is both a documentation and a user's guide to the Geoecology Data Base. It describes the Data Base design, illustrates applications, provides examples of accessing the Data Base, and gives general information on the data set contents.

  12. Results of revision of the data base of the State list of particularly protected parts of nature and landscape in sequence on the collection of letters of the state list

    International Nuclear Information System (INIS)

    Ambroz, L.; Sykora, J.

    2005-01-01

    The State list of particularly protected parts of nature and landscape (Stat list) is official account of protected territories and protected trees and their protected zones on the territory of the Slovak Republic. The State list was delimited from the State protection of nature of the Slovak Republic on the Museum of Nature Protection and Speleology. The content of the State list and structure of data base of protected territories and protected territories are presented

  13. Airborne Collision Detection and Avoidance for Small UAS Sense and Avoid Systems

    Science.gov (United States)

    Sahawneh, Laith Rasmi

    collision risk using the uncorrelated encounter model (UEM) developed by MIT Lincoln Laboratory. We evaluate the proposed approach using Monte Carlo simulations and compare the performance with linearly extrapolated collision detection logic. For the path planning and collision avoidance part, we present multiple reactive path planning algorithms. We first propose a collision avoidance algorithm based on a simulated chain that responds to a virtual force field produced by encountering intruders. The key feature of the proposed approach is to model the future motion of both the intruder and the ownship using a chain of waypoints that are equally spaced in time. This timing information is used to continuously re-plan paths that minimize the probability of collision. Second, we present an innovative collision avoidance logic using an ownship centered coordinate system. The technique builds a graph in the local-level frame and uses the Dijkstra's algorithm to find the least cost path. An advantage of this approach is that collision avoidance is inherently a local phenomenon and can be more naturally represented in the local coordinates than the global coordinates. Finally, we propose a two step path planner for ground-based SAA systems. In the first step, an initial suboptimal path is generated using A* search. In the second step, using the A* solution as an initial condition, a chain of unit masses connected by springs and dampers evolves in a simulated force field. The chain is described by a set of ordinary differential equations that is driven by virtual forces to find the steady-state equilibrium. The simulation results show that the proposed approach produces collision-free plans while minimizing the path length. To move towards a deployable system, we apply collision detection and avoidance techniques to a variety of simulation and sensor modalities including camera, radar and ADS-B along with suitable tracking schemes. Keywords: unmanned aircraft system, small UAS

  14. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2015-01-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. (paper)

  15. Lithium-ion battery state of function estimation based on fuzzy logic algorithm with associated variables

    Science.gov (United States)

    Gan, L.; Yang, F.; Shi, Y. F.; He, H. L.

    2017-11-01

    Many occasions related to batteries demand to know how much continuous and instantaneous power can batteries provide such as the rapidly developing electric vehicles. As the large-scale applications of lithium-ion batteries, lithium-ion batteries are used to be our research object. Many experiments are designed to get the lithium-ion battery parameters to ensure the relevance and reliability of the estimation. To evaluate the continuous and instantaneous load capability of a battery called state-of-function (SOF), this paper proposes a fuzzy logic algorithm based on battery state-of-charge(SOC), state-of-health(SOH) and C-rate parameters. Simulation and experimental results indicate that the proposed approach is suitable for battery SOF estimation.

  16. A new corresponding state-based correlation for the surface tension of organic fatty acids

    Science.gov (United States)

    Zhang, Cuihua; Tian, Jianxiang; Zheng, Mengmeng; Yi, Huili; Zhang, Laibin; Liu, Shuzhen

    2018-01-01

    In this paper, we proposed a new corresponding state-based correlation for organic fatty (aliphatic, carboxylic and polyfunctional) acids. By using the recently published surface tension data of the 99 acids [A. Mulero and I. Cachadiña, J. Phys. Chem. Ref. Data 45 (2016) 033105] and comparing with the recently published other corresponding state correlations, we found that this correlation reproduces the lowest absolute average deviation (AAD) values for 82 acids out of the 99 acids. It can reproduce the surface tension data with AAD less than 10% for 89 out of the 99 acids.

  17. Ni-MH batteries state-of-charge prediction based on immune evolutionary network

    International Nuclear Information System (INIS)

    Cheng Bo; Zhou Yanlu; Zhang Jiexin; Wang Junping; Cao Binggang

    2009-01-01

    Based on clonal selection theory, an improved immune evolutionary strategy is presented. Compared with conventional evolutionary strategy algorithm (CESA) and immune monoclonal strategy algorithm (IMSA), experimental results show that the proposed algorithm is of high efficiency and can effectively prevent premature convergence. A three-layer feed-forward neural network is presented to predict state-of-charge (SOC) of Ni-MH batteries. Initially, partial least square regression (PLSR) is used to select input variables. Then, five variables, battery terminal voltage, voltage derivative, voltage second derivative, discharge current and battery temperature, are selected as the inputs of NN. In order to overcome the weakness of BP algorithm, the new algorithm is adopted to train weights. Finally, under the state of dynamic power cycle, the predicted SOC and the actual SOC are compared to verify the proposed neural network with acceptable accuracy (5%).

  18. Measurement of single electron and nuclear spin states based on optically detected magnetic resonance

    Energy Technology Data Exchange (ETDEWEB)

    Berman, Gennady P [Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Bishop, Alan R [Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Chernobrod, Boris M [Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Hawley, Marilyn E [Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Brown, Geoffrey W [Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Tsifrinovich, Vladimir I [Polytechnic University, Brooklyn, NY 11201 (United States)

    2006-05-15

    A novel approach for measurement of single electron and nuclear spin states is suggested. Our approach is based on optically detected magnetic resonance in a nano-probe located at the apex of an AFM tip. The method provides single electron spin sensitivity with nano-scale spatial resolution.

  19. Measurement of single electron and nuclear spin states based on optically detected magnetic resonance

    International Nuclear Information System (INIS)

    Berman, Gennady P; Bishop, Alan R; Chernobrod, Boris M; Hawley, Marilyn E; Brown, Geoffrey W; Tsifrinovich, Vladimir I

    2006-01-01

    A novel approach for measurement of single electron and nuclear spin states is suggested. Our approach is based on optically detected magnetic resonance in a nano-probe located at the apex of an AFM tip. The method provides single electron spin sensitivity with nano-scale spatial resolution

  20. Changes in Resting-State Connectivity following Melody-Based Therapy in a Patient with Aphasia

    Directory of Open Access Journals (Sweden)

    Tali Bitan

    2018-01-01

    Full Text Available Melody-based treatments for patients with aphasia rely on the notion of preserved musical abilities in the RH, following left hemisphere damage. However, despite evidence for their effectiveness, the role of the RH is still an open question. We measured changes in resting-state functional connectivity following melody-based intervention, to identify lateralization of treatment-related changes. A patient with aphasia due to left frontal and temporal hemorrhages following traumatic brain injuries (TBI more than three years earlier received 48 sessions of melody-based intervention. Behavioral measures improved and were maintained at the 8-week posttreatment follow-up. Resting-state fMRI data collected before and after treatment showed an increase in connectivity between motor speech control areas (bilateral supplementary motor areas and insulae and RH language areas (inferior frontal gyrus pars triangularis and pars opercularis. This change, which was specific for the RH, was greater than changes in a baseline interval measured before treatment. No changes in RH connectivity were found in a matched control TBI patient scanned at the same intervals. These results are compatible with a compensatory role for RH language areas following melody-based intervention. They further suggest that this therapy intervenes at the level of the interface between language areas and speech motor control areas necessary for language production.

  1. Shape coexistence and mixing in N ∼ 20 region

    International Nuclear Information System (INIS)

    Utsuno, Yutaka; Otsuka, Takaharu; Mizusaki, Takahiro; Honma, Michio

    2005-01-01

    Spherical-deformed shape coexistence in the N ∼ 20 region is studied with the Monte Carlo shell model calculation. We focused upon the role of the configuration mixing in its description, and found that the deformed state is not correctly positioned until the mixing is treated in a proper way. It is also mentioned that the intruder component in 33 Al is accessible through the measurement of the magnetic moment

  2. [Community-based organizations and the aids epidemic in Amazonas state, Brazil].

    Science.gov (United States)

    Kadri, Michele Rocha; Schweickardt, Julio Cesar

    2015-05-01

    The scope of this paper was to analyze the perception of community-based organizations and their contributions to the history of tackling Aids in Amazonas State. It involved qualitative research with the use of oral and documental sources. Data were collected between June and September 2013 by means of semi-structured interviews with the leaders of eight organizations that work or worked with more vulnerable communities. Based on Discourse Analysis the conclusion drawn is that that the organizations perceive two distinct phases since the decentralization of funds from the Sexually-Transmitted Diseases Aids and Viral Hepatitis Department to the local leaders. The first phase was marked by the strengthening of organizations, collective empowerment and active political participation. The current phase has seen the distancing between organizations, a loss of political momentum and weakening of common response and organization.

  3. The application of state machine based on labview for solid target transfer control system at BATAN’s cyclotron

    International Nuclear Information System (INIS)

    Heranudin; Rajiman; Parwanto; Edy Slamet R

    2015-01-01

    Software programming for the new solid target transfer control system referred to the working principle of the whole each sub system. System modeling with state machine diagram was chosen because this simplified a complex design of the control system. State machine implementation of this system was performed by creating basic state drawn from the working system of each sub system. All states with their described inputs, outputs and algorithms were compiled in the sequential state machine diagram. In order to ease the operation, three modes namely automatic, major states and micro states were created. Testing of the system has been conducted and as a result, the system worked properly. The implementation of State machine based on LabView has several advantages such as faster, easier programming and the capability for further developments. (author)

  4. The State of Preschool 2012: State Preschool Yearbook. Executive Summary

    Science.gov (United States)

    Barnett, W. Steven; Carolan, Megan E.; Fitzgerald, Jen; Squires, James H.

    2012-01-01

    The 2012 "State Preschool Yearbook" profiles state-funded prekindergarten programs in the United States. The "Yearbook" compares each state program's standards against a checklist of 10 research-based quality standards benchmarks. Although the benchmarks against which the National Institute for Early Education Research (NIEER)…

  5. High-performance flexible all-solid-state supercapacitors based on densely-packed graphene/polypyrrole nanoparticle papers

    Science.gov (United States)

    Yang, Chao; Zhang, Liling; Hu, Nantao; Yang, Zhi; Wei, Hao; Wang, Yanyan; Zhang, Yafei

    2016-11-01

    Graphene-based all-solid-state supercapacitors (ASSSCs) have received increasing attention. It's a great challenge to fabricate high-performance flexible solid-state supercapacitors with high areal and volumetric energy storage capability, superior electron and ion conductivity, robust mechanical flexibility, as well as long term stability. Herein, we report a facile method to fabricate flexible ASSSCs based on densely-packed reduced graphene oxide (rGO)/polypyrrole nanoparticle (PPy NP) hybrid papers with a sandwich framework, which consists of well-separated and continuously-aligned rGO sheets. The incorporation of PPy NPs not only provides pseudocapacitance but also facilitates the infiltration of gel electrolyte. The assembled ASSSCs possess maximum areal and volumetric specific capacitances of 477 mF/cm2 and 94.9 F/cm3 at 0.5 mA/cm2. They also exhibit little capacitance deviation under different bending states, excellent cycling stability, small leakage current and low self-discharge characteristics. Additionally, the maximum areal and volumetric energy densities of 132.5 μWh/cm2 and 26.4 mWh/cm3 are achieved, which indicate that this hybrid paper is a promising candidate for high-performance flexible energy storage devices.

  6. Multi-Sensor Based State Prediction for Personal Mobility Vehicles.

    Directory of Open Access Journals (Sweden)

    Jamilah Abdur-Rahim

    Full Text Available This paper presents a study on multi-modal human emotional state detection while riding a powered wheelchair (PMV; Personal Mobility Vehicle in an indoor labyrinth-like environment. The study reports findings on the habituation of human stress response during self-driving. In addition, the effects of "loss of controllability", change in the role of the driver to a passenger, are investigated via an autonomous driving modality. The multi-modal emotional state detector sensing framework consists of four sensing devices: electroencephalograph (EEG, heart inter-beat interval (IBI, galvanic skin response (GSR and stressor level lever (in the case of autonomous riding. Physiological emotional state measurement characteristics are organized by time-scale, in terms of capturing slower changes (long-term and quicker changes from moment-to-moment. Experimental results with fifteen participants regarding subjective emotional state reports and commercial software measurements validated the proposed emotional state detector. Short-term GSR and heart signal characterizations captured moment-to-moment emotional state during autonomous riding (Spearman correlation; ρ = 0.6, p < 0.001. Short-term GSR and EEG characterizations reliably captured moment-to-moment emotional state during self-driving (Classification accuracy; 69.7. Finally, long-term GSR and heart characterizations were confirmed to reliably capture slow changes during autonomous riding and also of emotional state during participant resting state. The purpose of this study and the exploration of various algorithms and sensors in a structured framework is to provide a comprehensive background for multi-modal emotional state prediction experiments and/or applications. Additional discussion regarding the feasibility and utility of the possibilities of these concepts are given.

  7. A Lossy Counting-Based State of Charge Estimation Method and Its Application to Electric Vehicles

    Directory of Open Access Journals (Sweden)

    Hong Zhang

    2015-12-01

    Full Text Available Estimating the residual capacity or state-of-charge (SoC of commercial batteries on-line without destroying them or interrupting the power supply, is quite a challenging task for electric vehicle (EV designers. Many Coulomb counting-based methods have been used to calculate the remaining capacity in EV batteries or other portable devices. The main disadvantages of these methods are the cumulative error and the time-varying Coulombic efficiency, which are greatly influenced by the operating state (SoC, temperature and current. To deal with this problem, we propose a lossy counting-based Coulomb counting method for estimating the available capacity or SoC. The initial capacity of the tested battery is obtained from the open circuit voltage (OCV. The charging/discharging efficiencies, used for compensating the Coulombic losses, are calculated by the lossy counting-based method. The measurement drift, resulting from the current sensor, is amended with the distorted Coulombic efficiency matrix. Simulations and experimental results show that the proposed method is both effective and convenient.

  8. A Longitudinal Study of State Strategies and Policies to Accelerate Evidence-Based Practices in the Context of Systems Transformation

    Science.gov (United States)

    Rieckmann, Traci; Abraham, Amanda; Zwick, Janet; Rasplica, Caitlin; McCarty, Dennis

    2015-01-01

    Objective To profile state agency efforts to promote implementation of three evidence-based practices (EBPs): screening and brief intervention (SBIRT), psychosocial interventions, and medication-assisted treatment (MAT). Data Sources/Study Setting Primary data collected from representatives of 50 states and the District of Columbia’s Single State Authorities from 2007 to 2009. Study Design/Data Collection The study used mixed methods, in-depth, semistructured interviews and quantitative surveys. Interviews assessed state and provider strategies to accelerate implementation of EBPs. Principal Findings Statewide implementation of psychosocial interventions and MAT increased significantly over 3 years. In the first two assessments, states that contracted directly with providers were more likely to link use of EBPs to reimbursement, and states with indirect contract, through counties and other entities, increased recommendations, and some requirements for provision of specific EBPs. The number of states using legislation as a policy lever to promote EBPs was unchanged. Conclusions Health care reform and implementation of parity in coverage increases access to treatment for alcohol and drug use. Science-based substance abuse treatment will become even more crucial as payers seek consistent quality of care. This study provides baseline data on service delivery, contracting, and financing as state agencies and treatment providers prepare for implementation of the Affordable Care Act. PMID:25532616

  9. Prediction-based control for LTI systems with uncertain time-varying delays and partial state knowledge

    Science.gov (United States)

    Léchappé, V.; Moulay, E.; Plestan, F.

    2018-06-01

    The stability of a prediction-based controller for linear time-invariant (LTI) systems is studied in the presence of time-varying input and output delays. The uncertain delay case is treated as well as the partial state knowledge case. The reduction method is used in order to prove the convergence of the closed-loop system including the state observer, the predictor and the plant. Explicit conditions that guarantee the closed-loop stability are given, thanks to a Lyapunov-Razumikhin analysis. Simulations illustrate the theoretical results.

  10. Towards Model Checking a Spi-Calculus Dialect

    NARCIS (Netherlands)

    Gnesi, S.; Latella, D.; Lenzini, Gabriele

    We present a model checking framework for a spi-calculus dialect which uses a linear time temporal logic for expressing security properties. We have provided our spi-calculus dialect, called SPID, with a semantics based on labeled transition systems (LTS), where the intruder is modeled in the

  11. Aggressive display and territoriality of the bateleur Terathopius ...

    African Journals Online (AJOL)

    1988-07-04

    Jul 4, 1988 ... territorial function because it drives intruders away from the nest, usually by a gain in altitude by the intruder. ... bateleur I saw in the field, also noting the bird's age and ..... benefit of territoriality may change depending on the.

  12. A probabilistic-based approach to monitoring tool wear state and assessing its effect on workpiece quality in nickel-based alloys

    Science.gov (United States)

    Akhavan Niaki, Farbod

    The objective of this research is first to investigate the applicability and advantage of statistical state estimation methods for predicting tool wear in machining nickel-based superalloys over deterministic methods, and second to study the effects of cutting tool wear on the quality of the part. Nickel-based superalloys are among those classes of materials that are known as hard-to-machine alloys. These materials exhibit a unique combination of maintaining their strength at high temperature and have high resistance to corrosion and creep. These unique characteristics make them an ideal candidate for harsh environments like combustion chambers of gas turbines. However, the same characteristics that make nickel-based alloys suitable for aggressive conditions introduce difficulties when machining them. High strength and low thermal conductivity accelerate the cutting tool wear and increase the possibility of the in-process tool breakage. A blunt tool nominally deteriorates the surface integrity and damages quality of the machined part by inducing high tensile residual stresses, generating micro-cracks, altering the microstructure or leaving a poor roughness profile behind. As a consequence in this case, the expensive superalloy would have to be scrapped. The current dominant solution for industry is to sacrifice the productivity rate by replacing the tool in the early stages of its life or to choose conservative cutting conditions in order to lower the wear rate and preserve workpiece quality. Thus, monitoring the state of the cutting tool and estimating its effects on part quality is a critical task for increasing productivity and profitability in machining superalloys. This work aims to first introduce a probabilistic-based framework for estimating tool wear in milling and turning of superalloys and second to study the detrimental effects of functional state of the cutting tool in terms of wear and wear rate on part quality. In the milling operation, the

  13. Wi-Fi and GSM Based Motion Sensor for Home Security System Apllication

    Science.gov (United States)

    Huzaimy Jusoh, Mohamad; Jamali, Muhammad Firdaus Bin; Zainal Abidin, Ahmad Faizal bin; Asari Sulaiman, Ahmad; Fahmi Hussin, Mohamad

    2015-11-01

    The Wi-Fi and GSM based home security system is a system designed to reduce the high rates of crimes in most personal housing. The overall project consists of three major parts; the input part that consists of sensors, the software part that operates the entire hardware structure, and the output part, which consists of camera, alarm system, and micro secure digital (SD) data storage card. It is based on the principle of infrared radiation generated by a human body heat which trigger the passive infrared (PIR) sensor. The microcontroller processes the received signal, then trigger the buzzer alarm, camera and alerts the home owner through an SMS. Once triggered, the camera will capture the image of the intruder and the image will be saved in SD card. As alert to the user (away), the Global System for Mobile Communication (GSM) will send the Short Message Service (SMS) from the device to the user's mobile phone. The image will be sent to Dropbox data cloud storage via Wi-Fi for further clarification. The prototype was successfully developed, tested and has been installed at residential area in Taman Cahaya Alam, Section U12, Shah Alam, Malaysia.

  14. Cooperation dynamics of generalized reciprocity in state-based social dilemmas

    Science.gov (United States)

    Stojkoski, Viktor; Utkovski, Zoran; Basnarkov, Lasko; Kocarev, Ljupco

    2018-05-01

    We introduce a framework for studying social dilemmas in networked societies where individuals follow a simple state-based behavioral mechanism based on generalized reciprocity, which is rooted in the principle "help anyone if helped by someone." Within this general framework, which applies to a wide range of social dilemmas including, among others, public goods, donation, and snowdrift games, we study the cooperation dynamics on a variety of complex network examples. By interpreting the studied model through the lenses of nonlinear dynamical systems, we show that cooperation through generalized reciprocity always emerges as the unique attractor in which the overall level of cooperation is maximized, while simultaneously exploitation of the participating individuals is prevented. The analysis elucidates the role of the network structure, here captured by a local centrality measure which uniquely quantifies the propensity of the network structure to cooperation by dictating the degree of cooperation displayed both at the microscopic and macroscopic level. We demonstrate the applicability of the analysis on a practical example by considering an interaction structure that couples a donation process with a public goods game.

  15. Modelling and analysis of transient state during improved coupling procedure with the grid for DFIG based wind turbine generator

    Science.gov (United States)

    Kammoun, Soulaymen; Sallem, Souhir; Ben Ali Kammoun, Mohamed

    2017-11-01

    The aim of this study is to enhance DFIG based Wind Energy Conversion Systems (WECS) dynamics during grid coupling. In this paper, a system modelling and a starting/coupling procedure for this generator to the grid are proposed. The proposed non-linear system is a variable structure system (VSS) and has two different states, before and after coupling. So, two different state models are given to the system to analyse transient stability during the coupling. The given model represents well the transient state of the machine, through which, a behaviour assessment of the generator before, during and after connection is given based on simulation results. For this, a 300 kW DFIG based wind generation system model was simulated on the Matlab/SIMULINK environment. We judge the proposed procedure to be practical, smooth and stability improved.

  16. The nature and role of trap states in a dendrimer-based organic field-effect transistor explosive sensor

    Science.gov (United States)

    Tang, Guoqiang; Chen, Simon S. Y.; Lee, Kwan H.; Pivrikas, Almantas; Aljada, Muhsen; Burn, Paul L.; Meredith, Paul; Shaw, Paul E.

    2013-06-01

    We report the fabrication and charge transport characterization of carbazole dendrimer-based organic field-effect transistors (OFETs) for the sensing of explosive vapors. After exposure to para-nitrotoluene (pNT) vapor, the OFET channel carrier mobility decreases due to trapping induced by the absorbed pNT. The influence of trap states on transport in devices before and after exposure to pNT vapor has been determined using temperature-dependent measurements of the field-effect mobility. These data clearly show that the absorption of pNT vapor into the dendrimer active layer results in the formation of additional trap states. Such states inhibit charge transport by decreasing the density of conducting states.

  17. Cluster-Based Analysis on State Industrialisation Development:Strenghts, Challenges and the Strategic Action Agenda for the State Government of Perak

    OpenAIRE

    Mohd Nurzid, Mohd Nur Azlan

    2003-01-01

    This study presents the findings on the current status and performance of the Perak State Industrialisation drive. Industrial Cluster Analysis by way of applying the Porter’s Diamond Model to determine the suitability of a particular industry to the nation or region’s competitive advantage has been gaining popularity since its introduction in the 1990’s. The Second Malaysia Industrial Masterplan 1996-2005 (IMP2) has embraced this Cluster-Based Industrial Development framework by promoting the...

  18. Designing magnetic compensated states in tetragonal Mn{sub 3}Ge-based Heusler alloys

    Energy Technology Data Exchange (ETDEWEB)

    You, Yurong; Xu, Guizhou, E-mail: gzxu@njust.edu.cn; Hu, Fang; Gong, Yuanyuan; Liu, Er; Peng, Guo; Xu, Feng, E-mail: xufeng@njust.edu.cn

    2017-05-01

    Magnetic compensated materials attracted much interests due to the observed large exchange bias and large coercivity, and also their potential applications in the antiferromagnetic spintronics with merit of no stray field. In this work, by using ab-initio studies, we designed several Ni (Pd, Pt) doped Mn{sub 3}Ge-based D0{sub 22}-type tetragonal Heusler alloys with fully compensated states. Theoretically, we find the total moment change is asymmetric across the compensation point (at ~x=0.3) in Mn{sub 3-x}Y{sub x}Ge (Y=Ni, Pd, Pt). In addition, an uncommon discontinuous jump is observed across the critical zero-moment point, indicating that some non-trivial properties may emerge at this point. Further electronic analyses of these compensated alloys reveal high spin polarizations at the Fermi level, which is advantageous for spin transfer torque applications. - Highlights: • Several new fully compensated magnetic states are identified in Mn{sub 3}Ge-based tetragonal alloys. • The magnetic moment changes are asymmetric upon Ni, Pd and Pt substitution. • Discontinuous jumps exist across the compensated points. • The three compensated alloys possess large spin polarizations.

  19. All-Solid-State Lithium-Sulfur Battery based on a nanoconfined LiBH 4 Electrolyte

    NARCIS (Netherlands)

    Das, Supti; Ngene, Peter; Norby, Poul; Vegge, Tejs; de Jongh, P.E.; Blanchard, Didier

    2016-01-01

    In this work we characterize all-solid-state lithium-sulfur batteries based on nano-confined LiBH4in mesoporous silica as solid electrolytes. The nano-confined LiBH4has fast ionic lithium conductivity at room temperature, 0.1 mScm-1, negligible electronic conductivity and its cationic transport

  20. Particle-filtering-based estimation of maximum available power state in Lithium-Ion batteries

    International Nuclear Information System (INIS)

    Burgos-Mellado, Claudio; Orchard, Marcos E.; Kazerani, Mehrdad; Cárdenas, Roberto; Sáez, Doris

    2016-01-01

    Highlights: • Approach to estimate the state of maximum power available in Lithium-Ion battery. • Optimisation problem is formulated on the basis of a non-linear dynamic model. • Solutions of the optimisation problem are functions of state of charge estimates. • State of charge estimates computed using particle filter algorithms. - Abstract: Battery Energy Storage Systems (BESS) are important for applications related to both microgrids and electric vehicles. If BESS are used as the main energy source, then it is required to include adequate procedures for the estimation of critical variables such as the State of Charge (SoC) and the State of Health (SoH) in the design of Battery Management Systems (BMS). Furthermore, in applications where batteries are exposed to high charge and discharge rates it is also desirable to estimate the State of Maximum Power Available (SoMPA). In this regard, this paper presents a novel approach to the estimation of SoMPA in Lithium-Ion batteries. This method formulates an optimisation problem for the battery power based on a non-linear dynamic model, where the resulting solutions are functions of the SoC. In the battery model, the polarisation resistance is modelled using fuzzy rules that are function of both SoC and the discharge (charge) current. Particle filtering algorithms are used as an online estimation technique, mainly because these algorithms allow approximating the probability density functions of the SoC and SoMPA even in the case of non-Gaussian sources of uncertainty. The proposed method for SoMPA estimation is validated using the experimental data obtained from an experimental setup designed for charging and discharging the Lithium-Ion batteries.