WorldWideScience

Sample records for level scheme constructed

  1. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  2. Two-level schemes for the advection equation

    Science.gov (United States)

    Vabishchevich, Petr N.

    2018-06-01

    The advection equation is the basis for mathematical models of continuum mechanics. In the approximate solution of nonstationary problems it is necessary to inherit main properties of the conservatism and monotonicity of the solution. In this paper, the advection equation is written in the symmetric form, where the advection operator is the half-sum of advection operators in conservative (divergent) and non-conservative (characteristic) forms. The advection operator is skew-symmetric. Standard finite element approximations in space are used. The standard explicit two-level scheme for the advection equation is absolutely unstable. New conditionally stable regularized schemes are constructed, on the basis of the general theory of stability (well-posedness) of operator-difference schemes, the stability conditions of the explicit Lax-Wendroff scheme are established. Unconditionally stable and conservative schemes are implicit schemes of the second (Crank-Nicolson scheme) and fourth order. The conditionally stable implicit Lax-Wendroff scheme is constructed. The accuracy of the investigated explicit and implicit two-level schemes for an approximate solution of the advection equation is illustrated by the numerical results of a model two-dimensional problem.

  3. On 165Ho level scheme

    International Nuclear Information System (INIS)

    Ardisson, Claire; Ardisson, Gerard.

    1976-01-01

    A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr

  4. Comparative study of construction schemes for proposed LINAC tunnel for ADSS

    International Nuclear Information System (INIS)

    Parchani, G.; Suresh, N.

    2003-01-01

    Radiation shielded structures involve architectural, structural and radiation shielding design. In order to attenuate the radiation level to the permissible limits concrete has been recognized as a most versatile radiation shielding material and is being extensively used. Concrete in addition to radiation shielding properties possesses very good mechanical properties, which enables its use as a structural member. High-energy linac lab, which will generate radiation, needs very large thickness of concrete for shielding. The length of tunnel (1.00 kM) is one of the most important factors in finalizing construction scheme. In view of this, it becomes essential to explore alternate construction schemes for such structures to optimize the cost of construction. In this paper, various alternates for the construction of proposed linac tunnel have been studied

  5. Four-level conservative finite-difference schemes for Boussinesq paradigm equation

    Science.gov (United States)

    Kolkovska, N.

    2013-10-01

    In this paper a two-parametric family of four level conservative finite difference schemes is constructed for the multidimensional Boussinesq paradigm equation. The schemes are explicit in the sense that no inner iterations are needed for evaluation of the numerical solution. The preservation of the discrete energy with this method is proved. The schemes have been numerically tested on one soliton propagation model and two solitons interaction model. The numerical experiments demonstrate that the proposed family of schemes has second order of convergence in space and time steps in the discrete maximal norm.

  6. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  7. Construction of a knowledge classification scheme for sharing and usage of knowledge

    International Nuclear Information System (INIS)

    Yoo, Jae Bok; Oh, Jeong Hoon; Lee, Ji Ho; Ko, Young Chul

    2003-12-01

    To efficiently share knowledge among our members on the basis of knowledge management system, first of all, we need to systematically design the knowledge classification scheme that we can classify these knowledge well. The objective of this project is to construct the most suitable knowledge classification scheme that all of us can share them in Korea Atomic Energy Research Institute(KAERI). To construct the knowledge classification scheme all over the our organization, we established a few principles to design it and examined related many classification schemes. And we carried out 3 steps to complete the best desirable KAERI's knowledge classification scheme, that is, 1) the step to design a draft of the knowledge classification scheme, 2) the step to revise a draft of the knowledge classification scheme, 3) the step to verify the revised scheme and to decide its scheme. The scheme completed as a results of this project is consisted of total 218 items, that is, sections of 8 items, classes of 43 items and sub-classes of 167 items. We expect that the knowledge classification scheme designed as the results of this project can be played an important role as the frame to share knowledge among our members when we introduce knowledge management system in our organization. In addition, we expect that methods to design its scheme as well as this scheme itself can be applied when design a knowledge classification scheme at the other R and D institutes and enterprises

  8. A linear construction of perfect secret sharing schemes

    NARCIS (Netherlands)

    Dijk, van M.; Santis, De A.

    1995-01-01

    In this paper, we generalize the vector space construction due to Brickell [5]. This generalization, introduced by Bertilsson [1], leads to perfect secret sharing schemes with rational information rates in which the secret can be computed efficiently by each qualified group. A one to one

  9. Practical splitting methods for the adaptive integration of nonlinear evolution equations. Part I: Construction of optimized schemes and pairs of schemes

    KAUST Repository

    Auzinger, Winfried; Hofstä tter, Harald; Ketcheson, David I.; Koch, Othmar

    2016-01-01

    We present a number of new contributions to the topic of constructing efficient higher-order splitting methods for the numerical integration of evolution equations. Particular schemes are constructed via setup and solution of polynomial systems for the splitting coefficients. To this end we use and modify a recent approach for generating these systems for a large class of splittings. In particular, various types of pairs of schemes intended for use in adaptive integrators are constructed.

  10. Practical splitting methods for the adaptive integration of nonlinear evolution equations. Part I: Construction of optimized schemes and pairs of schemes

    KAUST Repository

    Auzinger, Winfried

    2016-07-28

    We present a number of new contributions to the topic of constructing efficient higher-order splitting methods for the numerical integration of evolution equations. Particular schemes are constructed via setup and solution of polynomial systems for the splitting coefficients. To this end we use and modify a recent approach for generating these systems for a large class of splittings. In particular, various types of pairs of schemes intended for use in adaptive integrators are constructed.

  11. Single particle level scheme for alpha decay

    International Nuclear Information System (INIS)

    Mirea, M.

    1998-01-01

    The fine structure phenomenon in alpha decay was evidenced by Rosenblum. In this process the kinetic energy of the emitted particle has several determined values related to the structure of the parent and the daughter nucleus. The probability to find the daughter in a low lying state was considered strongly dependent on the spectroscopic factor defined as the square of overlap between the wave function of the parent in the ground state and the wave functions of the specific excited states of the daughter. This treatment provides a qualitative agreement with the experimental results if the variations of the penetrability between different excited states are neglected. Based on single particle structure during fission, a new formalism explained quantitatively the fine structure of the cluster decay. It was suggested that this formalism can be applied also to alpha decay. For this purpose, the first step is to construct the level scheme of this type of decay. Such a scheme, obtained with the super-asymmetric two-center potential, is plotted for the alpha decay of 223 Ra. It is interesting to note that, diabatically, the level with spin 3/2 emerging from 1i 11/2 (ground state of the parent) reaches an excited state of the daughter in agreement with the experiment. (author)

  12. Statistical interpretation of low energy nuclear level schemes

    Energy Technology Data Exchange (ETDEWEB)

    Egidy, T von; Schmidt, H H; Behkami, A N

    1988-01-01

    Nuclear level schemes and neutron resonance spacings yield information on level densities and level spacing distributions. A total of 75 nuclear level schemes with 1761 levels and known spins and parities was investigated. The A-dependence of level density parameters is discussed. The spacing distributions of levels near the groundstate indicate transitional character between regular and chaotic properties while chaos dominates near the neutron binding energy.

  13. The construction of Shenzhen's carbon emission trading scheme

    International Nuclear Information System (INIS)

    Jiang, Jing Jing; Ye, Bin; Ma, Xiao Ming

    2014-01-01

    The Shenzhen ETS is the first urban-level “cap-and-trade” carbon emissions trading scheme to operate in China. This paper gives an overview of the economic and emissions situation in Shenzhen and focuses on the development of the Shenzhen ETS regulatory framework. It is devised as an ETS with an intensity-based cap, output-based allocation and a market for trading of allowances. The design of the Shenzhen ETS attaches great importance to coordinate the dynamic relationships between economic growth, industrial transition and emissions control. The cap and its allocation are determined by carbon intensity reduction targets and economic output, with an aim to slow down emissions growth while mitigating shocks from economic fluctuation and industrial adjustment to market stability. The Shenzhen ETS features extensive coverage consisting of three types of regulated entities and four categories of covered emissions, in order to control carbon emissions by both improving energy efficiency and restraining growing energy demand. A competitive game theory method is created for allocation of free allowances to manufacturing enterprises. Mechanisms for carbon offsets and market stabilization are developed to promote active and orderly trading in the carbon market. Moreover, several challenges and their policy choices are detailed for the development of the Shenzhen ETS. - Highlights: • The Shenzhen ETS is the first urban-level “cap-and-trade” carbon emission trading scheme operated in China. • This paper focuses on the construction of Shenzhen carbon emission trading scheme. It is devised as the intensity-based cap, output-based allocation and allowance trade carbon market. • It has some signatures in the general principles, coverage and scope, cap and allocation and other mechanisms. • Several challenges and their policy choices are detailed for the development of Shenzhen ETS

  14. Construction of second-order accurate monotone and stable residual distribution schemes for steady problems

    International Nuclear Information System (INIS)

    Abgrall, Remi; Mezine, Mohamed

    2004-01-01

    After having recalled the basic concepts of residual distribution (RD) schemes, we provide a systematic construction of distribution schemes able to handle general unstructured meshes, extending the work of Sidilkover. Then, by using the concept of simple waves, we show how to generalize this technique to symmetrizable linear systems. A stability analysis is provided. We formally extend this construction to the Euler equations. Several test cases are presented to validate our approach

  15. Impact of Construction Waste Disposal Charging Scheme on work practices at construction sites in Hong Kong.

    Science.gov (United States)

    Yu, Ann T W; Poon, C S; Wong, Agnes; Yip, Robin; Jaillon, Lara

    2013-01-01

    Waste management in the building industry in Hong Kong has become an important environmental issue. Particularly, an increasing amount of construction and demolition (C&D) waste is being disposed at landfill sites. In order to reduce waste generation and encourage reuse and recycling, the Hong Kong Government has implemented the Construction Waste Disposal Charging Scheme (CWDCS) to levy charges on C&D waste disposal to landfills. In order to provide information on the changes in reducing waste generation practice among construction participants in various work trades, a study was conducted after 3 years of implementation of the CWDCS via a structured questionnaire survey in the building industry in Hong Kong. The study result has revealed changes with work flows of the major trades as well as differentiating the levels of waste reduced. Three building projects in the public and private sectors were selected as case studies to demonstrate the changes in work flows and the reduction of waste achieved. The research findings reveal that a significant reduction of construction waste was achieved at the first 3 years (2006-2008) of CWDCS implementation. However, the reduction cannot be sustained. The major trades have been influenced to a certain extent by the implementation of the CWDCS. Slight improvement in waste management practices was observed, but reduction of construction waste in the wet-finishing and dry-finishing trades has undergone little improvement. Implementation of the CWDCS has not yet motivated subcontractors to change their methods of construction so as to reduce C&D waste. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. Analysis of floor technology scheme in open-top construction of nuclear power project

    International Nuclear Information System (INIS)

    Zhang Shuxia; Lu Qinwu; Han Xiaoping

    2014-01-01

    Open-top construction is general technology in Ⅲ generation in nuclear power project. Because traditional floor structure and its form board upholding doesn't meet open-top construction, four floor scheme are presented, whose characters, advantages and disadvantages, and its application are summarized. The research results will help to the application of open-top construction. (authors)

  17. A suggested color scheme for reducing perception-related accidents on construction work sites.

    Science.gov (United States)

    Yi, June-seong; Kim, Yong-woo; Kim, Ki-aeng; Koo, Bonsang

    2012-09-01

    Changes in workforce demographics have led to the need for more sophisticated approaches to addressing the safety requirements of the construction industry. Despite extensive research in other industry domains, the construction industry has been passive in exploring the impact of a color scheme; perception-related accidents have been effectively diminished by its implementation. The research demonstrated that the use of appropriate color schemes could improve the actions and psychology of workers on site, thereby increasing their perceptions of potentially dangerous situations. As a preliminary study, the objects selected by rigorous analysis on accident reports were workwear, safety net, gondola, scaffolding, and safety passage. The colors modified on site for temporary facilities were adopted from existing theoretical and empirical research that suggests the use of certain colors and their combinations to improve visibility and conspicuity while minimizing work fatigue. The color schemes were also tested and confirmed through two workshops with workers and managers currently involved in actual projects. The impacts of color schemes suggested in this paper are summarized as follows. First, the color schemes improve the conspicuity of facilities with other on site components, enabling workers to quickly discern and orient themselves in their work environment. Secondly, the color schemes have been selected to minimize the visual work fatigue and monotony that can potentially increase accidents. Copyright © 2011 Elsevier Ltd. All rights reserved.

  18. Impact of Construction Waste Disposal Charging Scheme on work practices at construction sites in Hong Kong

    International Nuclear Information System (INIS)

    Yu, Ann T.W.; Poon, C.S.; Wong, Agnes; Yip, Robin; Jaillon, Lara

    2013-01-01

    Highlights: ► A significant reduction of construction waste was achieved at the first 3 years of CWDCS implementation. ► However, the reduction cannot be sustained. ► Implementation of the CWDCS has generated positive effects in waste reduction by all main trades. - Abstract: Waste management in the building industry in Hong Kong has become an important environmental issue. Particularly, an increasing amount of construction and demolition (C and D) waste is being disposed at landfill sites. In order to reduce waste generation and encourage reuse and recycling, the Hong Kong Government has implemented the Construction Waste Disposal Charging Scheme (CWDCS) to levy charges on C and D waste disposal to landfills. In order to provide information on the changes in reducing waste generation practice among construction participants in various work trades, a study was conducted after 3 years of implementation of the CWDCS via a structured questionnaire survey in the building industry in Hong Kong. The study result has revealed changes with work flows of the major trades as well as differentiating the levels of waste reduced. Three building projects in the public and private sectors were selected as case studies to demonstrate the changes in work flows and the reduction of waste achieved. The research findings reveal that a significant reduction of construction waste was achieved at the first 3 years (2006–2008) of CWDCS implementation. However, the reduction cannot be sustained. The major trades have been influenced to a certain extent by the implementation of the CWDCS. Slight improvement in waste management practices was observed, but reduction of construction waste in the wet-finishing and dry-finishing trades has undergone little improvement. Implementation of the CWDCS has not yet motivated subcontractors to change their methods of construction so as to reduce C and D waste.

  19. Impact of Construction Waste Disposal Charging Scheme on work practices at construction sites in Hong Kong

    Energy Technology Data Exchange (ETDEWEB)

    Yu, Ann T.W., E-mail: bsannyu@polyu.edu.hk [Department of Building and Real Estate, The Hong Kong Polytechnic University, Hung Hom, Kowloon (Hong Kong); Poon, C.S.; Wong, Agnes; Yip, Robin; Jaillon, Lara [Department of Civil and Structural Engineering, Hong Kong Polytechnic University, Hung Hom, Kowloon (Hong Kong)

    2013-01-15

    Highlights: Black-Right-Pointing-Pointer A significant reduction of construction waste was achieved at the first 3 years of CWDCS implementation. Black-Right-Pointing-Pointer However, the reduction cannot be sustained. Black-Right-Pointing-Pointer Implementation of the CWDCS has generated positive effects in waste reduction by all main trades. - Abstract: Waste management in the building industry in Hong Kong has become an important environmental issue. Particularly, an increasing amount of construction and demolition (C and D) waste is being disposed at landfill sites. In order to reduce waste generation and encourage reuse and recycling, the Hong Kong Government has implemented the Construction Waste Disposal Charging Scheme (CWDCS) to levy charges on C and D waste disposal to landfills. In order to provide information on the changes in reducing waste generation practice among construction participants in various work trades, a study was conducted after 3 years of implementation of the CWDCS via a structured questionnaire survey in the building industry in Hong Kong. The study result has revealed changes with work flows of the major trades as well as differentiating the levels of waste reduced. Three building projects in the public and private sectors were selected as case studies to demonstrate the changes in work flows and the reduction of waste achieved. The research findings reveal that a significant reduction of construction waste was achieved at the first 3 years (2006-2008) of CWDCS implementation. However, the reduction cannot be sustained. The major trades have been influenced to a certain extent by the implementation of the CWDCS. Slight improvement in waste management practices was observed, but reduction of construction waste in the wet-finishing and dry-finishing trades has undergone little improvement. Implementation of the CWDCS has not yet motivated subcontractors to change their methods of construction so as to reduce C and D waste.

  20. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  1. Modulation Schemes of Multi-phase Three-Level Z-Source Inverters

    DEFF Research Database (Denmark)

    Gao, F.; Loh, P.C.; Blaabjerg, Frede

    2007-01-01

    different modulation requirement and output performance. For clearly illustrating the detailed modulation process, time domain analysis instead of the traditional multi-dimensional space vector demonstration is assumed which reveals the right way to insert shoot-through durations in the switching sequence...... with minimal commutation count. Lastly, the theoretical findings are verified in Matlab/PLECS simulation and experimentally using constructed laboratory prototypes.......This paper investigates the modulation schemes of three-level multiphase Z-source inverters with either two Z-source networks or single Z-source network connected between the dc sources and inverter circuitry. With the proper offset added for achieving both desired four-leg operation and optimized...

  2. Discretisation Schemes for Level Sets of Planar Gaussian Fields

    Science.gov (United States)

    Beliaev, D.; Muirhead, S.

    2018-01-01

    Smooth random Gaussian functions play an important role in mathematical physics, a main example being the random plane wave model conjectured by Berry to give a universal description of high-energy eigenfunctions of the Laplacian on generic compact manifolds. Our work is motivated by questions about the geometry of such random functions, in particular relating to the structure of their nodal and level sets. We study four discretisation schemes that extract information about level sets of planar Gaussian fields. Each scheme recovers information up to a different level of precision, and each requires a maximum mesh-size in order to be valid with high probability. The first two schemes are generalisations and enhancements of similar schemes that have appeared in the literature (Beffara and Gayet in Publ Math IHES, 2017. https://doi.org/10.1007/s10240-017-0093-0; Mischaikow and Wanner in Ann Appl Probab 17:980-1018, 2007); these give complete topological information about the level sets on either a local or global scale. As an application, we improve the results in Beffara and Gayet (2017) on Russo-Seymour-Welsh estimates for the nodal set of positively-correlated planar Gaussian fields. The third and fourth schemes are, to the best of our knowledge, completely new. The third scheme is specific to the nodal set of the random plane wave, and provides global topological information about the nodal set up to `visible ambiguities'. The fourth scheme gives a way to approximate the mean number of excursion domains of planar Gaussian fields.

  3. GRAP, Gamma-Ray Level-Scheme Assignment

    International Nuclear Information System (INIS)

    Franklyn, C.B.

    2002-01-01

    1 - Description of program or function: An interactive program for allocating gamma-rays to an energy level scheme. Procedure allows for searching for new candidate levels of the form: 1) L1 + G(A) + G(B) = L2; 2) G(A) + G(B) = G(C); 3) G(A) + G(B) = C (C is a user defined number); 4) L1 + G(A) + G(B) + G(C) = L2. Procedure indicates intensity balance of feed and decay of each energy level. Provides for optimization of a level energy (and associated error). Overall procedure allows for pre-defining of certain gamma-rays as belonging to particular regions of the level scheme, for example, high energy transition levels, or due to beta- decay. 2 - Method of solution: Search for cases in which the energy difference between two energy levels is equal to a gamma-ray energy within user-defined limits. 3 - Restrictions on the complexity of the problem: Maximum number of gamma-rays: 999; Maximum gamma ray energy: 32000 units; Minimum gamma ray energy: 10 units; Maximum gamma-ray intensity: 32000 units; Minimum gamma-ray intensity: 0.001 units; Maximum number of levels: 255; Maximum level energy: 32000 units; Minimum level energy: 10 units; Maximum error on energy, intensity: 32 units; Minimum error on energy, intensity: 0.001 units; Maximum number of combinations: 6400 (ca); Maximum number of gamma-ray types : 127

  4. Design and Implementation of Green Construction Scheme for a High-rise Residential Building Project

    Science.gov (United States)

    Zhou, Yong; Huang, You Zhen

    2018-06-01

    This paper mainly studies the green construction scheme of a high-rise residential building project. From "four sections one environmental protection", saving material, water saving, energy saving, economical use of land and environmental protection conduct analysis and research. Adopting scientific, advanced, reasonable and economical construction technology measures, implementing green construction method. Promoting energy-saving technologies in buildings, ensuring the sustainable use of resources, Maximum savings of resources and energy, increase energy efficiency, to reduce pollution, reducing the adverse environmental impact of construction activities, ensure construction safety, build sustainable buildings.

  5. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  6. Study of the Riemann problem and construction of multidimensional Godunov-type schemes for two-phase flow models

    International Nuclear Information System (INIS)

    Toumi, I.

    1990-04-01

    This thesis is devoted to the study of the Riemann problem and the construction of Godunov type numerical schemes for one or two dimensional two-phase flow models. In the first part, we study the Riemann problem for the well-known Drift-Flux, model which has been widely used for the analysis of thermal hydraulics transients. Then we use this study to construct approximate Riemann solvers and we describe the corresponding Godunov type schemes for simplified equation of state. For computation of complex two-phase flows, a weak formulation of Roe's approximate Riemann solver, which gives a method to construct a Roe-averaged jacobian matrix with a general equation of state, is proposed. For two-dimensional flows, the developed methods are based upon an approximate solver for a two-dimensional Riemann problem, according to Harten-Lax-Van Leer principles. The numerical results for standard test problems show the good behaviour of these numerical schemes for a wide range of flow conditions [fr

  7. Methodology of ecooriented assessment of constructive schemes of cast in-situ RC framework in civil engineering

    Science.gov (United States)

    Avilova, I. P.; Krutilova, M. O.

    2018-01-01

    Economic growth is the main determinant of the trend to increased greenhouse gas (GHG) emission. Therefore, the reduction of emission and stabilization of GHG levels in the atmosphere become an urgent task to avoid the worst predicted consequences of climate change. GHG emissions in construction industry take a significant part of industrial GHG emission and are expected to consistently increase. The problem could be successfully solved with a help of both economical and organizational restrictions, based on enhanced algorithms of calculation and amercement of environmental harm in building industry. This study aims to quantify of GHG emission caused by different constructive schemes of RC framework in concrete casting. The result shows that proposed methodology allows to make a comparative analysis of alternative projects in residential housing, taking into account an environmental damage, caused by construction process. The study was carried out in the framework of the Program of flagship university development on the base of Belgorod State Technological University named after V.G. Shoukhov

  8. Schemes for Probabilistic Teleportation of an Unknown Three-Particle Three-Level Entangled State

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In this paper, two schemes for teleporting an unknown three-particle three-level entangled state are proposed. In the first scheme, two partial three-particle three-level entangled states are used as the quantum channels, while in the second scheme, three two-particle three-level non-maximally entangled states are employed as quantum channels.It is shown that the teleportation can be successfully realized with certain probability, for both two schemes, if a receiver adopts some appropriate unitary transformations. It is shown also that the successful probabilities of these two schemes are different.

  9. A Review of the Case of a Levy-Grant Scheme (LGS) in the UK Construction Industry

    Science.gov (United States)

    Abdel-Wahab, Mohamed; Dainty, Andrew; Ison, Stephen

    2010-01-01

    A Levy-Grant Scheme (LGS) has existed in the UK construction industry since 1964 to provide financial support for companies undertaking training activities. Despite the support of the LGS for various training activities, notably apprenticeships, the construction industry continues to suffer from both labour shortages and an under-investment in…

  10. Construction of second order accurate monotone and stable residual distribution schemes for unsteady flow problems

    International Nuclear Information System (INIS)

    Abgrall, Remi; Mezine, Mohamed

    2003-01-01

    The aim of this paper is to construct upwind residual distribution schemes for the time accurate solution of hyperbolic conservation laws. To do so, we evaluate a space-time fluctuation based on a space-time approximation of the solution and develop new residual distribution schemes which are extensions of classical steady upwind residual distribution schemes. This method has been applied to the solution of scalar advection equation and to the solution of the compressible Euler equations both in two space dimensions. The first version of the scheme is shown to be, at least in its first order version, unconditionally energy stable and possibly conditionally monotonicity preserving. Using an idea of Csik et al. [Space-time residual distribution schemes for hyperbolic conservation laws, 15th AIAA Computational Fluid Dynamics Conference, Anahein, CA, USA, AIAA 2001-2617, June 2001], we modify the formulation to end up with a scheme that is unconditionally energy stable and unconditionally monotonicity preserving. Several numerical examples are shown to demonstrate the stability and accuracy of the method

  11. Adopting the EU sustainable performance scheme Level(s) in the Danish building sector

    DEFF Research Database (Denmark)

    Kanafani, Kai; Rasmussen, Freja Nygaard; Zimmermann, Regitze Kjær

    2018-01-01

    to life cycle assessment (LCA) requirements within the Level(s) scheme. As a measure for the Danish building sector’s LCA practice, the specifications for LCAbyg, the official Danish building LCA tool, is used. In 2017, the European commission’s Joint Research Centre has launched Level(s) as a vo...

  12. Revisiting the level scheme of the proton emitter 151Lu

    International Nuclear Information System (INIS)

    Wang, F.; Sun, B.H.; Liu, Z.; Scholey, C.; Eeckhaudt, S.; Grahn, T.; Greenlees, P.T.; Jones, P.; Julin, R.; Juutinen, S.; Kettelhut, S.; Leino, M.; Nyman, M.; Rahkila, P.; Saren, J.; Sorri, J.; Uusitalo, J.; Ashley, S.F.; Cullen, I.J.; Garnsworthy, A.B.; Gelletly, W.; Jones, G.A.; Pietri, S.; Podolyak, Z.; Steer, S.; Thompson, N.J.; Walker, P.M.; Williams, S.; Bianco, L.; Darby, I.G.; Joss, D.T.; Page, R.D.; Pakarinen, J.; Rigby, S.; Cullen, D.M.; Khan, S.; Kishada, A.; Gomez-Hornillos, M.B.; Simpson, J.; Jenkins, D.G.; Niikura, M.; Seweryniak, D.; Shizuma, Toshiyuki

    2015-01-01

    An experiment aiming to search for new isomers in the region of proton emitter 151 Lu was performed at the Accelerator Laboratory of the University of Jyväskylä (JYFL), by combining the high resolution γ-ray array JUROGAM, gas-filled RITU separator and GREAT detectors with the triggerless total data readout acquisition (TDR) system. In this proceeding, we revisit the level scheme of 151 Lu by using the proton-tagging technique. A level scheme consistent with the latest experimental results is obtained, and 3 additional levels are identified at high excitation energies. (author)

  13. Performance of a Two-Level Call Admission Control Scheme for DS-CDMA Wireless Networks

    Directory of Open Access Journals (Sweden)

    Fapojuwo Abraham O

    2007-01-01

    Full Text Available We propose a two-level call admission control (CAC scheme for direct sequence code division multiple access (DS-CDMA wireless networks supporting multimedia traffic and evaluate its performance. The first-level admission control assigns higher priority to real-time calls (also referred to as class 0 calls in gaining access to the system resources. The second level admits nonreal-time calls (or class 1 calls based on the resources remaining after meeting the resource needs for real-time calls. However, to ensure some minimum level of performance for nonreal-time calls, the scheme reserves some resources for such calls. The proposed two-level CAC scheme utilizes the delay-tolerant characteristic of non-real-time calls by incorporating a queue to temporarily store those that cannot be assigned resources at the time of initial access. We analyze and evaluate the call blocking, outage probability, throughput, and average queuing delay performance of the proposed two-level CAC scheme using Markov chain theory. The analytic results are validated by simulation results. The numerical results show that the proposed two-level CAC scheme provides better performance than the single-level CAC scheme. Based on these results, it is concluded that the proposed two-level CAC scheme serves as a good solution for supporting multimedia applications in DS-CDMA wireless communication systems.

  14. Performance of a Two-Level Call Admission Control Scheme for DS-CDMA Wireless Networks

    Directory of Open Access Journals (Sweden)

    Abraham O. Fapojuwo

    2007-11-01

    Full Text Available We propose a two-level call admission control (CAC scheme for direct sequence code division multiple access (DS-CDMA wireless networks supporting multimedia traffic and evaluate its performance. The first-level admission control assigns higher priority to real-time calls (also referred to as class 0 calls in gaining access to the system resources. The second level admits nonreal-time calls (or class 1 calls based on the resources remaining after meeting the resource needs for real-time calls. However, to ensure some minimum level of performance for nonreal-time calls, the scheme reserves some resources for such calls. The proposed two-level CAC scheme utilizes the delay-tolerant characteristic of non-real-time calls by incorporating a queue to temporarily store those that cannot be assigned resources at the time of initial access. We analyze and evaluate the call blocking, outage probability, throughput, and average queuing delay performance of the proposed two-level CAC scheme using Markov chain theory. The analytic results are validated by simulation results. The numerical results show that the proposed two-level CAC scheme provides better performance than the single-level CAC scheme. Based on these results, it is concluded that the proposed two-level CAC scheme serves as a good solution for supporting multimedia applications in DS-CDMA wireless communication systems.

  15. Sensor data security level estimation scheme for wireless sensor networks.

    Science.gov (United States)

    Ramos, Alex; Filho, Raimir Holanda

    2015-01-19

    Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates.

  16. ON THE CONSTRUCTION OF PARTIAL DIFFERENCE SCHEMES II: DISCRETE VARIABLES AND SCHWARZIAN LATTICES

    Directory of Open Access Journals (Sweden)

    Decio Levi

    2016-06-01

    Full Text Available In the process of constructing invariant difference schemes which approximate partial differential equations we write down a procedure for discretizing a partial differential equation on an arbitrary lattice. An open problem is the meaning of a lattice which does not satisfy the Clairaut–Schwarz–Young theorem. To analyze it we apply the procedure on a simple example, the potential Burgers equation with two different lattices, an orthogonal lattice which is invariant under the symmetries of the equation and satisfies the commutativity of the partial difference operators and an exponential lattice which is not invariant and does not satisfy the Clairaut–Schwarz–Young theorem. A discussion on the numerical results is presented showing the different behavior of both schemes for two different exact solutions and their numerical approximations.

  17. Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks

    Science.gov (United States)

    Ramos, Alex; Filho, Raimir Holanda

    2015-01-01

    Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates. PMID:25608215

  18. Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Alex Ramos

    2015-01-01

    Full Text Available Due to their increasing dissemination, wireless sensor networks (WSNs have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE, a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates.

  19. A Robust Control Scheme for Medium-Voltage-Level DVR Implementation

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Loh, Poh Chiang; Li, Yun Wei

    2007-01-01

    of Hinfin controller weighting function selection, inner current loop tuning, and system disturbance rejection capability is presented. Finally, the designed control scheme is extensively tested on a laboratory 10-kV MV-level DVR system with varying voltage sag (balanced and unbalanced) and loading (linear....../nonlinear load and induction motor load) conditions. It is shown that the proposed control scheme is effective in both balanced and unbalanced sag compensation and load disturbance rejection, as its robustness is explicitly specified....

  20. Features and perspectives of automatized construction crane-manipulators

    Science.gov (United States)

    Stepanov, Mikhail A.; Ilukhin, Peter A.

    2018-03-01

    Modern construction industry still has a high percentage of manual labor, and the greatest prospects of improving the construction process are lying in the field of automatization. In this article automatized construction manipulator-cranes are being studied in order to achieve the most rational design scheme. This is done through formulating a list of general conditions necessary for such cranes and a set of specialized kinematical conditions. A variety of kinematical schemes is evaluated via these conditions, and some are taken for further dynamical analisys. The comparative dynamical analisys of taken schemes was made and the most rational scheme was defined. Therefore a basis for a more complex and practical research of manipulator-cranes design is given and ways to implement them on practical level can now be calculated properly. Also, the perspectives of implementation of automated control systems and informational networks on construction sites in order to boost the quality of construction works, safety of labour and ecological safety are shown.

  1. Macro-level integrated renewable energy production schemes for sustainable development

    International Nuclear Information System (INIS)

    Subhadra, Bobban G.

    2011-01-01

    The production of renewable clean energy is a prime necessity for the sustainable future existence of our planet. However, because of the resource-intensive nature, and other challenges associated with these new generation renewable energy sources, novel industrial frameworks need to be co-developed. Integrated renewable energy production schemes with foundations on resource sharing, carbon neutrality, energy-efficient design, source reduction, green processing plan, anthropogenic use of waste resources for the production green energy along with the production of raw material for allied food and chemical industries is imperative for the sustainable development of this sector especially in an emission-constrained future industrial scenario. To attain these objectives, the scope of hybrid renewable production systems and integrated renewable energy industrial ecology is briefly described. Further, the principles of Integrated Renewable Energy Park (IREP) approach, an example for macro-level energy production, and its benefits and global applications are also explored. - Research highlights: → Discusses the need for macro-level renewable energy production schemes. → Scope of hybrid and integrated industrial ecology for renewable energy production. → Integrated Renewable Energy Parks (IREPs): A macro-level energy production scheme. → Discusses the principle foundations and global applications of IREPs. → Describes the significance of IREPs in the carbon-neutral future business arena.

  2. A construction scheme of web page comment information extraction system based on frequent subtree mining

    Science.gov (United States)

    Zhang, Xiaowen; Chen, Bingfeng

    2017-08-01

    Based on the frequent sub-tree mining algorithm, this paper proposes a construction scheme of web page comment information extraction system based on frequent subtree mining, referred to as FSM system. The entire system architecture and the various modules to do a brief introduction, and then the core of the system to do a detailed description, and finally give the system prototype.

  3. A novel construction scheme of QC-LDPC codes based on the RU algorithm for optical transmission systems

    Science.gov (United States)

    Yuan, Jian-guo; Liang, Meng-qi; Wang, Yong; Lin, Jin-zhao; Pang, Yu

    2016-03-01

    A novel lower-complexity construction scheme of quasi-cyclic low-density parity-check (QC-LDPC) codes for optical transmission systems is proposed based on the structure of the parity-check matrix for the Richardson-Urbanke (RU) algorithm. Furthermore, a novel irregular QC-LDPC(4 288, 4 020) code with high code-rate of 0.937 is constructed by this novel construction scheme. The simulation analyses show that the net coding gain ( NCG) of the novel irregular QC-LDPC(4 288,4 020) code is respectively 2.08 dB, 1.25 dB and 0.29 dB more than those of the classic RS(255, 239) code, the LDPC(32 640, 30 592) code and the irregular QC-LDPC(3 843, 3 603) code at the bit error rate ( BER) of 10-6. The irregular QC-LDPC(4 288, 4 020) code has the lower encoding/decoding complexity compared with the LDPC(32 640, 30 592) code and the irregular QC-LDPC(3 843, 3 603) code. The proposed novel QC-LDPC(4 288, 4 020) code can be more suitable for the increasing development requirements of high-speed optical transmission systems.

  4. Construction of Association Scheme Using Some (123)-avoiding ...

    African Journals Online (AJOL)

    This paper presents some backgrounds research on association scheme using a class of (123)-avoiding pattern of Aunu numbers as an application area. It also attempts to highlight some further applications ... concept of association scheme. This research also shows us that the Aunu patterns can be used in design theory.

  5. Decoupled scheme based on the Hermite expansion to construct lattice Boltzmann models for the compressible Navier-Stokes equations with arbitrary specific heat ratio.

    Science.gov (United States)

    Hu, Kainan; Zhang, Hongwu; Geng, Shaojuan

    2016-10-01

    A decoupled scheme based on the Hermite expansion to construct lattice Boltzmann models for the compressible Navier-Stokes equations with arbitrary specific heat ratio is proposed. The local equilibrium distribution function including the rotational velocity of particle is decoupled into two parts, i.e., the local equilibrium distribution function of the translational velocity of particle and that of the rotational velocity of particle. From these two local equilibrium functions, two lattice Boltzmann models are derived via the Hermite expansion, namely one is in relation to the translational velocity and the other is connected with the rotational velocity. Accordingly, the distribution function is also decoupled. After this, the evolution equation is decoupled into the evolution equation of the translational velocity and that of the rotational velocity. The two evolution equations evolve separately. The lattice Boltzmann models used in the scheme proposed by this work are constructed via the Hermite expansion, so it is easy to construct new schemes of higher-order accuracy. To validate the proposed scheme, a one-dimensional shock tube simulation is performed. The numerical results agree with the analytical solutions very well.

  6. High-spin level scheme of odd-odd 142Pm

    International Nuclear Information System (INIS)

    Liu Minliang; Zhang Yuhu; Zhou Xiaohong; He Jianjun; Guo Yingxiang; Lei Xiangguo; Huang Wenxue; Liu Zhong; Luo Yixiao; Feng Xichen; Zhang Shuangquan; Xu Xiao; Zheng Yong; Luo Wanju

    2002-01-01

    The level structure of doubly odd nucleus 142 Pm has been studied via the 128 Te( 19 F, 5nγ) 142 Pm reaction in the energy region from 75 to 95 MeV. In-beam γ rays were measured including the excited function, γ-ray singles and γ-γ coincidences in experiment. The level scheme of 142 Pm has been extended up to excitation energy of 7030.0 keV including 25 new γ rays and 13 new levels. Based on the measured γ-ray anisotropies, the level spins in 142 Pm have been suggested

  7. Soft rotator model and {sup 246}Cm low-lying level scheme

    Energy Technology Data Exchange (ETDEWEB)

    Porodzinskij, Yu.V.; Sukhovitskij, E.Sh. [Radiation Physics and Chemistry Problems Inst., Minsk-Sosny (Belarus)

    1997-03-01

    Non-axial soft rotator nuclear model is suggested as self-consistent approach for interpretation of level schemes, {gamma}-transition probabilities and neutron interaction with even-even nuclei. (author)

  8. Control Scheme of River-lake System from the View of Ecological Sponge Basin aiming at Sponge City Construction

    Science.gov (United States)

    Ding, X.; Liu, J.; Yang, Z.

    2017-12-01

    China is in the rapid advance of urbanization, and is promoting the Sponge City Construction (SCC) with the characteristics of natural accumulation, natural infiltration and natural purification. The Chinese government selected 16 and 14 cities as pilot cities in 2015 and 2016 respectively to carry out SCC taking Low Impact Development (LID) as the concept. However, in 2015 and 2016, water-logging occurred in 10 cities and 9 cities respectively during the pilot cities. Therefore, relying solely on LID can not solve the problem of urban flood and waterlogging. Except for a series of LID measures during the process of SCC, corresponding control scheme of river-lake system should be established to realize water-related targets. From the view of ecological sponge basin, this study presents the general idea of SCC both in and out of the unban built-up area and the corresponding control scheme of river-lake system: for the regions outside the built-up area, the main aim of SCC is to carry out the top-level design of urban flood control and waterlogging, establish the water security system outside the city for solving the problems including flood control, water resources, water environment and water ecology; for the built-up area, the main aim of SCC is to construct different kinds of urban sponge according to local conditions and develop multi-scale drainage system responding to different intensities of rainfall taking the river-lake system as the core. Taking Fenghuang County of Hunan Province as an example for the application research, the results indicate that, after the implementation of the control scheme of river-lake system: 1) together with other SCC measures including LID, the control rate of total annual runoff in Fenghuang County is expected to be 82.9% which meets the target requirement of 80%; 2) flood control and drainage standards in Fenghuang County can be increased from the current 10-year return to 20-year return; 3) urban and rural water supply

  9. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  10. High-Order Hyperbolic Residual-Distribution Schemes on Arbitrary Triangular Grids

    Science.gov (United States)

    Mazaheri, Alireza; Nishikawa, Hiroaki

    2015-01-01

    In this paper, we construct high-order hyperbolic residual-distribution schemes for general advection-diffusion problems on arbitrary triangular grids. We demonstrate that the second-order accuracy of the hyperbolic schemes can be greatly improved by requiring the scheme to preserve exact quadratic solutions. We also show that the improved second-order scheme can be easily extended to third-order by further requiring the exactness for cubic solutions. We construct these schemes based on the LDA and the SUPG methodology formulated in the framework of the residual-distribution method. For both second- and third-order-schemes, we construct a fully implicit solver by the exact residual Jacobian of the second-order scheme, and demonstrate rapid convergence of 10-15 iterations to reduce the residuals by 10 orders of magnitude. We demonstrate also that these schemes can be constructed based on a separate treatment of the advective and diffusive terms, which paves the way for the construction of hyperbolic residual-distribution schemes for the compressible Navier-Stokes equations. Numerical results show that these schemes produce exceptionally accurate and smooth solution gradients on highly skewed and anisotropic triangular grids, including curved boundary problems, using linear elements. We also present Fourier analysis performed on the constructed linear system and show that an under-relaxation parameter is needed for stabilization of Gauss-Seidel relaxation.

  11. New data on excited level scheme of 73Ge nucleus

    International Nuclear Information System (INIS)

    Kosyak, Yu.G.; Kaipov, D.K.; Chekushina, L.V.

    1990-01-01

    New data on the scheme of 73 Ge decay obtained by the method of reactor fast neutron inelastic scattering are presented. γ-Spectra from reaction 73 Ge(n, n'γ) 73 Ge at the angles of 90 and 124 deg of relatively incident neutron beam have been measured. Experimental populations of the levels are studied. 29 new γ-transitions have been identified, two new levels have been introduced

  12. A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework.

    Science.gov (United States)

    Wang, Yuan-Gen; Zhu, Guopu; Kwong, Sam; Shi, Yun-Qing

    2017-08-23

    Security analysis is a very important issue for digital watermarking. Several years ago, according to Kerckhoffs' principle, the famous four security levels, namely insecurity, key security, subspace security, and stego-security, were defined for spread-spectrum (SS) embedding schemes in the framework of watermarked-only attack. However, up to now there has been little application of the definition of these security levels to the theoretical analysis of the security of SS embedding schemes, due to the difficulty of the theoretical analysis. In this paper, based on the security definition, we present a theoretical analysis to evaluate the security levels of five typical SS embedding schemes, which are the classical SS, the improved SS (ISS), the circular extension of ISS, the nonrobust and robust natural watermarking, respectively. The theoretical analysis of these typical SS schemes are successfully performed by taking advantage of the convolution of probability distributions to derive the probabilistic models of watermarked signals. Moreover, simulations are conducted to illustrate and validate our theoretical analysis. We believe that the theoretical and practical analysis presented in this paper can bridge the gap between the definition of the four security levels and its application to the theoretical analysis of SS embedding schemes.

  13. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  14. Scheme of 2-dimensional atom localization for a three-level atom via quantum coherence

    OpenAIRE

    Zafar, Sajjad; Ahmed, Rizwan; Khan, M. Khalid

    2013-01-01

    We present a scheme for two-dimensional (2D) atom localization in a three-level atomic system. The scheme is based on quantum coherence via classical standing wave fields between the two excited levels. Our results show that conditional position probability is significantly phase dependent of the applied field and frequency detuning of spontaneously emitted photons. We obtain a single localization peak having probability close to unity by manipulating the control parameters. The effect of ato...

  15. Current situation and countermeasures of port logistics park information construction

    Directory of Open Access Journals (Sweden)

    Zhen Liu

    2013-03-01

    Full Text Available Purpose: Improve work efficiency of logistics park department, and drive the economy of the park and its surrounding areas. Design/methodology/approach: Analyze the information development situation and existent questions of current national logistics park, and design proper scheme to meet the demand of port logistics park. Findings: Proposed an information construction implementation plan using technology of the Internet of things which can be applied to port logistics park. Designed a scheme for the park information construction and explained the system's implementation strategy and implementation steps. Practical implications: The proposed construction program is particularly suitable for the northwest port logistics parks in China, and also has reference function to other logistics park construction. Originality/value: Group the information construction of the logistics park into four levels, three types of users, and two requirements. The scheme is innovative and comprehensive, which can ensure the development of port logistics park.

  16. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  17. International proposal for an acoustic classification scheme for dwellings

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2014-01-01

    Acoustic classification schemes specify different quality levels for acoustic conditions. Regulations and classification schemes for dwellings typically include criteria for airborne and impact sound insulation, façade sound insulation and service equipment noise. However, although important...... classes, implying also trade barriers. Thus, a harmonized classification scheme would be useful, and the European COST Action TU0901 "Integrating and Harmonizing Sound Insulation Aspects in Sustainable Urban Housing Constructions", running 2009-2013 with members from 32 countries, including three overseas...... for quality of life, information about acoustic conditions is rarely available, neither for new or existing housing. Regulatory acoustic requirements will, if enforced, ensure a corresponding quality for new dwellings, but satisfactory conditions for occupants are not guaranteed. Consequently, several...

  18. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  19. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  20. The scheme machine: A case study in progress in design derivation at system levels

    Science.gov (United States)

    Johnson, Steven D.

    1995-01-01

    The Scheme Machine is one of several design projects of the Digital Design Derivation group at Indiana University. It differs from the other projects in its focus on issues of system design and its connection to surrounding research in programming language semantics, compiler construction, and programming methodology underway at Indiana and elsewhere. The genesis of the project dates to the early 1980's, when digital design derivation research branched from the surrounding research effort in programming languages. Both branches have continued to develop in parallel, with this particular project serving as a bridge. However, by 1990 there remained little real interaction between the branches and recently we have undertaken to reintegrate them. On the software side, researchers have refined a mathematically rigorous (but not mechanized) treatment starting with the fully abstract semantic definition of Scheme and resulting in an efficient implementation consisting of a compiler and virtual machine model, the latter typically realized with a general purpose microprocessor. The derivation includes a number of sophisticated factorizations and representations and is also deep example of the underlying engineering methodology. The hardware research has created a mechanized algebra supporting the tedious and massive transformations often seen at lower levels of design. This work has progressed to the point that large scale devices, such as processors, can be derived from first-order finite state machine specifications. This is roughly where the language oriented research stops; thus, together, the two efforts establish a thread from the highest levels of abstract specification to detailed digital implementation. The Scheme Machine project challenges hardware derivation research in several ways, although the individual components of the system are of a similar scale to those we have worked with before. The machine has a custom dual-ported memory to support garbage collection

  1. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  2. Construction of Z-scheme Ag{sub 2}CO{sub 3}/N-doped graphene photocatalysts with enhanced visible-light photocatalytic activity by tuning the nitrogen species

    Energy Technology Data Exchange (ETDEWEB)

    Song, Shaoqing [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Key Laboratory of Radioactive Geology and Exploration Technology Fundamental Science for National Defense, East China Institute of Technology, Nanchang, Jiangxi Province 330013 (China); Meng, Aiyun [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Jiang, Shujuan [Key Laboratory of Radioactive Geology and Exploration Technology Fundamental Science for National Defense, East China Institute of Technology, Nanchang, Jiangxi Province 330013 (China); Cheng, Bei [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Jiang, Chuanjia, E-mail: jiangcj2016@yahoo.com [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China)

    2017-02-28

    Highlights: • Z-scheme photocatalyst composed of Ag{sub 2}CO{sub 3} and N-doped graphene (NG). • Pyridinic nitrogen species of NG spontaneously promoted plasmonic Ag formation. • Graphitic N of NG facilitated the Z-scheme transfer option and O{sub 2} adsorption. • Z-scheme Ag{sub 2}CO{sub 3}-NG showed high photocatalytic performance. - Abstract: Semiconductor-based photocatalysis has great potential in various environmental and energy applications, and Z-scheme photocatalysts have many advantages over single-component photocatalysts. The construction of a highly efficient Z-scheme photocatalytic system depends on the geometric structure arrangement, microscopic and crystalline form of the stoichiometric species, and it has not been elucidated whether the Z-scheme photocatalysts can be designed by tuning the electronic structures of cocatalysts alone. Here, using N-doped graphene (NG) as cocatalyst, we successfully constructed Z-scheme Ag{sub 2}CO{sub 3}-NG photocatalysts with enhanced activity for the photooxidative degradation of phenol pollutant. It was found that the pyridinic nitrogen species (N{sub p}) of NG could spontaneously reduce Ag{sup +} to produce plasmonic Ag nanoparticles on Ag{sub 2}CO{sub 3}-NG, while the efficiency of the photogenerated charge separation, Z-scheme transfer option, and O{sub 2} adsorption were promoted by the graphitic nitrogen species (N{sub g}). Therefore, the as-designed Z-scheme Ag{sub 2}CO{sub 3}-NG photocatalysts showed much higher activity than Ag{sub 2}CO{sub 3} and its composites with graphene oxide (GO) or reduced GO as cocatalysts in the photocatalytic degradation of phenol. Hence, our results provide a new strategy for exploring advanced Z-scheme photocatalysts with NG as cocatalyst by rationally tuning the N{sub p} and N{sub g} species.

  3. Proposed classification scheme for high-level and other radioactive wastes

    International Nuclear Information System (INIS)

    Kocher, D.C.; Croff, A.G.

    1986-01-01

    The Nuclear Waste Policy Act (NWPA) of 1982 defines high-level radioactive waste (HLW) as: (A) the highly radioactive material resulting from the reprocessing of spent nuclear fuel....that contains fission products in sufficient concentrations; and (B) other highly radioactive material that the Commission....determines....requires permanent isolation. This paper presents a generally applicable quantitative definition of HLW that addresses the description in paragraph (B). The approach also results in definitions of other waste classes, i.e., transuranic (TRU) and low-level waste (LLW). A basic waste classification scheme results from the quantitative definitions

  4. Sound classification of dwellings – A diversity of national schemes in Europe

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2011-01-01

    Sound classification schemes for dwellings exist in ten countries in Europe, typically prepared and published as national standards. The schemes define quality classes intended to reflect different levels of acoustical comfort. The main criteria concern airborne and impact sound insulation between...... dwellings, facade sound insulation and installation noise. This paper presents the sound classification schemes in Europe and compares the class criteria for sound insulation between dwellings. The schemes have been implemented and revised gradually since the early 1990s. However, due to lack...... constructions fulfilling different classes. The current variety of descriptors and classes also causes trade barriers. Thus, there is a need to harmonize characteristics of the schemes, and a European COST Action TU0901 "Integrating and Harmonizing Sound Insulation Aspects in Sustainable Urban Housing...

  5. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  6. Energy level schemes of f{sup N} electronic configurations for the di-, tri-, and tetravalent lanthanides and actinides in a free state

    Energy Technology Data Exchange (ETDEWEB)

    Ma, C.-G. [College of Sciences, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Brik, M.G., E-mail: mikhail.brik@ut.ee [College of Sciences, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Institute of Physics, University of Tartu, Ravila 14C, Tartu 50411 (Estonia); Institute of Physics, Jan Dlugosz University, Armii Krajowej 13/15, PL-42200 Czestochowa (Poland); Institute of Physics, Polish Academy of Sciences, Al. Lotników 32/46, 02-668 Warsaw (Poland); Liu, D.-X.; Feng, B.; Tian, Ya [College of Sciences, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Suchocki, A. [Institute of Physics, Polish Academy of Sciences, Al. Lotników 32/46, 02-668 Warsaw (Poland)

    2016-02-15

    The energy level diagrams are theoretically constructed for the di-, tri-, tetravalent lanthanide and actinide ions, using the Hartree–Fock calculated parameters of the Coulomb and spin–orbit interactions within f{sup N} (N=1…13) electron configurations. These diagrams are analogous to Dieke's diagram, which was obtained experimentally. They can be used for an analysis of the optical spectra of all considered groups of ions in various environments. Systematic variation of some prominent energy levels (especially those ones with a potential for emission transitions) along the isoelectronic 4f/5f ions is considered. - Highlights: • Energy level schemes for di-, tri, tetravalent lanthanides/actinides are calculated. • Systematic variation of the characteristic energy levels across the series is considered. • Potentially interesting emission transitions are identified.

  7. An Enhanced Three-Level Voltage Switching State Scheme for Direct Torque Controlled Open End Winding Induction Motor

    Science.gov (United States)

    Kunisetti, V. Praveen Kumar; Thippiripati, Vinay Kumar

    2018-01-01

    Open End Winding Induction Motors (OEWIM) are popular for electric vehicles, ship propulsion applications due to less DC link voltage. Electric vehicles, ship propulsions require ripple free torque. In this article, an enhanced three-level voltage switching state scheme for direct torque controlled OEWIM drive is implemented to reduce torque and flux ripples. The limitations of conventional Direct Torque Control (DTC) are: possible problems during low speeds and starting, it operates with variable switching frequency due to hysteresis controllers and produces higher torque and flux ripple. The proposed DTC scheme can abate the problems of conventional DTC with an enhanced voltage switching state scheme. The three-level inversion was obtained by operating inverters with equal DC-link voltages and it produces 18 voltage space vectors. These 18 vectors are divided into low and high frequencies of operation based on rotor speed. The hardware results prove the validity of proposed DTC scheme during steady-state and transients. From simulation and experimental results, proposed DTC scheme gives less torque and flux ripples on comparison to two-level DTC. The proposed DTC is implemented using dSPACE DS-1104 control board interface with MATLAB/SIMULINK-RTI model.

  8. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM

    Directory of Open Access Journals (Sweden)

    Arvind Selwal

    2016-09-01

    Full Text Available Biometric is the science of human recognition based upon using their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at very sophisticated level. A biometric system deals with raw data captured using a sensor and feature template extracted from raw image. One of the challenges being faced by designers of these systems is to secure template data extracted from the biometric modalities of the user and protect the raw images. To minimize spoof attacks on biometric systems by unauthorised users one of the solutions is to use multi-biometric systems. Multi-modal biometric system works by using fusion technique to merge feature templates generated from different modalities of the human. In this work a new scheme is proposed to secure template during feature fusion level. Scheme is based on union operation of fuzzy relations of templates of modalities during fusion process of multimodal biometric systems. This approach serves dual purpose of feature fusion as well as transformation of templates into a single secured non invertible template. The proposed technique is cancelable and experimentally tested on a bimodal biometric system comprising of fingerprint and hand geometry. Developed scheme removes the problem of an attacker learning the original minutia position in fingerprint and various measurements of hand geometry. Given scheme provides improved performance of the system with reduction in false accept rate and improvement in genuine accept rate.

  9. Synchronised PWM Schemes for Three-level Inverters with Zero Common-mode Voltage

    DEFF Research Database (Denmark)

    Oleschuk, Valentin; Blaabjerg, Frede

    2002-01-01

    This paper presents results of analysis and comparison of novel synchronised schemes of pulsewidth modulation (PWM), applied to three-level voltage source inverters with control algorithms providing elimination of the common-mode voltage. The proposed approach is based on a new strategy of digital...

  10. Formalized description of assessment procedures of tender offers (of the construction organizer and contracting companies in case of engineering control scheme

    Directory of Open Access Journals (Sweden)

    Sborshchikov Sergey Borisovich

    2016-10-01

    Full Text Available The procedure of evaluating and selecting tender offers is not only an important element of the control system of investment and construction activity but is also an effective tool to increase its efficiency due to optimization of construction works price, reduction of their duration, stimulating innovations in the production, increasing the quality and engineering safety of construction production. At the recent time when new organizational forms and control schemes of investment and construction activity are appearing the system of competitive bidding gains more importance and new functions, because the choice of construction organizer and contracting companies directly influences the results of the construction. The authors consider the task of selecting the bidders’ offers which is a multicriterion task. The offers are evaluated according to the set of parameters reflecting the effectiveness of investment and construction projects. The criteria selection is based on the fact that the proposals of the organizer of construction and the contractors are related to the cost of works and to the deadlines which directly affects the implementation parameters of investment and construction projects.

  11. Two-level MOC calculation scheme in APOLLO2 for cross-section library generation for LWR hexagonal assemblies

    International Nuclear Information System (INIS)

    Petrov, Nikolay; Todorova, Galina; Kolev, Nikola; Damian, Frederic

    2011-01-01

    The accurate and efficient MOC calculation scheme in APOLLO2, developed by CEA for generating multi-parameterized cross-section libraries for PWR assemblies, has been adapted to hexagonal assemblies. The neutronic part of this scheme is based on a two-level calculation methodology. At the first level, a multi-cell method is used in 281 energy groups for cross-section definition and self-shielding. At the second level, precise MOC calculations are performed in a collapsed energy mesh (30-40 groups). In this paper, the application and validation of the two-level scheme for hexagonal assemblies is described. Solutions for a VVER assembly are compared with TRIPOLI4® calculations and direct 281g MOC solutions. The results show that the accuracy is close to that of the 281g MOC calculation while the CPU time is substantially reduced. Compared to the multi-cell method, the accuracy is markedly improved. (author)

  12. Solving the Sea-Level Equation in an Explicit Time Differencing Scheme

    Science.gov (United States)

    Klemann, V.; Hagedoorn, J. M.; Thomas, M.

    2016-12-01

    In preparation of coupling the solid-earth to an ice-sheet compartment in an earth-system model, the dependency of initial topography on the ice-sheet history and viscosity structure has to be analysed. In this study, we discuss this dependency and how it influences the reconstruction of former sea level during a glacial cycle. The modelling is based on the VILMA code in which the field equations are solved in the time domain applying an explicit time-differencing scheme. The sea-level equation is solved simultaneously in the same explicit scheme as the viscoleastic field equations (Hagedoorn et al., 2007). With the assumption of only small changes, we neglect the iterative solution at each time step as suggested by e.g. Kendall et al. (2005). Nevertheless, the prediction of the initial paleo topography in case of moving coastlines remains to be iterated by repeated integration of the whole load history. The sensitivity study sketched at the beginning is accordingly motivated by the question if the iteration of the paleo topography can be replaced by a predefined one. This study is part of the German paleoclimate modelling initiative PalMod. Lit:Hagedoorn JM, Wolf D, Martinec Z, 2007. An estimate of global mean sea-level rise inferred from tide-gauge measurements using glacial-isostatic models consistent with the relative sea-level record. Pure appl. Geophys. 164: 791-818, doi:10.1007/s00024-007-0186-7Kendall RA, Mitrovica JX, Milne GA, 2005. On post-glacial sea level - II. Numerical formulation and comparative reesults on spherically symmetric models. Geophys. J. Int., 161: 679-706, doi:10.1111/j.365-246.X.2005.02553.x

  13. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  14. Development of new NDT certification scheme in Singapore

    International Nuclear Information System (INIS)

    Wong, B.S.; Prabhakaran, K.G.; Babu, S.K.; Kuppuswamy, N.

    2009-01-01

    Nondestructive testing plays a vital role in Singapore Industry either it is construction or it it oil and gas. To cope up with the future demands for nondestructive testing personnel and cater to the local industry needs for qualified and certified NDT operators, Nondestructive Testing Society (Singapore)-NDTSS launched the SGNDT Certification Scheme. The aim of the organization is to promote and standardize the quality of NDT through education and training based on a scheme that is on par with internationally recognized 3rd party certifications. The certification also provides a greater confidence to the clients and end users who utilize the NDT test results provided by the certified operators. NDE certification in Singapore varies from industries and currently relies on the in-house certification scheme based on SNT-TC-1A where organizations find it difficult to standardize the skill and reliability of operators. NDE Certification system varies globally from countries to countries. A proper certification system is required to produce successful NDT Practitioners to suit the local industry. This paper outlines the development of Singapore NDT Certification Scheme (SGNDT), the operations, levels of qualification, the method of operation and control measures. The Training and Certification committee, Quality Management system within the certification scheme and the current system practiced in Singapore are discussed in this paper. The paper also highlights the importance of third party certification scheme. (author)

  15. Proposed classification scheme for high-level and other radioactive wastes

    International Nuclear Information System (INIS)

    Kocher, D.C.; Croff, A.G.

    1986-01-01

    The Nuclear Waste Policy Act (NWPA) of 1982 defines high-level (radioactive) waste (HLW) as (A) the highly radioactive material resulting from the reprocessing of spent nuclear fuel...that contains fission products in sufficient concentrations; and (B) other highly radioactive material that the Commission...determines...requires permanent isolation. This paper presents a generally applicable quantitative definition of HLW that addresses the description in paragraph B. The approach also results in definitions of other wastes classes, i.e., transuranic (TRU) and low-level waste (LLW). The basic waste classification scheme that results from the quantitative definitions of highly radioactive and requires permanent isolation is depicted. The concentrations of radionuclides that correspond to these two boundaries, and that may be used to classify radioactive wastes, are given

  16. Mutual influences of rated currents, short circuit levels, fault durations and integrated protective schemes for industrial distribution MV switchgears

    Energy Technology Data Exchange (ETDEWEB)

    Gaidano, G. (FIAT Engineering, Torino, Italy); Lionetto, P.F.; Pelizza, C.; Tommazzolli, F.

    1979-01-01

    This paper deals with the problem of integrated and coordinated design of distribution systems, as regards the definition of system structure and parameters together with protection criteria and schemes. Advantages in system operation, dynamic response, heavier loads with reduced machinery rating margins and overall cost reduction, can be achieved. It must be noted that MV switchgears installed in industrial main distribution substations are the vital nodes of the distribution system. Very large amounts of power (up to 100 MW and more) are conveyed through MV busbars, coming from Utility and from in-plant generators and outgoing to subdistribution substations, to step-down transformers and to main concentrated loads (big drivers, furnaces etc.). Criteria and methods already studied and applied to public distribution are examined to assess service continuity and economics by means of the reduction of thermal stresses, minimization of disturbances and improvement of system stability. The life of network components depends on sizing, on fault energy levels and on probability of fault occurrence. Constructional measures and protection schemes, which reduce probability and duration of faults, are the most important tools to improve overall reliability. The introduction of advanced techniques, mainly based on computer application, not only allows drastic reduction of fault duration, but also permits the system to operate, under any possible contingency, in the optimal conditions, as the computer provides adaptive control. This mode of system management makes it possible to size network components with reference to the true magnitude of system quantities, avoiding expensive oversizing connected to the unflexibility of conventional protection and control schemes.

  17. Construction of Low Dissipative High Order Well-Balanced Filter Schemes for Non-Equilibrium Flows

    Science.gov (United States)

    Wang, Wei; Yee, H. C.; Sjogreen, Bjorn; Magin, Thierry; Shu, Chi-Wang

    2009-01-01

    The goal of this paper is to generalize the well-balanced approach for non-equilibrium flow studied by Wang et al. [26] to a class of low dissipative high order shock-capturing filter schemes and to explore more advantages of well-balanced schemes in reacting flows. The class of filter schemes developed by Yee et al. [30], Sjoegreen & Yee [24] and Yee & Sjoegreen [35] consist of two steps, a full time step of spatially high order non-dissipative base scheme and an adaptive nonlinear filter containing shock-capturing dissipation. A good property of the filter scheme is that the base scheme and the filter are stand alone modules in designing. Therefore, the idea of designing a well-balanced filter scheme is straightforward, i.e., choosing a well-balanced base scheme with a well-balanced filter (both with high order). A typical class of these schemes shown in this paper is the high order central difference schemes/predictor-corrector (PC) schemes with a high order well-balanced WENO filter. The new filter scheme with the well-balanced property will gather the features of both filter methods and well-balanced properties: it can preserve certain steady state solutions exactly; it is able to capture small perturbations, e.g., turbulence fluctuations; it adaptively controls numerical dissipation. Thus it shows high accuracy, efficiency and stability in shock/turbulence interactions. Numerical examples containing 1D and 2D smooth problems, 1D stationary contact discontinuity problem and 1D turbulence/shock interactions are included to verify the improved accuracy, in addition to the well-balanced behavior.

  18. Construction of low dissipative high-order well-balanced filter schemes for non-equilibrium flows

    International Nuclear Information System (INIS)

    Wang Wei; Yee, H.C.; Sjoegreen, Bjoern; Magin, Thierry; Shu, Chi-Wang

    2011-01-01

    The goal of this paper is to generalize the well-balanced approach for non-equilibrium flow studied by Wang et al. (2009) to a class of low dissipative high-order shock-capturing filter schemes and to explore more advantages of well-balanced schemes in reacting flows. More general 1D and 2D reacting flow models and new examples of shock turbulence interactions are provided to demonstrate the advantage of well-balanced schemes. The class of filter schemes developed by Yee et al. (1999) , Sjoegreen and Yee (2004) and Yee and Sjoegreen (2007) consist of two steps, a full time step of spatially high-order non-dissipative base scheme and an adaptive non-linear filter containing shock-capturing dissipation. A good property of the filter scheme is that the base scheme and the filter are stand-alone modules in designing. Therefore, the idea of designing a well-balanced filter scheme is straightforward, i.e. choosing a well-balanced base scheme with a well-balanced filter (both with high-order accuracy). A typical class of these schemes shown in this paper is the high-order central difference schemes/predictor-corrector (PC) schemes with a high-order well-balanced WENO filter. The new filter scheme with the well-balanced property will gather the features of both filter methods and well-balanced properties: it can preserve certain steady-state solutions exactly; it is able to capture small perturbations, e.g. turbulence fluctuations; and it adaptively controls numerical dissipation. Thus it shows high accuracy, efficiency and stability in shock/turbulence interactions. Numerical examples containing 1D and 2D smooth problems, 1D stationary contact discontinuity problem and 1D turbulence/shock interactions are included to verify the improved accuracy, in addition to the well-balanced behavior.

  19. A comparison between national scheme for the acoustic classification of dwellings in Europe and in the U.S

    DEFF Research Database (Denmark)

    Berardi, Umberto; Rasmussen, Birgit

    2015-01-01

    , focusing on sound insulation performance, national schemes for sound classification of dwellings have been developed in several European countries. These schemes define acoustic classes according to different levels of sound insulation. Due to the lack of coordination among countries, a significant...... scheme may facilitate exchanging experiences about constructions fulfilling different classes, reducing trade barriers, and finally increasing the sound insulation of dwellings....... diversity in terms of descriptors, number of classes, and class intervals occurred between national schemes. However, a proposal ”acoustic classification scheme for dwellings” has been developed recently in the European COST Action TU0901 with 32 member countries. This proposal has been accepted as an ISO...

  20. Confirming theoretical pay constructs of a variable pay scheme

    Directory of Open Access Journals (Sweden)

    Sibangilizwe Ncube

    2013-05-01

    Full Text Available Orientation: Return on the investment in variable pay programmes remains controversial because their cost versus contribution cannot be empirically justified. Research purpose: This study validates the findings of the model developed by De Swardt on the factors related to successful variable pay programmes. Motivation for the study: Many organisations blindly implement variable pay programmes without any means to assess the impact these programmes have on the company’s performance. This study was necessary to validate the findings of an existing instrument that validates the contribution of variable pay schemes. Research design, approach and method: The study was conducted using quantitative research. A total of 300 completed questionnaires from a non-purposive sample of 3000 participants in schemes across all South African industries were returned and analysed. Main findings: Using exploratory and confirmatory factor analysis, it was found that the validation instrument developed by De Swardt is still largely valid in evaluating variable pay schemes. The differences between the study and the model were reported. Practical/managerial implications: The study confirmed the robustness of an existing model that enables practitioners to empirically validate the use of variable pay plans. This model assists in the design and implementation of variable pay programmes that meet critical success factors. Contribution/value-add: The study contributed to the development of a measurement instrument that will assess whether a variable pay plan contributes to an organisation’s success.

  1. Scheme of fault tectonic and tectonic activity manifestation in the region of the Crimea nuclear power plant construction

    International Nuclear Information System (INIS)

    Pasynkov, A.L.

    1989-01-01

    Characteristic of fault tectonics and tectonic activity manifestation in the region of the Crimea nuclear power plant construction is presented. Mosaic-block structure of the area, predetermined by the development of diagonal systems of activated tectonic dislocations with different displacement amplitudes and different stratigraphic ranges of manifestation, was established. Strained-stressed state of the region is determined by the presence of the South-Azov zone of deep fault and Krasnogorsk-Samarlinks fault system. The presented scheme can be used as tectonic basis of seismogenic activity of the region

  2. Computing with high-resolution upwind schemes for hyperbolic equations

    International Nuclear Information System (INIS)

    Chakravarthy, S.R.; Osher, S.; California Univ., Los Angeles)

    1985-01-01

    Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and glitches, relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes. 21 references

  3. Constructing an Urban Population Model for Medical Insurance Scheme Using Microsimulation Techniques

    Directory of Open Access Journals (Sweden)

    Linping Xiong

    2012-01-01

    Full Text Available China launched a pilot project of medical insurance reform in 79 cities in 2007 to cover urban nonworking residents. An urban population model was created in this paper for China’s medical insurance scheme using microsimulation model techniques. The model made it clear for the policy makers the population distributions of different groups of people, the potential urban residents entering the medical insurance scheme. The income trends of units of individuals and families were also obtained. These factors are essential in making the challenging policy decisions when considering to balance the long-term financial sustainability of the medical insurance scheme.

  4. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  5. The Relationship between Nonconservative Schemes and Initial Values of Nonlinear Evolution Equations

    Institute of Scientific and Technical Information of China (English)

    林万涛

    2004-01-01

    For the nonconservative schemes of the nonlinear evolution equations, taking the one-dimensional shallow water wave equation as an example, the necessary conditions of computational stability are given.Based on numerical tests, the relationship between the nonlinear computational stability and the construction of difference schemes, as well as the form of initial values, is further discussed. It is proved through both theoretical analysis and numerical tests that if the construction of difference schemes is definite, the computational stability of nonconservative schemes is decided by the form of initial values.

  6. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  7. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  8. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  9. Multi-Hierarchical Gray Correlation Analysis Applied in the Selection of Green Building Design Scheme

    Science.gov (United States)

    Wang, Li; Li, Chuanghong

    2018-02-01

    As a sustainable form of ecological structure, green building is widespread concerned and advocated in society increasingly nowadays. In the survey and design phase of preliminary project construction, carrying out the evaluation and selection of green building design scheme, which is in accordance with the scientific and reasonable evaluation index system, can improve the ecological benefits of green building projects largely and effectively. Based on the new Green Building Evaluation Standard which came into effect on January 1, 2015, the evaluation index system of green building design scheme is constructed taking into account the evaluation contents related to the green building design scheme. We organized experts who are experienced in construction scheme optimization to mark and determine the weight of each evaluation index through the AHP method. The correlation degree was calculated between each evaluation scheme and ideal scheme by using multilevel gray relational analysis model and then the optimal scheme was determined. The feasibility and practicability of the evaluation method are verified by introducing examples.

  10. Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system

    Science.gov (United States)

    Zhou, Nanrun; Chen, Weiwei; Yan, Xinyu; Wang, Yunqian

    2018-06-01

    In order to obtain higher encryption efficiency, a bit-level quantum color image encryption scheme by exploiting quantum cross-exchange operation and a 5D hyper-chaotic system is designed. Additionally, to enhance the scrambling effect, the quantum channel swapping operation is employed to swap the gray values of corresponding pixels. The proposed color image encryption algorithm has larger key space and higher security since the 5D hyper-chaotic system has more complex dynamic behavior, better randomness and unpredictability than those based on low-dimensional hyper-chaotic systems. Simulations and theoretical analyses demonstrate that the presented bit-level quantum color image encryption scheme outperforms its classical counterparts in efficiency and security.

  11. Upwind differencing scheme for the equations of ideal magnetohydrodynamics

    International Nuclear Information System (INIS)

    Brio, M.; Wu, C.C.

    1988-01-01

    Recently, upwind differencing schemes have become very popular for solving hyperbolic partial differential equations, especially when discontinuities exist in the solutions. Among many upwind schemes successfully applied to the problems in gas dynamics, Roe's method stands out for its relative simplicity and clarity of the underlying physical model. In this paper, an upwind differencing scheme of Roe-type for the MHD equations is constructed. In each computational cell, the problem is first linearized around some averaged state which preserves the flux differences. Then the solution is advanced in time by computing the wave contributions to the flux at the cell interfaces. One crucial task of the linearization procedure is the construction of a Roe matrix. For the special case γ = 2, a Roe matrix in the form of a mean value Jacobian is found, and for the general case, a simple averaging procedure is introduced. All other necessary ingredients of the construction, which include eigenvalues, and a complete set of right eigenvectors of the Roe matrix and decomposition coefficients are presented. As a numerical example, we chose a coplanar MHD Riemann problem. The problem is solved by the newly constructed second-order upwind scheme as well as by the Lax-Friedrichs, the Lax-Wendroff, and the flux-corrected transport schemes. The results demonstrate several advantages of the upwind scheme. In this paper, we also show that the MHD equations are nonconvex. This is a contrast to the general belief that the fast and slow waves are like sound waves in the Euler equations. As a consequence, the wave structure becomes more complicated; for example, compound waves consisting of a shock and attached to it a rarefaction wave of the same family can exist in MHD. copyright 1988 Academic Press, Inc

  12. Accurate adiabatic singlet-triplet gaps in atoms and molecules employing the third-order spin-flip algebraic diagrammatic construction scheme for the polarization propagator

    Energy Technology Data Exchange (ETDEWEB)

    Lefrancois, Daniel; Dreuw, Andreas, E-mail: dreuw@uni-heidelberg.de [Interdisciplinary Center for Scientific Computing, Ruprecht-Karls University, Im Neuenheimer Feld 205, 69120 Heidelberg (Germany); Rehn, Dirk R. [Departments of Physics, Chemistry and Biology, Linköping University, SE-581 83 Linköping (Sweden)

    2016-08-28

    For the calculation of adiabatic singlet-triplet gaps (STG) in diradicaloid systems the spin-flip (SF) variant of the algebraic diagrammatic construction (ADC) scheme for the polarization propagator in third order perturbation theory (SF-ADC(3)) has been applied. Due to the methodology of the SF approach the singlet and triplet states are treated on an equal footing since they are part of the same determinant subspace. This leads to a systematically more accurate description of, e.g., diradicaloid systems than with the corresponding non-SF single-reference methods. Furthermore, using analytical excited state gradients at ADC(3) level, geometry optimizations of the singlet and triplet states were performed leading to a fully consistent description of the systems, leading to only small errors in the calculated STGs ranging between 0.6 and 2.4 kcal/mol with respect to experimental references.

  13. SECRET SHARING SCHEMES WITH STRONG MULTIPLICATION AND A LARGE NUMBER OF PLAYERS FROM TORIC VARIETIES

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    2017-01-01

    This article consider Massey's construction for constructing linear secret sharing schemes from toric varieties over a finite field $\\Fq$ with $q$ elements. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. The schemes have strong multiplication, such schemes can be utilized in ...

  14. ESCL8R and LEVIT8R: interactive graphical analysis of {gamma}-{gamma} and {gamma}-{gamma}-{gamma} coincidence data for level schemes

    Energy Technology Data Exchange (ETDEWEB)

    Radford, D C [Atomic Energy of Canada Ltd., Chalk River, ON (Canada). Chalk River Nuclear Labs.

    1992-08-01

    The extraction of complete and consistent nuclear level schemes from high-fold coincidence data will require intelligent computer programs. These will need to present the relevant data in an easily assimilated manner, keep track of all {gamma}-ray assignments and expected coincidence intensities, and quickly find significant discrepancies between a proposed level scheme and the data. Some steps in this direction have been made at Chalk River. The programs ESCL8R and LEVIT8R, for analysis of two-fold and three-fold data sets respectively, allow fast and easy inspection of the data, and compare the results to expectations calculations on the basis of a proposed level scheme. Least-squares fits directly to the 2D and/or 3D data, with the intensities and energies of the level scheme transitions as parameters, allow fast and easy extraction of the optimum physics results. (author). 4 refs., 3 figs.

  15. Constructing a Scientific Explanation—A Narrative Account

    Science.gov (United States)

    Yeo, Jennifer; Gilbert, John K.

    2014-07-01

    Studies analyzing explanations that have been constructed by science students have found that they were generally weak and lack necessary features. The goal of this study was to establish the competencies that one needs to construct a scientific explanation. Scientific explanations can be looked at in three ways, in terms of their function, form and level, as being essentially sign-making processes. Taking a case study approach and using Lemke's multimodal framework, we analyzed the scientific explanation of an electromagnetic induction phenomenon constructed by one high school student. We found that such a construction involves the complex coordination of different types of signs, not only to represent the entities in the phenomenon, but also to support thinking and reasoning about it at abstract levels. Scientific conventions and rules, and everyday material and social tools were found to be crucial in shifting from one level of abstraction to another. The findings highlight the importance of developing the skillful use of schemes of scientific representation by students and familiarizing them with commonly encountered contexts.

  16. Nested Hilbert schemes on surfaces: Virtual fundamental class

    DEFF Research Database (Denmark)

    Gholampour, Amin; Sheshmani, Artan; Yau, Shing-Tung

    We construct natural virtual fundamental classes for nested Hilbert schemes on a nonsingular projective surface S. This allows us to define new invariants of S that recover some of the known important cases such as Poincare invariants of Durr-Kabanov-Okonek and the stable pair invariants of Kool......-Thomas. In the case of the nested Hilbert scheme of points, we can express these invariants in terms of integrals over the products of Hilbert scheme of points on S, and relate them to the vertex operator formulas found by Carlsson-Okounkov. The virtual fundamental classes of the nested Hilbert schemes play a crucial...

  17. Geminal embedding scheme for optimal atomic basis set construction in correlated calculations

    Energy Technology Data Exchange (ETDEWEB)

    Sorella, S., E-mail: sorella@sissa.it [International School for Advanced Studies (SISSA), Via Beirut 2-4, 34014 Trieste, Italy and INFM Democritos National Simulation Center, Trieste (Italy); Devaux, N.; Dagrada, M., E-mail: mario.dagrada@impmc.upmc.fr [Institut de Minéralogie, de Physique des Matériaux et de Cosmochimie, Université Pierre et Marie Curie, Case 115, 4 Place Jussieu, 75252 Paris Cedex 05 (France); Mazzola, G., E-mail: gmazzola@phys.ethz.ch [Theoretische Physik, ETH Zurich, 8093 Zurich (Switzerland); Casula, M., E-mail: michele.casula@impmc.upmc.fr [CNRS and Institut de Minéralogie, de Physique des Matériaux et de Cosmochimie, Université Pierre et Marie Curie, Case 115, 4 Place Jussieu, 75252 Paris Cedex 05 (France)

    2015-12-28

    We introduce an efficient method to construct optimal and system adaptive basis sets for use in electronic structure and quantum Monte Carlo calculations. The method is based on an embedding scheme in which a reference atom is singled out from its environment, while the entire system (atom and environment) is described by a Slater determinant or its antisymmetrized geminal power (AGP) extension. The embedding procedure described here allows for the systematic and consistent contraction of the primitive basis set into geminal embedded orbitals (GEOs), with a dramatic reduction of the number of variational parameters necessary to represent the many-body wave function, for a chosen target accuracy. Within the variational Monte Carlo method, the Slater or AGP part is determined by a variational minimization of the energy of the whole system in presence of a flexible and accurate Jastrow factor, representing most of the dynamical electronic correlation. The resulting GEO basis set opens the way for a fully controlled optimization of many-body wave functions in electronic structure calculation of bulk materials, namely, containing a large number of electrons and atoms. We present applications on the water molecule, the volume collapse transition in cerium, and the high-pressure liquid hydrogen.

  18. Hybrid flux splitting schemes for numerical resolution of two-phase flows

    Energy Technology Data Exchange (ETDEWEB)

    Flaatten, Tore

    2003-07-01

    This thesis deals with the construction of numerical schemes for approximating. solutions to a hyperbolic two-phase flow model. Numerical schemes for hyperbolic models are commonly divided in two main classes: Flux Vector Splitting (FVS) schemes which are based on scalar computations and Flux Difference Splitting (FDS) schemes which are based on matrix computations. FVS schemes are more efficient than FDS schemes, but FDS schemes are more accurate. The canonical FDS schemes are the approximate Riemann solvers which are based on a local decomposition of the system into its full wave structure. In this thesis the mathematical structure of the model is exploited to construct a class of hybrid FVS/FDS schemes, denoted as Mixture Flux (MF) schemes. This approach is based on a splitting of the system in two components associated with the pressure and volume fraction variables respectively, and builds upon hybrid FVS/FDS schemes previously developed for one-phase flow models. Through analysis and numerical experiments it is demonstrated that the MF approach provides several desirable features, including (1) Improved efficiency compared to standard approximate Riemann solvers, (2) Robustness under stiff conditions, (3) Accuracy on linear and nonlinear phenomena. In particular it is demonstrated that the framework allows for an efficient weakly implicit implementation, focusing on an accurate resolution of slow transients relevant for the petroleum industry. (author)

  19. Different-Level Simultaneous Minimization Scheme for Fault Tolerance of Redundant Manipulator Aided with Discrete-Time Recurrent Neural Network.

    Science.gov (United States)

    Jin, Long; Liao, Bolin; Liu, Mei; Xiao, Lin; Guo, Dongsheng; Yan, Xiaogang

    2017-01-01

    By incorporating the physical constraints in joint space, a different-level simultaneous minimization scheme, which takes both the robot kinematics and robot dynamics into account, is presented and investigated for fault-tolerant motion planning of redundant manipulator in this paper. The scheme is reformulated as a quadratic program (QP) with equality and bound constraints, which is then solved by a discrete-time recurrent neural network. Simulative verifications based on a six-link planar redundant robot manipulator substantiate the efficacy and accuracy of the presented acceleration fault-tolerant scheme, the resultant QP and the corresponding discrete-time recurrent neural network.

  20. Biomechanics of Artificial Disc Replacements Adjacent to a 2-Level Fusion in 4-Level Hybrid Constructs: An In Vitro Investigation

    Science.gov (United States)

    Liao, Zhenhua; Fogel, Guy R.; Wei, Na; Gu, Hongsheng; Liu, Weiqiang

    2015-01-01

    Background The ideal procedure for multilevel cervical degenerative disc diseases remains controversial. Recent studies on hybrid surgery combining anterior cervical discectomy and fusion (ACDF) and artificial cervical disc replacement (ACDR) for 2-level and 3-level constructs have been reported in the literature. The purpose of this study was to estimate the biomechanics of 3 kinds of 4-level hybrid constructs, which are more likely to be used clinically compared to 4-level arthrodesis. Material/Methods Eighteen human cadaveric spines (C2–T1) were evaluated in different testing conditions: intact, with 3 kinds of 4-level hybrid constructs (hybrid C3–4 ACDR+C4–6 ACDF+C6–7ACDR; hybrid C3–5ACDF+C5–6ACDR+C6–7ACDR; hybrid C3–4ACDR+C4–5ACDR+C5–7ACDF); and 4-level fusion. Results Four-level fusion resulted in significant decrease in the C3–C7 ROM compared with the intact spine. The 3 different 4-level hybrid treatment groups caused only slight change at the instrumented levels compared to intact except for flexion. At the adjacent levels, 4-level fusion resulted in significant increase of contribution of both upper and lower adjacent levels. However, for the 3 hybrid constructs, significant changes of motion increase far lower than 4P at adjacent levels were only noted in partial loading conditions. No destabilizing effect or hypermobility were observed in any 4-level hybrid construct. Conclusions Four-level fusion significantly eliminated motion within the construct and increased motion at the adjacent segments. For all 3 different 4-level hybrid constructs, ACDR normalized motion of the index segment and adjacent segments with no significant hypermobility. Compared with the 4-level ACDF condition, the artificial discs in 4-level hybrid constructs had biomechanical advantages compared to fusion in normalizing adjacent level motion. PMID:26694835

  1. TVD schemes in one and two space dimensions

    International Nuclear Information System (INIS)

    Leveque, R.J.; Goodman, J.B.; New York Univ., NY)

    1985-01-01

    The recent development of schemes which are second order accurate in smooth regions has made it possible to overcome certain difficulties which used to arise in numerical computations of discontinuous solutions of conservation laws. The present investigation is concerned with scalar conservation laws, taking into account the employment of total variation diminishing (TVD) schemes. The concept of a TVD scheme was introduced by Harten et al. (1976). Harten et al. first constructed schemes which are simultaneously TVD and second order accurate on smooth solutions. In the present paper, a summary is provided of recently conducted work in this area. Attention is given to TVD schemes in two space dimensions, a second order accurate TVD scheme in one dimension, and the entropy condition and spreading of rarefaction waves. 19 references

  2. Constructing level-2 phylogenetic networks from triplets

    OpenAIRE

    Iersel, Leo; Keijsper, J.C.M.; Kelk, Steven; Stougie, Leen; Hagen, F.; Boekhout, T.; Vingron, M.; Wong, L.

    2009-01-01

    htmlabstractJansson and Sung showed that, given a dense set of input triplets T (representing hypotheses about the local evolutionary relationships of triplets of taxa), it is possible to determine in polynomial time whether there exists a level-1 network consistent with T, and if so to construct such a network (Inferring a Level-1 Phylogenetic Network from a Dense Set of Rooted Triplets, Theoretical Computer Science, 363, pp. 60-68 (2006)). Here we extend this work by showing that this probl...

  3. Quantum dynamics calculations using symmetrized, orthogonal Weyl-Heisenberg wavelets with a phase space truncation scheme. II. Construction and optimization

    International Nuclear Information System (INIS)

    Poirier, Bill; Salam, A.

    2004-01-01

    In this paper, we extend and elaborate upon a wavelet method first presented in a previous publication [B. Poirier, J. Theo. Comput. Chem. 2, 65 (2003)]. In particular, we focus on construction and optimization of the wavelet functions, from theoretical and numerical viewpoints, and also examine their localization properties. The wavelets used are modified Wilson-Daubechies wavelets, which in conjunction with a simple phase space truncation scheme, enable one to solve the multidimensional Schroedinger equation. This approach is ideally suited to rovibrational spectroscopy applications, but can be used in any context where differential equations are involved

  4. Security analysis and improvements of arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  5. Design and construction of the low-level liquid waste treatment system

    International Nuclear Information System (INIS)

    Baker, M.N.; Mateer, W.E.; Metzler, G.H.; Reeves, S.R.; Rickettson, D.J.

    1989-03-01

    This report describes the design and construction of the Low-Level Liquid Waste Treatment System (LWTS). The LWTS is part of a system that will prepare High-Level Radioactive Waste for solidification in glass. This preparation includes removal of water and salts from the stored waste. The topics addressed are: the design objective to reuse the Process Building to contain LWTS, the special considerations that arise when building a new system inside a decontaminated facility, interface to existing plant systems, phased construction, and construction testing. 8 refs., 24 figs

  6. Towards a multigrid scheme in SU(2) lattice gauge theory

    International Nuclear Information System (INIS)

    Gutbrod, F.

    1992-12-01

    The task of constructing a viable updating multigrid scheme for SU(2) lattice gauge theory is discussed in connection with the classical eigenvalue problem. For a nonlocal overrelaxation Monte Carlo update step, the central numerical problem is the search for the minimum of a quadratic approximation to the action under nonlocal constraints. Here approximate eigenfunctions are essential to reduce the numerical work, and these eigenfunctions are to be constructed with multigrid techniques. A simple implementation on asymmetric lattices is described, where the grids are restricted to 3-dimensional hyperplanes. The scheme is shown to be moderately successful in the early stages of the updating history (starting from a cold configuration). The main results of another, less asymmetric scheme are presented briefly. (orig.)

  7. Self-adjusting entropy-stable scheme for compressible Euler equations

    Institute of Scientific and Technical Information of China (English)

    程晓晗; 聂玉峰; 封建湖; LuoXiao-Yu; 蔡力

    2015-01-01

    In this work, a self-adjusting entropy-stable scheme is proposed for solving compressible Euler equations. The entropy-stable scheme is constructed by combining the entropy conservative flux with a suitable diffusion operator. The entropy has to be preserved in smooth solutions and be dissipated at shocks. To achieve this, a switch function, based on entropy variables, is employed to make the numerical diffusion term added around discontinuities automatically. The resulting scheme is still entropy-stable. A number of numerical experiments illustrating the robustness and accuracy of the scheme are presented. From these numerical results, we observe a remarkable gain in accuracy.

  8. Additive Difference Schemes for Filtration Problems in Multilayer Systems

    CERN Document Server

    Ayrjan, E A; Pavlush, M; Fedorov, A V

    2000-01-01

    In the present paper difference schemes for solution of the plane filtration problem in multilayer systems are analyzed within the framework of difference schemes general theory. Attention is paid to splitting the schemes on physical processes of filtration along water-carring layers and vertical motion between layers. Some absolutely stable additive difference schemes are obtained the realization of which needs no software modification. Parallel algorithm connected with the solving of the filtration problem in every water-carring layer on a single processor is constructed. Program realization on the multi-processor system SPP2000 at JINR is discussed.

  9. Student’s scheme in solving mathematics problems

    Science.gov (United States)

    Setyaningsih, Nining; Juniati, Dwi; Suwarsono

    2018-03-01

    The purpose of this study was to investigate students’ scheme in solving mathematics problems. Scheme are data structures for representing the concepts stored in memory. In this study, we used it in solving mathematics problems, especially ratio and proportion topics. Scheme is related to problem solving that assumes that a system is developed in the human mind by acquiring a structure in which problem solving procedures are integrated with some concepts. The data were collected by interview and students’ written works. The results of this study revealed are students’ scheme in solving the problem of ratio and proportion as follows: (1) the content scheme, where students can describe the selected components of the problem according to their prior knowledge, (2) the formal scheme, where students can explain in construct a mental model based on components that have been selected from the problem and can use existing schemes to build planning steps, create something that will be used to solve problems and (3) the language scheme, where students can identify terms, or symbols of the components of the problem.Therefore, by using the different strategies to solve the problems, the students’ scheme in solving the ratio and proportion problems will also differ.

  10. Asynchronous Two-Level Checkpointing Scheme for Large-Scale Adjoints in the Spectral-Element Solver Nek5000

    Energy Technology Data Exchange (ETDEWEB)

    Schanen, Michel; Marin, Oana; Zhang, Hong; Anitescu, Mihai

    2016-01-01

    Adjoints are an important computational tool for large-scale sensitivity evaluation, uncertainty quantification, and derivative-based optimization. An essential component of their performance is the storage/recomputation balance in which efficient checkpointing methods play a key role. We introduce a novel asynchronous two-level adjoint checkpointing scheme for multistep numerical time discretizations targeted at large-scale numerical simulations. The checkpointing scheme combines bandwidth-limited disk checkpointing and binomial memory checkpointing. Based on assumptions about the target petascale systems, which we later demonstrate to be realistic on the IBM Blue Gene/Q system Mira, we create a model of the expected performance of our checkpointing approach and validate it using the highly scalable Navier-Stokes spectralelement solver Nek5000 on small to moderate subsystems of the Mira supercomputer. In turn, this allows us to predict optimal algorithmic choices when using all of Mira. We also demonstrate that two-level checkpointing is significantly superior to single-level checkpointing when adjoining a large number of time integration steps. To our knowledge, this is the first time two-level checkpointing had been designed, implemented, tuned, and demonstrated on fluid dynamics codes at large scale of 50k+ cores.

  11. The effect of hearing aid signal-processing schemes on acceptable noise levels: perception and prediction.

    Science.gov (United States)

    Wu, Yu-Hsiang; Stangl, Elizabeth

    2013-01-01

    The acceptable noise level (ANL) test determines the maximum noise level that an individual is willing to accept while listening to speech. The first objective of the present study was to systematically investigate the effect of wide dynamic range compression processing (WDRC), and its combined effect with digital noise reduction (DNR) and directional processing (DIR), on ANL. Because ANL represents the lowest signal-to-noise ratio (SNR) that a listener is willing to accept, the second objective was to examine whether the hearing aid output SNR could predict aided ANL across different combinations of hearing aid signal-processing schemes. Twenty-five adults with sensorineural hearing loss participated in the study. ANL was measured monaurally in two unaided and seven aided conditions, in which the status of the hearing aid processing schemes (enabled or disabled) and the location of noise (front or rear) were manipulated. The hearing aid output SNR was measured for each listener in each condition using a phase-inversion technique. The aided ANL was predicted by unaided ANL and hearing aid output SNR, under the assumption that the lowest acceptable SNR at the listener's eardrum is a constant across different ANL test conditions. Study results revealed that, on average, WDRC increased (worsened) ANL by 1.5 dB, while DNR and DIR decreased (improved) ANL by 1.1 and 2.8 dB, respectively. Because the effects of WDRC and DNR on ANL were opposite in direction but similar in magnitude, the ANL of linear/DNR-off was not significantly different from that of WDRC/DNR-on. The results further indicated that the pattern of ANL change across different aided conditions was consistent with the pattern of hearing aid output SNR change created by processing schemes. Compared with linear processing, WDRC creates a noisier sound image and makes listeners less willing to accept noise. However, this negative effect on noise acceptance can be offset by DNR, regardless of microphone mode

  12. Assessment Schemes for Sustainability Design through BIM: Lessons Learnt

    Directory of Open Access Journals (Sweden)

    Kamaruzzaman Syahrul Nizam

    2016-01-01

    Full Text Available There is increasing demand on sustainability-led design to reduce negative impacts brought by construction development. The capability of Building Information Modeling (BIM to achieve sustainability is widely acknowledged. Various sustainability analysis and calculation can be performed at early stages to help the designers in decision making. However, the level of implementation is still not popular in the construction industry. Many of the industry players are still rely on traditional 2D method for designing and analysis. Hence, this study aims to demonstrate a proof concept of using BIM for sustainability design. The first phase of this study conducted a critical review of existing assessment schemes: BREEAM, LEED, SBTool, CASBEE, BEAM Plus, Green Star, Green Mark and GBI, to develop a set of main criteria to be considered for sustainability design. The findings revealed that fourteen criteria are considered, which are management, sustainable site, transport, indoor environmental quality, energy, waste, water, material, pollution, innovation, economics, social, culture and quality of services. It was found that most of the existing schemes emphasized on environmental aspect as compared to economics, social and culture except SBTool. The next phase of this study will conduct a case study to demonstrate sustainability design through BIM by using the criteria developed from the first phase.

  13. Management and construction of a major zero discharge water supply and treatment scheme at Mount Piper Power Station, Australia

    Energy Technology Data Exchange (ETDEWEB)

    Wong, P.; Docker, P.; Gabbrielli, E.; Wade, P. [Pacific Power, Sydney, NSW (Australia)

    1994-09-01

    Excellence in the organisation and management of a large multi-disciplinary design and construct project such as the zero discharge water supply and treatment scheme for Mount Piper coal-fired power station was essential to its successful execution. This paper discusses the management philosophies and strategies of Pacific Power and Transfield-PWT Asia/Pacific that resulted in this project being completed to the satisfaction of the client in the minimum time without delays and cost increases caused by interfaces between the parties. It highlights the advantages of contract packaging and placing the total responsibility for the performance and integration of a complex project system on one organisation. 2 refs., 6 figs.

  14. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  15. Subtraction with hadronic initial states at NLO: an NNLO-compatible scheme

    Science.gov (United States)

    Somogyi, Gábor

    2009-05-01

    We present an NNLO-compatible subtraction scheme for computing QCD jet cross sections of hadron-initiated processes at NLO accuracy. The scheme is constructed specifically with those complications in mind, that emerge when extending the subtraction algorithm to next-to-next-to-leading order. It is therefore possible to embed the present scheme in a full NNLO computation without any modifications.

  16. Subtraction with hadronic initial states at NLO: an NNLO-compatible scheme

    International Nuclear Information System (INIS)

    Somogyi, Gabor

    2009-01-01

    We present an NNLO-compatible subtraction scheme for computing QCD jet cross sections of hadron-initiated processes at NLO accuracy. The scheme is constructed specifically with those complications in mind, that emerge when extending the subtraction algorithm to next-to-next-to-leading order. It is therefore possible to embed the present scheme in a full NNLO computation without any modifications.

  17. The Newcastle connection: A software subsystem for constructing distributed UNIX systems

    International Nuclear Information System (INIS)

    Randell, B.

    1985-01-01

    The Newcastle connection is a software subsystem that can be added to each of a set of physically interconnected UNIX or UNIX look-alike systems, so as to construct a distributed system which is functionally indistinguishable at both the user and the program level from a conventional single-processor UNIX system. The techniques used are applicable to a variety and multiplicity of both local and wide area networks, and enable all issues of inter-processor communication, network protocols, etc., to be hidden. A brief account is given of experience with such distributed systems, the first of which was constructed in 1982 using a set of PDP11s running UNIX Version 7, and connected by a Cambridge Ring - since this date the Connection has been used to construct distributed systems based on various other computers and versions of UNIX, both at Newcastle and elsewhere. The final sections compare our scheme to various precursor schemes and discuss its potential relevance to other operating systems. (orig.)

  18. A modified symplectic PRK scheme for seismic wave modeling

    Science.gov (United States)

    Liu, Shaolin; Yang, Dinghui; Ma, Jian

    2017-02-01

    A new scheme for the temporal discretization of the seismic wave equation is constructed based on symplectic geometric theory and a modified strategy. The ordinary differential equation in terms of time, which is obtained after spatial discretization via the spectral-element method, is transformed into a Hamiltonian system. A symplectic partitioned Runge-Kutta (PRK) scheme is used to solve the Hamiltonian system. A term related to the multiplication of the spatial discretization operator with the seismic wave velocity vector is added into the symplectic PRK scheme to create a modified symplectic PRK scheme. The symplectic coefficients of the new scheme are determined via Taylor series expansion. The positive coefficients of the scheme indicate that its long-term computational capability is more powerful than that of conventional symplectic schemes. An exhaustive theoretical analysis reveals that the new scheme is highly stable and has low numerical dispersion. The results of three numerical experiments demonstrate the high efficiency of this method for seismic wave modeling.

  19. Energy levels of 56Mn

    DEFF Research Database (Denmark)

    Van Assche, P. H. M.; Baader, H. A.; Koch, H. R.

    1971-01-01

    The low-energy spectrum of the 55Mn(n,γ)56 Mn reaction has been studied with a γ-diffraction spectrometer. These data allowed the construction of a level scheme for 56Mn with two previously unobserved doublets. High-energy γ-transitions to the low-energy states have been measured for different...

  20. Extending Java for High-Level Web Service Construction

    DEFF Research Database (Denmark)

    Christensen, Aske Simon; Møller, Anders; Schwartzbach, Michael Ignatieff

    2003-01-01

    We incorporate innovations from the project into the Java language to provide high-level features for Web service programming. The resulting language, JWIG, contains an advanced session model and a flexible mechanism for dynamic construction of XML documents, in particular XHTML. To support program...

  1. Security of Linear Secret-Sharing Schemes Against Mass Surveillance

    DEFF Research Database (Denmark)

    Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel

    2015-01-01

    by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...... there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion....

  2. Self-adjusting entropy-stable scheme for compressible Euler equations

    International Nuclear Information System (INIS)

    Cheng Xiao-Han; Nie Yu-Feng; Cai Li; Feng Jian-Hu; Luo Xiao-Yu

    2015-01-01

    In this work, a self-adjusting entropy-stable scheme is proposed for solving compressible Euler equations. The entropy-stable scheme is constructed by combining the entropy conservative flux with a suitable diffusion operator. The entropy has to be preserved in smooth solutions and be dissipated at shocks. To achieve this, a switch function, which is based on entropy variables, is employed to make the numerical diffusion term be automatically added around discontinuities. The resulting scheme is still entropy-stable. A number of numerical experiments illustrating the robustness and accuracy of the scheme are presented. From these numerical results, we observe a remarkable gain in accuracy. (paper)

  3. SYNTHESIS OF VISCOELASTIC MATERIAL MODELS (SCHEMES

    Directory of Open Access Journals (Sweden)

    V. Bogomolov

    2014-10-01

    Full Text Available The principles of structural viscoelastic schemes construction for materials with linear viscoelastic properties in accordance with the given experimental data on creep tests are analyzed. It is shown that there can be only four types of materials with linear visco-elastic properties.

  4. Carrots that look like sticks: toward an understanding of multitasking incentive schemes

    NARCIS (Netherlands)

    Al-Ubaydli, O.; Andersen, S.; Gneezy, U.; List, J.A.

    2015-01-01

    Constructing compensation schemes for effort in multidimensional tasks is complex, particularly when some dimensions are not easily observable. When incentive schemes contractually reward workers for easily observed measures, such as quantity produced, the standard model predicts that unrewarded

  5. Hilbert schemes of points and infinite dimensional Lie algebras

    CERN Document Server

    Qin, Zhenbo

    2018-01-01

    Hilbert schemes, which parametrize subschemes in algebraic varieties, have been extensively studied in algebraic geometry for the last 50 years. The most interesting class of Hilbert schemes are schemes X^{[n]} of collections of n points (zero-dimensional subschemes) in a smooth algebraic surface X. Schemes X^{[n]} turn out to be closely related to many areas of mathematics, such as algebraic combinatorics, integrable systems, representation theory, and mathematical physics, among others. This book surveys recent developments of the theory of Hilbert schemes of points on complex surfaces and its interplay with infinite dimensional Lie algebras. It starts with the basics of Hilbert schemes of points and presents in detail an example of Hilbert schemes of points on the projective plane. Then the author turns to the study of cohomology of X^{[n]}, including the construction of the action of infinite dimensional Lie algebras on this cohomology, the ring structure of cohomology, equivariant cohomology of X^{[n]} a...

  6. Economic sustainability, water security and multi-level governance of local water schemes in Nepal

    Directory of Open Access Journals (Sweden)

    Emma Hakala

    2017-07-01

    Full Text Available This article explores the role of multi-level governance and power structures in local water security through a case study of the Nawalparasi district in Nepal. It focuses on economic sustainability as a measure to address water security, placing this thematic in the context of a complicated power structure consisting of local, district and national administration as well as external development cooperation actors. The study aims to find out whether efforts to improve the economic sustainability of water schemes have contributed to water security at the local level. In addition, it will consider the interactions between water security, power structures and local equality and justice. The research builds upon survey data from the Nepalese districts of Nawalparasi and Palpa, and a case study based on interviews and observation in Nawalparasi. The survey was performed in water schemes built within a Finnish development cooperation programme spanning from 1990 to 2004, allowing a consideration of the long-term sustainability of water management projects. This adds a crucial external influence into the intra-state power structures shaping water management in Nepal. The article thus provides an alternative perspective to cross-regional water security through a discussion combining transnational involvement with national and local points of view.

  7. Advanced Entry Adult Apprenticeship Training Scheme: A Case Study

    Science.gov (United States)

    Sparks, Alan; Ingram, Hadyn; Phillips, Sunny

    2009-01-01

    Purpose: The purpose of this paper is to evaluate an innovative way to train adult apprentices for the construction industry. Design/methodology/approach: The paper emphasizes that, in order to address skills shortages for international construction, training methods must be improved. It looks at the example of an adult apprenticeship scheme in…

  8. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  9. A fully distributed geo-routing scheme for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2013-12-01

    When marrying randomized distributed space-time coding (RDSTC) to beaconless geo-routing, new performance horizons can be created. In order to reach those horizons, however, beaconless geo-routing protocols must evolve to operate in a fully distributed fashion. In this letter, we expose a technique to construct a fully distributed geo-routing scheme in conjunction with RDSTC. We then demonstrate the performance gains of this novel scheme by comparing it to one of the prominent classical schemes. © 2013 IEEE.

  10. A fully distributed geo-routing scheme for wireless sensor networks

    KAUST Repository

    Bader, Ahmed; Abed-Meraim, Karim; Alouini, Mohamed-Slim

    2013-01-01

    When marrying randomized distributed space-time coding (RDSTC) to beaconless geo-routing, new performance horizons can be created. In order to reach those horizons, however, beaconless geo-routing protocols must evolve to operate in a fully distributed fashion. In this letter, we expose a technique to construct a fully distributed geo-routing scheme in conjunction with RDSTC. We then demonstrate the performance gains of this novel scheme by comparing it to one of the prominent classical schemes. © 2013 IEEE.

  11. SUBSURFACE CONSTRUCTION AND DEVELOPMENT ANALYSIS

    International Nuclear Information System (INIS)

    N.E. Kramer

    1998-01-01

    The purpose of this analysis is to identify appropriate construction methods and develop a feasible approach for construction and development of the repository subsurface facilities. The objective of this analysis is to support development of the subsurface repository layout for License Application (LA) design. The scope of the analysis for construction and development of the subsurface Repository facilities covers: (1) Excavation methods, including application of knowledge gained from construction of the Exploratory Studies Facility (ESF). (2) Muck removal from excavation headings to the surface. This task will examine ways of preventing interference with other subsurface construction activities. (3) The logistics and equipment for the construction and development rail haulage systems. (4) Impact of ground support installation on excavation and other construction activities. (5) Examination of how drift mapping will be accomplished. (6) Men and materials handling. (7) Installation and removal of construction utilities and ventilation systems. (8) Equipping and finishing of the emplacement drift mains and access ramps to fulfill waste emplacement operational needs. (9) Emplacement drift and access mains and ramps commissioning prior to handover for emplacement operations. (10) Examination of ways to structure the contracts for construction of the repository. (11) Discussion of different construction schemes and how to minimize the schedule risks implicit in those schemes. (12) Surface facilities needed for subsurface construction activities

  12. Design of Rate-Compatible Parallel Concatenated Punctured Polar Codes for IR-HARQ Transmission Schemes

    Directory of Open Access Journals (Sweden)

    Jian Jiao

    2017-11-01

    Full Text Available In this paper, we propose a rate-compatible (RC parallel concatenated punctured polar (PCPP codes for incremental redundancy hybrid automatic repeat request (IR-HARQ transmission schemes, which can transmit multiple data blocks over a time-varying channel. The PCPP coding scheme can provide RC polar coding blocks in order to adapt to channel variations. First, we investigate an improved random puncturing (IRP pattern for the PCPP coding scheme due to the code-rate and block length limitations of conventional polar codes. The proposed IRP algorithm only select puncturing bits from the frozen bits set and keep the information bits unchanged during puncturing, which can improve 0.2–1 dB decoding performance more than the existing random puncturing (RP algorithm. Then, we develop a RC IR-HARQ transmission scheme based on PCPP codes. By analyzing the overhead of the previous successful decoded PCPP coding block in our IR-HARQ scheme, the optimal initial code-rate can be determined for each new PCPP coding block over time-varying channels. Simulation results show that the average number of transmissions is about 1.8 times for each PCPP coding block in our RC IR-HARQ scheme with a 2-level PCPP encoding construction, which can reduce half of the average number of transmissions than the existing RC polar coding schemes.

  13. Theoretical Framework and Model Design for Beautiful Countryside Construction in China

    Directory of Open Access Journals (Sweden)

    ZHENG Xiang-qun

    2015-04-01

    Full Text Available In the context of China today, the process of beautiful countryside construction mainly imitates the patterns of‘urbanization’construction. However, this approach leads to the loss of countryside characteristics and the separation of agricultural culture. Therefore, it's urgent to carry out research of the theoretical framework and model design for beautiful countryside construction. In this paper, based on the analysis of the beautiful countryside construction connotation, the basic theory of beautiful countryside construction was summarized in three aspects: rural complex ecosystem model, multi-functionality of rural model and sustainable development evaluation model. The basic idea of the beautiful countryside construction mode was studied. The design method of beautiful countryside construction mode was proposed in three levels: planning, scheming and evaluating. The research results might offer scientific reference for improving the scientific and operational nature of beautiful countryside construction.

  14. Exact renormalization group as a scheme for calculations

    International Nuclear Information System (INIS)

    Mack, G.

    1985-10-01

    In this lecture I report on recent work to use exact renormalization group methods to construct a scheme for calculations in quantum field theory and classical statistical mechanics on the continuum. (orig./HSI)

  15. An efficient and provable secure revocable identity-based encryption scheme.

    Directory of Open Access Journals (Sweden)

    Changji Wang

    Full Text Available Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.

  16. Constructing space difference schemes which satisfy a cell entropy inequality

    Science.gov (United States)

    Merriam, Marshal L.

    1989-01-01

    A numerical methodology for solving convection problems is presented, using finite difference schemes which satisfy the second law of thermodynamics on a cell-by-cell basis in addition to the usual conservation laws. It is shown that satisfaction of a cell entropy inequality is sufficient, in some cases, to guarantee nonlinear stability. Some details are given for several one-dimensional problems, including the quasi-one-dimensional Euler equations applied to flow in a nozzle.

  17. A New Proxy Electronic Voting Scheme Achieved by Six-Particle Entangled States

    Science.gov (United States)

    Cao, Hai-Jing; Ding, Li-Yuan; Jiang, Xiu-Li; Li, Peng-Fei

    2018-03-01

    In this paper, we use quantum proxy signature to construct a new secret electronic voting scheme. In our scheme, six particles entangled states function as quantum channels. The voter Alice, the Vote Management Center Bob, the scrutineer Charlie only perform two particles measurements on the Bell bases to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. We use quantum key distribution and one-time pad to guarantee its unconditional security. The significant advantage of our scheme is that transmitted information capacity is twice as much as the capacity of other schemes.

  18. Propagation of frequency-chirped laser pulses in a medium of atoms with a Λ-level scheme

    International Nuclear Information System (INIS)

    Demeter, G.; Dzsotjan, D.; Djotyan, G. P.

    2007-01-01

    We study the propagation of frequency-chirped laser pulses in optically thick media. We consider a medium of atoms with a Λ level-scheme (Lambda atoms) and also, for comparison, a medium of two-level atoms. Frequency-chirped laser pulses that induce adiabatic population transfer between the atomic levels are considered. They induce transitions between the two lower (metastable) levels of the Λ-atoms and between the ground and excited states of the two-level atoms. We show that associated with this adiabatic population transfer in Λ-atoms, there is a regime of enhanced transparency of the medium--the pulses are distorted much less than in the medium of two-level atoms and retain their ability to transfer the atomic population much longer during propagation

  19. Bi-level image compression with tree coding

    DEFF Research Database (Denmark)

    Martins, Bo; Forchhammer, Søren

    1996-01-01

    Presently, tree coders are the best bi-level image coders. The current ISO standard, JBIG, is a good example. By organising code length calculations properly a vast number of possible models (trees) can be investigated within reasonable time prior to generating code. Three general-purpose coders...... are constructed by this principle. A multi-pass free tree coding scheme produces superior compression results for all test images. A multi-pass fast free template coding scheme produces much better results than JBIG for difficult images, such as halftonings. Rissanen's algorithm `Context' is presented in a new...

  20. A Key Pre-Distribution Scheme Based on µ-PBIBD for Enhancing Resilience in Wireless Sensor Networks.

    Science.gov (United States)

    Yuan, Qi; Ma, Chunguang; Yu, Haitao; Bian, Xuefen

    2018-05-12

    Many key pre-distribution (KPD) schemes based on combinatorial design were proposed for secure communication of wireless sensor networks (WSNs). Due to complexity of constructing the combinatorial design, it is infeasible to generate key rings using the corresponding combinatorial design in large scale deployment of WSNs. In this paper, we present a definition of new combinatorial design, termed “µ-partially balanced incomplete block design (µ-PBIBD)”, which is a refinement of partially balanced incomplete block design (PBIBD), and then describe a 2-D construction of µ-PBIBD which is mapped to KPD in WSNs. Our approach is of simple construction which provides a strong key connectivity and a poor network resilience. To improve the network resilience of KPD based on 2-D µ-PBIBD, we propose a KPD scheme based on 3-D Ex-µ-PBIBD which is a construction of µ-PBIBD from 2-D space to 3-D space. Ex-µ-PBIBD KPD scheme improves network scalability and resilience while has better key connectivity. Theoretical analysis and comparison with the related schemes show that key pre-distribution scheme based on Ex-µ-PBIBD provides high network resilience and better key scalability, while it achieves a trade-off between network resilience and network connectivity.

  1. Visual privacy by context: proposal and evaluation of a level-based visualisation scheme.

    Science.gov (United States)

    Padilla-López, José Ramón; Chaaraoui, Alexandros Andre; Gu, Feng; Flórez-Revuelta, Francisco

    2015-06-04

    Privacy in image and video data has become an important subject since cameras are being installed in an increasing number of public and private spaces. Specifically, in assisted living, intelligent monitoring based on computer vision can allow one to provide risk detection and support services that increase people's autonomy at home. In the present work, a level-based visualisation scheme is proposed to provide visual privacy when human intervention is necessary, such as at telerehabilitation and safety assessment applications. Visualisation levels are dynamically selected based on the previously modelled context. In this way, different levels of protection can be provided, maintaining the necessary intelligibility required for the applications. Furthermore, a case study of a living room, where a top-view camera is installed, is presented. Finally, the performed survey-based evaluation indicates the degree of protection provided by the different visualisation models, as well as the personal privacy preferences and valuations of the users.

  2. A Prediction Packetizing Scheme for Reducing Channel Traffic in Transaction-Level Hardware/Software Co-Emulation

    OpenAIRE

    Lee , Jae-Gon; Chung , Moo-Kyoung; Ahn , Ki-Yong; Lee , Sang-Heon; Kyung , Chong-Min

    2005-01-01

    Submitted on behalf of EDAA (http://www.edaa.com/); International audience; This paper presents a scheme for efficient channel usage between simulator and accelerator where the accelerator models some RTL sub-blocks in the accelerator-based hardware/software co-simulation while the simulator runs transaction-level model of the remaining part of the whole chip being verified. With conventional simulation accelerator, evaluations of simulator and accelerator alternate at every valid simulation ...

  3. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  4. Conceptual scheme of a hybrid mesocatalytic fusion reactor

    International Nuclear Information System (INIS)

    Petrov, Yu.V.

    1988-01-01

    To test the practical realization of the mesocatalytic method for energy production a preliminary engineering analysis and calculation of the separate units of the conceptual scheme of the hybrid mesocatalytic reactor was made. The construction and efficiency of the most characteristic separate blocks of the conceptual scheme for muon-catalyzed fusion are examined. The muon catalysis cycle in a dt mixture was assessed. The kinetics and energetics of muon production through a pion-forming target and a converter were evaluated. Concomitant questions, particularly the removal of helium from hydrogen, are discussed. Fusion chamber requirements were calculated and problems of heat removal were assessed. Blanket construction and efficiency were examined. The efficiency of different methods for power generation were comparatively reviewed including hybrid thermonuclear, electronuclear nuclear, and hybrid mesocatalytic methods. Energy balances and economic restrictions were examined

  5. Construction of Tai Lam tunnel under a Build, Operate and Transfer (BOT) scheme in Hong Kong; BOT hoshiki ni yoru Hong Kong root 3 (Tai Lam tunnel) kensetsu koji

    Energy Technology Data Exchange (ETDEWEB)

    Hayashi, K.; Endo, S. [Nishimatsu Construction Co. Ltd., Tokyo (Japan)

    1998-01-01

    Hongkong Route 3 construction under the BOT scheme (covering the basic plan, design, and construction, and the management of the completed tunnel as a private, toll facility) is described. The new route aims at dealing with aggravating traffic conditions as part of the major highway network joining Hongkong and Guanzhou, China proper. It is a dual three lane system, consisting of a 3.7km-long road tunnel, a 1.5km-long southern approach, and a 6.3km-long northern approach. Geologically speaking, the tunnel section as a whole is on a relatively hard and stable basement made of fine-grain granite and granitic diorite. Also introduced in this report are the project-executing organization and the flow of tendering under the BOT scheme. Since the shortening of the construction time is quite important in the 30-year BOT franchise period, rapid boring technologies were introduced into tunnel excavation. The 5.6m long-hole blasting enabled a maximum monthly progress of 460m. For the assurance of high boring accuracy and cycle time reduction, a fully automatic boring machine was adopted for speedy positioning and marking. An emulsion-type explosive was used, which can be pump-fed under pressure, for shortening the charging time. 5 figs.

  6. WENO schemes for balance laws with spatially varying flux

    International Nuclear Information System (INIS)

    Vukovic, Senka; Crnjaric-Zic, Nelida; Sopta, Luka

    2004-01-01

    In this paper we construct numerical schemes of high order of accuracy for hyperbolic balance law systems with spatially variable flux function and a source term of the geometrical type. We start with the original finite difference characteristicwise weighted essentially nonoscillatory (WENO) schemes and then we create new schemes by modifying the flux formulations (locally Lax-Friedrichs and Roe with entropy fix) in order to account for the spatially variable flux, and by decomposing the source term in order to obtain balance between numerical approximations of the flux gradient and of the source term. We apply so extended WENO schemes to the one-dimensional open channel flow equations and to the one-dimensional elastic wave equations. In particular, we prove that in these applications the new schemes are exactly consistent with steady-state solutions from an appropriately chosen subset. Experimentally obtained orders of accuracy of the extended and original WENO schemes are almost identical on a convergence test. Other presented test problems illustrate the improvement of the proposed schemes relative to the original WENO schemes combined with the pointwise source term evaluation. As expected, the increase in the formal order of accuracy of applied WENO reconstructions in all the tests causes visible increase in the high resolution properties of the schemes

  7. Hilbert schemes of points and Heisenberg algebras

    International Nuclear Information System (INIS)

    Ellingsrud, G.; Goettsche, L.

    2000-01-01

    Let X [n] be the Hilbert scheme of n points on a smooth projective surface X over the complex numbers. In these lectures we describe the action of the Heisenberg algebra on the direct sum of the cohomologies of all the X [n] , which has been constructed by Nakajima. In the second half of the lectures we study the relation of the Heisenberg algebra action and the ring structures of the cohomologies of the X [n] , following recent work of Lehn. In particular we study the Chern and Segre classes of tautological vector bundles on the Hilbert schemes X [n] . (author)

  8. Building fast well-balanced two-stage numerical schemes for a model of two-phase flows

    Science.gov (United States)

    Thanh, Mai Duc

    2014-06-01

    We present a set of well-balanced two-stage schemes for an isentropic model of two-phase flows arisen from the modeling of deflagration-to-detonation transition in granular materials. The first stage is to absorb the source term in nonconservative form into equilibria. Then in the second stage, these equilibria will be composed into a numerical flux formed by using a convex combination of the numerical flux of a stable Lax-Friedrichs-type scheme and the one of a higher-order Richtmyer-type scheme. Numerical schemes constructed in such a way are expected to get the interesting property: they are fast and stable. Tests show that the method works out until the parameter takes on the value CFL, and so any value of the parameter between zero and this value is expected to work as well. All the schemes in this family are shown to capture stationary waves and preserves the positivity of the volume fractions. The special values of the parameter 0,1/2,1/(1+CFL), and CFL in this family define the Lax-Friedrichs-type, FAST1, FAST2, and FAST3 schemes, respectively. These schemes are shown to give a desirable accuracy. The errors and the CPU time of these schemes and the Roe-type scheme are calculated and compared. The constructed schemes are shown to be well-balanced and faster than the Roe-type scheme.

  9. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  10. A cancelable biometric scheme based on multi-lead ECGs.

    Science.gov (United States)

    Peng-Tzu Chen; Shun-Chi Wu; Jui-Hsuan Hsieh

    2017-07-01

    Biometric technologies offer great advantages over other recognition methods, but there are concerns that they may compromise the privacy of individuals. In this paper, an electrocardiogram (ECG)-based cancelable biometric scheme is proposed to relieve such concerns. In this scheme, distinct biometric templates for a given beat bundle are constructed via "subspace collapsing." To determine the identity of any unknown beat bundle, the multiple signal classification (MUSIC) algorithm, incorporating a "suppression and poll" strategy, is adopted. Unlike the existing cancelable biometric schemes, knowledge of the distortion transform is not required for recognition. Experiments with real ECGs from 285 subjects are presented to illustrate the efficacy of the proposed scheme. The best recognition rate of 97.58 % was achieved under the test condition N train = 10 and N test = 10.

  11. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  12. Pixel detector readout electronics with two-level discriminator scheme

    International Nuclear Information System (INIS)

    Pengg, F.

    1998-01-01

    In preparation for a silicon pixel detector with more than 3,000 readout channels per chip for operation at the future large hadron collider (LHC) at CERN the analog front end of the readout electronics has been designed and measured on several test-arrays with 16 by 4 cells. They are implemented in the HP 0.8 microm process but compatible with the design rules of the radiation hard Honeywell 0.8 microm bulk process. Each cell contains bump bonding pad, preamplifier, discriminator and control logic for masking and testing within a layout area of only 50 microm by 140 microm. A new two-level discriminator scheme has been implemented to cope with the problems of time-walk and interpixel cross-coupling. The measured gain of the preamplifier is 900 mV for a minimum ionizing particle (MIP, about 24,000 e - for a 300 microm thick Si-detector) with a return to baseline within 750 ns for a 1 MIP input signal. The full readout chain (without detector) shows an equivalent noise charge to 60e - r.m.s. The time-walk, a function of the separation between the two threshold levels, is measured to be 22 ns at a separation of 1,500 e - , which is adequate for the 40 MHz beam-crossing frequency at the LHC. The interpixel cross-coupling, measured with a 40fF coupling capacitance, is less than 3%. A single cell consumes 35 microW at 3.5 V supply voltage

  13. Study on construction technology of metro tunnel under a glass curtain wall

    Science.gov (United States)

    Zhang, Jian; Yu, Deqiang

    2018-03-01

    To ensure the safety of the glass curtain wall building above loess tunnel and get an optimal scheme, an elastic-plastic FEM model is established to simulate three reinforcement schemes based on a tunnel section in Xi’an Metro Line 3. The results show that the settlement value of the optimal scheme is reduced by 69.89% compared with the drainage measures, and the uneven settlement value is reduced by 57.5%. The construction points, technical processes and technical indexes of the optimal scheme are introduced. According to the actual project, the cumulative settlement of the building under construction is 16mm, which meets the control standards. According to the actual project, the cumulative settlement of the glass curtain wall building is 16mm, which meets the control standards. The reinforcement scheme can provide some reference for the design and construction of the metro in loess area.

  14. A discontinous Galerkin finite element method with an efficient time integration scheme for accurate simulations

    KAUST Repository

    Liu, Meilin; Bagci, Hakan

    2011-01-01

    A discontinuous Galerkin finite element method (DG-FEM) with a highly-accurate time integration scheme is presented. The scheme achieves its high accuracy using numerically constructed predictor-corrector integration coefficients. Numerical results

  15. Student Teachers’ Proof Schemes on Proof Tasks Involving Inequality: Deductive or Inductive?

    Science.gov (United States)

    Rosyidi, A. H.; Kohar, A. W.

    2018-01-01

    Exploring student teachers’ proof ability is crucial as it is important for improving the quality of their learning process and help their future students learn how to construct a proof. Hence, this study aims at exploring at the proof schemes of student teachers in the beginning of their studies. Data were collected from 130 proofs resulted by 65 Indonesian student teachers on two proof tasks involving algebraic inequality. To analyse, the proofs were classified into the refined proof schemes level proposed by Lee (2016) ranging from inductive, which only provides irrelevant inferences, to deductive proofs, which consider addressing formal representation. Findings present several examples of each of Lee’s level on the student teachers’ proofs spanning from irrelevant inferences, novice use of examples or logical reasoning, strategic use examples for reasoning, deductive inferences with major and minor logical coherence, and deductive proof with informal and formal representation. Besides, it was also found that more than half of the students’ proofs coded as inductive schemes, which does not meet the requirement for doing the proof for the proof tasks examined in this study. This study suggests teacher educators in teacher colleges to reform the curriculum regarding proof learning which can accommodate the improvement of student teachers’ proving ability from inductive to deductive proof as well from informal to formal proof.

  16. A novel two-level dynamic parallel data scheme for large 3-D SN calculations

    International Nuclear Information System (INIS)

    Sjoden, G.E.; Shedlock, D.; Haghighat, A.; Yi, C.

    2005-01-01

    We introduce a new dynamic parallel memory optimization scheme for executing large scale 3-D discrete ordinates (Sn) simulations on distributed memory parallel computers. In order for parallel transport codes to be truly scalable, they must use parallel data storage, where only the variables that are locally computed are locally stored. Even with parallel data storage for the angular variables, cumulative storage requirements for large discrete ordinates calculations can be prohibitive. To address this problem, Memory Tuning has been implemented into the PENTRAN 3-D parallel discrete ordinates code as an optimized, two-level ('large' array, 'small' array) parallel data storage scheme. Memory Tuning can be described as the process of parallel data memory optimization. Memory Tuning dynamically minimizes the amount of required parallel data in allocated memory on each processor using a statistical sampling algorithm. This algorithm is based on the integral average and standard deviation of the number of fine meshes contained in each coarse mesh in the global problem. Because PENTRAN only stores the locally computed problem phase space, optimal two-level memory assignments can be unique on each node, depending upon the parallel decomposition used (hybrid combinations of angular, energy, or spatial). As demonstrated in the two large discrete ordinates models presented (a storage cask and an OECD MOX Benchmark), Memory Tuning can save a substantial amount of memory per parallel processor, allowing one to accomplish very large scale Sn computations. (authors)

  17. Research on Construction Optimization of Three-Connected-Arch Hydraulic Underground Cavities Considering Creep Property

    Directory of Open Access Journals (Sweden)

    Bao-yun Zhao

    2014-01-01

    Full Text Available In order to prevent the creep of surrounding rock in long-term construction, with consideration of different construction methods and other factors during the construction of large-scale underground cavity, three different construction schemes are designed for specific projects and a nonlinear viscoelastic-plastic creep model which can describe rock accelerated creeping is introduced and applied to construction optimization calculation of the large-scale three-connected-arch hydraulic underground cavity through secondary development of FLAC3D. The results show that the adoption of middle cavity construction method, the second construction method, enables the maximum vault displacement of 16.04 mm. This method results in less stress redistribution and plastic zone expansion to the cavity’s surrounding rock than the other two schemes, which is the safest construction scheme. The conclusion can provide essential reference and guidance to similar engineering for construction optimization.

  18. Non-interactive and Reusable Non-malleable Commitment Schemes

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Groth, Jens

    2003-01-01

    version based on the strong RSA assumption. For UC commitments, we show that existence of a UC commitment scheme in the CRS model (interactive or not) implies key exchange and - for a uniform reference string - even implies oblivious transfer. This indicates that UC commitment is a strictly stronger...... primitive than NM. Finally, we show that our strong RSA based construction can be used to improve the most efficient known UC commitment scheme so it can work with a CRS of size independent of the number of players, without loss of efficiency....

  19. Achieving transparency in carbon labelling for construction materials – Lessons from current assessment standards and carbon labels

    International Nuclear Information System (INIS)

    Wu, Peng; Low, Sui Pheng; Xia, Bo; Zuo, Jian

    2014-01-01

    Highlights: • The evolution of international GHG standards is reviewed. • The evolution of international carbon labelling schemes is reviewed. • The transparency requirements in carbon labelling schemes are revealed. • Key recommendations are provided to improve transparency in carbon labelling. - Abstract: The construction industry is one of the largest sources of carbon emissions. Manufacturing of raw materials, such as cement, steel and aluminium, is energy intensive and has considerable impact on carbon emissions level. Due to the rising recognition of global climate change, the industry is under pressure to reduce carbon emissions. Carbon labelling schemes are therefore developed as meaningful yardsticks to measure and compare carbon emissions. Carbon labelling schemes can help switch consumer-purchasing habits to low-carbon alternatives. However, such switch is dependent on a transparent scheme. The principle of transparency is highlighted in all international greenhouse gas (GHG) standards, including the newly published ISO 14067: Carbon footprint of products – requirements and guidelines for quantification and communication. However, there are few studies which systematically investigate the transparency requirements in carbon labelling schemes. A comparison of five established carbon labelling schemes, namely the Singapore Green Labelling Scheme, the CarbonFree (the U.S.), the CO 2 Measured Label and the Reducing CO 2 Label (UK), the CarbonCounted (Canada), and the Hong Kong Carbon Labelling Scheme is therefore conducted to identify and investigate the transparency requirements. The results suggest that the design of current carbon labels have transparency issues relating but not limited to the use of a single sign to represent the comprehensiveness of the carbon footprint. These transparency issues are partially caused by the flexibility given to select system boundary in the life cycle assessment (LCA) methodology to measure GHG emissions. The

  20. Decoration of mesoporous Co3O4 nanospheres assembled by monocrystal nanodots on g-C3N4 to construct Z-scheme system for improving photocatalytic performance

    Science.gov (United States)

    Wu, Haijun; Li, Chunmei; Che, Huinan; Hu, Hao; Hu, Wei; Liu, Chunbo; Ai, Junzhe; Dong, Hongjun

    2018-05-01

    The Co3O4/g-C3N4 Z-scheme system is constructed by decoration of mesoporous Co3O4 nanospheres assembled by monocrystal nanodots on the surface of g-C3N4, which dramatically improves the photocatalytic activity for degrading tetracycline hydrochloride (TC) compared with single g-C3N4. The microstructure investigations evidence the mesoporous structure and enlarged specific surface area of Co3O4/g-C3N4 Z-scheme system, which implies the increase of surface active sites and adsorption ability for reactant molecules. Moreover, by virtue of analyzing physical and photoelectrochemical properties, it evidences that the decoration effect of mesoporous Co3O4 nanospheres on the surface of g-C3N4 obviously improves the transfer and separation efficiency of charge carriers between two phase interfaces and broadens light harvest range. These important factors are beneficial to enhancing photocatalytic activity of Co3O4/g-C3N4 Z-scheme system. In addition, the photocatalityc reaction mechanism is also revealed in depth.

  1. Lectures on Hilbert schemes of points on surfaces

    CERN Document Server

    Nakajima, Hiraku

    1999-01-01

    This beautifully written book deals with one shining example: the Hilbert schemes of points on algebraic surfaces ... The topics are carefully and tastefully chosen ... The young person will profit from reading this book. --Mathematical Reviews The Hilbert scheme of a surface X describes collections of n (not necessarily distinct) points on X. More precisely, it is the moduli space for 0-dimensional subschemes of X of length n. Recently it was realized that Hilbert schemes originally studied in algebraic geometry are closely related to several branches of mathematics, such as singularities, symplectic geometry, representation theory--even theoretical physics. The discussion in the book reflects this feature of Hilbert schemes. One example of the modern, broader interest in the subject is a construction of the representation of the infinite-dimensional Heisenberg algebra, i.e., Fock space. This representation has been studied extensively in the literature in connection with affine Lie algebras, conformal field...

  2. Electromagnetically induced transparency and retrieval of light pulses in a Λ-type and a V-type level scheme in Pr3+:Y2SiO5

    International Nuclear Information System (INIS)

    Beil, Fabian; Klein, Jens; Halfmann, Thomas; Nikoghosyan, Gor

    2008-01-01

    We examine electromagnetically induced transparency (EIT), the optical preparation of persistent nuclear spin coherences and the retrieval of light pulses both in a Λ-type and a V-type coupling scheme in a Pr 3+ :Y 2 SiO 5 crystal, cooled to cryogenic temperatures. The medium is prepared by optical pumping and spectral hole burning, creating a spectrally isolated Λ-type and a V-type system within the inhomogeneous bandwidth of the 3 H 4 ↔ 1 D 2 transition of the Pr 3+ ions. By EIT, in the Λ-type scheme we drive a nuclear spin coherence between the ground-state hyperfine levels, while in the V-type scheme we drive a coherence between the excited-state hyperfine levels. We observe the cancellation of absorption due to EIT and the retrieval of light pulses in both level schemes. This also permits the determination of dephasing times of the nuclear spin coherence, either in the ground state or the optically excited state

  3. Towards a security model for computational puzzle schemes

    NARCIS (Netherlands)

    Tang, Qiang; Jeckmans, Arjan

    2011-01-01

    In the literature, computational puzzle schemes have been considered as a useful tool for a number of applications, such as constructing timed cryptography, fighting junk emails, and protecting critical infrastructure from denial-of-service attacks. However, there is a lack of a general security

  4. Project Guarantee 1985. Repository for high-level radioactive waste: construction and operation

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    An engineering project study aimed at demonstrating the feasibility of constructing a deep repository for high-level waste (Type C repository) has been carried out; the study is based on a model data-set representing typical geological and rock mechanical conditions as found outside the so-called Permocarboniferous basin in the regions under investigation by Nagra in Cantons Aargau, Schaffhausen, Solothurn and Zuerich. The repository is intended for disposal of high-level waste and any intermediate-level waste from re-processing in which the concentration of long-lived alpha-emitters exceeds the permissible limits set for a Type B repository. Final disposal of high-level waste is in subterranean, horizontally mined tunnels and of intermediate-level waste in underground vertical silos. The repository is intended to accomodate a total of around 6'000 HWL-cylinders (gross volume of around 1'200 m3) and around 10'000 m3 of intermediate-level waste. The total excavated volume is around 1'100'000 m3 and a construction time for the whole repository (up to the beginning of emplacement) of around 15 years is expected. For the estimated 50-year emplacement operations, a working team of around 60 people will be needed and a team of around 160 for the simultaneous tunnelling operations and auxiliary work. The project described in the present report permits the conclusion that construction of a repository for high-level radioactive waste and, if necessary, spent fuel-rods is feasible with present-day technology

  5. Accurate B-spline-based 3-D interpolation scheme for digital volume correlation

    Science.gov (United States)

    Ren, Maodong; Liang, Jin; Wei, Bin

    2016-12-01

    An accurate and efficient 3-D interpolation scheme, based on sampling theorem and Fourier transform technique, is proposed to reduce the sub-voxel matching error caused by intensity interpolation bias in digital volume correlation. First, the influence factors of the interpolation bias are investigated theoretically using the transfer function of an interpolation filter (henceforth filter) in the Fourier domain. A law that the positional error of a filter can be expressed as a function of fractional position and wave number is found. Then, considering the above factors, an optimized B-spline-based recursive filter, combining B-spline transforms and least squares optimization method, is designed to virtually eliminate the interpolation bias in the process of sub-voxel matching. Besides, given each volumetric image containing different wave number ranges, a Gaussian weighting function is constructed to emphasize or suppress certain of wave number ranges based on the Fourier spectrum analysis. Finally, a novel software is developed and series of validation experiments were carried out to verify the proposed scheme. Experimental results show that the proposed scheme can reduce the interpolation bias to an acceptable level.

  6. Contribution of promoting the green residence assessment scheme to energy saving

    International Nuclear Information System (INIS)

    Huang, Zhiyu; Yuan, Hongping; Shen, Liyin

    2012-01-01

    Green residence development has been one of the important strategies for promoting sustainable urban development. Governments throughout the world have been encouraging property developers to deliver green properties. In line with this development, governments have been implementing various assessment programs to certify green residential buildings with the aim of contributing to sustainable urban development. With reference to the Chinese construction practice, this paper examines the effectiveness of the green residence assessment scheme toward its defined aim through investigating the contents and procedures of the green residence assessment scheme by referring to the practices of Chongqing city in western China. Based on the results of five case studies and five semi-structured interviews, this study reveals the significant contribution from implementing the green residence assessment scheme particularly to energy saving in residential buildings. Further, the green residence assessment scheme promotes the application of green building materials and green construction technologies in the entire process of delivering and operating residential buildings. The findings provide valuable references for further investigating alternative methods to achieve better energy saving in developing residential buildings. - Highlights: ► Energy saving in residence development is important for sustainable urban development. ► Green residence assessment scheme contributes significantly to energy saving in residences. ► Green residence assessment promotes application of environmentally friendly building materials and technologies

  7. The behaviour of the lande factor and effective exchange parameter in a group of Pr intermetallics observed through reduced level scheme models

    International Nuclear Information System (INIS)

    Ranke, P.J. von; Caldas, A.; Palermo, L.

    1993-01-01

    The present work constitutes a portion of a continuing series of studies dealing with models, in which we retain only the two lowest levels of the crystal field splitting scheme of rare-earth ion in rare-earth intermetallics. In these reduced level scheme models, the crystal field and the magnetic Hamiltonians are represented in matrix notation. These two matrices constitute the model Hamiltonian proposed in this paper, from which we derive the magnetic state equations of interest for this work. Putting into these equations a group of adequate experimental data found in the literature for a particular rare-earth intermetallic we obtain the Lande factor and effective exchange parameter related to this rare-earth intermetallic. This study will be applied to a group of Pr intermetallics, in cubic symmetry, in which the ground level may be a non-magnetic singlet level or a non-magnetic doublet level. In both cases, the first excited level is a triplet one. (orig.)

  8. Constructing Hotelling's T 2 control limits for different α levels of ...

    African Journals Online (AJOL)

    When the quality of a product is controlled by combinations of two or more variables, a high level decision qui-ckly determines the out of control signals, while simultaneously, evaluating the variable(s) responsible for the false alarm rate (α) levels of significance. In this connection, bootstrap algorithm for constructing ...

  9. Time-division-multiplex control scheme for voltage multiplier rectifiers

    Directory of Open Access Journals (Sweden)

    Bin-Han Liu

    2017-03-01

    Full Text Available A voltage multiplier rectifier with a novel time-division-multiplexing (TDM control scheme for high step-up converters is proposed in this study. In the proposed TDM control scheme, two full-wave voltage doubler rectifiers can be combined to realise a voltage quadrupler rectifier. The proposed voltage quadrupler rectifier can reduce transformer turn ratio and transformer size for high step-up converters and also reduce voltage stress for the output capacitors and rectifier diodes. An N-times voltage rectifier can be straightforwardly produced by extending the concepts from the proposed TDM control scheme. A phase-shift full-bridge (PSFB converter is adopted in the primary side of the proposed voltage quadrupler rectifier to construct a PSFB quadrupler converter. Experimental results for the PSFB quadrupler converter demonstrate the performance of the proposed TDM control scheme for voltage quadrupler rectifiers. An 8-times voltage rectifier is simulated to determine the validity of extending the proposed TDM control scheme to realise an N-times voltage rectifier. Experimental and simulation results show that the proposed TDM control scheme has great potential to be used in high step-up converters.

  10. Joint efforts to harmonize sound insulation descriptors and classification schemes in Europe (COST TU0901)

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2010-01-01

    Sound insulation descriptors, regulatory requirements and classification schemes in Europe represent a high degree of diversity. One implication is very little exchange of experience of housing design and construction details for different levels of sound insulation; another is trade barriers...... for building systems and products. Unfortunately, there is evidence for a development in the "wrong" direction. For example, sound classification schemes for dwellings exist in nine countries. There is no sign on increasing harmonization, rather the contrary, as more countries are preparing proposals with new......, new housing must meet the needs of the people and offer comfort. Also for existing housing, sound insulation aspects should be taken into account, when renovating housing; otherwise the renovation is not “sustainable”. A joint European Action, COST TU0901 "Integrating and Harmonizing Sound Insulation...

  11. Power Grid Construction Project Portfolio Optimization Based on Bi-level programming model

    Science.gov (United States)

    Zhao, Erdong; Li, Shangqi

    2017-08-01

    As the main body of power grid operation, county-level power supply enterprises undertake an important emission to guarantee the security of power grid operation and safeguard social power using order. The optimization of grid construction projects has been a key issue of power supply capacity and service level of grid enterprises. According to the actual situation of power grid construction project optimization of county-level power enterprises, on the basis of qualitative analysis of the projects, this paper builds a Bi-level programming model based on quantitative analysis. The upper layer of the model is the target restriction of the optimal portfolio; the lower layer of the model is enterprises’ financial restrictions on the size of the enterprise project portfolio. Finally, using a real example to illustrate operation proceeding and the optimization result of the model. Through qualitative analysis and quantitative analysis, the bi-level programming model improves the accuracy and normative standardization of power grid enterprises projects.

  12. Numerical viscosity of entropy stable schemes for systems of conservation laws. Final Report

    International Nuclear Information System (INIS)

    Tadmor, E.

    1985-11-01

    Discrete approximations to hyperbolic systems of conservation laws are studied. The amount of numerical viscosity present in such schemes is quantified and related to their entropy stability by means of comparison. To this end conservative schemes which are also entropy conservative are constructed. These entropy conservative schemes enjoy second-order accuracy; moreover, they admit a particular interpretation within the finite-element frameworks, and hence can be formulated on various mesh configurations. It is then shown that conservative schemes are entropy stable if and only if they contain more viscosity than the mentioned above entropy conservative ones

  13. Initial investment to 3D printing technologies in a construction company

    OpenAIRE

    Cernohorsky, Zdenek; Matejka, Petr

    2017-01-01

    This article deals with an initial investment to 3D printing technologies in a construction company. The investment refers to the use of building information models and their integration with 3D printing technology within a construction company. In the first part, there will be discussed an introduction of 3D printing scheme in a construction company from a lifecycle perspective in general. As a part of this scheme, the ideal variant of an initial investment will be considered a.k.a a pilot p...

  14. Successful application and research of modularized scheme of containment liner of CPR1000+ reactor building

    International Nuclear Information System (INIS)

    Lu Qinwu; Zhang Shuxia; Guo Junying

    2012-01-01

    Research of modularized scheme in design, special grid structure spreader, crane, and successful applied in Yangjiang NPP project 3 will instruct and promote modularized construction of containment liner in construction projects. (authors)

  15. Global and local level density models

    International Nuclear Information System (INIS)

    Koning, A.J.; Hilaire, S.; Goriely, S.

    2008-01-01

    Four different level density models, three phenomenological and one microscopic, are consistently parameterized using the same set of experimental observables. For each of the phenomenological models, the Constant Temperature Model, the Back-shifted Fermi gas Model and the Generalized Superfluid Model, a version without and with explicit collective enhancement is considered. Moreover, a recently published microscopic combinatorial model is compared with the phenomenological approaches and with the same set of experimental data. For each nuclide for which sufficient experimental data exists, a local level density parameterization is constructed for each model. Next, these local models have helped to construct global level density prescriptions, to be used for cases for which no experimental data exists. Altogether, this yields a collection of level density formulae and parameters that can be used with confidence in nuclear model calculations. To demonstrate this, a large-scale validation with experimental discrete level schemes and experimental cross sections and neutron emission spectra for various different reaction channels has been performed

  16. National Rural Employment Guarantee Scheme, poverty and prices in rural India.

    Science.gov (United States)

    Gaiha, Raghav; Kulkarni, Vani S; Pandey, Manoj K; Imai, Katsushi S

    2010-01-01

    The objective of this analysis is mainly to construct an intuitive measure of the performance of the National Rural Employment Guarantee Scheme (NREGS) in India. The focus is on divergence between demand and supply at the district level. Some related issues addressed are: (i) whether the gap between demand and supply responds to poverty; and (ii) whether recent hikes in NREGS wages are inflationary. Our analysis confirms responsiveness of the positive gap between demand and supply to poverty. Also, apprehensions expressed about the inflationary potential of recent hikes in NREGS wages have been confirmed. More importantly, higher NREGS wages are likely to undermine self-selection of the poor in it.

  17. Level structures in odd-odd deformed nucleus {sup 184}Ta

    Energy Technology Data Exchange (ETDEWEB)

    Gowrishankar, R.; Sood, P.C. [Sri Sathya Sai Institute of Higher Learning, Department of Physics, Prasanthinilayam (India)

    2016-02-15

    A detailed low-energy level scheme of the odd-odd n-rich nucleus {sub 73}{sup 184}Ta{sub 111} is constructed using the well tested Two-Quasiparticle Rotor Model (TQRM) for calculating the bandhead energies of physically admissible 2qp configurations with the inclusion of residual n-p interaction contribution. The presently available data on this level scheme from {sup 184}Hf decay are shown to be in agreement with these calculations. Our analysis concludes that {sup 184}Hf (Q{sub β} = 1340(30) keV) decay admits of 7 additional (to the 3 presently reported) β -branches to {sup 184}Ta with J = 0 or 1 and 8 more physically admissible weak (1f{sup u}) β -branches populating J{sup π} = 2{sup -} levels in {sup 184}Ta. Further, a close examination of our level scheme clearly indicates the existence of a low-lying (E{sub x} = 260(40) keV) high-spin (J{sup π} = 10{sup -}) long-lived isomer in this nucleus. (orig.)

  18. IMPROVED ENTROPY-ULTRA-BEE SCHEME FOR THE EULER SYSTEM OF GAS DYNAMICS

    Institute of Scientific and Technical Information of China (English)

    Rongsan Chen; Dekang Mao

    2017-01-01

    The Entropy-Ultra-Bee scheme was developed for the linear advection equation and extended to the Euler system of gas dynamics in [13].It was expected that the technology be applied only to the second characteristic field of the system and the computation in the other two nonlinear fields be implemented by the Godunov scheme.However,the numerical experiments in [13] showed that the scheme,though having improved the wave resolution in the second field,produced numerical oscillations in the other two nonlinear fields.Sophisticated entropy increaser was designed to suppress the spurious oscillations by increasing the entropy when there are waves in the two nonlinear fields presented.However,the scheme is then not efficient neither robust with problem-related parameters.The purpose of this paper is to fix this problem.To this end,we first study a 3 × 3 linear system and apply the technology precisely to its second characteristic field while maintaining the computation in the other two fields be implemented by the Godunov scheme.We then follow the discussion for the linear system to apply the Entropy-Ultra-Bee technology to the second characteristic field of the Euler system in a linearlized field-byfield fashion to develop a modified Entropy-Ultra-Bee scheme for the system.Meanwhile a remark is given to explain the problem of the previous Entropy-Ultra-Bee scheme in [13].A reference solution is constructed for computing the numerical entropy,which maintains the feature of the density and flats the velocity and pressure to constants.The numerical entropy is then computed as the entropy cell-average of the reference solution.Several limitations are adopted in the construction of the reference solution to further stabilize the scheme.Designed in such a way,the modified Entropy-Ultra-Bee scheme has a unified form with no problem-related parameters.Numerical experiments show that all the spurious oscillations in smooth regions are gone and the results are better than that

  19. Level and decay schemes of even-A Se and Ge isotopes from (n,n'γ) reaction studies

    Energy Technology Data Exchange (ETDEWEB)

    Sigaud, J.; Patin, Y.; McEllistrem, M. T.; Haouat, G.; Lachkar, J.

    1975-06-01

    The energy levels and the decay schemes of {sup 76}Se, {sup 78}Se, {sup 80}Se, {sup 82}Se and {sup 76}Ge have been studied through the measurements of (n,n'γ) differential cross sections. Gamma-ray excitation functions have been measured between 2.0- and 4.1-MeV incident neutron energy, and angular distribution have been observed for all of these isotopes.

  20. A Velocity-Level Bi-Criteria Optimization Scheme for Coordinated Path Tracking of Dual Robot Manipulators Using Recurrent Neural Network.

    Science.gov (United States)

    Xiao, Lin; Zhang, Yongsheng; Liao, Bolin; Zhang, Zhijun; Ding, Lei; Jin, Long

    2017-01-01

    A dual-robot system is a robotic device composed of two robot arms. To eliminate the joint-angle drift and prevent the occurrence of high joint velocity, a velocity-level bi-criteria optimization scheme, which includes two criteria (i.e., the minimum velocity norm and the repetitive motion), is proposed and investigated for coordinated path tracking of dual robot manipulators. Specifically, to realize the coordinated path tracking of dual robot manipulators, two subschemes are first presented for the left and right robot manipulators. After that, such two subschemes are reformulated as two general quadratic programs (QPs), which can be formulated as one unified QP. A recurrent neural network (RNN) is thus presented to solve effectively the unified QP problem. At last, computer simulation results based on a dual three-link planar manipulator further validate the feasibility and the efficacy of the velocity-level optimization scheme for coordinated path tracking using the recurrent neural network.

  1. Positioning and Priorities of Growth Management in Construction Industrialization: Chinese Firm-Level Empirical Research

    Directory of Open Access Journals (Sweden)

    Jingxiao Zhang

    2017-06-01

    Full Text Available The purpose of this research is to quantitatively evaluate the growth phase, position, and priorities of the industrialization policy management of the construction industry at firm level. The goal is to integrate quantitative dynamics into the policy-making process for sustainable policy development in future China. This research proposes an integrated framework, including growth management model and industrial policy evaluation method, to identify the challenges of construction industrialization and policy management. The research applies the mixed system method, which includes entropy method and average score method, to analyze the growth stage and major impact indexes targeting 327 survey samples. The empirical results show that the proposed conceptual framework and policy evaluation method could effectively determine the growth position and directions of the construction industrialization. For verification purpose, the study uses the local industry data from Shaanxi Province, China. The calculation results substantiate that the construction industry is in the middle section of the third growth phase. The comparison of the results from statistical methods shows that the local construction industry still needs substantial effort in policy management to improve its sustainable industrialization level. As countermeasures, the policy priorities should concentrate on: (1 enhancing effective cooperation among universities, research institutions and enterprises; (2 improving actions towards technology transfer into productivity; and (3 encouraging market acceptance of construction industrialization. This research complements the existing literature of policy evaluation of construction industrialization. Moreover, it provides theoretical and operational steps on industry policy evaluation and growth management framework, with accurate and ample data analysis on firm-level survey. Researchers and policy makers can use this research for further

  2. Inverse scattering scheme for the Dirac equation at fixed energy

    International Nuclear Information System (INIS)

    Leeb, H.; Lehninger, H.; Schilder, C.

    2001-01-01

    Full text: Based on the concept of generalized transformation operators a new hierarchy of Dirac equations with spherical symmetric scalar and fourth component vector potentials is presented. Within this hierarchy closed form expressions for the solutions, the potentials and the S-matrix can be given in terms of solutions of the original Dirac equation. Using these transformations an inverse scattering scheme has been constructed for the Dirac equation which is the analog to the rational scheme in the non-relativistic case. The given method provides for the first time an inversion scheme with closed form expressions for the S-matrix for non-relativistic scattering problems with central and spin-orbit potentials. (author)

  3. Construction of Capacity Achieving Lattice Gaussian Codes

    KAUST Repository

    Alghamdi, Wael

    2016-04-01

    We propose a new approach to proving results regarding channel coding schemes based on construction-A lattices for the Additive White Gaussian Noise (AWGN) channel that yields new characterizations of the code construction parameters, i.e., the primes and dimensions of the codes, as functions of the block-length. The approach we take introduces an averaging argument that explicitly involves the considered parameters. This averaging argument is applied to a generalized Loeliger ensemble [1] to provide a more practical proof of the existence of AWGN-good lattices, and to characterize suitable parameters for the lattice Gaussian coding scheme proposed by Ling and Belfiore [3].

  4. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.

    Science.gov (United States)

    Wang, Shangping; Zhao, Duqiao; Zhang, Yaling

    2017-01-01

    Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme with attribute revocation in cloud storage, the keyword search in our scheme is attribute based with access control, when the search succeeds, the cloud server returns the corresponding cipher text to user and the user can decrypt the cipher text definitely. Besides, our scheme supports multiple keywords search, which makes the scheme more practical. Under the assumption of decisional bilinear Diffie-Hellman exponent (q-BDHE) and decisional Diffie-Hellman (DDH) in the selective security model, we prove that our scheme is secure.

  5. Towards a Competency-based Vision for Construction Safety Education

    Science.gov (United States)

    Pedro, Akeem; Hai Chien, Pham; Park, Chan Sik

    2018-04-01

    Accidents still prevail in the construction industry, resulting in injuries and fatalities all over the world. Educational programs in construction should deliver safety knowledge and skills to students who will become responsible for ensuring safe construction work environments in the future. However, there is a gap between the competencies current pedagogical approaches target, and those required for safety in practice. This study contributes to addressing this issue in three steps. Firstly, a vision for competency-based construction safety education is conceived. Building upon this, a research scheme to achieve the vision is developed, and the first step of the scheme is initiated in this study. The critical competencies required for safety education are investigated through analyses of literature, and confirmed through surveys with construction and safety management professionals. Results from the study would be useful in establishing and orienting education programs towards current industry safety needs and requirements

  6. Efficient construction of two-dimensional cluster states with probabilistic quantum gates

    International Nuclear Information System (INIS)

    Chen Qing; Cheng Jianhua; Wang Kelin; Du Jiangfeng

    2006-01-01

    We propose an efficient scheme for constructing arbitrary two-dimensional (2D) cluster states using probabilistic entangling quantum gates. In our scheme, the 2D cluster state is constructed with starlike basic units generated from 1D cluster chains. By applying parallel operations, the process of generating 2D (or higher-dimensional) cluster states is significantly accelerated, which provides an efficient way to implement realistic one-way quantum computers

  7. A discontinous Galerkin finite element method with an efficient time integration scheme for accurate simulations

    KAUST Repository

    Liu, Meilin

    2011-07-01

    A discontinuous Galerkin finite element method (DG-FEM) with a highly-accurate time integration scheme is presented. The scheme achieves its high accuracy using numerically constructed predictor-corrector integration coefficients. Numerical results show that this new time integration scheme uses considerably larger time steps than the fourth-order Runge-Kutta method when combined with a DG-FEM using higher-order spatial discretization/basis functions for high accuracy. © 2011 IEEE.

  8. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  9. Probabilistic pathway construction.

    Science.gov (United States)

    Yousofshahi, Mona; Lee, Kyongbum; Hassoun, Soha

    2011-07-01

    Expression of novel synthesis pathways in host organisms amenable to genetic manipulations has emerged as an attractive metabolic engineering strategy to overproduce natural products, biofuels, biopolymers and other commercially useful metabolites. We present a pathway construction algorithm for identifying viable synthesis pathways compatible with balanced cell growth. Rather than exhaustive exploration, we investigate probabilistic selection of reactions to construct the pathways. Three different selection schemes are investigated for the selection of reactions: high metabolite connectivity, low connectivity and uniformly random. For all case studies, which involved a diverse set of target metabolites, the uniformly random selection scheme resulted in the highest average maximum yield. When compared to an exhaustive search enumerating all possible reaction routes, our probabilistic algorithm returned nearly identical distributions of yields, while requiring far less computing time (minutes vs. years). The pathways identified by our algorithm have previously been confirmed in the literature as viable, high-yield synthesis routes. Prospectively, our algorithm could facilitate the design of novel, non-native synthesis routes by efficiently exploring the diversity of biochemical transformations in nature. Copyright © 2011 Elsevier Inc. All rights reserved.

  10. Asymptotic analysis of discrete schemes for non-equilibrium radiation diffusion

    International Nuclear Information System (INIS)

    Cui, Xia; Yuan, Guang-wei; Shen, Zhi-jun

    2016-01-01

    Motivated by providing well-behaved fully discrete schemes in practice, this paper extends the asymptotic analysis on time integration methods for non-equilibrium radiation diffusion in [2] to space discretizations. Therein studies were carried out on a two-temperature model with Larsen's flux-limited diffusion operator, both the implicitly balanced (IB) and linearly implicit (LI) methods were shown asymptotic-preserving. In this paper, we focus on asymptotic analysis for space discrete schemes in dimensions one and two. First, in construction of the schemes, in contrast to traditional first-order approximations, asymmetric second-order accurate spatial approximations are devised for flux-limiters on boundary, and discrete schemes with second-order accuracy on global spatial domain are acquired consequently. Then by employing formal asymptotic analysis, the first-order asymptotic-preserving property for these schemes and furthermore for the fully discrete schemes is shown. Finally, with the help of manufactured solutions, numerical tests are performed, which demonstrate quantitatively the fully discrete schemes with IB time evolution indeed have the accuracy and asymptotic convergence as theory predicts, hence are well qualified for both non-equilibrium and equilibrium radiation diffusion. - Highlights: • Provide AP fully discrete schemes for non-equilibrium radiation diffusion. • Propose second order accurate schemes by asymmetric approach for boundary flux-limiter. • Show first order AP property of spatially and fully discrete schemes with IB evolution. • Devise subtle artificial solutions; verify accuracy and AP property quantitatively. • Ideas can be generalized to 3-dimensional problems and higher order implicit schemes.

  11. Multi-level trellis coded modulation and multi-stage decoding

    Science.gov (United States)

    Costello, Daniel J., Jr.; Wu, Jiantian; Lin, Shu

    1990-01-01

    Several constructions for multi-level trellis codes are presented and many codes with better performance than previously known codes are found. These codes provide a flexible trade-off between coding gain, decoding complexity, and decoding delay. New multi-level trellis coded modulation schemes using generalized set partitioning methods are developed for Quadrature Amplitude Modulation (QAM) and Phase Shift Keying (PSK) signal sets. New rotationally invariant multi-level trellis codes which can be combined with differential encoding to resolve phase ambiguity are presented.

  12. Cost-based droop scheme for DC microgrid

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Wang, Peng; Loh, Poh Chiang

    2014-01-01

    voltage level, less on optimized operation and control of generation sources. The latter theme is perused in this paper, where cost-based droop scheme is proposed for distributed generators (DGs) in DC microgrids. Unlike traditional proportional power sharing based droop scheme, the proposed scheme......-connected operation. Most importantly, the proposed scheme can reduce overall total generation cost in DC microgrids without centralized controller and communication links. The performance of the proposed scheme has been verified under different load conditions.......DC microgrids are gaining interest due to higher efficiencies of DC distribution compared with AC. The benefits of DC systems have been widely researched for data centers, IT facilities and residential applications. The research focus, however, has been more on system architecture and optimal...

  13. A new chaotic secure communication scheme

    International Nuclear Information System (INIS)

    Hua Changchun; Yang Bo; Ouyang Gaoxiang; Guan Xinping

    2005-01-01

    A new chaotic secure communication scheme is constructed. Unified chaotic system is used to encrypt the emitted signal. Different from the existing chaotic secure communication methods, the useful information is embodied in the parameter of chaotic systems in this Letter. The receiver is designed which can succeed in recovering the former signal. Finally computer simulations are done to verify the proposed methods, and the results show that the obtained theoretic results are feasible and efficient

  14. Universal block diagram based modeling and simulation schemes for fractional-order control systems.

    Science.gov (United States)

    Bai, Lu; Xue, Dingyü

    2017-05-08

    Universal block diagram based schemes are proposed for modeling and simulating the fractional-order control systems in this paper. A fractional operator block in Simulink is designed to evaluate the fractional-order derivative and integral. Based on the block, the fractional-order control systems with zero initial conditions can be modeled conveniently. For modeling the system with nonzero initial conditions, the auxiliary signal is constructed in the compensation scheme. Since the compensation scheme is very complicated, therefore the integrator chain scheme is further proposed to simplify the modeling procedures. The accuracy and effectiveness of the schemes are assessed in the examples, the computation results testify the block diagram scheme is efficient for all Caputo fractional-order ordinary differential equations (FODEs) of any complexity, including the implicit Caputo FODEs. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  15. A CU-Level Rate and Distortion Estimation Scheme for RDO of Hardware-Friendly HEVC Encoders Using Low-Complexity Integer DCTs.

    Science.gov (United States)

    Lee, Bumshik; Kim, Munchurl

    2016-08-01

    In this paper, a low complexity coding unit (CU)-level rate and distortion estimation scheme is proposed for High Efficiency Video Coding (HEVC) hardware-friendly implementation where a Walsh-Hadamard transform (WHT)-based low-complexity integer discrete cosine transform (DCT) is employed for distortion estimation. Since HEVC adopts quadtree structures of coding blocks with hierarchical coding depths, it becomes more difficult to estimate accurate rate and distortion values without actually performing transform, quantization, inverse transform, de-quantization, and entropy coding. Furthermore, DCT for rate-distortion optimization (RDO) is computationally high, because it requires a number of multiplication and addition operations for various transform block sizes of 4-, 8-, 16-, and 32-orders and requires recursive computations to decide the optimal depths of CU or transform unit. Therefore, full RDO-based encoding is highly complex, especially for low-power implementation of HEVC encoders. In this paper, a rate and distortion estimation scheme is proposed in CU levels based on a low-complexity integer DCT that can be computed in terms of WHT whose coefficients are produced in prediction stages. For rate and distortion estimation in CU levels, two orthogonal matrices of 4×4 and 8×8 , which are applied to WHT that are newly designed in a butterfly structure only with addition and shift operations. By applying the integer DCT based on the WHT and newly designed transforms in each CU block, the texture rate can precisely be estimated after quantization using the number of non-zero quantized coefficients and the distortion can also be precisely estimated in transform domain without de-quantization and inverse transform required. In addition, a non-texture rate estimation is proposed by using a pseudoentropy code to obtain accurate total rate estimates. The proposed rate and the distortion estimation scheme can effectively be used for HW-friendly implementation of

  16. Secret Sharing Schemes with a large number of players from Toric Varieties

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    A general theory for constructing linear secret sharing schemes over a finite field $\\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. We present general methods for obtaining the reconstruction and privacy thresholds as well as conditions...... for multiplication on the associated secret sharing schemes. In particular we apply the method on certain toric surfaces. The main results are ideal linear secret sharing schemes where the number of players can be as large as $(q-1)^2-1$. We determine bounds for the reconstruction and privacy thresholds...

  17. Effective information rates of single-carrier and multi-carrier modulation schemes for bandwidth constrained IM/DD systems

    KAUST Repository

    Mazahir, Sana; Chaaban, Anas; Elgala, Hany; Alouini, Mohamed-Slim

    2017-01-01

    -negative real and baseband signals), the construction of these signals along with their time and frequency characteristics differ from their RF counterparts. This necessitates a careful study of such schemes under practical constraints. Three schemes are studied

  18. Gradual and Cumulative Improvements to the Classical Differential Evolution Scheme through Experiments

    Directory of Open Access Journals (Sweden)

    Anescu George

    2016-12-01

    Full Text Available The paper presents the experimental results of some tests conducted with the purpose to gradually and cumulatively improve the classical DE scheme in both efficiency and success rate. The modifications consisted in the randomization of the scaling factor (a simple jitter scheme, a more efficient Random Greedy Selection scheme, an adaptive scheme for the crossover probability and a resetting mechanism for the agents. After each modification step, experiments have been conducted on a set of 11 scalable, multimodal, continuous optimization functions in order to analyze the improvements and decide the new improvement direction. Finally, only the initial classical scheme and the constructed Fast Self-Adaptive DE (FSA-DE variant were compared with the purpose of testing their performance degradation with the increase of the search space dimension. The experimental results demonstrated the superiority of the proposed FSA-DE variant.

  19. A hybrid feature selection and health indicator construction scheme for delay-time-based degradation modelling of rolling element bearings

    Science.gov (United States)

    Zhang, Bin; Deng, Congying; Zhang, Yi

    2018-03-01

    Rolling element bearings are mechanical components used frequently in most rotating machinery and they are also vulnerable links representing the main source of failures in such systems. Thus, health condition monitoring and fault diagnosis of rolling element bearings have long been studied to improve operational reliability and maintenance efficiency of rotatory machines. Over the past decade, prognosis that enables forewarning of failure and estimation of residual life attracted increasing attention. To accurately and efficiently predict failure of the rolling element bearing, the degradation requires to be well represented and modelled. For this purpose, degradation of the rolling element bearing is analysed with the delay-time-based model in this paper. Also, a hybrid feature selection and health indicator construction scheme is proposed for extraction of the bearing health relevant information from condition monitoring sensor data. Effectiveness of the presented approach is validated through case studies on rolling element bearing run-to-failure experiments.

  20. 19 CFR 351.412 - Levels of trade; adjustment for difference in level of trade; constructed export price offset.

    Science.gov (United States)

    2010-04-01

    ... Price, Constructed Export Price, Fair Value, and Normal Value § 351.412 Levels of trade; adjustment for.... The Secretary is authorized to adjust normal value to account for such a difference. (See section 773... value for a difference in level of trade if: (1) The Secretary calculates normal value at a different...

  1. New level schemes with high-spin states of 105,107,109Tc

    International Nuclear Information System (INIS)

    Luo, Y.X.; Rasmussen, J.O.; Lee, I.Y.; Fallon, P.; Hamilton, J.H.; Ramayya, A.V.; Hwang, J.K.; Gore, P.M.; Zhu, S.J.; Wu, S.C.; Ginter, T.N.; Ter-Akopian, G.M.; Daniel, A.V.; Stoyer, M.A.; Donangelo, R.; Gelberg, A.

    2004-01-01

    New level schemes of odd-Z 105,107,109 Tc are proposed based on the 252 Cf spontaneous-fission-gamma data taken with Gammasphere in 2000. Bands of levels are considerably extended and expanded to show rich spectroscopic information. Spin/parity and configuration assignments are made based on determinations of multipolarities of low-lying transitions and the level analogies to the previously reported levels, and to those of the neighboring Rh isotopes. A non-yrast negative-parity band built on the 3/2 - [301] orbital is observed for the first time in 105 Tc. A positive-parity band built on the 1/2 + [431] intruder orbital originating from the π(g 7/2 /d 5/2 ) subshells and having a strong deformation-driving effect is observed for the first time in 105 Tc, and assigned in 107 Tc. A positive-parity band built on the excited 11/2 + level, which has rather low excitation energy and predominantly decays into the 9/2 + level of the ground state band, provides evidence of triaxiality in 107,109 Tc, and probably also in 105 Tc. Rotational constants are calculated and discussed for the K=1/2 intruder bands using the Bohr-Mottelson formula. Level systematics are discussed in terms of the locations of proton Fermi levels and deformations. The band crossings of yrast positive-parity bands are observed, most likely related to h 11/2 neutron alignment. Triaxial-rotor-plus-particle model calculations performed with ε=0.32 and γ=-22.5 deg. on the prolate side of maximum triaxiality yielded the best reproduction of the excitation energies, signature splittings, and branching ratios of the positive-parity bands (except for the intruder bands) of these Tc isotopes. The significant discrepancies between the triaxial-rotor-plus-particle model calculations and experiment for the K=1/2 intruder bands in 105,107 Tc need further theoretical studies

  2. Bernstein's levels of movement construction: A contemporary perspective.

    Science.gov (United States)

    Profeta, Vitor L S; Turvey, Michael T

    2018-02-01

    Explanation of how goal-directed movements are made manifest is the ultimate aim of the field classically referred to as "motor control". Essential to the sought-after explanation is comprehension of the supporting functional architecture. Seven decades ago, the Russian physiologist and movement scientist Nikolai A. Bernstein proposed a hierarchical model to explain the construction of movements. In his model, the levels of the hierarchy share a common language (i.e., they are commensurate) and perform complementing functions to bring about dexterous movements. The science of the control and coordination of movement in the phylum Craniata has made considerable progress in the intervening seven decades. The contemporary body of knowledge about each of Bernstein's hypothesized functional levels is both more detailed and more sophisticated. A natural consequence of this progress, however, is the relatively independent theoretical development of a given level from the other levels. In this essay, we revisit each level of Bernstein's hierarchy from the joint perspectives of (a) the ecological approach to perception-action and (b) dynamical systems theory. We review a substantial and relevant body of literature produced in different areas of study that are accommodated by this ecological-dynamical version of Bernstein's levels. Implications for the control and coordination of movement and the challenges to producing a unified theory are discussed. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  4. Interband cascade laser-based ppbv-level mid-infrared methane detection using two digital lock-in amplifier schemes

    Science.gov (United States)

    Song, Fang; Zheng, Chuantao; Yu, Di; Zhou, Yanwen; Yan, Wanhong; Ye, Weilin; Zhang, Yu; Wang, Yiding; Tittel, Frank K.

    2018-03-01

    A parts-per-billion in volume (ppbv) level mid-infrared methane (CH4) sensor system was demonstrated using second-harmonic wavelength modulation spectroscopy (2 f-WMS). A 3291 nm interband cascade laser (ICL) and a multi-pass gas cell (MPGC) with a 16 m optical path length were adopted in the reported sensor system. Two digital lock-in amplifier (DLIA) schemes, a digital signal processor (DSP)-based DLIA and a LabVIEW-based DLIA, were used for harmonic signal extraction. A limit of detection (LoD) of 13.07 ppbv with an averaging time of 2 s was achieved using the DSP-based DLIA and a LoD of 5.84 ppbv was obtained using the LabVIEW-based DLIA with the same averaging time. A rise time of 0→2 parts-per-million in volume (ppmv) and fall time of 2→0 ppmv were observed. Outdoor atmospheric CH4 concentration measurements were carried out to evaluate the sensor performance using the two DLIA schemes.

  5. Optimization of the scheme for natural ecology planning of urban rivers based on ANP (analytic network process) model.

    Science.gov (United States)

    Zhang, Yichuan; Wang, Jiangping

    2015-07-01

    Rivers serve as a highly valued component in ecosystem and urban infrastructures. River planning should follow basic principles of maintaining or reconstructing the natural landscape and ecological functions of rivers. Optimization of planning scheme is a prerequisite for successful construction of urban rivers. Therefore, relevant studies on optimization of scheme for natural ecology planning of rivers is crucial. In the present study, four planning schemes for Zhaodingpal River in Xinxiang City, Henan Province were included as the objects for optimization. Fourteen factors that influenced the natural ecology planning of urban rivers were selected from five aspects so as to establish the ANP model. The data processing was done using Super Decisions software. The results showed that important degree of scheme 3 was highest. A scientific, reasonable and accurate evaluation of schemes could be made by ANP method on natural ecology planning of urban rivers. This method could be used to provide references for sustainable development and construction of urban rivers. ANP method is also suitable for optimization of schemes for urban green space planning and design.

  6. Emissions trading and competitiveness: pros and cons of relative and absolute schemes

    International Nuclear Information System (INIS)

    Kuik, Onno; Mulder, Machiel

    2004-01-01

    Emissions trading is a hot issue. At national as well as supranational levels, proposals for introduction of emissions trading schemes have been made. This paper assesses alternative emissions trading schemes at domestic level: (1) schemes where the total level of emissions is fixed (absolute cap-and-trade), (2) schemes where the allowable level of emissions per firm is related to some firm-specific indicator (relative cap-and-trade), and (3) mixed schemes which combine elements of the above alternatives. We present a quantitative assessment of these alternatives for climate change policy in the Netherlands. It is concluded that while relative cap-and-trade would avoid negative effects on competitiveness, it would not reduce emissions at the lowest costs. Besides, the addition of a trade system to existing relative standards does not result in additional emission reduction; it should be combined with other policy measures, such as energy taxes, in order to realise further reduction. Absolute cap-and-trade leads to efficient emissions reduction, but, implemented at the national level, its overall macroeconomic costs may be significant. The mixed scheme has as drawback that it treats firms unequal, which leads to high administrative costs. We conclude that none of the trading schemes is an advisable instrument for domestic climate policy

  7. Exact Finite-Difference Schemes for d-Dimensional Linear Stochastic Systems with Constant Coefficients

    Directory of Open Access Journals (Sweden)

    Peng Jiang

    2013-01-01

    Full Text Available The authors attempt to construct the exact finite-difference schemes for linear stochastic differential equations with constant coefficients. The explicit solutions to Itô and Stratonovich linear stochastic differential equations with constant coefficients are adopted with the view of providing exact finite-difference schemes to solve them. In particular, the authors utilize the exact finite-difference schemes of Stratonovich type linear stochastic differential equations to solve the Kubo oscillator that is widely used in physics. Further, the authors prove that the exact finite-difference schemes can preserve the symplectic structure and first integral of the Kubo oscillator. The authors also use numerical examples to prove the validity of the numerical methods proposed in this paper.

  8. Social Constructivism: Botanical Classification Schemes of Elementary School Children.

    Science.gov (United States)

    Tull, Delena

    The assertion that there is a social component to children's construction of knowledge about natural phenomena is supported by evidence from an examination of children's classification schemes for plants. An ethnographic study was conducted with nine sixth grade children in central Texas. The children classified plants in the outdoors, in a…

  9. Awareness and Coverage of the National Health Insurance Scheme ...

    African Journals Online (AJOL)

    Sub- national levels possess a high degree of autonomy in a number of sectors including health. It is important to assess the level of coverage of the scheme among the formal sector workers in Nigeria as a proxy to gauge the extent of coverage of the scheme and derive suitable lessons that could be used in its expansion.

  10. Degradation in urban air quality from construction activity and increased traffic arising from a road widening scheme.

    Science.gov (United States)

    Font, Anna; Baker, Timothy; Mudway, Ian S; Purdie, Esme; Dunster, Christina; Fuller, Gary W

    2014-11-01

    Road widening schemes in urban areas are often proposed as a solution to traffic congestion and as a means of stimulating economic growth. There is however clear evidence that new or expanded roads rapidly fill with either displaced or induced traffic, offsetting any short-term gains in eased traffic flows. What has not been addressed in any great detail is the impact of such schemes on air quality, with modelled impact predictions seldom validated by measurements after the expansion of road capacity. In this study we made use of a road widening project in London to investigate the impact on ambient air quality (particulate matter, NOX, NO2) during and after the completion of the road works. PM10 increased during the construction period up to 15 μg m(-3) during working hours compared to concentrations before the road works. A box modelling approach was used to determine a median emission factor of 0.0022 kg PM10 m(-2) month(-1), three times larger than that used in the UK emission inventory (0.0007 kg PM10 m(-2) month(-1)). Peaks of activity released 0.0130 kg PM10 m(-2) month(-1), three and eight times smaller than the peak values used in the European and US inventories. After the completion of the widening there was an increase in all pollutants from the road during rush hour: 2-4 μg m(-3) for PM10; 1 μg m(-3) for PM2.5; 40 and 8 μg m(-3) for NOX and NO2, respectively. NO2 EU Limit Value was breached after the road development illustrating a notable deterioration in residential air quality. Additionally, PM10, but not PM2.5, glutathione dependent oxidative potential increased after the road was widened consistent with an increase in pro-oxidant components in the coarse particle mode, related to vehicle abrasion processes. These increased air pollution indices were associated with an increase in the number of cars, taxis and LGVs. Copyright © 2014. Published by Elsevier B.V.

  11. Plan of deep underground construction for investigations on high-level radioactive waste storage

    International Nuclear Information System (INIS)

    Mayanovskij, M.S.

    1996-01-01

    The program of studies of the Japanese PNC corporation on construction of deep underground storage for high-level radioactive wastes is presented. The program is intended for 20 years. The total construction costs equal about 20 billion yen. The total cost of the project is equal to 60 billion yen. The underground part is planned to reach 1000 m depth

  12. Directional virtual backbone based data aggregation scheme for Wireless Visual Sensor Networks.

    Science.gov (United States)

    Zhang, Jing; Liu, Shi-Jian; Tsai, Pei-Wei; Zou, Fu-Min; Ji, Xiao-Rong

    2018-01-01

    Data gathering is a fundamental task in Wireless Visual Sensor Networks (WVSNs). Features of directional antennas and the visual data make WVSNs more complex than the conventional Wireless Sensor Network (WSN). The virtual backbone is a technique, which is capable of constructing clusters. The version associating with the aggregation operation is also referred to as the virtual backbone tree. In most of the existing literature, the main focus is on the efficiency brought by the construction of clusters that the existing methods neglect local-balance problems in general. To fill up this gap, Directional Virtual Backbone based Data Aggregation Scheme (DVBDAS) for the WVSNs is proposed in this paper. In addition, a measurement called the energy consumption density is proposed for evaluating the adequacy of results in the cluster-based construction problems. Moreover, the directional virtual backbone construction scheme is proposed by considering the local-balanced factor. Furthermore, the associated network coding mechanism is utilized to construct DVBDAS. Finally, both the theoretical analysis of the proposed DVBDAS and the simulations are given for evaluating the performance. The experimental results prove that the proposed DVBDAS achieves higher performance in terms of both the energy preservation and the network lifetime extension than the existing methods.

  13. Repository schemes for high-level radioactive waste disposal. Report on task no. 1(b)- Review of schemes for argillaceous and saliferous formations

    Energy Technology Data Exchange (ETDEWEB)

    1981-01-01

    This Report examines international proposals for the underground storage of high level radioactive waste. From this study proposals have been developed in relation to conditions that can be expected in the United Kingdom. This Report is restricted to the consideration of repositories in the softer rocks, the clays and the shales which can be encountered in many parts of the United Kingdom. It has also considered the construction of a repository in rock salt. The only such deposits which could be developed for the purpose are found under the North Sea. For the purpose of this Study it has been assumed that suitable sites can be located near enough to a coast line to allow works to be constructed from the land. The likely cost of a repository will vary widely depending upon the nature of the ground in which it is constructed and the depth. The choice here is not an engineering matter but is dictated by the degree of protection which it is necessary to give to the environment, both within the forseeable future and for many generations to come. Costs are estimated making various assumptions.

  14. Intercomparison and validation of snow albedo parameterization schemes in climate models

    Energy Technology Data Exchange (ETDEWEB)

    Pedersen, Christina A.; Winther, Jan-Gunnar [Norwegian Polar Institute, Tromsoe (Norway)

    2005-09-01

    Snow albedo is known to be crucial for heat exchange at high latitudes and high altitudes, and is also an important parameter in General Circulation Models (GCMs) because of its strong positive feedback properties. In this study, seven GCM snow albedo schemes and a multiple linear regression model were intercompared and validated against 59 years of in situ data from Svalbard, the French Alps and six stations in the former Soviet Union. For each site, the significant meteorological parameters for modeling the snow albedo were identified by constructing the 95% confidence intervals. The significant parameters were found to be: temperature, snow depth, positive degree day and a dummy of snow depth, and the multiple linear regression model was constructed to include these. Overall, the intercomparison showed that the modeled snow albedo varied more than the observed albedo for all models, and that the albedo was often underestimated. In addition, for several of the models, the snow albedo decreased at a faster rate or by a greater magnitude during the winter snow metamorphosis than the observed albedo. Both the temperature dependent schemes and the prognostic schemes showed shortcomings. (orig.)

  15. Estimation of the common cause failure probabilities on the component group with mixed testing scheme

    International Nuclear Information System (INIS)

    Hwang, Meejeong; Kang, Dae Il

    2011-01-01

    Highlights: ► This paper presents a method to estimate the common cause failure probabilities on the common cause component group with mixed testing schemes. ► The CCF probabilities are dependent on the testing schemes such as staggered testing or non-staggered testing. ► There are many CCCGs with specific mixed testing schemes in real plant operation. ► Therefore, a general formula which is applicable to both alternate periodic testing scheme and train level mixed testing scheme was derived. - Abstract: This paper presents a method to estimate the common cause failure (CCF) probabilities on the common cause component group (CCCG) with mixed testing schemes such as the train level mixed testing scheme or the alternate periodic testing scheme. In the train level mixed testing scheme, the components are tested in a non-staggered way within the same train, but the components are tested in a staggered way between the trains. The alternate periodic testing scheme indicates that all components in the same CCCG are tested in a non-staggered way during the planned maintenance period, but they are tested in a staggered way during normal plant operation. Since the CCF probabilities are dependent on the testing schemes such as staggered testing or non-staggered testing, CCF estimators have two kinds of formulas in accordance with the testing schemes. Thus, there are general formulas to estimate the CCF probability on the staggered testing scheme and non-staggered testing scheme. However, in real plant operation, there are many CCCGs with specific mixed testing schemes. Recently, Barros () and Kang () proposed a CCF factor estimation method to reflect the alternate periodic testing scheme and the train level mixed testing scheme. In this paper, a general formula which is applicable to both the alternate periodic testing scheme and the train level mixed testing scheme was derived.

  16. FOUNDATION OF THE RATIONAL LEVEL OF THE ORGANIZATIONAL AND TECHNOLOGICAL RELIABILITY IN CONSTRUCTION PROJECTS

    Directory of Open Access Journals (Sweden)

    MLODESTKY V. R.

    2015-09-01

    Full Text Available Statement of the problem. The main points of contractual obligations is their timely performance with ensuring the desired level of investments of the investment funds provided for in this contract. The longer the execution of the works under the contract, the higher the probability of violation of these terms. Analysis of construction projects over the past decade has shown that the situation has not changed significantly, according to [8] contemporary data on the construction of a number of objects from which it follows that the larger the object, and accordingly, the longer construction period, the more the actual deviation of the actual terms of the construction of the planned, up to 50...100% in some cases. The comparison of these data shows that the problem of ensuring reliable operation of the construction company on the stage of implementation of a specific project is relevant in the present time. Analysis of recent research. The analysis of researches in the field of the rational justification of organizational and technological reliability values shows that its range is in the range from 0.35 to 0.9, it indicates the absence of a reasoned approach to this issue. Of course, for a more reliable implementation of the plan one needs to have a certain amount of appropriate material and financial resources, but in the management process is another important resource that should be in possession of the subject of management this is information. The purpose and objectives of work. The aim of this work is the study of the rational level of organizational and technological reliability (OTR based on analysis of the need for this information. To achieve the goal of the article were set and solve the following tasks: - to establish the relationship between OTR and the right amount of information; - to determine the influence of the accuracy of determining the current state of the controlled parameter and the level of information; - to justify the

  17. Scheme (in?) dependence in perturbative Lagrangian quantum field theory

    International Nuclear Information System (INIS)

    Slavnov, D.A.

    1995-01-01

    A problem of renormalization - scheme ambiguity in perturbation quantum field theory is investigated. A procedure is described that makes it possible to express uniquely all observable quantities in terms of a set base observables. Renormalization group equations for the base observable are constructed. The case of mass theory is treated. 9 refs

  18. Conservative numerical schemes for Euler-Lagrange equations

    Energy Technology Data Exchange (ETDEWEB)

    Vazquez, L. [Universidad Complutense, Madrid (Spain). Dept. de Matematica Aplicada; Jimenez, S. [Universidad Alfonso X El Sabio, Madrid (Spain). Dept. de Matematica Aplicada

    1999-05-01

    As a preliminary step to study magnetic field lines, the authors seek numerical schemes that reproduce at discrete level the significant feature of the continuous model, based on an underling Lagrangian structure. The resulting scheme give discrete counterparts of the variation law for the energy as well of as the Euler-Lagrange equations and their symmetries.

  19. A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching

    Science.gov (United States)

    Chen, Zhigang; Wang, Jian; Song, Xinxia

    2014-01-01

    A critical challenge in a fully homomorphic encryption (FHE) scheme is to manage noise. Modulus switching technique is currently the most efficient noise management technique. When using the modulus switching technique to design and implement a FHE scheme, how to choose concrete parameters is an important step, but to our best knowledge, this step has drawn very little attention to the existing FHE researches in the literature. The contributions of this paper are twofold. On one hand, we propose a function of the lower bound of dimension value in the switching techniques depending on the LWE specific security levels. On the other hand, as a case study, we modify the Brakerski FHE scheme (in Crypto 2012) by using the modulus switching technique. We recommend concrete parameter values of our proposed scheme and provide security analysis. Our result shows that the modified FHE scheme is more efficient than the original Brakerski scheme in the same security level. PMID:25093212

  20. The effects of run-of-river hydroelectric power schemes on invertebrate community composition in temperate streams and rivers.

    Science.gov (United States)

    Bilotta, Gary S; Burnside, Niall G; Turley, Matthew D; Gray, Jeremy C; Orr, Harriet G

    2017-01-01

    Run-of-river (ROR) hydroelectric power (HEP) schemes are often presumed to be less ecologically damaging than large-scale storage HEP schemes. However, there is currently limited scientific evidence on their ecological impact. The aim of this article is to investigate the effects of ROR HEP schemes on communities of invertebrates in temperate streams and rivers, using a multi-site Before-After, Control-Impact (BACI) study design. The study makes use of routine environmental surveillance data collected as part of long-term national and international monitoring programmes at 22 systematically-selected ROR HEP schemes and 22 systematically-selected paired control sites. Five widely-used family-level invertebrate metrics (richness, evenness, LIFE, E-PSI, WHPT) were analysed using a linear mixed effects model. The analyses showed that there was a statistically significant effect (p<0.05) of ROR HEP construction and operation on the evenness of the invertebrate community. However, no statistically significant effects were detected on the four other metrics of community composition. The implications of these findings are discussed in this article and recommendations are made for best-practice study design for future invertebrate community impact studies.

  1. Optimised resource construction for verifiable quantum computation

    International Nuclear Information System (INIS)

    Kashefi, Elham; Wallden, Petros

    2017-01-01

    Recent developments have brought the possibility of achieving scalable quantum networks and quantum devices closer. From the computational point of view these emerging technologies become relevant when they are no longer classically simulatable. Hence a pressing challenge is the construction of practical methods to verify the correctness of the outcome produced by universal or non-universal quantum devices. A promising approach that has been extensively explored is the scheme of verification via encryption through blind quantum computation. We present here a new construction that simplifies the required resources for any such verifiable protocol. We obtain an overhead that is linear in the size of the input (computation), while the security parameter remains independent of the size of the computation and can be made exponentially small (with a small extra cost). Furthermore our construction is generic and could be applied to any universal or non-universal scheme with a given underlying graph. (paper)

  2. Traffic condition with road upgrading during construction and operation stages based on level-of-service (LOS)

    Science.gov (United States)

    Tay, A. C.; Lee, H. H.

    2018-04-01

    In this study, traffic survey was done at signalized intersection of both ends of an upgrading road during morning and afternoon peak hours throughout construction period. The intersections of Tudan Road located at Miri City in Sarawak State, Malaysia were chosen as study sites. The aim of this research was to investigate the traffic condition for the signalized intersections of a R3 secondary road that being upgrading to standard U5 dual carriageway during peak hours for construction and operation stages. Data collected from these sites were analyzed according to Highway Capacity Manual (HCM) 2010. From the results, the level-of-services (LOS) of Kuala Baram By Pass Road intersection improved from Level F to Level E at operation stage for weekday during peak hours in the morning. LOS of Lutong-Kuala Baram Road intersection at construction stage were Level C during peak hours in the morning and Level D during peak hours in the afternoon for weekends. However, the LOS during both peak hours for weekends were projected to improve to Level B at the operation stage. It proved that the road construction has affected LOS, and this temporary issue can be solved after the upgraded road is in operation.

  3. Review of the earthwork for seawater pump room and the construction of big cofferdam

    International Nuclear Information System (INIS)

    Chen Puzhi; Yan Wenkang

    2003-01-01

    The fact that the project of big cofferdam facing the ocean for the pump room is one of prerequisites for the site earthwork and the building constructions was significantly shown in the paper. The design scheme provided by foreign party not exactly conforming with actual conditions resulted in many construction problems. Based on the site condition, Chinese party proposed new construction schemes, which not only ensured the first concrete pouring of the project on June 8, 1998, but also saved several million funds

  4. A Quantitative Analysis of Children's Splitting Operations and Fraction Schemes

    Science.gov (United States)

    Norton, Anderson; Wilkins, Jesse L. M.

    2009-01-01

    Teaching experiments with pairs of children have generated several hypotheses about students' construction of fractions. For example, Steffe (2004) hypothesized that robust conceptions of improper fractions depends on the development of a splitting operation. Results from teaching experiments that rely on scheme theory and Steffe's hierarchy of…

  5. UNIFICATION OF PROCESSES OF SORTING OUT OF DESTROYED CONSTRUCTION OBJECTS

    Directory of Open Access Journals (Sweden)

    SHATOV S. V.

    2015-09-01

    Full Text Available Summary. Problem statement. Technogenic catastrophes, failures or natural calamities, result in destruction of build objects. Under the obstructions of destructions can be victims. The most widespread technogenic failure is explosions of gas. The structure of obstructions changes and depends on parameters and direction of explosion, firstly its size and location of wreckages. Sorting out of obstructions is carried out with machines and mechanisms which do not meet the requirements of these works, that predetermines of carrying out of rescue or restoration works on imperfect scheme , especially on the initial stages, and it increases terms and labour intensiveness of their conduct. Development technological solution is needed for the effective sorting out of destructions of construction objects. Purpose. Development of unification solution on the improvement of technological processes of sorting out of destructions of buildings and constructions. Conclusion. The analysis of experience of works shows on sorting out of the destroyed construction objects, show that they are carried out on imperfect scheme, which do not take into account character of destruction of objects and are based on the use of construction machines which do not meet the requirements of these processes, and lead to considerable resource losses. Developed unified scheme of sorting out of the destroyed construction objects depending on character of their destruction and possibility of line of works, and also with the use of build machines with a multipurpose equipment, provide the increase of efficiency of carrying out of rescue and construction works.

  6. An Optimization Scheme for ProdMod

    International Nuclear Information System (INIS)

    Gregory, M.V.

    1999-01-01

    A general purpose dynamic optimization scheme has been devised in conjunction with the ProdMod simulator. The optimization scheme is suitable for the Savannah River Site (SRS) High Level Waste (HLW) complex operations, and able to handle different types of optimizations such as linear, nonlinear, etc. The optimization is performed in the stand-alone FORTRAN based optimization deliver, while the optimizer is interfaced with the ProdMod simulator for flow of information between the two

  7. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms

    Science.gov (United States)

    Belazi, Akram; Abd El-Latif, Ahmed A.; Diaconu, Adrian-Viorel; Rhouma, Rhouma; Belghith, Safya

    2017-01-01

    In this paper, a new chaos-based partial image encryption scheme based on Substitution-boxes (S-box) constructed by chaotic system and Linear Fractional Transform (LFT) is proposed. It encrypts only the requisite parts of the sensitive information in Lifting-Wavelet Transform (LWT) frequency domain based on hybrid of chaotic maps and a new S-box. In the proposed encryption scheme, the characteristics of confusion and diffusion are accomplished in three phases: block permutation, substitution, and diffusion. Then, we used dynamic keys instead of fixed keys used in other approaches, to control the encryption process and make any attack impossible. The new S-box was constructed by mixing of chaotic map and LFT to insure the high confidentiality in the inner encryption of the proposed approach. In addition, the hybrid compound of S-box and chaotic systems strengthened the whole encryption performance and enlarged the key space required to resist the brute force attacks. Extensive experiments were conducted to evaluate the security and efficiency of the proposed approach. In comparison with previous schemes, the proposed cryptosystem scheme showed high performances and great potential for prominent prevalence in cryptographic applications.

  8. Sound classification of dwellings - Comparison of schemes in Europe

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2009-01-01

    National sound classification schemes for dwellings exist in nine countries in Europe, and proposals are under preparation in more countries. The schemes specify class criteria concerning several acoustic aspects, the main criteria being about airborne and impact sound insulation between dwellings......, facade sound insulation and installation noise. The quality classes reflect dierent levels of acoustical comfort. The paper presents and compares the sound classification schemes in Europe. The schemes have been implemented and revised gradually since the 1990es. However, due to lack of coordination...

  9. A Study of Construction Reactor Oversight Process in US

    International Nuclear Information System (INIS)

    Yun, I.; Kim, S. Y.; Jeong, G. Y.; Kim, S. P.

    2015-01-01

    This process provides a risk-informed approach such as construction significance determination process (SDP) and construction program performance index analogous to those used in the Reactor Oversight Process (ROP). The cROP has been applied to Vogtle units 3, 4 and V.C. Summer units 2, 3 under construction for the regulatory inspection. In this paper, the cROP is dissected to present its major contents and characteristics. The main features of the cROP can be summarized as followings: 1) The cROP which adopts the concept of the ROP used for operating NPPs assesses NPP under construction periodically to determine the appropriate level of regulatory response. 2) The cROP consists of three parts: the CIP, the CAP and the CEP. 3) The inspections for NPPs under construction can be categorized into three parts: vendor inspection, baseline inspection and supplemental and plant specific inspections. USNRC's regulatory resources can be used effectively based on baseline inspection, which is using ITAAC inspections. The construction SDP is used to assign the color scheme to categorize the significance of inspection findings. Regulatory actions are taken from CAM to which the significance of inspection findings input. In this paper, major contents and characteristics of USNRC's cROP have been presented

  10. Development of Dalaelven hydro power scheme in Sweden

    International Nuclear Information System (INIS)

    Kokko, Voitto; Hjerthen, Peter; Ingfaelt, Hans; Loewen, Karl-Erik; Sjoegren, Arne

    2015-01-01

    The Dalaelven hydro scheme is located in central Sweden. Fortum has in the scheme 50 dams and 35 hydro power plants producing 4 TWh energy with a capacity of 970 MW. The main reservoirs are Lake Siljan and Traengsletsjoen with Traengslet dam, the highest earth-filled dam in Sweden. Development of the hydro scheme started 1878 with construction of four power plants for industry until 1930. From 1931 to 1974 15 power plants were built for increasing electricity consumption. De-regulation of the energy market in 1990's and EU environmental targets in 2000's resulted in the rehabilitation of ten power plants between 1990 and 2014 with increased annual energy production of 377 GWh (29%) and capacity 124 MW (59%). This energy decreases the annual CO 2 emissions with 125918 tons in comparison to production of the same amount of energy by coal. In several cases the rehabilitation was made in new power houses, allowing the development of the layout and technology of civil structures, and use of state-of-art equipment. Sweden uses the green certificate system, and 235 GWh of the energy received this certificate. Other environmental benefits come from use of the environmentally friendly Kaplan turbines and construction of some new fish pass. There are further plans to increase the spillway capacity of Traengslet dam and to rehabilitate eight power plant units. The possibilities of obtaining the Environmental licences for the rehabilitations has became challenging in the past years and green certificates are nowadays agreed only for increased energy. (authors)

  11. Quantum information theoretical analysis of various constructions for quantum secret sharing

    NARCIS (Netherlands)

    Rietjens, K.P.T.; Schoenmakers, B.; Tuyls, P.T.

    2005-01-01

    Recently, an information theoretical model for quantum secret sharing (QSS) schemes was introduced. By using this model, we prove that pure state quantum threshold schemes (QTS) can be constructed from quantum MDS codes and vice versa. In particular, we consider stabilizer codes and give a

  12. Design and construction of an optical sensor for liquid level control

    International Nuclear Information System (INIS)

    Razani, M.; Golnabi, H.; Dabbaghian, M. H.; Dariani, R. S.; Vaziri, N.; Hojabri, A.

    2010-01-01

    Design and construction of an optical sensor for liquid level control is reported here. Operation of this sensor is based on the intensity modulation. The modulated light intensity is detected by total internal reflection in a prism. The variation of output intensity is measured by an optical detector and is monitored by a digital voltmeter. This optical fiber sensor is used for water level measurement in this experiment. For a white light source, the output voltage in the case of low water level is equal to 480 mV and when the water level reaches to prism reduced to 8 mV. Height measurement accuracy in this system is about ±1mm.

  13. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Directory of Open Access Journals (Sweden)

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  14. A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Laicheng Cao

    2016-01-01

    Full Text Available In order to verify the data integrity in mobile multicloud computing environment, a MMCDIV (mobile multicloud data integrity verification scheme is proposed. First, the computability and nondegeneracy of verification can be obtained by adopting BLS (Boneh-Lynn-Shacham short signature scheme. Second, communication overhead is reduced based on HVR (Homomorphic Verifiable Response with random masking and sMHT (sequence-enforced Merkle hash tree construction. Finally, considering the resource constraints of mobile devices, data integrity is verified by lightweight computing and low data transmission. The scheme improves shortage that mobile device communication and computing power are limited, it supports dynamic data operation in mobile multicloud environment, and data integrity can be verified without using direct source file block. Experimental results also demonstrate that this scheme can achieve a lower cost of computing and communications.

  15. An extrapolation scheme for solid-state NMR chemical shift calculations

    Science.gov (United States)

    Nakajima, Takahito

    2017-06-01

    Conventional quantum chemical and solid-state physical approaches include several problems to accurately calculate solid-state nuclear magnetic resonance (NMR) properties. We propose a reliable computational scheme for solid-state NMR chemical shifts using an extrapolation scheme that retains the advantages of these approaches but reduces their disadvantages. Our scheme can satisfactorily yield solid-state NMR magnetic shielding constants. The estimated values have only a small dependence on the low-level density functional theory calculation with the extrapolation scheme. Thus, our approach is efficient because the rough calculation can be performed in the extrapolation scheme.

  16. Stimulating Learning with Integrated Assessments in Construction Education

    Directory of Open Access Journals (Sweden)

    Imriyas Kamardeen

    2014-09-01

    Full Text Available Quality of learning students experience is heavily dependent on the effectiveness of course design. Assessments are a key component in course design and students determine their level of involvement in a learning activity based on whether it is assessed or not. Assessments are therefore a powerful tool that lecturers can utilise to drive learning. However, designing effective assessments to stimulate learning is challenging in the presence of disciplinary, contextual dimensions. A case study approach is adopted to demonstrate how effective integrated assessment schemes may be developed and implemented for construction education. The scheme in the case study amalgamated case-based learning, online quizzes and adaptive eTests to provide a variety of assessments, aligned with lecture topics and contemporary real-word scenarios. It was found that the presence of both formative and summative tasks in the assessment scheme complemented each other, kept students constantly motivated and engaged in learning, and resulted in a good learning experience for them. The study provide evidence, and valuable insights and tips for lecturers in similar degree programs as to how they could modify pedagogical styles in their courses for better learning experiences for students and improved teaching ratings for themselves. Keywords: Pedagogy, Integrated assessment, Case-based learning, Online quiz, Adaptive eLearning

  17. Stimulating Learning with Integrated Assessments in Construction Education

    Directory of Open Access Journals (Sweden)

    Imriyas Kamardeen

    2014-09-01

    Full Text Available Quality of learning students experience is heavily dependent on the effectiveness of course design. Assessments are a key component in course design and students determine their level of involvement in a learning activity based on whether it is assessed or not. Assessments are therefore a powerful tool that lecturers can utilise to drive learning. However, designing effective assessments to stimulate learning is challenging in the presence of disciplinary, contextual dimensions. A case study approach is adopted to demonstrate how effective integrated assessment schemes may be developed and implemented for construction education. The scheme in the case study amalgamated case-based learning, online quizzes and adaptive eTests to provide a variety of assessments, aligned with lecture topics and contemporary real-word scenarios. It was found that the presence of both formative and summative tasks in the assessment scheme complemented each other, kept students constantly motivated and engaged in learning, and resulted in a good learning experience for them. The study provide evidence, and valuable insights and tips for lecturers in similar degree programs as to how they could modify pedagogical styles in their courses for better learning experiences for students and improved teaching ratings for themselves.   Keywords: Pedagogy, Integrated assessment, Case-based learning, Online quiz, Adaptive eLearning

  18. Multi-area layered multicast scheme for MPLS networks

    Science.gov (United States)

    Ma, Yajie; Yang, Zongkai; Wang, Yuming; Chen, Jingwen

    2005-02-01

    Multi-protocol label switching (MPLS) is multiprotocols both at layer 2 and layer 3. It is suggested to overcome the shortcomings of performing complex longest prefix matching in layer 3 routing by using short, fixed length labels. The MPLS community has put more effort into the label switching of unicast IP traffic, but less in the MPLS multicast mechanism. The reasons are the higher label consumption, the dynamical mapping of L3 multicast tree to L2 LSPs and the 20-bit shim header which is much fewer than the IPv4 IP header. On the other hand, heterogeneity of node capability degrades total performance of a multicast group. In order to achieve the scalability as well as the heterogeneity in MPLS networks, a novel scheme of MPLS-based Multi-area Layered Multicast Scheme (MALM) is proposed. Unlike the existing schemes which focus on aggregating the multicast stream, we construct the multicast tree based on the virtual topology aggregation. The MPLS area is divided into different sub-areas to form the hierarchical virtual topology and the multicast group is reconstructed into multiple layers according to the node capability. At the same time, the label stack is used to save the label space. For stability of the MALM protocol, a multi-layer protection scheme is also discussed. The experiment results show that the proposed scheme saves label space and decrease the Multicast Forwarding Table in much degree.

  19. How Governance Regimes Shape the Implementation of Water Reuse Schemes

    Directory of Open Access Journals (Sweden)

    Jos Frijns

    2016-12-01

    Full Text Available The governance dimensions of water reuse scheme development and operation, such as policies and regulatory frameworks, and public involvement and stakeholder collaboration, can serve to both facilitate and constrain wider adoption of water reuse practices. This paper explores the significance and underlying structure of the key governance challenges facing the water reuse sector in Europe. It presents empirical evidence from interviews and focus group sessions conducted at four water reuse schemes: an indirect potable reuse scheme at Torreele (Belgium, the urban reuse of treated municipal wastewater at the London Olympic Park (United Kingdom and at Sabadell (Spain, and the reuse of agro-industrial effluent for irrigation at Capitanata (Italy. The findings underscore the importance of clarity in policy arrangements around water reuse, as well as of the financial competitiveness of reuse projects compared to alternative water supply options. Operators of water reuse schemes expressed a preference for water quality standards, which focus on appropriateness for use rather than over-emphasise the waters’ origin so that unnecessary treatment and costs can be avoided. Positive public support was widely acknowledged as an important factor in the success or failure of water reuse schemes. We conclude that constructive institutional relationships underpin many of the challenges faced by reuse scheme operators and that greater emphasis should be given to building confidence and gaining trust in water service providers through early identification of how governance regimes shape the viability of new schemes.

  20. On the construction of capacity-achieving lattice Gaussian codes

    KAUST Repository

    Alghamdi, Wael Mohammed Abdullah

    2016-08-15

    In this paper, we propose a new approach to proving results regarding channel coding schemes based on construction-A lattices for the Additive White Gaussian Noise (AWGN) channel that yields new characterizations of the code construction parameters, i.e., the primes and dimensions of the codes, as functions of the block-length. The approach we take introduces an averaging argument that explicitly involves the considered parameters. This averaging argument is applied to a generalized Loeliger ensemble [1] to provide a more practical proof of the existence of AWGN-good lattices, and to characterize suitable parameters for the lattice Gaussian coding scheme proposed by Ling and Belfiore [3]. © 2016 IEEE.

  1. On the construction of capacity-achieving lattice Gaussian codes

    KAUST Repository

    Alghamdi, Wael; Abediseid, Walid; Alouini, Mohamed-Slim

    2016-01-01

    In this paper, we propose a new approach to proving results regarding channel coding schemes based on construction-A lattices for the Additive White Gaussian Noise (AWGN) channel that yields new characterizations of the code construction parameters, i.e., the primes and dimensions of the codes, as functions of the block-length. The approach we take introduces an averaging argument that explicitly involves the considered parameters. This averaging argument is applied to a generalized Loeliger ensemble [1] to provide a more practical proof of the existence of AWGN-good lattices, and to characterize suitable parameters for the lattice Gaussian coding scheme proposed by Ling and Belfiore [3]. © 2016 IEEE.

  2. Level set method for image segmentation based on moment competition

    Science.gov (United States)

    Min, Hai; Wang, Xiao-Feng; Huang, De-Shuang; Jin, Jing; Wang, Hong-Zhi; Li, Hai

    2015-05-01

    We propose a level set method for image segmentation which introduces the moment competition and weakly supervised information into the energy functional construction. Different from the region-based level set methods which use force competition, the moment competition is adopted to drive the contour evolution. Here, a so-called three-point labeling scheme is proposed to manually label three independent points (weakly supervised information) on the image. Then the intensity differences between the three points and the unlabeled pixels are used to construct the force arms for each image pixel. The corresponding force is generated from the global statistical information of a region-based method and weighted by the force arm. As a result, the moment can be constructed and incorporated into the energy functional to drive the evolving contour to approach the object boundary. In our method, the force arm can take full advantage of the three-point labeling scheme to constrain the moment competition. Additionally, the global statistical information and weakly supervised information are successfully integrated, which makes the proposed method more robust than traditional methods for initial contour placement and parameter setting. Experimental results with performance analysis also show the superiority of the proposed method on segmenting different types of complicated images, such as noisy images, three-phase images, images with intensity inhomogeneity, and texture images.

  3. Nonlinear Stability Analysis of a Composite Girder Cable-Stayed Bridge with Three Pylons during Construction

    Directory of Open Access Journals (Sweden)

    Xiaoguang Deng

    2015-01-01

    Full Text Available Based on the nonlinear stability analysis method, the 3D nonlinear finite element model of a composite girder cable-stayed bridge with three pylons is established to research the effect of factors including geometric nonlinearity, material nonlinearity, static wind load, and unbalanced construction load on the structural stability during construction. Besides, the structural nonlinear stability in different construction schemes and the determination of temporary pier position are also studied. The nonlinear stability safety factors are calculated to demonstrate the rationality and safety of construction schemes. The results show that the nonlinear stability safety factors of this bridge during construction meet the design requirement and the minimum value occurs in the maximum double cantilever stage. Besides, the nonlinear stability of the structure in the side of edge-pylon meets the design requirement in the two construction schemes. Furthermore, the temporary pier can improve the structure stability, effectively, and the actual position is reasonable. In addition, the local buckling of steel girder occurs earlier than overall instability under load in some cable tension stages. Finally, static wind load and the unbalanced construction load should be considered in the stability analysis for the adverse impact.

  4. Causes of Low-Skilled Workers’ Performance in Construction Projects

    Directory of Open Access Journals (Sweden)

    Alhaji Ali Zannah

    2017-06-01

    Full Text Available Skilled workers’ performance is one of the crucial aspects of labour productivity that requires proper attention for effective projects delivery in the construction industry. The level of skilled workers’ low performance has been seen to be a major factor which contributes toward inefficient construction projects productivity. Therefore, the objective of this research is to identify the causes of low-skilled workers’ performance in construction projects in the Nigeria. The objective was achieved through a structured quantitative method of questionnaire distributed to 150 respondents that comprise of active stakeholders in the Nigerian construction industry. 111 responses representing 74 % were retrieved. The data were analysed using descriptive statistics and analysis of variance (ANOVA. The finding shows that; low wages of skilled, lack of sufficient skill acquisition centres and lack of incentive schemes for skilled workers were the most significant causes of low-skilled workers’ performance in the Nigerian construction industry. The homogenous analysis indicates that there are significant differences in perception of respondents on few variables whereas majority of respondents have similarities in most of the variables. The research findings indicate the need for stakeholders in the Nigerian construction industry to provide incentives and motivate skilled workers, provide training and retraining, conducive working condition, supply of quality materials and equipment, and proper site management in order improve low-skilled workers’ performance in Nigerian construction industry towards optimal performance.

  5. Construction Safety And Health Factors At The Industry Level: The Case Of Singapore

    Directory of Open Access Journals (Sweden)

    Charles Y.J. Cheah

    2007-12-01

    Full Text Available The construction industry is one of the most hazardous industries due to the unique nature of its products and the processes involved. Recent occurrences of highly publicized construction site accidents in Singapore have highlighted the immediate needs for the local industry to address safety and attention at the industry level. The objective of this paper is to examine issues and critical factors affecting S&H standards in Singapore. Clearly, collective efforts should be pursued at the industry level as the country moves towards the ultimate safety management strategy of self-regulation. The findings also indicate that the challenge of making worksites safe should not be placed solely on the contractors but should be shared by all parties affecting the value chain of construction, including the developers, the consultants and the government. The factors identified through factor analysis may inform legislators and industry practitioners in terms of the sources of problems and help develop effective strategies for improvement. Some of the experiences mentioned in the paper could also be relevant to other countries facing similar circumstances.

  6. A VR Based Interactive Genetic Algorithm Framework For Design of Support Schemes to Deep Excavations

    International Nuclear Information System (INIS)

    Wei, Riyu; Wu, Heng

    2002-01-01

    An interactive genetic algorithm (IGA) framework for the design of support schemes to deep excavations is proposed in this paper, in which virtual reality (VR) is used as an aid to the evaluation of design schemes that is performed interactively. The fitness of a scheme individual is evaluated by two steps. Firstly a fitness value is automatically assigned to a scheme individual according to the the estimated construction cost of the individual. And the human evaluation is introduced to modify the fitness value by taking into account other factors, such as the feasibility factor. The design scheme is composed of four basic categories, i. e., cantilever walls, reinforced soil walls, tieback systems and bracing systems, each of which is encoded by a binary string. To assist human evaluation, 3D models of design schemes are created and visualized in a virtual reality environment, providing designers with a reality sense of various schemes

  7. A General Construction of IND-CCA2 Secure Public Key Encryption

    DEFF Research Database (Denmark)

    Kiltz, Eike; Malone-Lee, John

    2003-01-01

    We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in [1, 2] fits our general framework and moreover that our method of analysis leads to a more efficient security reduction....

  8. A data seamless interaction scheme between electric power secondary business systems

    Science.gov (United States)

    Ai, Wenkai; Qian, Feng

    2018-03-01

    At present, the data interaction of electric power secondary business systems is very high, and it is not universal to develop programs when data interaction is carried out by different manufacturers' electric power secondary business systems. There are different interaction schemes for electric power secondary business systems with different manufacturers, which lead to high development cost, low reusability and high maintenance difficulty. This paper introduces a new data seamless interaction scheme between electric power secondary business systems. The scheme adopts the international common Java message service protocol as the transmission protocol, adopts the common JavaScript object symbol format as the data interactive format, unified electric power secondary business systems data interactive way, improve reusability, reduce complexity, monitor the operation of the electric power secondary business systems construction has laid a solid foundation.

  9. Verifying atom entanglement schemes by testing Bell's inequality

    International Nuclear Information System (INIS)

    Angelakis, D.G.; Knight, P.L.; Tregenna, B.; Munro, W.J.

    2001-01-01

    Recent experiments to test Bell's inequality using entangled photons and ions aimed at tests of basic quantum mechanical principles. Interesting results have been obtained and many loopholes could be closed. In this paper we want to point out that tests of Bell's inequality also play an important role in verifying atom entanglement schemes. We describe as an example a scheme to prepare arbitrary entangled states of N two-level atoms using a leaky optical cavity and a scheme to entangle atoms inside a photonic crystal. During the state preparation no photons are emitted, and observing a violation of Bell's inequality is the only way to test whether a scheme works with a high precision or not. (orig.)

  10. A New Graph Drawing Scheme for Social Network

    Directory of Open Access Journals (Sweden)

    Eric Ke Wang

    2014-01-01

    visualization is employed to extract the potential information from the large scale of social network data and present the information briefly as visualized graphs. In the process of information visualization, graph drawing is a crucial part. In this paper, we study the graph layout algorithms and propose a new graph drawing scheme combining multilevel and single-level drawing approaches, including the graph division method based on communities and refining approach based on partitioning strategy. Besides, we compare the effectiveness of our scheme and FM3 in experiments. The experiment results show that our scheme can achieve a clearer diagram and effectively extract the community structure of the social network to be applied to drawing schemes.

  11. Using Sphinx to Improve Onion Routing Circuit Construction

    Science.gov (United States)

    Kate, Aniket; Goldberg, Ian

    This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit construction messages for three onion routing protocols that have emerged as enhancements to the Tor anonymizing network; namely, Tor with predistributed Diffie-Hellman values, pairing-based onion routing, and certificateless onion routing. Our new circuit constructions are also secure in the universal composability framework, a property that was missing from the original constructions. Further, we compare the performance of our schemes with their older counterparts as well as with each other.

  12. Investigating students’ failure in fractional concept construction

    Science.gov (United States)

    Kurniawan, Henry; Sutawidjaja, Akbar; Rahman As’ari, Abdur; Muksar, Makbul; Setiawan, Iwan

    2018-04-01

    Failure is a failure to achieve goals. This failure occurs because a larger scheme integrates the schemes in mind that are related to the problem at hand. These schemes are integrated so that they are interconnected to form new structures. This new scheme structure is used to interpret the problems at hand. This research is a qualitative research done to trace student’s failure which happened in fractional concept construction. Subjects in this study as many as 2 students selected from 15 students with the consideration of these students meet the criteria that have been set into two groups that fail in solving the problem. Both groups, namely group 1 is a search group for the failure of students of S1 subject and group 2 is a search group for the failure of students of S2 subject.

  13. On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes

    NARCIS (Netherlands)

    Tang, Qiang; Jeckmans, Arjan

    A (computational) client puzzle scheme enables a client to prove to a server that a certain amount of computing resources (CPU cycles and/or Memory look-ups) has been dedicated to solve a puzzle. Researchers have identified a number of potential applications, such as constructing timed cryptography,

  14. A progressive diagonalization scheme for the Rabi Hamiltonian

    International Nuclear Information System (INIS)

    Pan, Feng; Guan, Xin; Wang, Yin; Draayer, J P

    2010-01-01

    A diagonalization scheme for the Rabi Hamiltonian, which describes a qubit interacting with a single-mode radiation field via a dipole interaction, is proposed. It is shown that the Rabi Hamiltonian can be solved almost exactly using a progressive scheme that involves a finite set of one variable polynomial equations. The scheme is especially efficient for the lower part of the spectrum. Some low-lying energy levels of the model with several sets of parameters are calculated and compared to those provided by the recently proposed generalized rotating-wave approximation and a full matrix diagonalization.

  15. A Semantic Basis for Meaning Construction in Constructivist Interactions

    DEFF Research Database (Denmark)

    Badie, Farshad

    2015-01-01

    . In this research I will analyse 'meaning construction' within constructivism. I will focus on a semantic loop that the learner and mentor as intentional participants move through and organise their personal constructed conceptions in order to construct meanings and produce their individual meaningful...... comprehensions. Subsequently, I will provide a semantic framework for analysing the meaning construction based on personal knowings and personal conceptions within constructivist interactions. This research could propose a new scheme for interpretation based on semantics and on interaction....

  16. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  17. Comparison of renormalization group schemes for sine-Gordon-type models

    International Nuclear Information System (INIS)

    Nandori, I.; Nagy, S.; Sailer, K.; Trombettoni, A.

    2009-01-01

    The scheme dependence of the renormalization group (RG) flow has been investigated in the local potential approximation for two-dimensional periodic, sine-Gordon type field-theoretic models discussing the applicability of various functional RG methods in detail. It was shown that scheme-independent determination of such physical parameters is possible as the critical frequency (temperature) at which Kosterlitz-Thouless-Berezinskii type phase transition takes place in the sine-Gordon and the layered sine-Gordon models, and the critical ratio characterizing the Ising-type phase transition of the massive sine-Gordon model. For the latter case, the Maxwell construction represents a strong constraint on the RG flow, which results in a scheme-independent infrared value for the critical ratio. For the massive sine-Gordon model also the shrinking of the domain of the phase with spontaneously broken periodicity is shown to take place due to the quantum fluctuations.

  18. Differential on-on keying: A robust non-coherent digital modulation scheme

    KAUST Repository

    Kaddoum, Georges

    2015-05-01

    A robust digital modulation scheme, called differential on-on keying (DOOK), is presented in this paper which outperforms the conventional on-off keying (OOK). In this scheme, a sinusoidal signal is transmitted during the first half of the bit duration while a replica or an inverted version of the sinusoidal signal is transmitted during the second half for logic one or logic zero, respectively. Non-coherent receiver correlates the two halves of the received signal over half bit duration to construct a decision variable. Bit error performance is analyzed over AWGN and Rayleigh fading channels and compared to the conventional OOK.

  19. Differential on-on keying: A robust non-coherent digital modulation scheme

    KAUST Repository

    Kaddoum, Georges; Ahmed, Mohammed F. A.; Al-Naffouri, Tareq Y.

    2015-01-01

    A robust digital modulation scheme, called differential on-on keying (DOOK), is presented in this paper which outperforms the conventional on-off keying (OOK). In this scheme, a sinusoidal signal is transmitted during the first half of the bit duration while a replica or an inverted version of the sinusoidal signal is transmitted during the second half for logic one or logic zero, respectively. Non-coherent receiver correlates the two halves of the received signal over half bit duration to construct a decision variable. Bit error performance is analyzed over AWGN and Rayleigh fading channels and compared to the conventional OOK.

  20. Asymptotically and exactly energy balanced augmented flux-ADER schemes with application to hyperbolic conservation laws with geometric source terms

    Science.gov (United States)

    Navas-Montilla, A.; Murillo, J.

    2016-07-01

    In this work, an arbitrary order HLL-type numerical scheme is constructed using the flux-ADER methodology. The proposed scheme is based on an augmented Derivative Riemann solver that was used for the first time in Navas-Montilla and Murillo (2015) [1]. Such solver, hereafter referred to as Flux-Source (FS) solver, was conceived as a high order extension of the augmented Roe solver and led to the generation of a novel numerical scheme called AR-ADER scheme. Here, we provide a general definition of the FS solver independently of the Riemann solver used in it. Moreover, a simplified version of the solver, referred to as Linearized-Flux-Source (LFS) solver, is presented. This novel version of the FS solver allows to compute the solution without requiring reconstruction of derivatives of the fluxes, nevertheless some drawbacks are evidenced. In contrast to other previously defined Derivative Riemann solvers, the proposed FS and LFS solvers take into account the presence of the source term in the resolution of the Derivative Riemann Problem (DRP), which is of particular interest when dealing with geometric source terms. When applied to the shallow water equations, the proposed HLLS-ADER and AR-ADER schemes can be constructed to fulfill the exactly well-balanced property, showing that an arbitrary quadrature of the integral of the source inside the cell does not ensure energy balanced solutions. As a result of this work, energy balanced flux-ADER schemes that provide the exact solution for steady cases and that converge to the exact solution with arbitrary order for transient cases are constructed.

  1. Gaining qualitative insight into the subjective experiences of adherers to an exercise referral scheme: A thematic analysis.

    Science.gov (United States)

    Eynon, Michael John; O'Donnell, Christopher; Williams, Lynn

    2016-07-01

    Nine adults who had completed an exercise referral scheme participated in a semi-structured interview to uncover the key psychological factors associated with adherence to the scheme. Through thematic analysis, an exercise identity emerged to be a major factor associated with adherence to the scheme, which was formed of a number of underpinning constructs including changes in self-esteem, changes in self-efficacy and changes in self-regulatory strategies. Also, an additional theme of transitions in motivation to exercise was identified, showing participants' motivation to alter from extrinsic to intrinsic reasons to exercise during the scheme.

  2. Application of quasi-optical approach to construct RF power supply for TeV linear colliders

    International Nuclear Information System (INIS)

    Saldin, E.L.; Sarantsev, V.P.; Schneidmiller, E.A.; Ulyanov, Yu.N.; Yurkov, M.V.

    1995-01-01

    An idea to use a quasi-optical approach for constructing an RF power supply for TeV linear e + e - colliders is developed. The RF source of the proposed scheme is composed of a large number of low-power RF amplifiers commutated by quasi-optical elements. The RF power of this source is transmitted to the accelerating structure of the collider by means of quasi-optical waveguides and mirrors. Such an approach enables one not only to decrease the required peak RF power by several orders of magnitude with respect to the traditional approach based on standard klystron technique, but also to achieve the required level of reliability, as it is based on well-developed technology of serial microwave devices. To illustrate the proposed scheme, a conceptual project of 2x500 GeV X-band collider is considered. Accelerating structure of the collider is of the standard travelling wave type and the RF source is assumed to be composed of 0.7 MW klystrons. All equipment of such a collider is placed in a tunnel of 12x6 m 2 cross section. It is shown that such a collider may be constructed at the present level of accelerator technique. ((orig.))

  3. Construction of Difference Equations Using Lie Groups

    International Nuclear Information System (INIS)

    Axford, R.A.

    1998-01-01

    The theory of prolongations of the generators of groups of point transformations to the grid point values of dependent variables and grid spacings is developed and applied to the construction of group invariant numerical algorithms. The concepts of invariant difference operators and generalized discrete sources are introduced for the discretization of systems of inhomogeneous differential equations and shown to produce exact difference equations. Invariant numerical flux functions are constructed from the general solutions of first order partial differential equations that come out of the evaluation of the Lie derivatives of conservation forms of difference schemes. It is demonstrated that invariant numerical flux functions with invariant flux or slope limiters can be determined to yield high resolution difference schemes. The introduction of an invariant flux or slope limiter can be done so as not to break the symmetry properties of a numerical flux-function

  4. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  5. Relating ASD symptoms to well-being: moving across different construct levels.

    Science.gov (United States)

    Deserno, M K; Borsboom, D; Begeer, S; Geurts, H M

    2018-05-01

    Little is known about the specific factors that contribute to the well-being (WB) of individuals with autism spectrum disorder (ASD). A plausible hypothesis is that ASD symptomatology has a direct negative effect on WB. In the current study, the emerging tools of network analysis allow to explore the functional interdependencies between specific symptoms of ASD and domains of WB in a multivariate framework. We illustrate how studying both higher-order (total score) and lower-order (subscale) representations of ASD symptomatology can clarify the interrelations of factors relevant for domains of WB. We estimated network structures on three different construct levels for ASD symptomatology, as assessed with the Adult Social Behavior Questionnaire (item, subscale, total score), relating them to daily functioning (DF) and subjective WB in 323 adult individuals with clinically identified ASD (aged 17-70 years). For these networks, we assessed the importance of specific factors in the network structure. When focusing on the highest representation level of ASD symptomatology (i.e. a total score), we found a negative connection between ASD symptom severity and domains of WB. However, zooming in on lower representation levels of ASD symptomatology revealed that this connection was mainly funnelled by ASD symptoms related to insistence on sameness and experiencing reduced contact and that those symptom scales, in turn, impact different domains of WB. Zooming in across construct levels of ASD symptom severity into subscales of ASD symptoms can provide us with important insights into how specific domains of ASD symptoms relate to specific domains of DF and WB.

  6. Leasing instruments of high-rise construction financing

    Science.gov (United States)

    Aleksandrova, Olga; Ivleva, Elena; Sukhacheva, Viktoria; Rumyantseva, Anna

    2018-03-01

    The leasing sector of the business economics is expanding. Leasing instruments for high-rise construction financing allow to determine the best business behaviour in the leasing economy sector, not only in the sphere of transactions with equipment and vehicles. Investments in high-rise construction have a multiplicative effect. It initiates an active search and leasing instruments use in the economic behaviour of construction organizations. The study of the high-rise construction sector in the structure of the leasing market participants significantly expands the leasing system framework. The scheme of internal and external leasing process factors influence on the result formation in the leasing sector of economy is offered.

  7. Explicit TE/TM scheme for particle beam simulations

    International Nuclear Information System (INIS)

    Dohlus, M.; Zagorodnov, I.

    2008-10-01

    In this paper we propose an explicit two-level conservative scheme based on a TE/TM like splitting of the field components in time. Its dispersion properties are adjusted to accelerator problems. It is simpler and faster than the implicit version. It does not have dispersion in the longitudinal direction and the dispersion properties in the transversal plane are improved. The explicit character of the new scheme allows a uniformly stable conformal method without iterations and the scheme can be parallelized easily. It assures energy and charge conservation. A version of this explicit scheme for rotationally symmetric structures is free from the progressive time step reducing for higher order azimuthal modes as it takes place for Yee's explicit method used in the most popular electrodynamics codes. (orig.)

  8. Investigation of optimal photoionization schemes for Sm by multi-step resonance ionization

    International Nuclear Information System (INIS)

    Cha, H.; Song, K.; Lee, J.

    1997-01-01

    Excited states of Sm atoms are investigated by using multi-color resonance enhanced multiphoton ionization spectroscopy. Among the ionization signals one observed at 577.86 nm is regarded as the most efficient excited state if an 1-color 3-photon scheme is applied. Meanwhile an observed level located at 587.42 nm is regarded as the most efficient state if one uses a 2-color scheme. For 2-color scheme a level located at 573.50 nm from this first excited state is one of the best second excited state for the optimal photoionization scheme. Based on this ionization scheme various concentrations of standard solutions for samarium are determined. The minimum amount of sample which can be detected by a 2-color scheme is determined as 200 fg. The detection sensitivity is limited mainly due to the pollution of the graphite atomizer. copyright 1997 American Institute of Physics

  9. An evaluation scheme for nanotechnology policies

    International Nuclear Information System (INIS)

    Soltani, Ali M.; Tabatabaeian, Seyed H.; Hanafizadeh, Payam; Bamdad Soofi, Jahanyar

    2011-01-01

    Dozens of countries are executing national nanotechnology plans. No rigorous evaluation scheme for these plans exists, although stakeholders—especially policy makers, top-level agencies and councils, as well as the society at large—are eager to learn the outcome of these policies. In this article, we recommend an evaluation scheme for national nanotechnology policies that would be used to review the whole or any component part of a national nanotechnology plan. In this scheme, a component at any level of aggregation is evaluated. The component may be part of the plan’s overarching policy goal, which for most countries is to create wealth and improve the quality of life of their nation with nanotechnology. Alternatively, the component may be a programme or an activity related to a programme. The evaluation could be executed at different times in the policy’s life cycle, i.e., before the policy is formulated, during its execution or after its completion. The three criteria for policy evaluation are appropriateness, efficiency and effectiveness. The evaluator should select the appropriate qualitative or quantitative methods to evaluate the various components of national nanotechnology plans.

  10. A Stereo Music Preprocessing Scheme for Cochlear Implant Users.

    Science.gov (United States)

    Buyens, Wim; van Dijk, Bas; Wouters, Jan; Moonen, Marc

    2015-10-01

    Listening to music is still one of the more challenging aspects of using a cochlear implant (CI) for most users. Simple musical structures, a clear rhythm/beat, and lyrics that are easy to follow are among the top factors contributing to music appreciation for CI users. Modifying the audio mix of complex music potentially improves music enjoyment in CI users. A stereo music preprocessing scheme is described in which vocals, drums, and bass are emphasized based on the representation of the harmonic and the percussive components in the input spectrogram, combined with the spatial allocation of instruments in typical stereo recordings. The scheme is assessed with postlingually deafened CI subjects (N = 7) using pop/rock music excerpts with different complexity levels. The scheme is capable of modifying relative instrument level settings, with the aim of improving music appreciation in CI users, and allows individual preference adjustments. The assessment with CI subjects confirms the preference for more emphasis on vocals, drums, and bass as offered by the preprocessing scheme, especially for songs with higher complexity. The stereo music preprocessing scheme has the potential to improve music enjoyment in CI users by modifying the audio mix in widespread (stereo) music recordings. Since music enjoyment in CI users is generally poor, this scheme can assist the music listening experience of CI users as a training or rehabilitation tool.

  11. Constructing unified models based on E8 in ten dimensions

    International Nuclear Information System (INIS)

    Kapetanakis, D.

    1992-01-01

    We examine the virtues and difficulties of the attempts to construct realistic four-dimensional models from a gauge theory based on E 8 and defined in ten dimensions. The four-dimensional theories are obtained using the coset space dimensional reduction scheme. Some of our points and in particular the proposed mechanism for supersymmetry breaking might be useful in other dimensional reduction schemes. (orig.)

  12. Construction of the Entrepreneurship Education Teachers Based on the Characteristics of Business Education Level

    Science.gov (United States)

    Wei, Yaping; Guo, Wenting

    2010-01-01

    College entrepreneurship education relatively lags behind in China at present. The main reason is that the lack of qualified teachers. For the construction of teachers' team training, firstly analysis the characteristics of the entrepreneurship education level, and then divide into two relatively independent levels which are basic entrepreneurship…

  13. Gröbner Bases and Generation of Difference Schemes for Partial Differential Equations

    Directory of Open Access Journals (Sweden)

    Vladimir P. Gerdt

    2006-05-01

    Full Text Available In this paper we present an algorithmic approach to the generation of fully conservative difference schemes for linear partial differential equations. The approach is based on enlargement of the equations in their integral conservation law form by extra integral relations between unknown functions and their derivatives, and on discretization of the obtained system. The structure of the discrete system depends on numerical approximation methods for the integrals occurring in the enlarged system. As a result of the discretization, a system of linear polynomial difference equations is derived for the unknown functions and their partial derivatives. A difference scheme is constructed by elimination of all the partial derivatives. The elimination can be achieved by selecting a proper elimination ranking and by computing a Gröbner basis of the linear difference ideal generated by the polynomials in the discrete system. For these purposes we use the difference form of Janet-like Gröbner bases and their implementation in Maple. As illustration of the described methods and algorithms, we construct a number of difference schemes for Burgers and Falkowich-Karman equations and discuss their numerical properties.

  14. Matching soil salinization and cropping systems in communally managed irrigation schemes

    Science.gov (United States)

    Malota, Mphatso; Mchenga, Joshua

    2018-03-01

    Occurrence of soil salinization in irrigation schemes can be a good indicator to introduce high salt tolerant crops in irrigation schemes. This study assessed the level of soil salinization in a communally managed 233 ha Nkhate irrigation scheme in the Lower Shire Valley region of Malawi. Soil samples were collected within the 0-0.4 m soil depth from eight randomly selected irrigation blocks. Irrigation water samples were also collected from five randomly selected locations along the Nkhate River which supplies irrigation water to the scheme. Salinity of both the soil and the irrigation water samples was determined using an electrical conductivity (EC) meter. Analysis of the results indicated that even for very low salinity tolerant crops (ECi water was suitable for irrigation purposes. However, root-zone soil salinity profiles depicted that leaching of salts was not adequate and that the leaching requirement for the scheme needs to be relooked and always be adhered to during irrigation operation. The study concluded that the crop system at the scheme needs to be adjusted to match with prevailing soil and irrigation water salinity levels.

  15. Biomechanics of Hybrid Anterior Cervical Fusion and Artificial Disc Replacement in 3-Level Constructs: An In Vitro Investigation

    Science.gov (United States)

    Liao, Zhenhua; Fogel, Guy R.; Pu, Ting; Gu, Hongsheng; Liu, Weiqiang

    2015-01-01

    Background The ideal surgical approach for cervical disk disease remains controversial, especially for multilevel cervical disease. The purpose of this study was to investigate the biomechanics of the cervical spine after 3-level hybrid surgery compared with 3-level anterior cervical discectomy and fusion (ACDF). Material/Methods Eighteen human cadaveric spines (C2-T1) were evaluated under displacement-input protocol. After intact testing, a simulated hybrid construct or fusion construct was created between C3 to C6 and tested in the following 3 conditions: 3-level disc plate disc (3DPD), 3-level plate disc plate (3PDP), and 3-level plate (3P). Results Compared to intact, almost 65~80% of motion was successfully restricted at C3-C6 fusion levels (p0.05). 3PDP construct resulted in significant decrease of ROM at C3-C6 levels less than 3P (pbiomechanical advantages compared to fusion in normalizing motion. PMID:26529430

  16. Maximum-principle-satisfying space-time conservation element and solution element scheme applied to compressible multifluids

    KAUST Repository

    Shen, Hua; Wen, Chih-Yung; Parsani, Matteo; Shu, Chi-Wang

    2016-01-01

    A maximum-principle-satisfying space-time conservation element and solution element (CE/SE) scheme is constructed to solve a reduced five-equation model coupled with the stiffened equation of state for compressible multifluids. We first derive a sufficient condition for CE/SE schemes to satisfy maximum-principle when solving a general conservation law. And then we introduce a slope limiter to ensure the sufficient condition which is applicative for both central and upwind CE/SE schemes. Finally, we implement the upwind maximum-principle-satisfying CE/SE scheme to solve the volume-fraction-based five-equation model for compressible multifluids. Several numerical examples are carried out to carefully examine the accuracy, efficiency, conservativeness and maximum-principle-satisfying property of the proposed approach.

  17. Maximum-principle-satisfying space-time conservation element and solution element scheme applied to compressible multifluids

    KAUST Repository

    Shen, Hua

    2016-10-19

    A maximum-principle-satisfying space-time conservation element and solution element (CE/SE) scheme is constructed to solve a reduced five-equation model coupled with the stiffened equation of state for compressible multifluids. We first derive a sufficient condition for CE/SE schemes to satisfy maximum-principle when solving a general conservation law. And then we introduce a slope limiter to ensure the sufficient condition which is applicative for both central and upwind CE/SE schemes. Finally, we implement the upwind maximum-principle-satisfying CE/SE scheme to solve the volume-fraction-based five-equation model for compressible multifluids. Several numerical examples are carried out to carefully examine the accuracy, efficiency, conservativeness and maximum-principle-satisfying property of the proposed approach.

  18. Carrier-based modulation schemes for various three-level matrix converters

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Loh, P.C.; Rong, R.C.

    2008-01-01

    different performance merits. To avoid confusion and hence fasten the converter applications in the industry, it would surely be better for modulation schemes to be developed from a common set of modulation principles that unfortunately has not yet been thoroughly defined. Contributing to that area...... a limited set of switching vectors because of its lower semiconductor count. Through simulation and experimental testing, all the evaluated matrix converters are shown to produce satisfactory sinusoidal input and output quantities using the same set of generic modulation principles, which can conveniently...

  19. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-12-08

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.

  20. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-01-01

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792

  1. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2017-12-01

    Full Text Available Vehicle sensor networks (VSNs are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem.

  2. A Modified Computational Scheme for the Stochastic Perturbation Finite Element Method

    Directory of Open Access Journals (Sweden)

    Feng Wu

    Full Text Available Abstract A modified computational scheme of the stochastic perturbation finite element method (SPFEM is developed for structures with low-level uncertainties. The proposed scheme can provide second-order estimates of the mean and variance without differentiating the system matrices with respect to the random variables. When the proposed scheme is used, it involves finite analyses of deterministic systems. In the case of one random variable with a symmetric probability density function, the proposed computational scheme can even provide a result with fifth-order accuracy. Compared with the traditional computational scheme of SPFEM, the proposed scheme is more convenient for numerical implementation. Four numerical examples demonstrate that the proposed scheme can be used in linear or nonlinear structures with correlated or uncorrelated random variables.

  3. Demand response scheme based on lottery-like rebates

    KAUST Repository

    Schwartz, Galina A.; Tembine, Hamidou; Amin, Saurabh; Sastry, S. Shankar

    2014-01-01

    In this paper, we develop a novel mechanism for reducing volatility of residential demand for electricity. We construct a reward-based (rebate) mechanism that provides consumers with incentives to shift their demand to off-peak time. In contrast to most other mechanisms proposed in the literature, the key feature of our mechanism is its modest requirements on user preferences, i.e., it does not require exact knowledge of user responsiveness to rewards for shifting their demand from the peak to the off-peak time. Specifically, our mechanism utilizes a probabilistic reward structure for users who shift their demand to the off-peak time, and is robust to incomplete information about user demand and/or risk preferences. We approach the problem from the public good perspective, and demonstrate that the mechanism can be implemented via lottery-like schemes. Our mechanism permits to reduce the distribution losses, and thus improve efficiency of electricity distribution. Finally, the mechanism can be readily incorporated into the emerging demand response schemes (e.g., the time-of-day pricing, and critical peak pricing schemes), and has security and privacy-preserving properties.

  4. Demand response scheme based on lottery-like rebates

    KAUST Repository

    Schwartz, Galina A.

    2014-08-24

    In this paper, we develop a novel mechanism for reducing volatility of residential demand for electricity. We construct a reward-based (rebate) mechanism that provides consumers with incentives to shift their demand to off-peak time. In contrast to most other mechanisms proposed in the literature, the key feature of our mechanism is its modest requirements on user preferences, i.e., it does not require exact knowledge of user responsiveness to rewards for shifting their demand from the peak to the off-peak time. Specifically, our mechanism utilizes a probabilistic reward structure for users who shift their demand to the off-peak time, and is robust to incomplete information about user demand and/or risk preferences. We approach the problem from the public good perspective, and demonstrate that the mechanism can be implemented via lottery-like schemes. Our mechanism permits to reduce the distribution losses, and thus improve efficiency of electricity distribution. Finally, the mechanism can be readily incorporated into the emerging demand response schemes (e.g., the time-of-day pricing, and critical peak pricing schemes), and has security and privacy-preserving properties.

  5. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  6. Patterns of agri-environmental scheme participation in Europe

    DEFF Research Database (Denmark)

    Pavlis, Evangelos S.; Terkenli, Theano S.; Kristensen, Søren Bech Pilgaard

    2016-01-01

    This paper investigates the personal and property characteristics of landowners who use EU Rural Development agri-environmental schemes (AES), as well as their motives for participation or non-participation in such schemes. The study is based on a questionnaire survey with landowners, in selected...... areas with marginal potential for agriculture. Motives for non-participation were also found to be dependent on the level of farming engagement and on case-area landscape types.......This paper investigates the personal and property characteristics of landowners who use EU Rural Development agri-environmental schemes (AES), as well as their motives for participation or non-participation in such schemes. The study is based on a questionnaire survey with landowners, in selected...... geographical particularities and on subjective factors, farmers' individualities, different rural cultures, landscape types, EU and national policies and special needs of the study areas—all areas where agricultural production is increasingly marginalized, for different reasons. Subsidy scheme participation...

  7. An analytic regularisation scheme on curved space–times with applications to cosmological space–times

    International Nuclear Information System (INIS)

    Géré, Antoine; Hack, Thomas-Paul; Pinamonti, Nicola

    2016-01-01

    We develop a renormalisation scheme for time-ordered products in interacting field theories on curved space–times that consists of an analytic regularisation of Feynman amplitudes and a minimal subtraction of the resulting pole parts. This scheme is directly applicable to space–times with Lorentzian signature, manifestly generally covariant, invariant under any space–time isometries present, and constructed to all orders in perturbation theory. Moreover, the scheme correctly captures the nongeometric state-dependent contribution of Feynman amplitudes, and it is well suited for practical computations. To illustrate this last point, we compute explicit examples on a generic curved space–time and demonstrate how momentum space computations in cosmological space–times can be performed in our scheme. In this work, we discuss only scalar fields in four space–time dimensions, but we argue that the renormalisation scheme can be directly generalised to other space–time dimensions and field theories with higher spin as well as to theories with local gauge invariance. (paper)

  8. Low-Dissipation Advection Schemes Designed for Large Eddy Simulations of Hypersonic Propulsion Systems

    Science.gov (United States)

    White, Jeffrey A.; Baurle, Robert A.; Fisher, Travis C.; Quinlan, Jesse R.; Black, William S.

    2012-01-01

    The 2nd-order upwind inviscid flux scheme implemented in the multi-block, structured grid, cell centered, finite volume, high-speed reacting flow code VULCAN has been modified to reduce numerical dissipation. This modification was motivated by the desire to improve the codes ability to perform large eddy simulations. The reduction in dissipation was accomplished through a hybridization of non-dissipative and dissipative discontinuity-capturing advection schemes that reduces numerical dissipation while maintaining the ability to capture shocks. A methodology for constructing hybrid-advection schemes that blends nondissipative fluxes consisting of linear combinations of divergence and product rule forms discretized using 4th-order symmetric operators, with dissipative, 3rd or 4th-order reconstruction based upwind flux schemes was developed and implemented. A series of benchmark problems with increasing spatial and fluid dynamical complexity were utilized to examine the ability of the candidate schemes to resolve and propagate structures typical of turbulent flow, their discontinuity capturing capability and their robustness. A realistic geometry typical of a high-speed propulsion system flowpath was computed using the most promising of the examined schemes and was compared with available experimental data to demonstrate simulation fidelity.

  9. Construction of a WMR for Trajectory Tracking Control: Experimental Results

    Directory of Open Access Journals (Sweden)

    R. Silva-Ortigoza

    2013-01-01

    Full Text Available This paper reports a solution for trajectory tracking control of a differential drive wheeled mobile robot (WMR based on a hierarchical approach. The general design and construction of the WMR are described. The hierarchical controller proposed has two components: a high-level control and a low-level control. The high-level control law is based on an input-output linearization scheme for the robot kinematic model, which provides the desired angular velocity profiles that the WMR has to track in order to achieve the desired position (x*,y* and orientation (φ*. Then, a low-level control law, based on a proportional integral (PI approach, is designed to control the velocity of the WMR wheels to ensure those tracking features. Regarding the trajectories, this paper provides the solution or the following cases: (1 time-varying parametric trajectories such as straight lines and parabolas and (2 smooth curves fitted by cubic splines which are generated by the desired data points x1*,y1*,…,xn*,yn*. A straightforward algorithm is developed for constructing the cubic splines. Finally, this paper includes an experimental validation of the proposed technique by employing a DS1104 dSPACE electronic board along with MATLAB/Simulink software.

  10. Progress with multigrid schemes for hypersonic flow problems

    International Nuclear Information System (INIS)

    Radespiel, R.; Swanson, R.C.

    1995-01-01

    Several multigrid schemes are considered for the numerical computation of viscous hypersonic flows. For each scheme, the basic solution algorithm employs upwind spatial discretization with explicit multistage time stepping. Two-level versions of the various multigrid algorithms are applied to the two-dimensional advection equation, and Fourier analysis is used to determine their damping properties. The capabilities of the multigrid methods are assessed by solving three different hypersonic flow problems. Some new multigrid schemes based on semicoarsening strategies are shown to be quite effective in relieving the stiffness caused by the high-aspect-ratio cells required to resolve high Reynolds number flows. These schemes exhibit good convergence rates for Reynolds numbers up to 200 X 10 6 and Mach numbers up to 25. 32 refs., 31 figs., 1 tab

  11. Traffic calming schemes : opportunities and implementation strategies.

    NARCIS (Netherlands)

    Schagen, I.N.L.G. van (ed.)

    2003-01-01

    Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and

  12. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  13. An asynchronous data-driven event-building scheme based on ATM switching fabrics

    International Nuclear Information System (INIS)

    Letheren, M.; Christiansen, J.; Mandjavidze, I.; Verhille, H.; De Prycker, M.; Pauwels, B.; Petit, G.; Wright, S.; Lumley, J.

    1994-01-01

    The very high data rates expected in experiments at the next generation of high luminosity hadron colliders will be handled by pipelined front-end readout electronics and multiple levels (2 or 3) of triggering. A variety of data acquisition architectures have been proposed for use downstream of the first level trigger. Depending on the architecture, the aggregate bandwidths required for event building are expected to be of the order 10--100 Gbit/s. Here, an Asynchronous Transfer Mode (ATM) packet-switching network technology is proposed as the interconnect for building high-performance, scalable data acquisition architectures. This paper introduces the relevant characteristics of ATM and describes components for the construction of an ATM-based event builder: (1) a multi-path, self-routing, scalable ATM switching fabric, (2) an experimental high performance workstation ATM-interface, and (3) a VMEbus ATM-interface. The requirement for traffic shaping in ATM-based event-builders is discussed and an analysis of the performance of several such schemes is presented

  14. Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes

    Science.gov (United States)

    Su, Chunhua; Bao, Feng; Zhou, Jianying; Takagi, Tsuyoshi; Sakurai, Kouichi

    Due to the fast development of Internet and the related IT technologies, it becomes more and more easier to access a large amount of data. k-means clustering is a powerful and frequently used technique in data mining. Many research papers about privacy-preserving k-means clustering were published. In this paper, we analyze the existing privacy-preserving k-means clustering schemes based on the cryptographic techniques. We show those schemes will cause the privacy breach and cannot output the correct results due to the faults in the protocol construction. Furthermore, we analyze our proposal as an option to improve such problems but with intermediate information breach during the computation.

  15. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  16. Initial investment to 3D printing technologies in a construction company

    Directory of Open Access Journals (Sweden)

    Cernohorsky, Zdenek

    2017-06-01

    Full Text Available This article deals with an initial investment to 3D printing technologies in a construction company. The investment refers to the use of building information models and their integration with 3D printing technology within a construction company. In the first part, there will be discussed an introduction of 3D printing scheme in a construction company from a lifecycle perspective in general. As a part of this scheme, the ideal variant of an initial investment will be considered a.k.a a pilot project. In the second part, there will be a more detailed discussion of the pilot project, more about each activities which should be its parts and which should analyze cost categories. These categories will be about particular lifecycle stages of the pilot project. In the third part, a summary is done. This article could be a handout for a construction company in a term of an initial investment to 3D printing.

  17. Efficient decoupling schemes with bounded controls based on Eulerian orthogonal arrays

    International Nuclear Information System (INIS)

    Wocjan, Pawel

    2006-01-01

    The task of decoupling, i.e., removing unwanted internal couplings of a quantum system and its couplings to an environment, plays an important role in quantum control theory. There are many efficient decoupling schemes based on combinatorial concepts such as orthogonal arrays, difference schemes, and Hadamard matrices. So far these combinatorial decoupling schemes have relied on the ability to effect sequences of instantaneous, arbitrarily strong control Hamiltonians (bang-bang controls). To overcome the shortcomings of bang-bang control, Viola and Knill proposed a method called 'Eulerian decoupling' that allows the use of bounded-strength controls for decoupling. However, their method was not directly designed to take advantage of the local structure of internal couplings and couplings to an environment that typically occur in multipartite quantum systems. In this paper we define a combinatorial structure called Eulerian orthogonal array. It merges the desirable properties of orthogonal arrays and Eulerian cycles in Cayley graphs (that are the basis of Eulerian decoupling). We show that this structure gives rise to decoupling schemes with bounded-strength control Hamiltonians that can be used to remove both internal couplings and couplings to an environment of a multipartite quantum system. Furthermore, we show how to construct Eulerian orthogonal arrays having good parameters in order to obtain efficient decoupling schemes

  18. 197Au(d,3He)196Pt reaction and the supersymmetry scheme

    International Nuclear Information System (INIS)

    Vergnes, M.; Berrier-Ronsin, G.; Rotbard, G.; Vernotte, J.; Langevin- Joliot, H.; Gerlic, E.; Wiele, J. van de; Guillot, J.

    1981-01-01

    The 197 Au(d, 3 He) 196 Pt reaction has been studied at Esub(d) = 108 MeV. An important breakdown of the selection rules of the supersymmetry scheme is observed for the 2 2 + level. The generally strong excitation of the 2 2 + level by transfer reactions in the Pt region leads to question the validity of the supersymmetry scheme at least for this level

  19. Well-balanced schemes for the Euler equations with gravitation: Conservative formulation using global fluxes

    Science.gov (United States)

    Chertock, Alina; Cui, Shumo; Kurganov, Alexander; Özcan, Şeyma Nur; Tadmor, Eitan

    2018-04-01

    We develop a second-order well-balanced central-upwind scheme for the compressible Euler equations with gravitational source term. Here, we advocate a new paradigm based on a purely conservative reformulation of the equations using global fluxes. The proposed scheme is capable of exactly preserving steady-state solutions expressed in terms of a nonlocal equilibrium variable. A crucial step in the construction of the second-order scheme is a well-balanced piecewise linear reconstruction of equilibrium variables combined with a well-balanced central-upwind evolution in time, which is adapted to reduce the amount of numerical viscosity when the flow is at (near) steady-state regime. We show the performance of our newly developed central-upwind scheme and demonstrate importance of perfect balance between the fluxes and gravitational forces in a series of one- and two-dimensional examples.

  20. Multiobjective hyper heuristic scheme for system design and optimization

    Science.gov (United States)

    Rafique, Amer Farhan

    2012-11-01

    As system design is becoming more and more multifaceted, integrated, and complex, the traditional single objective optimization trends of optimal design are becoming less and less efficient and effective. Single objective optimization methods present a unique optimal solution whereas multiobjective methods present pareto front. The foremost intent is to predict a reasonable distributed pareto-optimal solution set independent of the problem instance through multiobjective scheme. Other objective of application of intended approach is to improve the worthiness of outputs of the complex engineering system design process at the conceptual design phase. The process is automated in order to provide the system designer with the leverage of the possibility of studying and analyzing a large multiple of possible solutions in a short time. This article presents Multiobjective Hyper Heuristic Optimization Scheme based on low level meta-heuristics developed for the application in engineering system design. Herein, we present a stochastic function to manage meta-heuristics (low-level) to augment surety of global optimum solution. Generic Algorithm, Simulated Annealing and Swarm Intelligence are used as low-level meta-heuristics in this study. Performance of the proposed scheme is investigated through a comprehensive empirical analysis yielding acceptable results. One of the primary motives for performing multiobjective optimization is that the current engineering systems require simultaneous optimization of conflicting and multiple. Random decision making makes the implementation of this scheme attractive and easy. Injecting feasible solutions significantly alters the search direction and also adds diversity of population resulting in accomplishment of pre-defined goals set in the proposed scheme.

  1. Partly occupied Wannier functions: Construction and applications

    DEFF Research Database (Denmark)

    Thygesen, Kristian Sommer; Hansen, Lars Bruno; Jacobsen, Karsten Wedel

    2005-01-01

    We have developed a practical scheme to construct partly occupied, maximally localized Wannier functions (WFs) for a wide range of systems. We explain and demonstrate how the inclusion of selected unoccupied states in the definition of the WFs can improve both their localization and symmetry...

  2. Approach to the use of indicators for the assessment of the environmental level of construction products

    OpenAIRE

    Montes Delgado, María Victoria; Monterde Pereira, Daniel; Villoria Saez, Paola

    2011-01-01

    The European construction industry is supposed to consume the 40% of the natural European resources and to generate the 40% of the European solid waste. Conscious of the great damage being suffered by the environment because of construction activity, this work tries to provide the building actors with a new tool to improve the current situation. The tool proposed is a model for the comprehensive evaluation of construction products by determining their environmental level. In this researc...

  3. TE/TM scheme for computation of electromagnetic fields in accelerators

    International Nuclear Information System (INIS)

    Zagorodnov, Igor; Weiland, Thomas

    2005-01-01

    We propose a new two-level economical conservative scheme for short-range wake field calculation in three dimensions. The scheme does not have dispersion in the longitudinal direction and is staircase free (second order convergent). Unlike the finite-difference time domain method (FDTD), it is based on a TE/TM like splitting of the field components in time. Additionally, it uses an enhanced alternating direction splitting of the transverse space operator that makes the scheme computationally as effective as the conventional FDTD method. Unlike the FDTD ADI and low-order Strang methods, the splitting error in our scheme is only of fourth order. As numerical examples show, the new scheme is much more accurate on the long-time scale than the conventional FDTD approach

  4. Sources of funding for community schemes

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-11-01

    There is an increasing level of interest amongst community groups in the UK to become involved in the development of renewable energy schemes. Often however these community groups have only limited funds of their own, so any additional funds that can be identified to help fund their renewable energy scheme can be very useful. There are a range of funding sources available that provide grants or loans for which community groups are eligible to apply. Few of these funding sources are targeted towards renewable energy specifically, nevertheless the funds may be applicable to renewable energy schemes under appropriate circumstances. To date, however, few of these funds have been accessed by community groups for renewable energy initiatives. One of the reasons for this low take-up of funds on offer could be that the funding sources may be difficult and time-consuming to identify, especially where the energy component of the fund is not readily apparent. This directory draws together details about many of the principal funding sources available in the UK that may consider providing funds to community groups wanting to develop a renewable energy scheme. (author)

  5. QoE Guarantee Scheme Based on Cooperative Cognitive Cloud and Opportunistic Weight Particle Swarm

    Directory of Open Access Journals (Sweden)

    Weihang Shi

    2015-01-01

    Full Text Available It is well known that the Internet application of cloud services may be affected by the inefficiency of cloud computing and inaccurate evaluation of quality of experience (QoE seriously. In our paper, based on construction algorithms of cooperative cognitive cloud platform and optimization algorithm of opportunities weight particle swarm clustering, the QoE guarantee mechanism was proposed. The mechanism, through the sending users of requests and the cognitive neighbor users’ cooperation, combined the cooperation of subcloud platforms and constructed the optimal cloud platform with the different service. At the same time, the particle swarm optimization algorithm could be enhanced dynamically according to all kinds of opportunity request weight, which could optimize the cooperative cognitive cloud platform. Finally, the QoE guarantee scheme was proposed with the opportunity weight particle swarm optimization algorithm and collaborative cognitive cloud platform. The experimental results show that the proposed mechanism compared is superior to the QoE guarantee scheme based on cooperative cloud and QoE guarantee scheme based on particle swarm optimization, compared with optimization fitness and high cloud computing service execution efficiency and high throughput performance advantages.

  6. Study of the decay scheme of 159Tm

    International Nuclear Information System (INIS)

    Aguer, Pierre; Bastin, Genevieve; Chin Fan Liang; Libert, Jean; Paris, Pierre; Peghaire, Alain

    1975-01-01

    The energy levels of 159 Er have been investigated from the decay of 159 Tm (T(1/2)=9mn). Samples were obtained by (p,xn) reaction and on-line separation through Isocele facility. A level scheme is proposed with 24 levels between 0 and 1.3MeV [fr

  7. Oxygen- and nitrogen-chemisorbed carbon nanostructures for Z-scheme photocatalysis applications

    International Nuclear Information System (INIS)

    Qian Zhao; Pathak, Biswarup; Nisar, Jawad; Ahuja, Rajeev

    2012-01-01

    Here focusing on the very new experimental finding on carbon nanomaterials for solid-state electron mediator applications in Z-scheme photocatalysis, we have investigated different graphene-based nanostructures chemisorbed by various types and amounts of species such as oxygen (O), nitrogen (N) and hydroxyl (OH) and their electronic structures using density functional theory. The work functions of different nanostructures have also been investigated by us to evaluate their potential applications in Z-scheme photocatalysis for water splitting. The N-, O–N-, and N–N-chemisorbed graphene-based nanostructures (32 carbon atoms supercell, corresponding to lattice parameter of about 1 nm) are found promising to be utilized as electron mediators between reduction level and oxidation level of water splitting. The O- or OH-chemisorbed nanostructures have potential to be used as electron conductors between H 2 -evolving photocatalysts and the reduction level (H + /H 2 ). This systematic study is proposed to understand the properties of graphene-based carbon nanostructures in Z-scheme photocatalysis and guide experimentalists to develop better carbon-based nanomaterials for more efficient Z-scheme photocatalysis applications in the future.

  8. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  9. A novel evaluation method for building construction project based on integrated information entropy with reliability theory.

    Science.gov (United States)

    Bai, Xiao-ping; Zhang, Xi-wei

    2013-01-01

    Selecting construction schemes of the building engineering project is a complex multiobjective optimization decision process, in which many indexes need to be selected to find the optimum scheme. Aiming at this problem, this paper selects cost, progress, quality, and safety as the four first-order evaluation indexes, uses the quantitative method for the cost index, uses integrated qualitative and quantitative methodologies for progress, quality, and safety indexes, and integrates engineering economics, reliability theories, and information entropy theory to present a new evaluation method for building construction project. Combined with a practical case, this paper also presents detailed computing processes and steps, including selecting all order indexes, establishing the index matrix, computing score values of all order indexes, computing the synthesis score, sorting all selected schemes, and making analysis and decision. Presented method can offer valuable references for risk computing of building construction projects.

  10. A Coding Scheme to Analyse the Online Asynchronous Discussion Forums of University Students

    Science.gov (United States)

    Biasutti, Michele

    2017-01-01

    The current study describes the development of a content analysis coding scheme to examine transcripts of online asynchronous discussion groups in higher education. The theoretical framework comprises the theories regarding knowledge construction in computer-supported collaborative learning (CSCL) based on a sociocultural perspective. The coding…

  11. Positivity-preserving CE/SE schemes for solving the compressible Euler and Navier–Stokes equations on hybrid unstructured meshes

    KAUST Repository

    Shen, Hua

    2018-05-28

    We construct positivity-preserving space–time conservation element and solution element (CE/SE) schemes for solving the compressible Euler and Navier–Stokes equations on hybrid unstructured meshes consisting of triangular and rectangular elements. The schemes use an a posteriori limiter to prevent negative densities and pressures based on the premise of preserving optimal accuracy. The limiter enforces a constraint for spatial derivatives and does not change the conservative property of CE/SE schemes. Several numerical examples suggest that the proposed schemes preserve accuracy for smooth flows and strictly preserve positivity of densities and pressures for the problems involving near vacuum and very strong discontinuities.

  12. El esquema de aceptación europeo para productos de construcción en contacto con agua de consumo humano European acceptance scheme for construction products in contact with water intended for human consumption

    Directory of Open Access Journals (Sweden)

    Esperanza Menéndez Méndez

    2005-12-01

    Full Text Available El desarrollo legislativo y reglamentario europea se ha ido desarrollando de distinta manera en los diferentes Estados miembros (EM. Por su parte, la entrada en vigor de determinadas Directivas Europeas llevan asociado el desarrollo específico de algunos aspectos concretos, o la unificación de criterios, que pueden ser diferentes en varios EM.Los productos de construcción en contacto con agua de consumo humano están afectados por las circunstancias descritas anteriormente. Por una parte, distintos Estados miembros tienen establecidos diferentes criterios de aceptación para la instalación de productos en contacto con el agua de consumo, y por otra parte, tanto la Directiva sobre Productos de Construcción como la Directiva sobre agua de consumo humano afectan a distintos aspectos reglamentarios que han de desarrollarse para poder cumplir con lo establecido en estas directivas.Con el fin de adecuar la reglamentación de los distintos EM, que forman parte de la Unión Europea (UE, a los requisitos y especificaciones recogidos en las directivas mencionadas anteriormente, se vio la necesidad de desarrollar el Esquema de Aceptación Europeo para Productos de Construcción en Contacto con Agua de Consumo Humano (EAS.The quality of the water intended for human consumption is regulated through the Directive 98/83/EC (Drinking Water Directive. Products used in the construction of water supply systems can cause significant deterioration of the water quality and therefore many Member States operate national acceptance schemes for these products. These products are covered by the Directive 89/106/EEC (Construction Products Directive which calls for the preparation of European specifications for construction products and the approximation of the regulatory provisions of the Member States.In order to minimise the differences in the national regulatory provisions and to enable the elaboration of European specifications for construction products in contact

  13. Evaluation of the Norwegian R&D Tax Credit Scheme

    Directory of Open Access Journals (Sweden)

    Ådne Cappelen

    2010-11-01

    Full Text Available We find that the Norwegian R&D tax credit scheme introduced in 2002 mainly works as intended. The scheme is cost-effective and it is used by a large number of firms. It stimulates these firms to invest more in R&D, and, in particular, the effect is positive for small firms with little R&D experience. The returns on the R&D investments supported by the scheme are positive and generally not different from the returns to other R&D investments. We have found examples of what can be interpreted as tax motivated adjustments to the scheme, but to some extent this must be accepted as a cost to subsidy and support schemes intended for use by a large number of economic agents. This is particularly so when attempts are made to keep administrative expenditures and control routines at a low level.

  14. Stability of finite difference schemes for generalized von Foerster equations with renewal

    Directory of Open Access Journals (Sweden)

    Henryk Leszczyński

    2014-01-01

    Full Text Available We consider a von Foerster-type equation describing the dynamics of a population with the production of offsprings given by the renewal condition. We construct a finite difference scheme for this problem and give sufficient conditions for its stability with respect to \\(l^1\\ and \\(l^\\infty\\ norms.

  15. Design and construction of a lNG storage tank in Huelva, Spain

    OpenAIRE

    Editorial, Equipo

    1989-01-01

    This issue contains a number of articles; contents of which are summarized below, giving an overall idea of this outstanding engineering accomplishment. The National Gas Scheme intends to duplicate the consumption of natural gas during the period 1985-1992 to reach 6 % participation in the provision of primary energy by 1992. It is essential a great effort to meet the requirements of this scheme. Among the activities included in the Scheme, we shall mention the construction of a LNG Termin...

  16. Identification of high school students' ability level of constructing free body diagrams to solve restricted and structured response items in force matter

    Science.gov (United States)

    Rahmaniar, Andinisa; Rusnayati, Heni; Sutiadi, Asep

    2017-05-01

    While solving physics problem particularly in force matter, it is needed to have the ability of constructing free body diagrams which can help students to analyse every force which acts on an object, the length of its vector and the naming of its force. Mix method was used to explain the result without any special treatment to participants. The participants were high school students in first grade totals 35 students. The purpose of this study is to identify students' ability level of constructing free body diagrams in solving restricted and structured response items. Considering of two types of test, every student would be classified into four levels ability of constructing free body diagrams which is every level has different characteristic and some students were interviewed while solving test in order to know how students solve the problem. The result showed students' ability of constructing free body diagrams on restricted response items about 34.86% included in no evidence of level, 24.11% inadequate level, 29.14% needs improvement level and 4.0% adequate level. On structured response items is about 16.59% included no evidence of level, 23.99% inadequate level, 36% needs improvement level, and 13.71% adequate level. Researcher found that students who constructed free body diagrams first and constructed free body diagrams correctly were more successful in solving restricted and structured response items.

  17. Evaluation of PBL schemes in WRF for high Arctic conditions

    DEFF Research Database (Denmark)

    Kirova-Galabova, Hristina; Batchvarova, Ekaterina; Gryning, Sven-Erik

    2015-01-01

    was examined through two configurations (25 vertical levels and 4km grid step, 42 vertical levels and 1.33 km grid step). WRF was run with two planetary boundary layer schemes: Mellor –Yamada – Janjic with local vertical closure and non – local Yonsei University scheme. Temporal evolution of planetary boundary...... for temperature, above 150 m for relative humidity and for all levels for wind speed. Direct comparison of model and measured data showed that vertical profiles of studied parameters were reconstructed by the model relatively better in cloudy sky conditions, compared to clear skies....

  18. Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography

    Directory of Open Access Journals (Sweden)

    Debiao He

    2017-01-01

    Full Text Available Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the last several years. However, most of them suffer from security weaknesses or have poor performances. To reduce computation cost and achieve better security, we construct a lightweight data aggregation scheme against internal attackers in the smart grid environment using Elliptic Curve Cryptography (ECC. Security analysis of our proposed approach shows that it is provably secure and can provide confidentiality, authentication, and integrity. Performance analysis of the proposed scheme demonstrates that both computation and communication costs of the proposed scheme are much lower than the three previous schemes. As a result of these aforementioned benefits, the proposed lightweight data aggregation scheme is more practical for deployment in the smart grid environment.

  19. Project Guarantee 1985. Repository for low- and intermediate-level radioactive waste: construction and operation

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    A constructional engineering project study aimed at clarification of the feasibility of a repository for low- and intermediate-level radioactive waste (type B repository) has been carried out; the study is based on a model data-set derived from the geological, rock mechanical and topographical characterictics of one of Nagra's planned exploration areas. Final storage is effected in subterranean rock caverns accessed by horizontal tunnel. The reception area also is sited below the surface. Storage is conceived in such a way that, after closure of the repository, maintenance and supervision can be dispensed with and a guarantee of high long-term safety can nevertheless be provided. The envisaged repository consists of an entry tunnel for road vehicles and a reception area with a series of caverns for receiving waste, for additional technical facilities and for the production of the concrete back-fill material. The connecting tunnel is serviced by a tunnel railway and the actual repository area consists of several storage caverns. The repository is intended to accomodate a total of 200'000 m3 of solidified low- and intermediate-level waste. Valanginian marl is assumed as the host rock, although it would also be basically possible to house the proposed installations in other host rocks. The excavated material will total around 1'000'000 m3. The construction time for the whole installation is estimated as about 7 years and a working team of around 30 people will be required for the estimated 60-year operational duration. The project described in the present report justifies the conclusion that construction of a repository for low-and intermediate-level radioactive waste is feasible with present-day technology. This conclusion takes into consideration quantitative and operational constraints as well as geological and hydrogeological data relevant to constructional engineering. The latter are derived from a model data-set based on a specific locality

  20. Constructing unified models based on E sub 8 in ten dimensions

    Energy Technology Data Exchange (ETDEWEB)

    Kapetanakis, D. (Technische Univ. Muenchen, Garching (Germany). Fakultaet fuer Physik); Zoupanos, G. (European Organization for Nuclear Research, Geneva (Switzerland))

    1992-10-01

    We examine the virtues and difficulties of the attempts to construct realistic four-dimensional models from a gauge theory based on E{sub 8} and defined in ten dimensions. The four-dimensional theories are obtained using the coset space dimensional reduction scheme. Some of our points and in particular the proposed mechanism for supersymmetry breaking might be useful in other dimensional reduction schemes. (orig.).

  1. Developing a contributing factor classification scheme for Rasmussen's AcciMap: Reliability and validity evaluation.

    Science.gov (United States)

    Goode, N; Salmon, P M; Taylor, N Z; Lenné, M G; Finch, C F

    2017-10-01

    One factor potentially limiting the uptake of Rasmussen's (1997) Accimap method by practitioners is the lack of a contributing factor classification scheme to guide accident analyses. This article evaluates the intra- and inter-rater reliability and criterion-referenced validity of a classification scheme developed to support the use of Accimap by led outdoor activity (LOA) practitioners. The classification scheme has two levels: the system level describes the actors, artefacts and activity context in terms of 14 codes; the descriptor level breaks the system level codes down into 107 specific contributing factors. The study involved 11 LOA practitioners using the scheme on two separate occasions to code a pre-determined list of contributing factors identified from four incident reports. Criterion-referenced validity was assessed by comparing the codes selected by LOA practitioners to those selected by the method creators. Mean intra-rater reliability scores at the system (M = 83.6%) and descriptor (M = 74%) levels were acceptable. Mean inter-rater reliability scores were not consistently acceptable for both coding attempts at the system level (M T1  = 68.8%; M T2  = 73.9%), and were poor at the descriptor level (M T1  = 58.5%; M T2  = 64.1%). Mean criterion referenced validity scores at the system level were acceptable (M T1  = 73.9%; M T2  = 75.3%). However, they were not consistently acceptable at the descriptor level (M T1  = 67.6%; M T2  = 70.8%). Overall, the results indicate that the classification scheme does not currently satisfy reliability and validity requirements, and that further work is required. The implications for the design and development of contributing factors classification schemes are discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Health Profile of Construction Workers in Hong Kong.

    Science.gov (United States)

    Yi, Wen; Chan, Albert

    2016-12-13

    Construction is a manual, heavy, and complex sector concerning the most fatal accidents and high incidence of occupational illnesses and injuries resulting in days away from work. In Hong Kong, "Pilot Medical Examination Scheme for Construction Workers" was launched in 2014 to detect the health problems of their construction workforce. All registered workers under the Construction Workers Registration Board are eligible to join the scheme. The purpose of this paper is to assess the physical condition, physiological status, and musculoskeletal disorders of 942 construction workers in Hong Kong. This study adopted a two-phase design, which includes a basic medical examination to measure the workers' physiological parameters, such as blood pressure, resting heart rate, glucose, cholesterol, uric acid, liver function test, and renal function test; as well as a face-to-face interview following the medical examination to collect their demographic information and pain experience. Individual characteristics, including gender, age, obesity, alcohol drinking habit, and sleeping habit influenced the health condition of construction workers. Among the participants, 36.1% and 6.5% of them were overweight and obese, respectively. In addition, 43.0%, 38.4%, 16.2%, and 13.9% of the participants exceeded the thresholds of cholesterol, blood pressure, urea nitrogen, and uric urea, correspondingly. Moreover, 41.0% of the participants suffered musculoskeletal pain, where the most frequent painful parts occur in the lower back, shoulder, knees, leg, and neck. Through these findings, a series of important issues that need to be addressed is pointed out in terms of maintaining the physical well-being and reducing musculoskeletal disorders of construction workers. The finding may have implications for formulating proper intervention strategies for the sustainable development of Hong Kong's construction industry.

  3. Assessing the sustainable construction of large construction companies in Malaysia

    Science.gov (United States)

    Adewale, Bamgbade Jibril; Mohammed, Kamaruddeen Ahmed; Nasrun, Mohd Nawi Mohd

    2016-08-01

    Considering the increasing concerns for the consideration of sustainability issues in construction project delivery within the construction industry, this paper assesses the extent of sustainable construction among Malaysian large contractors, in order to ascertain the level of the industry's impacts on both the environment and the society. Sustainable construction explains the construction industry's responsibility to efficiently utilise the finite resources while also reducing construction impacts on both humans and the environment throughout the phases of construction. This study used proportionate stratified random sampling to conduct a field study with a sample of 172 contractors out of the 708 administered questionnaires. Data were collected from large contractors in the eleven states of peninsular Malaysia. Using the five-level rating scale (which include: 1= Very Low; 2= Low; 3= Moderate; 4= High; 5= Very High) to describe the level of sustainable construction of Malaysian contractors based on previous studies, statistical analysis reveals that environmental, social and economic sustainability of Malaysian large contractors are high.

  4. Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem

    Directory of Open Access Journals (Sweden)

    Juan Qu

    2014-01-01

    Full Text Available A password authentication scheme using smart card is called two-factor authentication scheme. Two-factor authentication scheme is the most accepted and commonly used mechanism that provides the authorized users a secure and efficient method for accessing resources over insecure communication channel. Up to now, various two-factor user authentication schemes have been proposed. However, most of them are vulnerable to smart card loss attack, offline password guessing attack, impersonation attack, and so on. In this paper, we design a password remote user authentication with key agreement scheme using elliptic curve cryptosystem. Security analysis shows that the proposed scheme has high level of security. Moreover, the proposed scheme is more practical and secure in contrast to some related schemes.

  5. Unequal Error Protected JPEG 2000 Broadcast Scheme with Progressive Fountain Codes

    OpenAIRE

    Chen, Zhao; Xu, Mai; Yin, Luiguo; Lu, Jianhua

    2012-01-01

    This paper proposes a novel scheme, based on progressive fountain codes, for broadcasting JPEG 2000 multimedia. In such a broadcast scheme, progressive resolution levels of images/video have been unequally protected when transmitted using the proposed progressive fountain codes. With progressive fountain codes applied in the broadcast scheme, the resolutions of images (JPEG 2000) or videos (MJPEG 2000) received by different users can be automatically adaptive to their channel qualities, i.e. ...

  6. A Novel Evaluation Method for Building Construction Project Based on Integrated Information Entropy with Reliability Theory

    Directory of Open Access Journals (Sweden)

    Xiao-ping Bai

    2013-01-01

    Full Text Available Selecting construction schemes of the building engineering project is a complex multiobjective optimization decision process, in which many indexes need to be selected to find the optimum scheme. Aiming at this problem, this paper selects cost, progress, quality, and safety as the four first-order evaluation indexes, uses the quantitative method for the cost index, uses integrated qualitative and quantitative methodologies for progress, quality, and safety indexes, and integrates engineering economics, reliability theories, and information entropy theory to present a new evaluation method for building construction project. Combined with a practical case, this paper also presents detailed computing processes and steps, including selecting all order indexes, establishing the index matrix, computing score values of all order indexes, computing the synthesis score, sorting all selected schemes, and making analysis and decision. Presented method can offer valuable references for risk computing of building construction projects.

  7. Generalized Spin Coherent States: Construction and Some Physical Properties

    International Nuclear Information System (INIS)

    Berrada, K.; El Baz, M.; Hassouni, Y.

    2009-12-01

    A generalized deformation of the su(2) algebra and a scheme for constructing associated spin coherent states is developed. The problem of resolving the unity operator in terms of these states is addressed and solved for some particular cases. The construction is carried using a deformation of Holstein-Primakoff realization of the su(2) algebra. The physical properties of these states is studied through the calculation of Mandel's parameter. (author)

  8. Mathematical Methods of System Analysis in Construction Materials

    Science.gov (United States)

    Garkina, Irina; Danilov, Alexander

    2017-10-01

    System attributes of construction materials are defined: complexity of an object, integrity of set of elements, existence of essential, stable relations between elements defining integrative properties of system, existence of structure, etc. On the basis of cognitive modelling (intensive and extensive properties; the operating parameters) materials (as difficult systems) and creation of the cognitive map the hierarchical modular structure of criteria of quality is under construction. It actually is a basis for preparation of the specification on development of material (the required organization and properties). Proceeding from a modern paradigm (model of statement of problems and their decisions) of development of materials, levels and modules are specified in structure of material. It when using the principles of the system analysis allows to considered technological process as the difficult system consisting of elements of the distinguished specification level: from atomic before separate process. Each element of system depending on an effective objective is considered as separate system with more detailed levels of decomposition. Among them, semantic and qualitative analyses of an object (are considered a research objective, decomposition levels, separate elements and communications between them come to light). Further formalization of the available knowledge in the form of mathematical models (structural identification) is carried out; communications between input and output parameters (parametrical identification) are defined. Hierarchical structures of criteria of quality are under construction for each allocated level. On her the relevant hierarchical structures of system (material) are under construction. Regularities of structurization and formation of properties, generally are considered at the levels from micro to a macrostructure. The mathematical model of material is represented as set of the models corresponding to private criteria by which separate

  9. QoS Support Polling Scheme for Multimedia Traffic in Wireless LAN MAC Protocol

    Institute of Scientific and Technical Information of China (English)

    YANG Zhijun; ZHAO Dongfeng

    2008-01-01

    Quality of service (QoS) support is a key attribute for multimedia traffic including video, voice, and data in wireless local area networks (LANs) but is limited in 802.11-based wireless LANs. A polling-based scheme called the point coordination function (PCF) was developed for 802.11 LANs to support the trans-mission of multimedia traffic. However, the PCF is not able to meet the desired practical traffic differentiation requirements for real-time data. This paper describes a QoS support polling scheme based on the IEEE 802.11 medium access control (MAC) protocol. The scheme uses a two-level polling mechanism with the QoS classes differentiated by two different access policies. Stations with higher priority traffic such as key or real-time data form the first level and can access the common channel through an exhaustive access policy. Other stations with lower priority traffic form the second level and can access the channel through a gated access policy. A system model based on imbedded Markov chain theory and a generation function were setup to explicitly analyze the mean information packet waiting time of the two-level polling scheme. Theo-retical and simulation results show that the new scheme efficiently differentiates services to guarantee better QoS and system stability.

  10. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  11. Reassessment of MLST schemes for Leptospira spp. typing worldwide.

    Science.gov (United States)

    Varni, Vanina; Ruybal, Paula; Lauthier, Juan José; Tomasini, Nicolás; Brihuega, Bibiana; Koval, Ariel; Caimi, Karina

    2014-03-01

    Leptospirosis is a neglected zoonosis of global importance. Several multilocus sequence typing (MLST) methods have been developed for Leptospira spp., the causative agent of leptospirosis. In this study we reassessed the most commonly used MLST schemes in a set of worldwide isolates, in order to select the loci that achieve the maximum power of discrimination for typing Leptospira spp. Global eBURST algorithm was used to detect clonal complexes among STs and phylogenetic relationships among concatenated and individual sequences were inferred through maximum likelihood (ML) analysis. The evaluation of 12 loci combined to type a subset of strains rendered 57 different STs. Seven of these loci were selected into a final scheme upon studying the number of alleles and polymorphisms, the typing efficiency, the discriminatory power and the ratio dN/dS per nucleotide site for each locus. This new 7-locus scheme was applied to a wider collection of worldwide strains. The ML tree constructed from concatenated sequences of the 7 loci identified 6 major clusters corresponding to 6 Leptospira species. Global eBURST established 8 CCs, which showed that genotypes were clearly related by geographic origin and host. ST52 and ST47, represented mostly by Argentinian isolates, grouped the higher number of isolates. These isolates were serotyped as serogroups Pomona and Icterohaemorrhagiae, showing a unidirectional correlation in which the isolates with the same ST belong to the same serogroup. In summary, this scheme combines the best loci from the most widely used MLST schemes for Leptospira spp. and supports worldwide strains classification. The Argentinian isolates exhibited congruence between allelic profile and serogroup, providing an alternative to serological methods. Published by Elsevier B.V.

  12. Decay schemes of the radioactive nuclei A = 225 to 229. Skhemy raspada radioaktivnykh yader A = 225 - 229

    Energy Technology Data Exchange (ETDEWEB)

    Dzhelepov, B S; Ivanov, R B; Mikhailova, M A

    1976-01-01

    This monograph is devoted to properties of atomic nuclei with mass numbers A = 225 to 229. The book collects and systematizes all of the experimental data characterizing properties of radioactive isotopes: information concerning masses of nuclei, magnetic and electric moments, lifetimes of nuclear states, the most reliable information on characteristics of radiations, quantum characteristics of levels and other properties of the studied nuclei. On basis of a critical analysis of the totality of information, decay schemes of radioactive nuclei with mass numbers A = 225 to 229 were constructed, as well as the series of excited states of the isotopes which lie in this region of nuclei.

  13. Status of the Texas low-level radioactive waste disposal site - construction sequencing and staffing patterns

    International Nuclear Information System (INIS)

    Jacobi, L.R. Jr.

    1996-01-01

    The Texas Low-Level Radioactive Waste Disposal Authority, an agency of the State of Texas, has been attempting to develop a site for the disposal of low-level radioactive waste in Texas for more than fourteen years. Since 1991, the agency has been evaluating a site near Sierra Blanca, in far west Texas. Site characterization was completed in 1992, and a license application was filed that year. Construction plans were completed in 1993. In April 1996, the licensing agency, the Texas Natural Resource Conservation Commission, completed its review and proposed to issue a license. The administrative hearings on the proposed license should be completed by July 1997. The Authority is prepared to begin construction and operations as soon as a final license can be issued

  14. A chaotic cryptography scheme for generating short ciphertext

    International Nuclear Information System (INIS)

    Wong, Kwok-Wo; Ho, Sun-Wah; Yung, Ching-Ki

    2003-01-01

    Recently, we have proposed a chaotic cryptographic scheme based on iterating the logistic map and updating the look-up table dynamically. The encryption and decryption processes become faster as the number of iterations required is reduced. However, the length of the ciphertext is still at least twice that of the original message. This may result in huge ciphertext files and hence long transmission time when encrypting large multimedia files. In this Letter, we modify the chaotic cryptographic scheme proposed previously so as to reduce the length of the ciphertext to the level slightly longer than that of the original message. Moreover, a session key is introduced in the cryptographic scheme so that the ciphertext length for a given message is not fixed

  15. A High-Accuracy Linear Conservative Difference Scheme for Rosenau-RLW Equation

    Directory of Open Access Journals (Sweden)

    Jinsong Hu

    2013-01-01

    Full Text Available We study the initial-boundary value problem for Rosenau-RLW equation. We propose a three-level linear finite difference scheme, which has the theoretical accuracy of Oτ2+h4. The scheme simulates two conservative properties of original problem well. The existence, uniqueness of difference solution, and a priori estimates in infinite norm are obtained. Furthermore, we analyze the convergence and stability of the scheme by energy method. At last, numerical experiments demonstrate the theoretical results.

  16. Construction contracting for the 1990s

    International Nuclear Information System (INIS)

    Kane, C.; Lyon, V.F.

    1991-01-01

    This paper reports that power plant constructing during the 1980s is over. Demand growth projections presently anticipate a need for 100,000 MW of new capacity by the year 2000, with only a small percentage of the demand growth currently under construction. Given a six-year lead time for baseload plants, a surge of activity must now begin. Another development over the past five years has been a conscious decision by regulators in increase rates only for the costs of efficiently built plants. The cost of construction inefficiencies will no longer be shouldered by investors. Large construction claims, excessive cost overruns, and expensive delays will no longer be passed on to the consumer automatically. Utility commissions will require the inefficient builders to either clean up their act or forego building their own plants. The most traditional contracting scheme, general contracting, will probably be the lease desirable in the construction of new power plants. General contracting is a single, general construction contract based on a detailed design. The design is not performed by the general contractor

  17. Employers' Perception of Graduates with Entry-Level Technical Skills from Construction Industry Programs in Ghana and Nigeria

    Science.gov (United States)

    Acheampong, Philip

    2013-01-01

    The purpose of this comparative study was to identify the technical skills and abilities needed by prospective employees of construction industries in Ghana and Nigeria. Potential employees were defined here as recent graduates of construction industry programs with entry-level technical skills. The continuous growth in and expansion of these two…

  18. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  19. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  20. Evaluating Levels of Project Planning and their Effects on Performance in the Nigerian Construction Industry

    Directory of Open Access Journals (Sweden)

    Godwin Idoro

    2012-11-01

    Full Text Available This study compares the level of project planning on public andprivate sectors projects and its impact on performance. Thepurpose is to create awareness of the level and effectivenessof the planning done by public and private clients in the deliveryof construction projects. A questionnaire survey administeredto a sample of 130 client representatives selected by stratifi edrandom sampling from the population of public and private clientsin the Nigerian construction industry is used and analysed usingdescriptive statistics, the t-test and Spearman correlation test. Theresults show that the level of preconstruction planning on privatesector projects is higher than that of public sector projects whilethe level of contract planning done by the latter is higher thanthat of the former. Furthermore, the performance of private sectorprojects is higher than that of public sector projects in many of theparameters used. However, the level of preparation of life-cyclecharts that concern project delivery time in both public and privatesectors projects is low and the level of project planning in the twocategories of projects has a limited impact on project performance.The understanding of how public and private sectors projectsperform in planning and its impact are expected to assist publicand private clients to know the challenges ahead of them in theireffort to improve the planning and performance of their projects.

  1. A missing-bending-magnet scheme for PEP

    International Nuclear Information System (INIS)

    Liu, R.Z.; Winick, H.

    1988-01-01

    This article presents a missing-bending-magnet scheme for PEP as a modification that could be considered if PEP were available as a fully dedicated synchrotron radiation source. The scheme can be applied to one or more PEP sextants without changing the rest. By removing some bending magnets, rearranging the remaining magnets, and adding two quadrupoles, ten additional straight sections per sextant can be created, each 5 m or more in length, for insertion devices. Beam lines therefrom, plus possible beam lines from bending magnets would enter a continuous experimental hall instead of individual tunnels and halls for each beam line. This should result in construction cost savings and increased operations efficiency. The ideal beam orbit is unchanged at the two ends and the middle of the sextant. At the end of the curved part of the sextant the lattice functions match those of the long interaction region straight section in the low emittance configuration of PEP. The electron beam characteristics in the newly created straight sections are described, including the enlargement of the horizontal beam size due to the nonzero dispersion. Some disadvantages of the scheme are increased operations complexity due to the need for nine new quadrupole families, increased beam emittance (by 14.5% is one sextant is modified), and reduced dynamic aperture. However, the dynamic aperture is still about as large as the physical aperture and should be adequate for good beam lifetime and injection. (orig.)

  2. TECHNICAL AND ECONOMIC SUBSTANTIATION OF PROJECTS OF THE AFFORDABLE HOUSING CONSTRUCTION

    Directory of Open Access Journals (Sweden)

    KRAVCHUNOVSKA T. S.

    2015-12-01

    Full Text Available Summary. Problem statement. The development of inhabitant locality of Ukraine is characterized by significant differences in levels of socio and economic development. An excessive concentration of population and industry in large cities, inefficient, slow development of most medium and small cities, towns and villages, considerable territorial disproportions of economic development of the country, considerable shortcomings in the territorial organization of society are observed. At the same time the tendency of the total area of increasing of inhabitant locality. The lands are used inefficiently. Among the most common problems of inhabitant locality is the housing problem. When making a decision on the design of affordable housing construction is one of the most important stages in the development of the technique and economic substantiation of the project is determination of the advisability and effectiveness of construction. The substantiation of advisability and effectiveness of affordable housing based on the definition of technical and economic indicators of projects, one of the most important among them is the cost, in its calculation is necessary to take into account the influence of organizational and technological factors, reflecting the features of construction in condition of compacted construction. Purpose. Development of methodical recommendations on substantiation of cost construction of affordable housing in the conditions of compacted construction. Conclusion. To provide a processing and the analysis of data is necessary development of the applied software on the basis of the developed block scheme of justification of cost construction of affordable housing.

  3. On a second order of accuracy stable difference scheme for the solution of a source identification problem for hyperbolic-parabolic equations

    Science.gov (United States)

    Ashyralyyeva, Maral; Ashyraliyev, Maksat

    2016-08-01

    In the present paper, a second order of accuracy difference scheme for the approximate solution of a source identification problem for hyperbolic-parabolic equations is constructed. Theorem on stability estimates for the solution of this difference scheme and their first and second order difference derivatives is presented. In applications, this abstract result permits us to obtain the stability estimates for the solutions of difference schemes for approximate solutions of two source identification problems for hyperbolic-parabolic equations.

  4. A computerized scheme for lung nodule detection in multiprojection chest radiography

    International Nuclear Information System (INIS)

    Guo Wei; Li Qiang; Boyce, Sarah J.; McAdams, H. Page; Shiraishi, Junji; Doi, Kunio; Samei, Ehsan

    2012-01-01

    Purpose: Our previous study indicated that multiprojection chest radiography could significantly improve radiologists' performance for lung nodule detection in clinical practice. In this study, the authors further verify that multiprojection chest radiography can greatly improve the performance of a computer-aided diagnostic (CAD) scheme. Methods: Our database consisted of 59 subjects, including 43 subjects with 45 nodules and 16 subjects without nodules. The 45 nodules included 7 real and 38 simulated ones. The authors developed a conventional CAD scheme and a new fusion CAD scheme to detect lung nodules. The conventional CAD scheme consisted of four steps for (1) identification of initial nodule candidates inside lungs, (2) nodule candidate segmentation based on dynamic programming, (3) extraction of 33 features from nodule candidates, and (4) false positive reduction using a piecewise linear classifier. The conventional CAD scheme processed each of the three projection images of a subject independently and discarded the correlation information between the three images. The fusion CAD scheme included the four steps in the conventional CAD scheme and two additional steps for (5) registration of all candidates in the three images of a subject, and (6) integration of correlation information between the registered candidates in the three images. The integration step retained all candidates detected at least twice in the three images of a subject and removed those detected only once in the three images as false positives. A leave-one-subject-out testing method was used for evaluation of the performance levels of the two CAD schemes. Results: At the sensitivities of 70%, 65%, and 60%, our conventional CAD scheme reported 14.7, 11.3, and 8.6 false positives per image, respectively, whereas our fusion CAD scheme reported 3.9, 1.9, and 1.2 false positives per image, and 5.5, 2.8, and 1.7 false positives per patient, respectively. The low performance of the conventional

  5. Operations Management on The Construction Site

    DEFF Research Database (Denmark)

    Koch, Christian

    2004-01-01

    this as a refreshing renewal and improvement of practical operations management at the site. However this paper will present a first step of development of a new approach to operations management at the building site, which at the same time builds on, and criticize lean construction for missing the point...... of the knowledge economy. This endeavour is carried out in two ways. First by a reading of the operations management literature. Juxtaposing this with lean construction extentions and the critique developed by other scholars. And also drawing on human resource management approaches. Second through a series......” scheme. In both directions it is revealed that the human resource and knowledge element of building processes is largely left untouched by lean construction methods. It is suggested to introduce at least two more dimensions of operations management at the site than the ones offered in lean construction...

  6. Rigorously modeling self-stabilizing fault-tolerant circuits: An ultra-robust clocking scheme for systems-on-chip☆

    Science.gov (United States)

    Dolev, Danny; Függer, Matthias; Posch, Markus; Schmid, Ulrich; Steininger, Andreas; Lenzen, Christoph

    2014-01-01

    We present the first implementation of a distributed clock generation scheme for Systems-on-Chip that recovers from an unbounded number of arbitrary transient faults despite a large number of arbitrary permanent faults. We devise self-stabilizing hardware building blocks and a hybrid synchronous/asynchronous state machine enabling metastability-free transitions of the algorithm's states. We provide a comprehensive modeling approach that permits to prove, given correctness of the constructed low-level building blocks, the high-level properties of the synchronization algorithm (which have been established in a more abstract model). We believe this approach to be of interest in its own right, since this is the first technique permitting to mathematically verify, at manageable complexity, high-level properties of a fault-prone system in terms of its very basic components. We evaluate a prototype implementation, which has been designed in VHDL, using the Petrify tool in conjunction with some extensions, and synthesized for an Altera Cyclone FPGA. PMID:26516290

  7. Rigorously modeling self-stabilizing fault-tolerant circuits: An ultra-robust clocking scheme for systems-on-chip.

    Science.gov (United States)

    Dolev, Danny; Függer, Matthias; Posch, Markus; Schmid, Ulrich; Steininger, Andreas; Lenzen, Christoph

    2014-06-01

    We present the first implementation of a distributed clock generation scheme for Systems-on-Chip that recovers from an unbounded number of arbitrary transient faults despite a large number of arbitrary permanent faults. We devise self-stabilizing hardware building blocks and a hybrid synchronous/asynchronous state machine enabling metastability-free transitions of the algorithm's states. We provide a comprehensive modeling approach that permits to prove, given correctness of the constructed low-level building blocks, the high-level properties of the synchronization algorithm (which have been established in a more abstract model). We believe this approach to be of interest in its own right, since this is the first technique permitting to mathematically verify, at manageable complexity, high-level properties of a fault-prone system in terms of its very basic components. We evaluate a prototype implementation, which has been designed in VHDL, using the Petrify tool in conjunction with some extensions, and synthesized for an Altera Cyclone FPGA.

  8. Construction of an all-solid-state artificial Z-scheme system consisting of Bi2WO6/Au/CdS nanostructure for photocatalytic CO2 reduction into renewable hydrocarbon fuel

    Science.gov (United States)

    Wang, Meng; Han, Qiutong; Li, Liang; Tang, Lanqin; Li, Haijin; Zhou, Yong; Zou, Zhigang

    2017-07-01

    An all-solid-state Bi2WO6/Au/CdS Z-scheme system was constructed for the photocatalytic reduction of CO2 into methane in the presence of water vapor. This Z-scheme consists of ultrathin Bi2WO6 nanoplates and CdS nanoparticles as photocatalysts, and a Au nanoparticle as a solid electron mediator offering a high speed charge transfer channel and leading to more efficient spatial separation of electron-hole pairs. The photo-generated electrons from the conduction band (CB) of Bi2WO6 transfer to the Au, and then release to the valence band (VB) of CdS to recombine with the holes of CdS. It allows the electrons remaining in the CB of CdS and holes in the VB of Bi2WO6 to possess strong reduction and oxidation powers, respectively, leading the Bi2WO6/Au/CdS to exhibit high photocatalytic reduction of CO2, relative to bare Bi2WO6, Bi2WO6/Au, and Bi2WO6/CdS. The depressed hole density on CdS also enhances the stability of the CdS against photocorrosion.

  9. An Evaluation of Interference Mitigation Schemes for HAPS Systems

    Directory of Open Access Journals (Sweden)

    Nam Kim

    2008-07-01

    Full Text Available The International Telecommunication Union-Radiocommunication sector (ITU-R has conducted frequency sharing studies between fixed services (FSs using a high altitude platform station (HAPS and fixed-satellite services (FSSs. In particular, ITU-R has investigated the power limitations related to HAPS user terminals (HUTs to facilitate frequency sharing with space station receivers. To reduce the level of interference from the HUTs that can harm a geostationary earth orbit (GEO satellite receiver in a space station, previous studies have taken two approaches: frequency sharing using a separated distance (FSSD and frequency sharing using power control (FSPC. In this paper, various performance evaluation results of interference mitigation schemes are presented. The results include performance evaluations using a new interference mitigation approach as well as conventional approaches. An adaptive beamforming scheme (ABS is introduced as a new scheme for efficient frequency sharing, and the interference mitigation effect on the ABS is examined considering pointing mismatch errors. The results confirm that the application of ABS enables frequency sharing between two systems with a smaller power reduction of HUTs in a cocoverage area compared to this reduction when conventional schemes are utilized. In addition, the analysis results provide the proper amount of modification at the transmitting power level of the HUT required for the suitable frequency sharing.

  10. Construction of stable explicit finite-difference schemes for Schroedinger type differential equations

    Science.gov (United States)

    Mickens, Ronald E.

    1989-01-01

    A family of conditionally stable, forward Euler finite difference equations can be constructed for the simplest equation of Schroedinger type, namely u sub t - iu sub xx. Generalization of this result to physically realistic Schroedinger type equations is presented.

  11. The QKD network: model and routing scheme

    Science.gov (United States)

    Yang, Chao; Zhang, Hongqi; Su, Jinhai

    2017-11-01

    Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.

  12. Asynchronous schemes for CFD at extreme scales

    Science.gov (United States)

    Konduri, Aditya; Donzis, Diego

    2013-11-01

    Recent advances in computing hardware and software have made simulations an indispensable research tool in understanding fluid flow phenomena in complex conditions at great detail. Due to the nonlinear nature of the governing NS equations, simulations of high Re turbulent flows are computationally very expensive and demand for extreme levels of parallelism. Current large simulations are being done on hundreds of thousands of processing elements (PEs). Benchmarks from these simulations show that communication between PEs take a substantial amount of time, overwhelming the compute time, resulting in substantial waste in compute cycles as PEs remain idle. We investigate a novel approach based on widely used finite-difference schemes in which computations are carried out asynchronously, i.e. synchronization of data among PEs is not enforced and computations proceed regardless of the status of messages. This drastically reduces PE idle time and results in much larger computation rates. We show that while these schemes remain stable, their accuracy is significantly affected. We present new schemes that maintain accuracy under asynchronous conditions and provide a viable path towards exascale computing. Performance of these schemes will be shown for simple models like Burgers' equation.

  13. Containment Domains: A Scalable, Efficient and Flexible Resilience Scheme for Exascale Systems

    Directory of Open Access Journals (Sweden)

    Jinsuk Chung

    2013-01-01

    Full Text Available This paper describes and evaluates a scalable and efficient resilience scheme based on the concept of containment domains. Containment domains are a programming construct that enable applications to express resilience needs and to interact with the system to tune and specialize error detection, state preservation and restoration, and recovery schemes. Containment domains have weak transactional semantics and are nested to take advantage of the machine and application hierarchies and to enable hierarchical state preservation, restoration and recovery. We evaluate the scalability and efficiency of containment domains using generalized trace-driven simulation and analytical analysis and show that containment domains are superior to both checkpoint restart and redundant execution approaches.

  14. Research on university culture construction in the view of ecological idea

    Directory of Open Access Journals (Sweden)

    Wang Xinggang

    2016-01-01

    Full Text Available With the progress of times, our spiritual pursuit becomes higher and higher, and it is especially true among modern youth. Therefore, establishment of university culture has gradually become the focus of attention. This paper firstly quantized university culture construction into four parts: material culture construction, spiritual culture construction, system culture construction, and behavioral culture construction. It then analogized each part as one population in ecological system; established multi-population ecological model; and analyzed the interactional relations between each part. At last, this paper reached conclusions based on multi-population ecological model and analyzed the correlations among various factors of university culture construction, so as to obtain a comprehensive, scientific and healthy scheme for university culture construction.

  15. Scalability of Direct Solver for Non-stationary Cahn-Hilliard Simulations with Linearized time Integration Scheme

    KAUST Repository

    Woźniak, M.; Smołka, M.; Cortes, Adriano Mauricio; Paszyński, M.; Schaefer, R.

    2016-01-01

    We study the features of a new mixed integration scheme dedicated to solving the non-stationary variational problems. The scheme is composed of the FEM approximation with respect to the space variable coupled with a 3-leveled time integration scheme

  16. Efficient solar light harvesting CdS/Co{sub 9}S{sub 8} hollow cubes for Z-scheme photocatalytic water splitting

    Energy Technology Data Exchange (ETDEWEB)

    Qiu, Bocheng; Zhu, Qiaohong; Du, Mengmeng; Fan, Linggang; Xing, Mingyang; Zhang, Jinlong [Key Lab. for Advanced Materials and Inst. of Fine Chemicals, School of Chemistry and Molecular Engineering, East China Univ. of Science and Technology, Shanghai (China)

    2017-03-01

    Hollow structures with an efficient light harvesting and tunable interior component offer great advantages for constructing a Z-scheme system. Controlled design of hollow cobalt sulfide (Co{sub 9}S{sub 8}) cubes embedded with cadmium sulfide quantum dots (QDs) is described, using hollow Co(OH){sub 2} as the template and a one-pot hydrothermal strategy. The hollow CdS/Co{sub 9}S{sub 8} cubes utilize multiple reflections of light in the cubic structure to achieve enhanced photocatalytic activity. Importantly, the photoexcited charge carriers can be effectively separated by the construction of a redox-mediator-free Z-scheme system. The hydrogen evolution rate over hollow CdS/Co{sub 9}S{sub 8} is 134 and 9.1 times higher than that of pure hollow Co{sub 9}S{sub 8} and CdS QDs under simulated solar light irradiation, respectively. Moreover, this is the first report describing construction of a hollow Co{sub 9}S{sub 8} based Z-scheme system for photocatalytic water splitting, which gives full play to the advantages of light-harvesting and charges separation. (copyright 2017 Wiley-VCH Verlag GmbH and Co. KGaA, Weinheim)

  17. Literature review of levels and determinants of exposure to potential carcinogens and other agents in the road construction industry.

    Science.gov (United States)

    Burstyn, I; Kromhout, H; Boffetta, P

    2000-01-01

    Workers in the road construction industry include asphalt plant, ground construction, and road paving workers. These individuals can be exposed to a wide range of potentially hazardous substances. A summary of levels of exposure to different substances measured during road construction is presented. In modern road paving, workers typically are exposed to 0.1 to 2 mg/m3 of bitumen fume, which includes 10 to 200 ng/m3 of benzo(a)pyrene. Sampling strategies and analytical methods employed in each reviewed survey are described briefly. The published reports provide some insight into the identity of factors that influence exposure to bitumen among road construction workers: type of work performed, meteorological conditions, temperature of paved asphalt. However, there is a lack of (a) comprehensive and well-designed studies that evaluate determinants of exposure to bitumen in road construction, and (b) standard methods for bitumen sampling and analysis. Information on determinants of other exposures in road construction is either absent or limited. It is concluded that data available through published reports have limited value in assessing historical exposure levels in the road construction industry.

  18. Alternative Scheme for Teleportation of Two-Atom Entangled State in Cavity QED

    Institute of Scientific and Technical Information of China (English)

    YANG Zhen-Biao

    2006-01-01

    We have proposed an alternative scheme for teleportation of two-atom entangled state in cavity QED. It is based on the degenerate Raman interaction of a single-mode cavity field with a ∧-type three-level atom. The prominent feature of the scheme is that only one cavity is required, which is prior to the previous one. Moreover, the atoms need to be detected are reduced compared with the previous scheme. The experimental feasibility of the scheme is discussed.The scheme can easily be generalized for teleportation of N-atom GHZ entangled states. The number of the atoms needed to be detected does not increase as the number of the atoms in GHZ state increases.

  19. Decentralising Zimbabwe’s water management: The case of Guyu-Chelesa irrigation scheme

    Science.gov (United States)

    Tambudzai, Rashirayi; Everisto, Mapedza; Gideon, Zhou

    Smallholder irrigation schemes are largely supply driven such that they exclude the beneficiaries on the management decisions and the choice of the irrigation schemes that would best suit their local needs. It is against this background that the decentralisation framework and the Dublin Principles on Integrated Water Resource Management (IWRM) emphasise the need for a participatory approach to water management. The Zimbabwean government has gone a step further in decentralising the management of irrigation schemes, that is promoting farmer managed irrigation schemes so as to ensure effective management of scarce community based land and water resources. The study set to investigate the way in which the Guyu-Chelesa irrigation scheme is managed with specific emphasis on the role of the Irrigation Management Committee (IMC), the level of accountability and the powers devolved to the IMC. Merrey’s 2008 critique of IWRM also informs this study which views irrigation as going beyond infrastructure by looking at how institutions and decision making processes play out at various levels including at the irrigation scheme level. The study was positioned on the hypothesis that ‘decentralised or autonomous irrigation management enhances the sustainability and effectiveness of irrigation schemes’. To validate or falsify the stated hypothesis, data was gathered using desk research in the form of reviewing articles, documents from within the scheme and field research in the form of questionnaire surveys, key informant interviews and field observation. The Statistical Package for Social Sciences was used to analyse data quantitatively, whilst content analysis was utilised to analyse qualitative data whereby data was analysed thematically. Comparative analysis was carried out as Guyu-Chelesa irrigation scheme was compared with other smallholder irrigation scheme’s experiences within Zimbabwe and the Sub Saharan African region at large. The findings were that whilst the

  20. Level Scheme of 223Fr

    International Nuclear Information System (INIS)

    Gaeta, R.; Gonzalez, J.A.; Gonzalez, L.; Roldan, C.

    1972-01-01

    A study has been made of the decay of 2 27 Ac at levels of 223 F r, means of alpha Spectrometers of Si barrier detector and gamma Spectrometers of Ge(Li). The rotational bands 1/2-(541 ↓ ] , 1/2-(530 ↑ ) and 3/2-(532 ↓ ) have been identified, as well as two octupolar bands associated with the fundamental one. The results obtained indicate that the unified model is applicable in this intermediate zone of the nuclide chart. (Author) 150 refs

  1. High-order asynchrony-tolerant finite difference schemes for partial differential equations

    Science.gov (United States)

    Aditya, Konduri; Donzis, Diego A.

    2017-12-01

    Synchronizations of processing elements (PEs) in massively parallel simulations, which arise due to communication or load imbalances between PEs, significantly affect the scalability of scientific applications. We have recently proposed a method based on finite-difference schemes to solve partial differential equations in an asynchronous fashion - synchronization between PEs is relaxed at a mathematical level. While standard schemes can maintain their stability in the presence of asynchrony, their accuracy is drastically affected. In this work, we present a general methodology to derive asynchrony-tolerant (AT) finite difference schemes of arbitrary order of accuracy, which can maintain their accuracy when synchronizations are relaxed. We show that there are several choices available in selecting a stencil to derive these schemes and discuss their effect on numerical and computational performance. We provide a simple classification of schemes based on the stencil and derive schemes that are representative of different classes. Their numerical error is rigorously analyzed within a statistical framework to obtain the overall accuracy of the solution. Results from numerical experiments are used to validate the performance of the schemes.

  2. A Generalized Weight-Based Particle-In-Cell Simulation Scheme

    International Nuclear Information System (INIS)

    Lee, W.W.; Jenkins, T.G.; Ethier, S.

    2010-01-01

    A generalized weight-based particle simulation scheme suitable for simulating magnetized plasmas, where the zeroth-order inhomogeneity is important, is presented. The scheme is an extension of the perturbative simulation schemes developed earlier for particle-in-cell (PIC) simulations. The new scheme is designed to simulate both the perturbed distribution ((delta)f) and the full distribution (full-F) within the same code. The development is based on the concept of multiscale expansion, which separates the scale lengths of the background inhomogeneity from those associated with the perturbed distributions. The potential advantage for such an arrangement is to minimize the particle noise by using (delta)f in the linear stage stage of the simulation, while retaining the flexibility of a full-F capability in the fully nonlinear stage of the development when signals associated with plasma turbulence are at a much higher level than those from the intrinsic particle noise.

  3. Evaluation and interconversion of various indicator PCB schemes for ∑PCB and dioxin-like PCB toxic equivalent levels in fish.

    Science.gov (United States)

    Gandhi, Nilima; Bhavsar, Satyendra P; Reiner, Eric J; Chen, Tony; Morse, Dave; Arhonditsis, George B; Drouillard, Ken G

    2015-01-06

    Polychlorinated biphenyls (PCBs) remain chemicals of concern more than three decades after the ban on their production. Technical mixture-based total PCB measurements are unreliable due to weathering and degradation, while detailed full congener specific measurements can be time-consuming and costly for large studies. Measurements using a subset of indicator PCBs (iPCBs) have been considered appropriate; however, inclusion of different PCB congeners in various iPCB schemes makes it challenging to readily compare data. Here, using an extensive data set, we examine the performance of existing iPCB3 (PCB 138, 153, and 180), iPCB6 (iPCB3 plus 28, 52, and 101) and iPCB7 (iPCB6 plus 118) schemes, and new iPCB schemes in estimating total of PCB congeners (∑PCB) and dioxin-like PCB toxic equivalent (dlPCB-TEQ) concentrations in sport fish fillets and the whole body of juvenile fish. The coefficients of determination (R(2)) for regressions conducted using logarithmically transformed data suggest that inclusion of an increased number of PCBs in an iPCB improves relationship with ∑PCB but not dlPCB-TEQs. Overall, novel iPCB3 (PCB 95, 118, and 153), iPCB4 (iPCB3 plus 138) and iPCB5 (iPCB4 plus 110) presented in this study and existing iPCB6 and iPCB7 are the most optimal indicators, while the current iPCB3 should be avoided. Measurement of ∑PCB based on a more detailed analysis (50+ congeners) is also overall a good approach for assessing PCB contamination and to track PCB origin in fish. Relationships among the existing and new iPCB schemes have been presented to facilitate their interconversion. The iPCB6 equiv levels for the 6.5 and 10 pg/g benchmarks of dlPCB-TEQ05 are about 50 and 120 ng/g ww, respectively, which are lower than the corresponding iPCB6 limits of 125 and 300 ng/g ww set by the European Union.

  4. Application of a micro-credit scheme to some ecological activities

    Science.gov (United States)

    Hakoyama, F.

    2017-03-01

    Micro-credit schemes are expanding very rapidly worldwide in ecological activities. Providing gas-cooking equipments in Burkina Faso is a successful example in which the micro-credit system contributes to improve not only poor women’s life but also ecological environment. In Bangladesh, a solar PV system program through micro-credit has been implemented widely and successfully: big NGOs act as equipment dealers and provide micro-credit loans to individual poor households. In contrast, there are very few cases which showed positive results in sanitation projects. Micro-credit schemes are, in principle, based on the income generated through the fund. But in usual cases, sanitation activities do not yield any income. High cost of latrine construction is another barrier. In this paper, we reviewed why we could not apply a micro-credit scheme to our “Améli-eaur project” in Burkina Faso. Common features for the success in ecological activities are 1) enough income yielded from the activity itself, 2) the strong needs from population side, and 3) established system support, both technically and administratively. If we find a way to fulfill these elements in a sanitation project, it can be a long, sustainable project.

  5. Sound classification schemes in Europe - Quality classes intended for renovated housing

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2010-01-01

    exposure in the home included in the proposed main objectives for a housing policy. In most countries in Europe, building regulations specify minimum requirements concerning acoustical conditions for new dwellings. In addition, several countries have introduced sound classification schemes with classes...... intended to reflect different levels of acoustical comfort. Consequently, acoustic requirements for a dwelling can be specified as the legal minimum requirements or as a specific class in a classification scheme. Most schemes have both higher classes than corresponding to the regulatory requirements...

  6. Design and construction of low level radioactive waste disposal facility at Rokkasho storage center

    International Nuclear Information System (INIS)

    Takahashi, K.; Itoh, H.; Iimura, H.; Shimoda, H.

    1992-01-01

    Japan Nuclear Fuel Industries Co., Inc. (JNFI) which has been established to dispose through burial the low-level radioactive waste (LLW) produced by nuclear power stations over the country is now constructing Rokkasho LLW Storage Center at Rokkasho Village,Aomori Prefecture. At this storage center JNFI plans to bury about 200,000m 3 , of LLW (equivalent to about one million drums each with a 200 liter capacity), and ultimately plans to bury about 600,000m 3 about 3 million drums of LLW. About the construction of the burial facilities for the first-stage LLW equivalent to 200,000 drums (each with a 200-liter capacity) we obtained the government's permit in November, 1990 and set out the construction work from the same month, which has since been promoted favorably. The facilities are scheduled to start operation from December, 1992. This paper gives an overview of at these facilities

  7. Hash function construction using weighted complex dynamical networks

    International Nuclear Information System (INIS)

    Song Yu-Rong; Jiang Guo-Ping

    2013-01-01

    A novel scheme to construct a hash function based on a weighted complex dynamical network (WCDN) generated from an original message is proposed in this paper. First, the original message is divided into blocks. Then, each block is divided into components, and the nodes and weighted edges are well defined from these components and their relations. Namely, the WCDN closely related to the original message is established. Furthermore, the node dynamics of the WCDN are chosen as a chaotic map. After chaotic iterations, quantization and exclusive-or operations, the fixed-length hash value is obtained. This scheme has the property that any tiny change in message can be diffused rapidly through the WCDN, leading to very different hash values. Analysis and simulation show that the scheme possesses good statistical properties, excellent confusion and diffusion, strong collision resistance and high efficiency. (general)

  8. ICT Innovation Diffusion in the Construction Sector

    DEFF Research Database (Denmark)

    Widén, Kristian; Christiansson, Per; Hjelseth, Eilif

    is to increase the possibility of successful implementation and adoption of new ICT tools in the construction sector across the supply chain through increasing the knowledge and awareness of how to execute suitable development and diffusion/implementation schemes. This research carried out in this study consists...... an innovation. Recent research on innovation diffusion in the construction sector show that a way to increase opportunities for diffusion in the construction sector is to stop considering diffusion as a discrete activity following on from the development of the innovation. It is therefore of great importance...... directly. The need for stakeholder management right up from the start of the innovation projects and how to deal with it is the major difference between traditional innovation project management and the one necessary for innovation projects in construction, ICT innovations as well as others. To what extent...

  9. Working capital management in the process of financial support of investment and construction projects and of the construction material industry

    Science.gov (United States)

    Danilochkina, Nadezhda; Lukmanova, Inessa; Roshchina, Olga; Voytolovskiy, Nikolay

    2018-03-01

    The article presents the analysis of working capital in the process of financial support of high-rise construction investment projects. The factors influencing the choice of the working capital management model were analyzed, the reasons of the change in the requirement for the values of current assets in the process of construction of high-rise facilities were determined. The author has developed the scheme of interrelation between production, operational and financial activity cycles of enterprises implementing investment projects of unique buildings and structures and made a comparative description of their financing sources.

  10. Design and Construction of an Atomic Clock on an Atom Chip

    International Nuclear Information System (INIS)

    Reinhard, Friedemann

    2009-01-01

    We describe the design and construction of an atomic clock on an atom chip, intended as a secondary standard, with a stability in the range of few 10 -13 at 1 s. This clock is based on a two-photon transition between the hyperfine states |F = 1; m F = -1> and |2; 1> of the electronic ground state of the 87 Rb atom. This transition is interrogated using a Ramsey scheme, operating on either a cloud of thermal atoms or a Bose-Einstein condensate. In contrast to atomic fountain clocks, this clock is magnetically trapped on an atom chip. We describe a theoretical model of the clock stability and the design and construction of a dedicated apparatus. It is able to control the magnetic field at the relative 10 -5 level and features a hybrid atom chip, containing DC conductors as well as a microwave transmission line for the clock interrogation. (author)

  11. Structural and parameteric uncertainty quantification in cloud microphysics parameterization schemes

    Science.gov (United States)

    van Lier-Walqui, M.; Morrison, H.; Kumjian, M. R.; Prat, O. P.; Martinkus, C.

    2017-12-01

    Atmospheric model parameterization schemes employ approximations to represent the effects of unresolved processes. These approximations are a source of error in forecasts, caused in part by considerable uncertainty about the optimal value of parameters within each scheme -- parameteric uncertainty. Furthermore, there is uncertainty regarding the best choice of the overarching structure of the parameterization scheme -- structrual uncertainty. Parameter estimation can constrain the first, but may struggle with the second because structural choices are typically discrete. We address this problem in the context of cloud microphysics parameterization schemes by creating a flexible framework wherein structural and parametric uncertainties can be simultaneously constrained. Our scheme makes no assuptions about drop size distribution shape or the functional form of parametrized process rate terms. Instead, these uncertainties are constrained by observations using a Markov Chain Monte Carlo sampler within a Bayesian inference framework. Our scheme, the Bayesian Observationally-constrained Statistical-physical Scheme (BOSS), has flexibility to predict various sets of prognostic drop size distribution moments as well as varying complexity of process rate formulations. We compare idealized probabilistic forecasts from versions of BOSS with varying levels of structural complexity. This work has applications in ensemble forecasts with model physics uncertainty, data assimilation, and cloud microphysics process studies.

  12. The social security scheme in Thailand: what lessons can be drawn?

    Science.gov (United States)

    Tangcharoensathien, V; Supachutikul, A; Lertiendumrong, J

    1999-04-01

    The Social Security Scheme was launched in 1990, covering formal sector private employees for non-work related sickness, maternity and invalidity including cash benefits and funeral grants. The scheme is financed by tripartite contributions from government, employers and employees, each of 1.5% of payroll (total of 4.5%). The scheme decided to pay health care providers, whether public or private, on a flat rate capitation basis to cover both ambulatory and inpatient care. Registration of the insured with a contractor hospital was a necessary consequence of the chosen capitation payment system. The aim of this paper is to review the operation of the scheme, and to explore the implications of capitation payment and registration for utilisation levels and provider behaviour. A key weakness of the scheme's design is suggested to be the initial decision to give employers not employees the responsibility for choosing the registered hospitals. This was done for administrative reasons, but it contributed to low levels of use of the contractor hospitals. In addition, low levels of use were also probably the result of the potential for cream skimming, cost shifting from inpatient to ambulatory care and under-provision of patient care, though since monitoring mechanisms by the Social Security Office were weak, these effects are difficult to detect conclusively. Mechanisms to improve utilisation levels were gradually introduced, such as employee choice of registered hospitals and the formation of sub-contractor networks to improve access to care. A beneficial effect of the capitation payment system was that the Social Security Fund generated substantial reserves and expenditures on sickness benefits were well stabilised. The paper ends by recommending that future policy amendments should be guided by research and empirical findings and that tougher monitoring and enforcement of quality of care standards are required.

  13. Adaptive protection coordination scheme for distribution network with distributed generation using ABC

    Directory of Open Access Journals (Sweden)

    A.M. Ibrahim

    2016-09-01

    Full Text Available This paper presents an adaptive protection coordination scheme for optimal coordination of DOCRs in interconnected power networks with the impact of DG, the used coordination technique is the Artificial Bee Colony (ABC. The scheme adapts to system changes; new relays settings are obtained as generation-level or system-topology changes. The developed adaptive scheme is applied on the IEEE 30-bus test system for both single- and multi-DG existence where results are shown and discussed.

  14. Classification schemes for knowledge translation interventions: a practical resource for researchers.

    Science.gov (United States)

    Slaughter, Susan E; Zimmermann, Gabrielle L; Nuspl, Megan; Hanson, Heather M; Albrecht, Lauren; Esmail, Rosmin; Sauro, Khara; Newton, Amanda S; Donald, Maoliosa; Dyson, Michele P; Thomson, Denise; Hartling, Lisa

    2017-12-06

    As implementation science advances, the number of interventions to promote the translation of evidence into healthcare, health systems, or health policy is growing. Accordingly, classification schemes for these knowledge translation (KT) interventions have emerged. A recent scoping review identified 51 classification schemes of KT interventions to integrate evidence into healthcare practice; however, the review did not evaluate the quality of the classification schemes or provide detailed information to assist researchers in selecting a scheme for their context and purpose. This study aimed to further examine and assess the quality of these classification schemes of KT interventions, and provide information to aid researchers when selecting a classification scheme. We abstracted the following information from each of the original 51 classification scheme articles: authors' objectives; purpose of the scheme and field of application; socioecologic level (individual, organizational, community, system); adaptability (broad versus specific); target group (patients, providers, policy-makers), intent (policy, education, practice), and purpose (dissemination versus implementation). Two reviewers independently evaluated the methodological quality of the development of each classification scheme using an adapted version of the AGREE II tool. Based on these assessments, two independent reviewers reached consensus about whether to recommend each scheme for researcher use, or not. Of the 51 original classification schemes, we excluded seven that were not specific classification schemes, not accessible or duplicates. Of the remaining 44 classification schemes, nine were not recommended. Of the 35 recommended classification schemes, ten focused on behaviour change and six focused on population health. Many schemes (n = 29) addressed practice considerations. Fewer schemes addressed educational or policy objectives. Twenty-five classification schemes had broad applicability

  15. Natural radioactivity levels and danger ratio in cements, concretes and mortars used in construction

    International Nuclear Information System (INIS)

    Meneses, J.; Pacheco, C.; Avila, J. M.; Miro, C.

    2010-01-01

    We have determined the natural radiation level in three types of adhesive cements, five types of concrete and two types of mortars of different strength normally used in the construction field. Of these materials, both concrete and mortars were prepared in our laboratories, cements the contrary were of a commercial nature.

  16. Survey and analysis of the domestic technology level for the concept development of high level waste disposal

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Chang Sun; Kim, Byung Su; Song, Jae Hyok [Seoul National University, Seoul (Korea); Park, Kwang Hon; Hwang, Ju Ho; Park, Sung Hyun; Lee, Jae Min [Kyunghee University, Seoul (Korea); Han, Joung Sang; Kim, Ku Young [Yonsei University, Seoul (Korea); Lee, Jae Ki; Chang, Jae Kwon [Hangyang University, Seoul (Korea)

    1998-09-01

    The objectives of this study are the analysis of the status of HLW disposal technology and the investigation of the domestic technology level. The study has taken two years to complete with the participation of forty five researchers. The study was mainly carried out through means of literature surveys, collection of related data, visits to research institutes, and meetings with experts in the specific fields. During the first year of this project, the International Symposium on the Concept Development of the High Level Waste Disposal System was held in Taejon, Korea in October, 1997. Eight highly professed foreign experts whose fields of expertise projected to the area of high level waste disposal were invited to the symposium. This study is composed of four major areas; disposal system design/construction, engineered barrier characterization, geologic environment evaluation and performance assessment and total safety. A technical tree scheme of HLW disposal has been illustrated according to the investigation and an analysis for each technical area. For each detailed technology, research projects, performing organization/method and techniques that are to be secured in the order of priority are proposed, but the suggestions are merely at a superfluous level of propositional idea due to the reduction of the budget in the second year. The detailed programs on HLW disposal are greatly affected by governmental HLW disposal policy and in this study, the primary decisions to be made in each level of HLW disposal enterprise and a rough scheme are proposed. (author). 20 refs., 97 figs., 33 tabs.

  17. Construction mathematics

    CERN Document Server

    Virdi, Surinder; Virdi, Narinder Kaur

    2014-01-01

    Construction Mathematics is an introductory level mathematics text, written specifically for students of construction and related disciplines. Learn by tackling exercises based on real-life construction maths. Examples include: costing calculations, labour costs, cost of materials and setting out of building components. Suitable for beginners and easy to follow throughout. Learn the essential basic theory along with the practical necessities. The second edition of this popular textbook is fully updated to match new curricula, and expanded to include even more learning exercises. End of chapter exercises cover a range of theoretical as well as practical problems commonly found in construction practice, and three detailed assignments based on practical tasks give students the opportunity to apply all the knowledge they have gained. Construction Mathematics addresses all the mathematical requirements of Level 2 construction NVQs from City & Guilds/CITB and Edexcel courses, including the BTEC First Diploma in...

  18. Discretization of convection-diffusion equations with finite-difference scheme derived from simplified analytical solutions

    International Nuclear Information System (INIS)

    Kriventsev, Vladimir

    2000-09-01

    Most of thermal hydraulic processes in nuclear engineering can be described by general convection-diffusion equations that are often can be simulated numerically with finite-difference method (FDM). An effective scheme for finite-difference discretization of such equations is presented in this report. The derivation of this scheme is based on analytical solutions of a simplified one-dimensional equation written for every control volume of the finite-difference mesh. These analytical solutions are constructed using linearized representations of both diffusion coefficient and source term. As a result, the Efficient Finite-Differencing (EFD) scheme makes it possible to significantly improve the accuracy of numerical method even using mesh systems with fewer grid nodes that, in turn, allows to speed-up numerical simulation. EFD has been carefully verified on the series of sample problems for which either analytical or very precise numerical solutions can be found. EFD has been compared with other popular FDM schemes including novel, accurate (as well as sophisticated) methods. Among the methods compared were well-known central difference scheme, upwind scheme, exponential differencing and hybrid schemes of Spalding. Also, newly developed finite-difference schemes, such as the the quadratic upstream (QUICK) scheme of Leonard, the locally analytic differencing (LOAD) scheme of Wong and Raithby, the flux-spline scheme proposed by Varejago and Patankar as well as the latest LENS discretization of Sakai have been compared. Detailed results of this comparison are given in this report. These tests have shown a high efficiency of the EFD scheme. For most of sample problems considered EFD has demonstrated the numerical error that appeared to be in orders of magnitude lower than that of other discretization methods. Or, in other words, EFD has predicted numerical solution with the same given numerical error but using much fewer grid nodes. In this report, the detailed

  19. Approximate Riemann solvers and flux vector splitting schemes for two-phase flow

    International Nuclear Information System (INIS)

    Toumi, I.; Kumbaro, A.; Paillere, H.

    1999-01-01

    These course notes, presented at the 30. Von Karman Institute Lecture Series in Computational Fluid Dynamics, give a detailed and through review of upwind differencing methods for two-phase flow models. After recalling some fundamental aspects of two-phase flow modelling, from mixture model to two-fluid models, the mathematical properties of the general 6-equation model are analysed by examining the Eigen-structure of the system, and deriving conditions under which the model can be made hyperbolic. The following chapters are devoted to extensions of state-of-the-art upwind differencing schemes such as Roe's Approximate Riemann Solver or the Characteristic Flux Splitting method to two-phase flow. Non-trivial steps in the construction of such solvers include the linearization, the treatment of non-conservative terms and the construction of a Roe-type matrix on which the numerical dissipation of the schemes is based. Extension of the 1-D models to multi-dimensions in an unstructured finite volume formulation is also described; Finally, numerical results for a variety of test-cases are shown to illustrate the accuracy and robustness of the methods. (authors)

  20. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  1. An Evaluation of Interference Mitigation Schemes for HAPS Systems

    Directory of Open Access Journals (Sweden)

    Kim Nam

    2008-01-01

    Full Text Available Abstract The International Telecommunication Union-Radiocommunication sector (ITU-R has conducted frequency sharing studies between fixed services (FSs using a high altitude platform station (HAPS and fixed-satellite services (FSSs. In particular, ITU-R has investigated the power limitations related to HAPS user terminals (HUTs to facilitate frequency sharing with space station receivers. To reduce the level of interference from the HUTs that can harm a geostationary earth orbit (GEO satellite receiver in a space station, previous studies have taken two approaches: frequency sharing using a separated distance (FSSD and frequency sharing using power control (FSPC. In this paper, various performance evaluation results of interference mitigation schemes are presented. The results include performance evaluations using a new interference mitigation approach as well as conventional approaches. An adaptive beamforming scheme (ABS is introduced as a new scheme for efficient frequency sharing, and the interference mitigation effect on the ABS is examined considering pointing mismatch errors. The results confirm that the application of ABS enables frequency sharing between two systems with a smaller power reduction of HUTs in a cocoverage area compared to this reduction when conventional schemes are utilized. In addition, the analysis results provide the proper amount of modification at the transmitting power level of the HUT required for the suitable frequency sharing.

  2. An early separation scheme for the LHC luminosity upgrade

    CERN Document Server

    Sterbini, G

    2010-01-01

    The present document is organized in five chapters. In the first chapter the framework of the study is described, developing the motivations, the goals and the requirements for the LHC Luminosity Upgrade. We analyze the need for the crossing angle and its impact on the peak luminosity of the collider. After having introduced the Early Separation Scheme, we explain how it may overcome some limitations of the present machine. We compare the nominal LHC crossing scheme with the proposed one underlining its potential in terms of performance and its issues with respect to the integration in the detectors. An analysis of the integrated magnetic field required is given. In the second chapter we introduce one of the most powerful aspect of the scheme: the luminosity leveling. After the description of the physical model adopted, we compare the results of its analytical and numerical solutions. All the potential improvement due to the Early Separation Scheme are shown on the luminosity plane (peak luminosity versus int...

  3. Exact density functional and wave function embedding schemes based on orbital localization

    International Nuclear Information System (INIS)

    Hégely, Bence; Nagy, Péter R.; Kállay, Mihály; Ferenczy, György G.

    2016-01-01

    Exact schemes for the embedding of density functional theory (DFT) and wave function theory (WFT) methods into lower-level DFT or WFT approaches are introduced utilizing orbital localization. First, a simple modification of the projector-based embedding scheme of Manby and co-workers [J. Chem. Phys. 140, 18A507 (2014)] is proposed. We also use localized orbitals to partition the system, but instead of augmenting the Fock operator with a somewhat arbitrary level-shift projector we solve the Huzinaga-equation, which strictly enforces the Pauli exclusion principle. Second, the embedding of WFT methods in local correlation approaches is studied. Since the latter methods split up the system into local domains, very simple embedding theories can be defined if the domains of the active subsystem and the environment are treated at a different level. The considered embedding schemes are benchmarked for reaction energies and compared to quantum mechanics (QM)/molecular mechanics (MM) and vacuum embedding. We conclude that for DFT-in-DFT embedding, the Huzinaga-equation-based scheme is more efficient than the other approaches, but QM/MM or even simple vacuum embedding is still competitive in particular cases. Concerning the embedding of wave function methods, the clear winner is the embedding of WFT into low-level local correlation approaches, and WFT-in-DFT embedding can only be more advantageous if a non-hybrid density functional is employed.

  4. Exact density functional and wave function embedding schemes based on orbital localization

    Science.gov (United States)

    Hégely, Bence; Nagy, Péter R.; Ferenczy, György G.; Kállay, Mihály

    2016-08-01

    Exact schemes for the embedding of density functional theory (DFT) and wave function theory (WFT) methods into lower-level DFT or WFT approaches are introduced utilizing orbital localization. First, a simple modification of the projector-based embedding scheme of Manby and co-workers [J. Chem. Phys. 140, 18A507 (2014)] is proposed. We also use localized orbitals to partition the system, but instead of augmenting the Fock operator with a somewhat arbitrary level-shift projector we solve the Huzinaga-equation, which strictly enforces the Pauli exclusion principle. Second, the embedding of WFT methods in local correlation approaches is studied. Since the latter methods split up the system into local domains, very simple embedding theories can be defined if the domains of the active subsystem and the environment are treated at a different level. The considered embedding schemes are benchmarked for reaction energies and compared to quantum mechanics (QM)/molecular mechanics (MM) and vacuum embedding. We conclude that for DFT-in-DFT embedding, the Huzinaga-equation-based scheme is more efficient than the other approaches, but QM/MM or even simple vacuum embedding is still competitive in particular cases. Concerning the embedding of wave function methods, the clear winner is the embedding of WFT into low-level local correlation approaches, and WFT-in-DFT embedding can only be more advantageous if a non-hybrid density functional is employed.

  5. Exact density functional and wave function embedding schemes based on orbital localization

    Energy Technology Data Exchange (ETDEWEB)

    Hégely, Bence; Nagy, Péter R.; Kállay, Mihály, E-mail: kallay@mail.bme.hu [MTA-BME Lendület Quantum Chemistry Research Group, Department of Physical Chemistry and Materials Science, Budapest University of Technology and Economics, P.O. Box 91, H-1521 Budapest (Hungary); Ferenczy, György G. [Medicinal Chemistry Research Group, Research Centre for Natural Sciences, Hungarian Academy of Sciences, Magyar tudósok körútja 2, H-1117 Budapest (Hungary); Department of Biophysics and Radiation Biology, Semmelweis University, Tűzoltó u. 37-47, H-1094 Budapest (Hungary)

    2016-08-14

    Exact schemes for the embedding of density functional theory (DFT) and wave function theory (WFT) methods into lower-level DFT or WFT approaches are introduced utilizing orbital localization. First, a simple modification of the projector-based embedding scheme of Manby and co-workers [J. Chem. Phys. 140, 18A507 (2014)] is proposed. We also use localized orbitals to partition the system, but instead of augmenting the Fock operator with a somewhat arbitrary level-shift projector we solve the Huzinaga-equation, which strictly enforces the Pauli exclusion principle. Second, the embedding of WFT methods in local correlation approaches is studied. Since the latter methods split up the system into local domains, very simple embedding theories can be defined if the domains of the active subsystem and the environment are treated at a different level. The considered embedding schemes are benchmarked for reaction energies and compared to quantum mechanics (QM)/molecular mechanics (MM) and vacuum embedding. We conclude that for DFT-in-DFT embedding, the Huzinaga-equation-based scheme is more efficient than the other approaches, but QM/MM or even simple vacuum embedding is still competitive in particular cases. Concerning the embedding of wave function methods, the clear winner is the embedding of WFT into low-level local correlation approaches, and WFT-in-DFT embedding can only be more advantageous if a non-hybrid density functional is employed.

  6. Interference-aware random beam selection schemes for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed

    2012-10-19

    Spectrum sharing systems have been recently introduced to alleviate the problem of spectrum scarcity by allowing secondary unlicensed networks to share the spectrum with primary licensed networks under acceptable interference levels to the primary users. In this work, we develop interference-aware random beam selection schemes that provide enhanced performance for the secondary network under the condition that the interference observed by the receivers of the primary network is below a predetermined/acceptable value. We consider a secondary link composed of a transmitter equipped with multiple antennas and a single-antenna receiver sharing the same spectrum with a primary link composed of a single-antenna transmitter and a single-antenna receiver. The proposed schemes select a beam, among a set of power-optimized random beams, that maximizes the signal-to-interference-plus-noise ratio (SINR) of the secondary link while satisfying the primary interference constraint for different levels of feedback information describing the interference level at the primary receiver. For the proposed schemes, we develop a statistical analysis for the SINR statistics as well as the capacity and bit error rate (BER) of the secondary link.

  7. An Energy Efficient Cooperative Hierarchical MIMO Clustering Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungyoung Lee

    2011-12-01

    Full Text Available In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO clustering scheme and traditional multihop Single-Input-Single-Output (SISO routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.

  8. Constructing Concept Schemes From Astronomical Telegrams Via Natural Language Clustering

    Science.gov (United States)

    Graham, Matthew; Zhang, M.; Djorgovski, S. G.; Donalek, C.; Drake, A. J.; Mahabal, A.

    2012-01-01

    The rapidly emerging field of time domain astronomy is one of the most exciting and vibrant new research frontiers, ranging in scientific scope from studies of the Solar System to extreme relativistic astrophysics and cosmology. It is being enabled by a new generation of large synoptic digital sky surveys - LSST, PanStarrs, CRTS - that cover large areas of sky repeatedly, looking for transient objects and phenomena. One of the biggest challenges facing these is the automated classification of transient events, a process that needs machine-processible astronomical knowledge. Semantic technologies enable the formal representation of concepts and relations within a particular domain. ATELs (http://www.astronomerstelegram.org) are a commonly-used means for reporting and commenting upon new astronomical observations of transient sources (supernovae, stellar outbursts, blazar flares, etc). However, they are loose and unstructured and employ scientific natural language for description: this makes automated processing of them - a necessity within the next decade with petascale data rates - a challenge. Nevertheless they represent a potentially rich corpus of information that could lead to new and valuable insights into transient phenomena. This project lies in the cutting-edge field of astrosemantics, a branch of astroinformatics, which applies semantic technologies to astronomy. The ATELs have been used to develop an appropriate concept scheme - a representation of the information they contain - for transient astronomy using hierarchical clustering of processed natural language. This allows us to automatically organize ATELs based on the vocabulary used. We conclude that we can use simple algorithms to process and extract meaning from astronomical textual data.

  9. Digital-Analog Hybrid Scheme and Its Application to Chaotic Random Number Generators

    Science.gov (United States)

    Yuan, Zeshi; Li, Hongtao; Miao, Yunchi; Hu, Wen; Zhu, Xiaohua

    2017-12-01

    Practical random number generation (RNG) circuits are typically achieved with analog devices or digital approaches. Digital-based techniques, which use field programmable gate array (FPGA) and graphics processing units (GPU) etc. usually have better performances than analog methods as they are programmable, efficient and robust. However, digital realizations suffer from the effect of finite precision. Accordingly, the generated random numbers (RNs) are actually periodic instead of being real random. To tackle this limitation, in this paper we propose a novel digital-analog hybrid scheme that employs the digital unit as the main body, and minimum analog devices to generate physical RNs. Moreover, the possibility of realizing the proposed scheme with only one memory element is discussed. Without loss of generality, we use the capacitor and the memristor along with FPGA to construct the proposed hybrid system, and a chaotic true random number generator (TRNG) circuit is realized, producing physical RNs at a throughput of Gbit/s scale. These RNs successfully pass all the tests in the NIST SP800-22 package, confirming the significance of the scheme in practical applications. In addition, the use of this new scheme is not restricted to RNGs, and it also provides a strategy to solve the effect of finite precision in other digital systems.

  10. A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods

    Science.gov (United States)

    Luo, Guangchun; Qin, Ke

    2014-01-01

    Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. We prove that asymmetric searchable structure could be converted to symmetric structure, and functions could be modeled separately apart from the core searchable structure. Based on this observation, we propose a layered searchable encryption (LSE) scheme, which provides compatibility, flexibility, and security for various settings and functionalities. In this scheme, the outputs of the core searchable component based on either symmetric or asymmetric setting are converted to some uniform mappings, which are then transmitted to loosely coupled functional components to further filter the results. In such a way, all functional components could directly support both symmetric and asymmetric settings. Based on LSE, we propose two representative and novel constructions for ranked keyword query (previously only available in symmetric scheme) and range query (previously only available in asymmetric scheme). PMID:24719565

  11. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  12. Relation between riding quality of MAGLEV vehicle and guideway construction accuracy. Chodendo jiki fujoshiki tetsudo guideway no seko seido to norigokochi level

    Energy Technology Data Exchange (ETDEWEB)

    Matsuura, A; Hashimoto, S; Furukawa, A [Railway Technology Research Institute, Tokyo (Japan)

    1994-01-15

    Good riding quality of MAGLEV vehicle requires construction of its guideway to a high level of accuracy. This paper discusses the relation of the power spectrum density (hereinafter the PSD) made up of guideway construction accuracy and its deviation with the level of riding comfort. The discussion uses the 'riding comfort affecting coefficient' consisting of the unit construction length, vehicle's travelling speed, and vibration characteristics. The PSD, which has been used to evaluate track deviation in the iron wheel/rail system railways, is derived from the number of limit exceeded point, the value 'P' as a track deviation coefficient, and the PSD. The relation between the standard deviation in construction errors and the PSD was derived based on track construction methods. This calculation method is characterized by a function with a step form. The relation between the deviation and the level was quantified using this PSD. Its practicability was verified by a simulated re-inspection of the guideway deviation. Correlation between the level and the construction accuracy was elucidated, and a method for determining the criteria for construction accuracy was established. A side wall beam installing vehicle has been fabricated on a trial basis for a side wall system for the guideway, and installation accuracy tests are being carried out. 14 refs., 12 figs., 3 tabs.

  13. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  14. Quantum-Secret-Sharing Scheme Based on Local Distinguishability of Orthogonal Seven-Qudit Entangled States

    Science.gov (United States)

    Liu, Cheng-Ji; Li, Zhi-Hui; Bai, Chen-Ming; Si, Meng-Meng

    2018-02-01

    The concept of judgment space was proposed by Wang et al. (Phys. Rev. A 95, 022320, 2017), which was used to study some important properties of quantum entangled states based on local distinguishability. In this study, we construct 15 kinds of seven-qudit quantum entangled states in the sense of permutation, calculate their judgment space and propose a distinguishability rule to make the judgment space more clearly. Based on this rule, we study the local distinguishability of the 15 kinds of seven-qudit quantum entangled states and then propose a ( k, n) threshold quantum secret sharing scheme. Finally, we analyze the security of the scheme.

  15. Note of the 20 December 2016 on the elaboration of regional biomass schemes

    International Nuclear Information System (INIS)

    Michel, Laurent; GESLAIN-LANEELLE, Catherine

    2016-01-01

    This official note informs Region prefects on modalities of elaboration of regional biomass schemes, and provides them with data on mobilizable biomass resources at the regional level. It briefly presents the legal framework of the scheme elaboration, the elaboration agenda, and the scope of usages of biomass to be considered within the scheme. It discusses the articulation between regional and national schemes, from a global point of view as well as in terms works of elaboration. It briefly describes how the regional scheme is to be assessed. Appendices present planning and programming elements to be taken into account, elements of explanation for the regional biomass table, institutions represented in the information and orientation committee of the national scheme, and regional biomass tables which contain detailed assessments of the various biomass resources for each French region

  16. The finite element method scheme for a solution of an evolution variational inequality with a nonlocal space operator

    Science.gov (United States)

    Glazyrina, O. V.; Pavlova, M. F.

    2016-11-01

    We consider the parabolic inequality with monotone with respect to a gradient space operator, which is depended on integral with respect to space variables solution characteristic. We construct a two-layer differential scheme for this problem with use of penalty method, semidiscretization with respect to time variable method and the finite element method (FEM) with respect to space variables. We proved a convergence of constructed mothod.

  17. Multi-criteria decision-making on assessment of proposed tidal barrage schemes in terms of environmental impacts.

    Science.gov (United States)

    Wu, Yunna; Xu, Chuanbo; Ke, Yiming; Chen, Kaifeng; Xu, Hu

    2017-12-15

    For tidal range power plants to be sustainable, the environmental impacts caused by the implement of various tidal barrage schemes must be assessed before construction. However, several problems exist in the current researches: firstly, evaluation criteria of the tidal barrage schemes environmental impact assessment (EIA) are not adequate; secondly, uncertainty of criteria information fails to be processed properly; thirdly, correlation among criteria is unreasonably measured. Hence the contributions of this paper are as follows: firstly, an evaluation criteria system is established from three dimensions of hydrodynamic, biological and morphological aspects. Secondly, cloud model is applied to describe the uncertainty of criteria information. Thirdly, Choquet integral with respect to λ-fuzzy measure is introduced to measure the correlation among criteria. On the above bases, a multi-criteria decision-making decision framework for tidal barrage scheme EIA is established to select the optimal scheme. Finally, a case study demonstrates the effectiveness of the proposed framework. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. A unified thermostat scheme for efficient configurational sampling for classical/quantum canonical ensembles via molecular dynamics

    Science.gov (United States)

    Zhang, Zhijun; Liu, Xinzijian; Chen, Zifei; Zheng, Haifeng; Yan, Kangyu; Liu, Jian

    2017-07-01

    We show a unified second-order scheme for constructing simple, robust, and accurate algorithms for typical thermostats for configurational sampling for the canonical ensemble. When Langevin dynamics is used, the scheme leads to the BAOAB algorithm that has been recently investigated. We show that the scheme is also useful for other types of thermostats, such as the Andersen thermostat and Nosé-Hoover chain, regardless of whether the thermostat is deterministic or stochastic. In addition to analytical analysis, two 1-dimensional models and three typical real molecular systems that range from the gas phase, clusters, to the condensed phase are used in numerical examples for demonstration. Accuracy may be increased by an order of magnitude for estimating coordinate-dependent properties in molecular dynamics (when the same time interval is used), irrespective of which type of thermostat is applied. The scheme is especially useful for path integral molecular dynamics because it consistently improves the efficiency for evaluating all thermodynamic properties for any type of thermostat.

  19. EXPLORING THE POTENTIAL OF INTEGRATION QUALITY ASSESSMENT SYSTEM IN CONSTRUCTION (QLASSIC WITH ISO 9001 QUALITY MANAGEMENT SYSTEM (QMS

    Directory of Open Access Journals (Sweden)

    Mukhtar Che Ali

    2014-03-01

    Full Text Available Quality has been identified as one of the fundamental needs of clients. As such construction projects that are able to be completed with distinctive quality will definitely enable to delight their customers. In this regard, Construction Industry Development Board (CIDB has introduced two quality related programs namely ISO 9001 DIY Scheme and QLASSIC. The later is essentially a quality performance assessment tool to evaluate the level of quality of a building construction work based on quality standards stipulated in CIS 7:2006. One of the key deliverables of QLASSIC is QLASSIC Score which denotes the level of quality of the assessed construction project. Potentially there is a strong correlation between QLASSIC and ISO 9001 QMS. However there is lack of knowledge in the industry in am algamating QLASSIC with ISO 9001QMS towards attaining high quality performance. Indeed it is noticed that not many studies have been undertaken in this area. Thus it warrants to undertake a study that deliberates on the relationship of practicing ISO 9001Q MS with the achievement of QLASSIC Score. Therefore among the key objectives of this research are generally to investigate the relationship between practicing ISO 9001 QMS principles with QLASSIC performance and to examine the expected business outcomes for ISO 9001 certified contractors that are able to sustain relatively high QLASSIC Score. Eventually it is postulated that the output of this research would enable to elevate the level of quality performance in the Malaysian construction industry.

  20. [Comprehensive evaluation of county-level construction land intensive utility in Guangdong province: a case study for Zijin County].

    Science.gov (United States)

    Zhang, Jun-Ping; Hu, Yue-Ming; Tian, Yuan; Wang, Lu; Liu, Su-Ping

    2010-02-01

    Based on the weights and membership values of evaluation indices, a measurement model of construction land intensive utility in Zijin County of Guangdong Province was established, and the basic principles of the greatest compatible class were adopted to classify the intensive utility levels of the construction land based on fuzzy recognition. Additionally, the intensive utility potential of construction land in Zijin County in 2005 was calculated by comparing the per capita construction land in towns, independent industrial and mining areas, and rural residential areas with the latest national land use standards for planning of town launched in 2007. The predicted value of the model was 0.421, suggesting that the construction land utility in Zijin County was still low- effective and extensive. Theoretically, the construction land area could be decreased by 555.69-2197.69 hm2, which meant there was a great potential in the intensive utility of construction land in the county.

  1. Autonomous construction agents: An investigative framework for large sensor network self-management

    Energy Technology Data Exchange (ETDEWEB)

    Koch, Joshua Bruce [Iowa State Univ., Ames, IA (United States)

    2008-01-01

    Recent technological advances have made it cost effective to utilize massive, heterogeneous sensor networks. To gain appreciable value from these informational systems, there must be a control scheme that coordinates information flow to produce meaningful results. This paper will focus on tools developed to manage the coordination of autonomous construction agents using stigmergy, in which a set of basic low-level rules are implemented through various environmental cues. Using VE-Suite, an open-source virtual engineering software package, an interactive environment is created to explore various informational configurations for the construction problem. A simple test case is developed within the framework, and construction times are analyzed for possible functional relationships pertaining to performance of a particular set of parameters and a given control process. Initial experiments for the test case show sensor saturation occurs relatively quickly with 5-7 sensors, and construction time is generally independent of sensor range except for small numbers of sensors. Further experiments using this framework are needed to define other aspects of sensor performance. These trends can then be used to help decide what kinds of sensing capabilities are required to simultaneously achieve the most cost-effective solution and provide the required value of information when applied to the development of real world sensor applications.

  2. Time Reversal UWB Communication System: A Novel Modulation Scheme with Experimental Validation

    Directory of Open Access Journals (Sweden)

    Khaleghi A

    2010-01-01

    Full Text Available A new modulation scheme is proposed for a time reversal (TR ultra wide-band (UWB communication system. The new modulation scheme uses the binary pulse amplitude modulation (BPAM and adds a new level of modulation to increase the data rate of a TR UWB communication system. Multiple data bits can be transmitted simultaneously with a cost of little added interference. Bit error rate (BER performance and the maximum achievable data rate of the new modulation scheme are theoretically analyzed. Two separate measurement campaigns are carried out to analyze the proposed modulation scheme. In the first campaign, the frequency responses of a typical indoor channel are measured and the performance is studied by the simulations using the measured frequency responses. Theoretical and the simulative performances are in strong agreement with each other. Furthermore, the BER performance of the proposed modulation scheme is compared with the performance of existing modulation schemes. It is shown that the proposed modulation scheme outperforms QAM and PAM for in an AWGN channel. In the second campaign, an experimental validation of the proposed modulation scheme is done. It is shown that the performances with the two measurement campaigns are in good agreement.

  3. Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2014-01-01

    Full Text Available Several certificateless short signature and multisignature schemes based on traditional public key infrastructure (PKI or identity-based cryptosystem (IBC have been proposed in the literature; however, no certificateless short sequential (or serial multisignature (CL-SSMS or short broadcast (or parallel multisignature (CL-SBMS schemes have been proposed. In this paper, we propose two such new CL-SSMS and CL-SBMS schemes based on elliptic curve bilinear pairing. Like any certificateless public key cryptosystem (CL-PKC, the proposed schemes are free from the public key certificate management burden and the private key escrow problem as found in PKI- and IBC-based cryptosystems, respectively. In addition, the requirements of the expected security level and the fixed length signature with constant verification time have been achieved in our schemes. The schemes are communication efficient as the length of the multisignature is equivalent to a single elliptic curve point and thus become the shortest possible multisignature scheme. The proposed schemes are then suitable for communication systems having resource constrained devices such as PDAs, mobile phones, RFID chips, and sensors where the communication bandwidth, battery life, computing power and storage space are limited.

  4. Construction history and construction management

    International Nuclear Information System (INIS)

    Agh, S.

    1999-01-01

    The process of pre-design and design preparation of the Mochovce NPP as well as the construction history of the plant is highlighted, including the financing aspect and problems arising from changes in the technological and other conditions of start-up of the reactor units. The results of international audits performed to improve the level of nuclear safety and implementation of the measures suggested are also described. The milestones of the whole construction process and start-up process, the control and quality system, and the methods of control and management of the complex construction project are outlined. (author)

  5. A risk-based classification scheme for genetically modified foods. III: Evaluation using a panel of reference foods.

    Science.gov (United States)

    Chao, Eunice; Krewski, Daniel

    2008-12-01

    This paper presents an exploratory evaluation of four functional components of a proposed risk-based classification scheme (RBCS) for crop-derived genetically modified (GM) foods in a concordance study. Two independent raters assigned concern levels to 20 reference GM foods using a rating form based on the proposed RBCS. The four components of evaluation were: (1) degree of concordance, (2) distribution across concern levels, (3) discriminating ability of the scheme, and (4) ease of use. At least one of the 20 reference foods was assigned to each of the possible concern levels, demonstrating the ability of the scheme to identify GM foods of different concern with respect to potential health risk. There was reasonably good concordance between the two raters for the three separate parts of the RBCS. The raters agreed that the criteria in the scheme were sufficiently clear in discriminating reference foods into different concern levels, and that with some experience, the scheme was reasonably easy to use. Specific issues and suggestions for improvements identified in the concordance study are discussed.

  6. Exergame Grading Scheme: Concept Development and Preliminary Psychometric Evaluations in Cancer Survivors

    Directory of Open Access Journals (Sweden)

    Hsiao-Lan Wang

    2017-01-01

    Full Text Available The challenge of using exergames to promote physical activity among cancer survivors lies in the selection of the exergames that match their fitness level. There is a need for a standardized grading scheme by which to judge an exergame’s capacity to address specific physical fitness attributes with different levels of physical engagement. The study aimed to develop an Exergame Grading Scheme and preliminarily evaluate its psychometric properties. Fourteen (14 items were created from the human movement and exergame literature. The content validity index (CVI was rated by content experts with two consecutive rounds (N=5 and N=3 independently. The interrater reliability (IRR was determined by two raters who used the Exergame Grading Scheme to determine the grading score of the five exergames performed by two cancer survivors (N=10. Each item had a score of 1 for item-level CVI and 1 for k. For IRR, 9 items had rho values of 1, 1 item had 0.93, and 4 items had between 0.80 and 0.89. This valid and reliable Exergame Grading Scheme makes it possible to develop a personalized physical activity program using any type of exergame or fitness mobile application in rehabilitation practice to meet the needs of cancer survivors.

  7. A numerical scheme using multi-shockpeakons to compute solutions of the Degasperis-Procesi equation

    Directory of Open Access Journals (Sweden)

    Hakon A. Hoel

    2007-07-01

    Full Text Available We consider a numerical scheme for entropy weak solutions of the DP (Degasperis-Procesi equation $u_t - u_{xxt} + 4uu_x = 3u_{x}u_{xx}+ uu_{xxx}$. Multi-shockpeakons, functions of the form $$ u(x,t =sum_{i=1}^n(m_i(t -hbox{sign}(x-x_i(ts_i(te^{-|x-x_i(t|}, $$ are solutions of the DP equation with a special property; their evolution in time is described by a dynamical system of ODEs. This property makes multi-shockpeakons relatively easy to simulate numerically. We prove that if we are given a non-negative initial function $u_0 in L^1(mathbb{R}cap BV(mathbb{R}$ such that $u_{0} - u_{0,x}$ is a positive Radon measure, then one can construct a sequence of multi-shockpeakons which converges to the unique entropy weak solution in $mathbb{R}imes[0,T$ for any $T>0$. From this convergence result, we construct a multi-shockpeakon based numerical scheme for solving the DP equation.

  8. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  9. Novel Schemes for Measurement-Based Quantum Computation

    International Nuclear Information System (INIS)

    Gross, D.; Eisert, J.

    2007-01-01

    We establish a framework which allows one to construct novel schemes for measurement-based quantum computation. The technique develops tools from many-body physics--based on finitely correlated or projected entangled pair states--to go beyond the cluster-state based one-way computer. We identify resource states radically different from the cluster state, in that they exhibit nonvanishing correlations, can be prepared using nonmaximally entangling gates, or have very different local entanglement properties. In the computational models, randomness is compensated in a different manner. It is shown that there exist resource states which are locally arbitrarily close to a pure state. We comment on the possibility of tailoring computational models to specific physical systems

  10. Novel schemes for measurement-based quantum computation.

    Science.gov (United States)

    Gross, D; Eisert, J

    2007-06-01

    We establish a framework which allows one to construct novel schemes for measurement-based quantum computation. The technique develops tools from many-body physics-based on finitely correlated or projected entangled pair states-to go beyond the cluster-state based one-way computer. We identify resource states radically different from the cluster state, in that they exhibit nonvanishing correlations, can be prepared using nonmaximally entangling gates, or have very different local entanglement properties. In the computational models, randomness is compensated in a different manner. It is shown that there exist resource states which are locally arbitrarily close to a pure state. We comment on the possibility of tailoring computational models to specific physical systems.

  11. Lattice Boltzmann method and gas-kinetic BGK scheme in the low-Mach number viscous flow simulations

    International Nuclear Information System (INIS)

    Xu Kun; He Xiaoyi

    2003-01-01

    Both lattice Boltzmann method (LBM) and the gas-kinetic BGK scheme are based on the numerical discretization of the Boltzmann equation with collisional models, such as, the Bhatnagar-Gross-Krook (BGK) model. LBM tracks limited number of particles and the viscous flow behavior emerges automatically from the intrinsic particle stream and collisions process. On the other hand, the gas-kinetic BGK scheme is a finite volume scheme, where the time-dependent gas distribution function with continuous particle velocity space is constructed and used in the evaluation of the numerical fluxes across cell interfaces. Currently, LBM is mainly used for low Mach number, nearly incompressible flow simulation. For the gas-kinetic scheme, the application is focusing on the high speed compressible flows. In this paper, we are going to compare both schemes in the isothermal low-Mach number flow simulations. The methodology for developing both schemes will be clarified through the introduction of operator splitting Boltzmann model and operator averaging Boltzmann model. From the operator splitting Boltzmann model, the error rooted in many kinetic schemes, which are based on the decoupling of particle transport and collision, can be easily understood. As to the test case, we choose to use the 2D cavity flow since it is one of the most extensively studied cases. Detailed simulation results with different Reynolds numbers, as well as the benchmark solutions, are presented

  12. Treatment of complementary events in constructing the linked Level 1 and Level 2 fault trees

    International Nuclear Information System (INIS)

    Jo, Young G.; Ahn, Kwang-Il

    2009-01-01

    Complementary events in the event trees for a PRA model should be treated properly in order to evaluate plant risk correctly. In this paper, the characteristics of the following three different cutset generation methods were investigated first in order to find the best practical way for treating complementary events: (1) exact method which treats complementary events logically, (2) no-delete term method which does not treat complementary events at all, and (3) delete term method which treats complementary events by deleting nonsense cutsets which are generated as a result of ignoring complementary events. Then, practical methods for treating complementary events in constructing linked fault trees for Level 1 and Level 2 PRA were suggested and demonstrated. The suggested methods deal with the following selected four typical cases: (1) Case 1-an event tree event (E) is represented by a fault tree gate whose inputs consist of only fault tree gates, (2) Case 2-E is represented by a single basic event, (3) Case 3-E is represented by an OR fault tree gate which has a single basic event and a fault tree gate as inputs, and (4) Case 4-E is represented by an AND fault tree gate which has a single basic event and a fault tree gate as inputs. In the suggested methods, first the high level logic structures of event tree events are examined and restructured, if needed. Then, the delete term method, the exact method, and the combination of the two methods are applied to through Case 1 to Case 4, respectively. As a result, it is recommended to treat complementary events, using the suggested methods, before Level 1 and Level 2 PRA fault trees are coupled

  13. A gas kinetic scheme for the Baer–Nunziato two-phase flow model

    International Nuclear Information System (INIS)

    Pan, Liang; Zhao, Guiping; Tian, Baolin; Wang, Shuanghu

    2012-01-01

    Numerical methods for the Baer–Nunziato (BN) two-phase flow model have attracted much attention in recent years. In this paper, we present a new gas kinetic scheme for the BN two-phase flow model containing non-conservative terms in the framework of finite volume method. In the view of microscopic aspect, a generalized Bhatnagar–Gross–Krook (BGK) model which matches with the BN model is constructed. Based on the integral solution of the generalized BGK model, we construct the distribution functions at the cell interface. Then numerical fluxes can be obtained by taking moments of the distribution functions, and non-conservative terms are explicitly introduced into the construction of numerical fluxes. In this method, not only the complex iterative process of exact solutions is avoided, but also the non-conservative terms included in the equation can be handled well.

  14. A digital memories based user authentication scheme with privacy preservation.

    Directory of Open Access Journals (Sweden)

    JunLiang Liu

    Full Text Available The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key, which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.

  15. The new Exponential Directional Iterative (EDI) 3-D Sn scheme for parallel adaptive differencing

    International Nuclear Information System (INIS)

    Sjoden, G.E.

    2005-01-01

    The new Exponential Directional Iterative (EDI) discrete ordinates (Sn) scheme for 3-D Cartesian Coordinates is presented. The EDI scheme is a logical extension of the positive, efficient Exponential Directional Weighted (EDW) Sn scheme currently used as the third level of the adaptive spatial differencing algorithm in the PENTRAN parallel discrete ordinates solver. Here, the derivation and advantages of the EDI scheme are presented; EDI uses EDW-rendered exponential coefficients as initial starting values to begin a fixed point iteration of the exponential coefficients. One issue that required evaluation was an iterative cutoff criterion to prevent the application of an unstable fixed point iteration; although this was needed in some cases, it was readily treated with a default to EDW. Iterative refinement of the exponential coefficients in EDI typically converged in fewer than four fixed point iterations. Moreover, EDI yielded more accurate angular fluxes compared to the other schemes tested, particularly in streaming conditions. Overall, it was found that the EDI scheme was up to an order of magnitude more accurate than the EDW scheme on a given mesh interval in streaming cases, and is potentially a good candidate as a fourth-level differencing scheme in the PENTRAN adaptive differencing sequence. The 3-D Cartesian computational cost of EDI was only about 20% more than the EDW scheme, and about 40% more than Diamond Zero (DZ). More evaluation and testing are required to determine suitable upgrade metrics for EDI to be fully integrated into the current adaptive spatial differencing sequence in PENTRAN. (author)

  16. Hitting emissions targets with (statistical) confidence in multi-instrument Emissions Trading Schemes

    International Nuclear Information System (INIS)

    Shipworth, David

    2003-12-01

    A means of assessing, monitoring and controlling aggregate emissions from multi-instrument Emissions Trading Schemes is proposed. The approach allows contributions from different instruments with different forms of emissions targets to be integrated. Where Emissions Trading Schemes are helping to meet specific national targets, the approach allows the entry requirements of new participants to be calculated and set at a level that will achieve these targets. The approach is multi-levelled, and may be extended downwards to support pooling of participants within instruments, or upwards to embed Emissions Trading Schemes within a wider suite of policies and measures with hard and soft targets. Aggregate emissions from each instrument are treated stochastically. Emissions from the scheme as a whole are then the joint probability distribution formed by integrating the emissions from its instruments. Because a Bayesian approach is adopted, qualitative and semi-qualitative data from expert opinion can be used where quantitative data is not currently available, or is incomplete. This approach helps government retain sufficient control over emissions trading scheme targets to allow them to meet their emissions reduction obligations, while minimising the need for retrospectively adjusting existing participants' conditions of entry. This maintains participant confidence, while providing the necessary policy levers for good governance

  17. Interference mitigation enhancement of switched-based scheme in over-loaded femtocells

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-01

    This paper proposes adequate methods to improve the interference mitigation capability of a recently investigated switched-based interference reduction scheme in short-range open-access and over-loaded femtocells. It is assumed that the available orthogonal channels for the femtocell network are distributed among operating access points in close vicinity, where each of which knows its allocated channels a priori. For the case when the feedback links are capacity-limited and the available channels can be universally shared and simultaneously used, the paper presents enhanced schemes to identify a channel to serve the desired scheduled user by maintaining the interference power level within a tolerable range. They attempt to either complement the switched-based scheme by minimum interference channel selection or adopt different interference thresholds on available channels, while aiming to reduce the channels examination load. The performance of the proposed schemes is quantified and then compared with those of the single-threshold switched-based scheme via numerical and simulation results. © 2012 IEEE.

  18. The Effect of a Monitoring Scheme on Tutorial Attendance and Assignment Submission

    Science.gov (United States)

    Burke, Grainne; Mac an Bhaird, Ciaran; O'Shea, Ann

    2013-01-01

    We report on the implementation of a monitoring scheme by the Department of Mathematics and Statistics at the National University of Ireland Maynooth. The scheme was introduced in an attempt to increase the level and quality of students' engagement with certain aspects of their undergraduate course. It is well documented that students with higher…

  19. A circuit scheme to control current surge for RFID-NVM pumps

    Energy Technology Data Exchange (ETDEWEB)

    Li Ming; Kang Jinfeng; Wang Yangyuan [Institute of Microelectronics, Peking University, Beijing 100871 (China); Yang Liwu, E-mail: prettynecess@163.co [Semiconductor Manufacturing International Corporation, Shanghai 201203 (China)

    2010-02-15

    This paper presents a new circuit scheme to control the current surge in the boosting phase of an radio frequency idenfication-nonvolative memory pump. By introducing a circuit block consisting of a current reference and a current mirror, the new circuit scheme can keep the period-average current of the pump constantly below the desired level, for example, 2.5 {mu}A. Therefore, it can prevent the rectified supply of the RFID tag IC from collapsing in the boosting phase of the pump. The presented scheme could effectively reduce the voltage drop on the rectified supply from more than 50% to even zero, but could cost less area. Moreover, an analytical expression to calculate the boosting time of a pump in the new scheme is developed. (semiconductor integrated circuits)

  20. A circuit scheme to control current surge for RFID-NVM pumps

    International Nuclear Information System (INIS)

    Li Ming; Kang Jinfeng; Wang Yangyuan; Yang Liwu

    2010-01-01

    This paper presents a new circuit scheme to control the current surge in the boosting phase of an radio frequency idenfication-nonvolative memory pump. By introducing a circuit block consisting of a current reference and a current mirror, the new circuit scheme can keep the period-average current of the pump constantly below the desired level, for example, 2.5 μA. Therefore, it can prevent the rectified supply of the RFID tag IC from collapsing in the boosting phase of the pump. The presented scheme could effectively reduce the voltage drop on the rectified supply from more than 50% to even zero, but could cost less area. Moreover, an analytical expression to calculate the boosting time of a pump in the new scheme is developed. (semiconductor integrated circuits)

  1. Sensory testing of emissions from construction products. Integration into the Blue Angel award criteria and assessment scheme of the Committee for Health Evaluation of Building Products; Sensorische Bewertung der Emissionen aus Bauprodukten.- Integration in die Vergabegrundlagen fuer den Blauen Engel und das Bewertungsschema des Ausschusses zur gesundheitlichen Bewertung von Bauprodukten

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, Birgit; Danielak, Maciej [Technische Univ. Berlin (Germany); Panaskova, Jana [Technische Univ. Berlin (Germany); RWTH Aachen (Germany). Inst. for Energy Efficient Buildings and Indoor Climate; Horn, Wolfgang; Jann, Oliver [Bundesanstalt fuer Materialforschung und -pruefung (BAM), Berlin (Germany); Mueller, Dirk [RWTH Aachen (Germany). Inst. for Energy Efficient Buildings and Indoor Climate

    2011-06-15

    Emissions from construction products impact the quality of indoor air considerably. The AgBB scheme is employed to evaluate the emissions of volatile organic compounds (VOC) from construction products. The hygienic evaluation according to the AgBB scheme requires product-specific measuring procedures. These exist for a range of products. They have been validated in co-operation with several research and testing institutes and have been included in the criteria for awarding the eco-label Blue Angel. The evaluation is, however, stricter and generally has lower limits. VOC emissions and odours can cause health problems so sensory testing is an important element in the evaluation of construction products and has - for reasons of precaution - been set down in the AgBB scheme. The main goal of the project is to derive a method of sensory evaluation and limits for awarding the Blue Angel and for the AgBB scheme. Based on the research conducted (see Chapter 5 Results and Discussion), perceived intensity and hedonics are suggested for the evaluation method. The derivation of limits for the sensory evaluation on the 28th day was effected in the present study through the additional questioning of the test subjects on the reasonability of a sample. For the Blue Angel, there could be different limits of perceived intensity and hedonic for each group of products. A preliminary suggestion for possible limits - here for all product groups - is a perceived intensity of 7 pi (5 pi + 2 pi as confidence coefficient, Chapter 5.1.5. ''Minimum Requirements for the Size of Test Groups'') and -1 (0{+-}0.8, rounded to -1) for the hedonic value (see Figure 6-1). (orig.)

  2. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  3. A quadratic form of the Coulomb operator and an optimization scheme for the extended Kohn-Sham models

    International Nuclear Information System (INIS)

    Kusakabe, Koichi

    2009-01-01

    To construct an optimization scheme for an extension of the Kohn-Sham approach, I introduce an operator form of the Coulomb interaction. This form is the sum of quadratic form pairs, which can be redefined in a self-consistent calculation of a multi-reference density functional theory. A detailed derivation of the form is given. A fluctuation term introduced in the extended Kohn-Sham scheme is expressed in this form for regularization. The present procedure also provides an exact derivation of effective negative interactions in charge fluctuation channels. Relevance to high-temperature superconductors is discussed.

  4. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  5. Method for accounting for γ-γ-coincidences in compu-- ter reconstruction of energy level and γ-transition schemes

    International Nuclear Information System (INIS)

    Burmistrov, V.R.

    1979-01-01

    The principle and program of introduction of data on γ-γ- coincidences into the computer program are described. By analogy with the principle of accounting for γ-line intensities while constructing a system of levels according to the reference levels and γ-line spectrum, the ''leaving'' γ-transitions are introduced as an artificial level parameter. This parameter is a list of γ-lines leaving the given level or the lower levels bound with it. As a result of introducing such parameters, the accounting for the data on γ-γ-coincidences amounts to comparing two tables of numbers: a table of γ-line coincidences (an experimental one) and a table of ''leaving'' γ-transitions of every level. The program arranges the γ-lines in the preset system of equations with regard to the γ-line energies, their intensities and data on γ-γ- coincidences, and excludes consideration of the false levels. The calculation results are printed out in tables [ru

  6. Advisibility of excavating an additional central shaft to reduce duration of mine construction. [USSR

    Energy Technology Data Exchange (ETDEWEB)

    Durov, E.M.

    1981-09-01

    This paper evaluates methods of reducing duration and cost of underground black coal mine construction. A proposed scheme of coal deposit opening by a system of three mine shafts is critically analyzed. In comparison to the conventional scheme, the proposed one has one additional mine shaft in the central mine zone. The shaft, equipped with a cage hoisting system, permits the rate of mine drivage in the center of the mine to be increased. The cage hoisting system in the additional shaft is activated before the main skip shaft has been equipped and is in operation. Duration of mine construction is reduced by 6 to 10 months. Exacavation of the additional shaft costs from 2.5 to 3.5 million rubles. A further system of mine construction is also analyzed. The main shaft in the mine center is temporarily equipped with a cage hoisting system. The cage system is used for hoisting rocks removed from mine headings and main workings constructed at the bottom of the main shaft. The main shaft is equipped with skips and hoisting tower at a later stage when construction of main roadways and structures at its bottom has been completed. The proposed system permits mine construction to be reduced by 4 to 5 months without a major increase in investment.

  7. The Calculation of Single-Nucleon Energies of Nuclei by Considering Two-Body Effective Interaction, n(k,ρ, and a Hartree-Fock Inspired Scheme

    Directory of Open Access Journals (Sweden)

    H. Mariji

    2016-01-01

    Full Text Available The nucleon single-particle energies (SPEs of the selected nuclei, that is, O16, Ca40, and Ni56, are obtained by using the diagonal matrix elements of two-body effective interaction, which generated through the lowest-order constrained variational (LOCV calculations for the symmetric nuclear matter with the Aυ18 phenomenological nucleon-nucleon potential. The SPEs at the major levels of nuclei are calculated by employing a Hartree-Fock inspired scheme in the spherical harmonic oscillator basis. In the scheme, the correlation influences are taken into account by imposing the nucleon effective mass factor on the radial wave functions of the major levels. Replacing the density-dependent one-body momentum distribution functions of nucleons, n(k,ρ, with the Heaviside functions, the role of n(k,ρ in the nucleon SPEs at the major levels of the selected closed shell nuclei is investigated. The best fit of spin-orbit splitting is taken into account when correcting the major levels of the nuclei by using the parameterized Wood-Saxon potential and the Aυ18 density-dependent mean field potential which is constructed by the LOCV method. Considering the point-like protons in the spherical Coulomb potential well, the single-proton energies are corrected. The results show the importance of including n(k,ρ, instead of the Heaviside functions, in the calculation of nucleon SPEs at the different levels, particularly the valence levels, of the closed shell nuclei.

  8. The Social Construction of Transnational Governance

    DEFF Research Database (Denmark)

    Haack, Patrick; Rasche, Andreas

    This paper examines the social construction of transnational governance schemes (TGSs hereafter), inter-organizational networks comprising public and/or private actors that jointly regulate global public policy issues, such as the protection of global ecosystems. We focus on the UN Global Compact...... (UNGC), one of the largest and most prominent TGSs. We create a data set of publically available documents on the UNGC, analyze how UNGC advocates and UNGC critics publically conceptualize and (de-)legitimize the UNGC, and examine how this process develops over time. By now, we have compiled a data base...... of more than 1,500 documents (speeches, news articles, press releases, blog entries, etc.), developed, tested, and validated a comprehensive coding scheme, coded more than 250 documents by means of the NVivo software, and carried out preliminary qualitative and quantitative analyses of the data. First...

  9. A Fixed-point Scheme for the Numerical Construction of Magnetohydrostatic Atmospheres in Three Dimensions

    Science.gov (United States)

    Gilchrist, S. A.; Braun, D. C.; Barnes, G.

    2016-12-01

    Magnetohydrostatic models of the solar atmosphere are often based on idealized analytic solutions because the underlying equations are too difficult to solve in full generality. Numerical approaches, too, are often limited in scope and have tended to focus on the two-dimensional problem. In this article we develop a numerical method for solving the nonlinear magnetohydrostatic equations in three dimensions. Our method is a fixed-point iteration scheme that extends the method of Grad and Rubin ( Proc. 2nd Int. Conf. on Peaceful Uses of Atomic Energy 31, 190, 1958) to include a finite gravity force. We apply the method to a test case to demonstrate the method in general and our implementation in code in particular.

  10. Impact and Suggestion of Column-to-Surface Vertical Correction Scheme on the Relationship between Satellite AOD and Ground-Level PM2.5 in China

    Directory of Open Access Journals (Sweden)

    Wei Gong

    2017-10-01

    Full Text Available As China is suffering from severe fine particle pollution from dense industrialization and urbanization, satellite-derived aerosol optical depth (AOD has been widely used for estimating particulate matter with an aerodynamic diameter less than 2.5 μm (PM2.5. However, the correlation between satellite AOD and ground-level PM2.5 could be influenced by aerosol vertical distribution, as satellite AOD represents the entire column, rather than just ground-level concentration. Here, a new column-to-surface vertical correction scheme is proposed to improve separation of the near-surface and elevated aerosol layers, based on the ratio of the integrated extinction coefficient within 200–500 m above ground level (AGL, using the Cloud-Aerosol Lidar with Orthogonal Polarization (CALIOP aerosol profile products. There are distinct differences in climate, meteorology, terrain, and aerosol transmission throughout China, so comparisons between vertical correction via CALIOP ratio and planetary boundary layer height (PBLH were conducted in different regions from 2014 to 2015, combined with the original Pearson coefficient between satellite AOD and ground-level PM2.5 for reference. Furthermore, the best vertical correction scheme was suggested for different regions to achieve optimal correlation with PM2.5, based on the analysis and discussion of regional and seasonal characteristics of aerosol vertical distribution. According to our results and discussions, vertical correction via PBLH is recommended in northwestern China, where the PBLH varies dramatically, stretching or compressing the surface aerosol layer; vertical correction via the CALIOP ratio is recommended in northeastern China, southwestern China, Central China (excluding summer, North China Plain (excluding Beijing, and the spring in the southeast coast, areas that are susceptible to exogenous aerosols and exhibit the elevated aerosol layer; and original AOD without vertical correction is

  11. A virtual network computer's optical storage virtualization scheme

    Science.gov (United States)

    Wang, Jianzong; Hu, Huaixiang; Wan, Jiguang; Wang, Peng

    2008-12-01

    In this paper, we present the architecture and implementation of a virtual network computers' (VNC) optical storage virtualization scheme called VOSV. Its task is to manage the mapping of virtual optical storage to physical optical storage, a technique known as optical storage virtualization. The design of VOSV aims at the optical storage resources of different clients and servers that have high read-sharing patterns. VOSV uses several schemes such as a two-level Cache mechanism, a VNC server embedded module and the iSCSI protocols to improve the performance. The results measured on the prototype are encouraging, and indicating that VOSV provides the high I/O performance.

  12. An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

    Directory of Open Access Journals (Sweden)

    Changji Wang

    2013-01-01

    Full Text Available There is an acceleration of adoption of cloud computing among enterprises. However, moving the infrastructure and sensitive data from trusted domain of the data owner to public cloud will pose severe security and privacy risks. Attribute-based encryption (ABE is a new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. Key-policy attribute-based encryption (KP-ABE is an important type of ABE, which enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that specify which ciphertexts the key holder will be allowed to decrypt. In most existing KP-ABE scheme, the ciphertext size grows linearly with the number of attributes embedded in ciphertext. In this paper, we propose a new KP-ABE construction with constant ciphertext size. In our construction, the access policy can be expressed as any monotone access structure. Meanwhile, the ciphertext size is independent of the number of ciphertext attributes, and the number of bilinear pairing evaluations is reduced to a constant. We prove that our scheme is semantically secure in the selective-set model based on the general Diffie-Hellman exponent assumption.

  13. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  14. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  15. Geneflow and Cumulative discounted Revenues of Dairy Cattle Cross-Breeding Schemes

    International Nuclear Information System (INIS)

    Kosgey, I.S.; Bebe, B.O.; Kahi, A.K.; Arendonk, J.A.M.V.

    1999-01-01

    A simulation study Using Matrix formulation was used to asses the flow of genes from the nucleus to the commercial population for three nucleus dairy cattle crossbreeding schemes involving indigenous (Zebu or native ) and exotic (European) animals under Kenyan conditions: Artificial insemination (A.I.) or natural mating F 1 production, continuous crossbred (F 2 inter se) production and multiple ovulation and embryo transfer (MOET) F 1 production. The latter two schemes used MOET in the nucleus. cumulative discounted expressions (CDES) and cumulative discounted Revenues (CDR) were calculated to rank these schemes. The Pathways considered were sires and dams to produce sires and dams. The evaluation Criterion was milk production measured in age class 3 through 10 in F 1 and F 2 cow populations. the schemes were evaluated over a 30-year projected period with assumed interest rates of 0% and 10%. Further, the genetic level between the indigenous nucleus animals, the F 1 males and commercial female population was calculated by defining the incidence vector h as the difference between the three groups. The F 1 A.I. or natural scheme had higher CDES of 0.978 and 0.161 at 0% and 10% interest rates respectively. The corresponding values for F 1 MOET scheme were 0.735 and 0.070 and those of F 2 inter se were 0.676 and 0.079 at 0% and 10% interest rates, respectively. For a nucleus with 64 dams, CDR (US$) were 95.50 and 15.80 at 0% and 10% interest rates, respectively for F 1 A.I. or natural scheme. The F 1 MOET scheme had corresponding values of 62.05 and 6.90 while F 2 inter se had 66.10 and 7.75. Under both interest rates, the F 1 A.I. or natural mating schemes had higher CDES and CDR than the other two schemes and is faster in dissemination of genes to the commercial population. F 2 inter se was intermediate. The genetic level of nucleus animal is higher than of F 1 male and females because indigenous nucleus females contribute 50% of the genes. F 2 cows are expected to

  16. BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    Rohit Kumar Das

    2016-12-01

    Full Text Available Due to an increase in the number of internet users, electronic commerce has grown significantly during the last decade. Electronic auction (e-auction is one of the famous e-commerce applications. Even so, security and robustness of e-auction schemes still remain a challenge. Requirements like anonymity and privacy of the b i d value are under threat from the attackers. Any auction protocol must not leak the anonymity and the privacy of the b i d value of an honest Bidder. Keeping these requirements in mind, we have firstly proposed a controlled traceable blind signature scheme (CTBSS because e-auction schemes should be able to trace the Bidders. Using CTBSS, a blind sealed-bid electronic auction scheme is proposed (BSEA. We have incorporated the notion of blind signature to e-auction schemes. Moreover, both the schemes are based upon elliptic curve cryptography (ECC, which provides a similar level of security with a comparatively smaller key size than the discrete logarithm problem (DLP based e-auction protocols. The analysis shows that BSEA fulfills all the requirements of e-auction protocol, and the total computation overhead is lower than the existing schemes.

  17. Sufficient Condition for Monotonicity in Constructing the Distribution Function With Bernoulli Scheme

    Directory of Open Access Journals (Sweden)

    Vedenyapin Aleksandr Dmitrievich

    2015-11-01

    Full Text Available This paper is the construction of the distribution function using the Bernoulli scheme, and is also designed to correct some of the mistakes that were made in the article [2]. Namely, a function built in [2] need not be monotonous, and some formulas need to be adjusted. The idea of building as well as in [2], is based on the model of Cox-Ross-Rubinstein "binary market". The essence of the model was to divide time into N steps, and assuming that the price of an asset at each step can move either up to a certain value with probability p, or down also by some certain value with probability q = 1 - p. Prices in step N can take only a finite number of values. "Success" or "failure" was the changing price for some fixed value in the model of Cox-Ross-Rubinstein. Here as a "success" or "failure" at every step we consider the affiliation of changing the index value to the section [r, S] either to the interval [I, r. Further a function P(r was introduced, which at any step gives us the probability of "success". The maximum index value increase for the all period of time [T, 2T] will be equal nS, and the maximum possible reduction will be equal nI. Then let x ∈ [nI, nS]. This segment will reflect every possible total variation that we can get at the end of a period of time [T, 2T]. The further introduced inequality k ≥ (x - nI/(S - I gives us the minimum number of successes that needed for total changing could be in the section [x, nS] if was n - k reductions with the index value to I. Then was introduced the function r(x, kmin which is defined on the interval (nI, nS] and provided us some assurance that the total index changing could be in the section [x, nS] if successful interval is [r(x, kmin, S] and the amount of success is satisfying to our inequality. The probability of k "successes" and n - k "failures" is calculated according to the formula of Bernoulli, where the probability of "success" is determined by the function P(r, and r is determined

  18. Automatic fault tree construction with RIKKE - a compendium of examples. Vol. 2

    International Nuclear Information System (INIS)

    Taylor, J.R.

    1982-02-01

    This second volume describes the construction of fault trees for systems with loops, including control and safety loops. It also gives a short summary of the event coding scheme used in the FTLIB component model library. (author)

  19. Renormalization in self-consistent approximation schemes at finite temperature I: theory

    International Nuclear Information System (INIS)

    Hees, H. van; Knoll, J.

    2001-07-01

    Within finite temperature field theory, we show that truncated non-perturbative self-consistent Dyson resummation schemes can be renormalized with local counter-terms defined at the vacuum level. The requirements are that the underlying theory is renormalizable and that the self-consistent scheme follows Baym's Φ-derivable concept. The scheme generates both, the renormalized self-consistent equations of motion and the closed equations for the infinite set of counter terms. At the same time the corresponding 2PI-generating functional and the thermodynamic potential can be renormalized, in consistency with the equations of motion. This guarantees the standard Φ-derivable properties like thermodynamic consistency and exact conservation laws also for the renormalized approximation scheme to hold. The proof uses the techniques of BPHZ-renormalization to cope with the explicit and the hidden overlapping vacuum divergences. (orig.)

  20. Image Interpolation Scheme based on SVM and Improved PSO

    Science.gov (United States)

    Jia, X. F.; Zhao, B. T.; Liu, X. X.; Song, H. P.

    2018-01-01

    In order to obtain visually pleasing images, a support vector machines (SVM) based interpolation scheme is proposed, in which the improved particle swarm optimization is applied to support vector machine parameters optimization. Training samples are constructed by the pixels around the pixel to be interpolated. Then the support vector machine with optimal parameters is trained using training samples. After the training, we can get the interpolation model, which can be employed to estimate the unknown pixel. Experimental result show that the interpolated images get improvement PNSR compared with traditional interpolation methods, which is agrees with the subjective quality.

  1. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  2. Retrospective on the construction and practice of a state-level emergency medical rescue team.

    Science.gov (United States)

    Lei, Zhang; Haitao, Guo; Xin, Wang; Yundou, Wang

    2014-10-01

    For the past few years, disasters like earthquakes, landslides, mudslides, tsunamis, and traffic accidents have occurred with an ever-growing frequency, coverage, and intensity greatly beyond the expectation of the public. In order to respond effectively to disasters and to reduce casualties and property damage, countries around the world have invested more efforts in the theoretical study of emergency medicine and the construction of emergency medical rescue forces. Consequently, emergency medical rescue teams of all scales and types have come into being and have played significant roles in disaster response work. As the only state-level emergency medical rescue force from the Chinese People's Armed Police Forces, the force described here has developed, through continuous learning and practice, a characteristic mode in terms of grouping methods, equipment system construction, and training.

  3. Adler endash Kostant endash Symes construction, bi-Hamiltonian manifolds, and KdV equations

    International Nuclear Information System (INIS)

    Guha, P.

    1997-01-01

    This paper focuses a relation between Adler endash Kostant endash Symes (AKS) theory applied to Fordy endash Kulish scheme and bi-Hamiltonian manifolds. The spirit of this paper is closely related to Casati endash Magri endash Pedroni work on Hamiltonian formulation of the KP equation. Here the KdV equation is deduced via the superposition of the Fordy endash Kulish scheme and AKS construction on the underlying current algebra C ∞ (S 1 ,g circle-times C[[λ

  4. A Pattern Construction Scheme for Neural Network-Based Cognitive Communication

    Directory of Open Access Journals (Sweden)

    Ozgur Orcay

    2011-01-01

    Full Text Available Inefficient utilization of the frequency spectrum due to conventional regulatory limitations and physical performance limiting factors, mainly the Signal to Noise Ratio (SNR, are prominent restrictions in digital wireless communication. Pattern Based Communication System (PBCS is an adaptive and perceptual communication method based on a Cognitive Radio (CR approach. It intends an SNR oriented cognition mechanism in the physical layer for improvement of Link Spectral Efficiency (LSE. The key to this system is construction of optimal communication signals, which consist of encoded data in different pattern forms (waveforms depending on spectral availabilities. The signals distorted in the communication medium are recovered according to the pre-trained pattern glossary by the perceptual receiver. In this study, we have shown that it is possible to improve the bandwidth efficiency when largely uncorrelated signal patterns are chosen in order to form a glossary that represents symbols for different length data groups and the information can be recovered by the Artificial Neural Network (ANN in the receiver site.

  5. Level structures in 156Pm from 156Nd β - decay

    International Nuclear Information System (INIS)

    Sood, P.C.; Gowrishankar, R.; Sainath, M.; Singh, B.

    2012-01-01

    Level energies in two-quasiparticle (2qp) structures in 156 61 Pm 95 are evaluated using the phenomenological rotor-particle model for odd-odd deformed nuclei with the inclusion of the residual p-n interaction contribution. Using these results as location guides, the experimental data from a recent 156 Nd decay study are used to construct a level scheme for 156 Pm with excitation energies upto 550 keV, wherein 26 (out of 30) γ's reported in 156 Nd decay are incorporated. Spin-parities and configuration assignments are suggested for 15 levels, in addition to the two isomers, in this energy domain. These investigations point to the need for information on higher-energy γ's and on β-γ and γ-γ coincidence data from 156 Nd β-decay to confirm these assignments. (orig.)

  6. Semi-passive, Chemical Oxidation Schemes for the Long-term Treatment of Contaminants

    Energy Technology Data Exchange (ETDEWEB)

    Frank W. Schwartz

    2005-12-13

    This research involves a combined experimental and modeling study that builds on our previous DOE-sponsored work in investigating how KMnO{sub 4} can be better used with in situ remediation of groundwater contaminated by chlorinated ethylenes (e.g., PCE, TCE, DCE). This study aims to provide scientific basis for developing a new long-term, semi-passive ISCO scheme that uses controlled release KMnO{sub 4} as a reactive barrier component. Specific objectives of the study are (1) to construct controlled release KMnO{sub 4} as a new reactive barrier component that could deliver permanganate at a controlled rate over long time periods of years, (2) to quantitatively describe release mechanisms associated with the controlled release KMnO{sub 4}, (3) to demonstrate efficacy of the new remediation scheme using proof-of-concept experiments, and (4) to design advanced forms of controlled release systems through numerical optimization. The new scheme operates in a long-term, semi-passive manner to control spreading of a dissolved contaminant plume with periodic replacement of the controlled release KMnO{sub 4} installed in the subsurface. As a first step in developing this remedial concept, we manufactured various prototype controlled release KMnO{sub 4} forms. Then we demonstrated using column experiments that the controlled release KMnO{sub 4} could deliver small amount of permanganate into flowing water at controlled rates over long time periods of years. An analytical model was also used to estimate the diffusivities and durations of the controlled release KMnO{sub 4}. Finally, proof-of-concept flow-tank experiments were performed to demonstrate the efficacy of the controlled release KMnO{sub 4} scheme in controlling dissolved TCE plume in a long-term, semi-passive manner. Another important thrust of our research effort involved numerical optimization of controlled release systems. This study used a numerical model that is capable of describing release patterns of active

  7. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  8. An Optimization Scheme for Water Pump Control in Smart Fish Farm with Efficient Energy Consumption

    Directory of Open Access Journals (Sweden)

    Israr Ullah

    2018-06-01

    Full Text Available Healthy fish production requires intensive care and ensuring stable and healthy production environment inside the farm tank is a challenging task. An Internet of Things (IoT based automated system is highly desirable that can continuously monitor the fish tanks with optimal resources utilization. Significant cost reduction can be achieved if farm equipment and water pumps are operated only when required using optimization schemes. In this paper, we present a general system design for smart fish farms. We have developed an optimization scheme for water pump control to maintain desired water level in fish tank with efficient energy consumption through appropriate selection of pumping flow rate and tank filling level. Proposed optimization scheme attempts to achieve a trade-off between pumping duration and flow rate through selection of optimized water level. Kalman filter algorithm is applied to remove error in sensor readings. We observed through simulation results that optimization scheme achieve significant reduction in energy consumption as compared to the two alternate schemes, i.e., pumping with maximum and minimum flow rates. Proposed system can help in collecting the data about the farm for long-term analysis and better decision making in future for efficient resource utilization and overall profit maximization.

  9. Remote unambiguous discrimination of linearly independent symmetric d-level quantum states

    International Nuclear Information System (INIS)

    Chen Libing; Liu Yuhua; Tan Peng; Lu Hong

    2009-01-01

    A set of linearly independent nonorthogonal symmetric d-level quantum states can be discriminated remotely and unambiguously with the aid of two-level Einstein-Podolsky-Rosen (EPR) states. We present a scheme for such a kind of remote unambiguous quantum state discrimination (UD). The probability of discrimination is in agreement with the optimal probability for local unambiguous discrimination among d symmetric states (Chefles and Barnettt 1998 Phys. Lett. A 250 223). This scheme consists of a remote generalized measurement described by a positive operator valued measurement (POVM). This remote POVM can be realized by performing a nonlocal 2d x 2d unitary operation on two spatially separated systems, one is the qudit which is encoded by one of the d symmetric nonorthogonal states to be distinguished and the other is an ancillary qubit, and a conventional local von Neumann orthogonal measurement on the ancilla. By decomposing the evolution process from the initial state to the final state, we construct a quantum network for realizing the remote POVM with a set of two-level nonlocal controlled-rotation gates, and thus provide a feasible physical means to realize the remote UD. A two-level nonlocal controlled-rotation gate can be implemented by using a two-level EPR pair in addition to local operations and classical communications (LOCCs)

  10. Comparison Criteria and Performance Levels for Soundproofing Panels Made in Different Constructive Variants

    Directory of Open Access Journals (Sweden)

    Ana Gheorghe

    2013-09-01

    Full Text Available This paper presents an analysis of the performance lavels and comparison criteria for panels made from different soundproofing materials, in different constructive variants. Setting the performance level, on the basis of normative and regulatory documents, for soundproofing materials contained inside of noise reduction devices, is determined so that it can be defined, tested and established feasible technical solutions for sound absorbing protection, through a dissemination of obtained results as well for ensuring requirements for implementing the technology transfer for manufacturing.

  11. A more accurate scheme for calculating Earth's skin temperature

    Science.gov (United States)

    Tsuang, Ben-Jei; Tu, Chia-Ying; Tsai, Jeng-Lin; Dracup, John A.; Arpe, Klaus; Meyers, Tilden

    2009-02-01

    The theoretical framework of the vertical discretization of a ground column for calculating Earth’s skin temperature is presented. The suggested discretization is derived from the evenly heat-content discretization with the optimal effective thickness for layer-temperature simulation. For the same level number, the suggested discretization is more accurate in skin temperature as well as surface ground heat flux simulations than those used in some state-of-the-art models. A proposed scheme (“op(3,2,0)”) can reduce the normalized root-mean-square error (or RMSE/STD ratio) of the calculated surface ground heat flux of a cropland site significantly to 2% (or 0.9 W m-2), from 11% (or 5 W m-2) by a 5-layer scheme used in ECMWF, from 19% (or 8 W m-2) by a 5-layer scheme used in ECHAM, and from 74% (or 32 W m-2) by a single-layer scheme used in the UCLA GCM. Better accuracy can be achieved by including more layers to the vertical discretization. Similar improvements are expected for other locations with different land types since the numerical error is inherited into the models for all the land types. The proposed scheme can be easily implemented into state-of-the-art climate models for the temperature simulation of snow, ice and soil.

  12. Riemann-problem and level-set approaches for two-fluid flow computations I. Linearized Godunov scheme

    NARCIS (Netherlands)

    B. Koren (Barry); M.R. Lewis; E.H. van Brummelen (Harald); B. van Leer

    2001-01-01

    textabstractA finite-volume method is presented for the computation of compressible flows of two immiscible fluids at very different densities. The novel ingredient in the method is a two-fluid linearized Godunov scheme, allowing for flux computations in case of different fluids (e.g., water and

  13. The construct of state-level suspicion: a model and research agenda for automated and information technology (IT) contexts.

    Science.gov (United States)

    Bobko, Philip; Barelka, Alex J; Hirshfield, Leanne M

    2014-05-01

    The objective was to review and integrate available research about the construct of state-level suspicion as it appears in social science literatures and apply the resulting findings to information technology (IT) contexts. Although the human factors literature is replete with articles about trust (and distrust) in automation, there is little on the related, but distinct, construct of "suspicion" (in either automated or IT contexts). The construct of suspicion--its precise definition, theoretical correlates, and role in such applications--deserves further study. Literatures that consider suspicion are reviewed and integrated. Literatures include communication, psychology, human factors, management, marketing, information technology, and brain/neurology. We first develop a generic model of state-level suspicion. Research propositions are then derived within IT contexts. Fundamental components of suspicion include (a) uncertainty, (b) increased cognitive processing (e.g., generation of alternative explanations for perceived discrepancies), and (c) perceptions of (mal)intent. State suspicion is defined as the simultaneous occurrence of these three components. Our analysis also suggests that trust inhibits suspicion, whereas distrust can be a catalyst of state-level suspicion. Based on a three-stage model of state-level suspicion, associated research propositions and questions are developed. These propositions and questions are intended to help guide future work on the measurement of suspicion (self-report and neurological), as well as the role of the construct of suspicion in models of decision making and detection of deception. The study of suspicion, including its correlates, antecedents, and consequences, is important. We hope that the social sciences will benefit from our integrated definition and model of state suspicion. The research propositions regarding suspicion in IT contexts should motivate substantial research in human factors and related fields.

  14. Modeling and Analysis of DIPPM: A New Modulation Scheme for Visible Light Communications

    Directory of Open Access Journals (Sweden)

    Sana Ullah Jan

    2015-01-01

    Full Text Available Visible Light Communication (VLC uses an Intensity-Modulation and Direct-Detection (IM/DD scheme to transmit data. However, the light source used in VLC systems is continuously switched on and off quickly, resulting in flickering. In addition, recent illumination systems include dimming support to allow users to dim the light sources to the desired level. Therefore, the modulation scheme for data transmission in VLC system must include flicker mitigation and dimming control capabilities. In this paper, the authors propose a Double Inverse Pulse Position Modulation (DIPPM scheme that minimizes flickering and supports a high level of dimming for the illumination sources in VLC systems. To form DIPPM, some changes are made in the symbol structure of the IPPM scheme, and a detailed explanation and mathematical model of DIPPM are given in this paper. Furthermore, both analytical and simulation results for the error performance of 2-DIPPM are compared with the performance of VPPM. Also, the communication performance of DIPPM is analyzed in terms of the normalized required power.

  15. Energy conserving schemes for the simulation of musical instrument contact dynamics

    Science.gov (United States)

    Chatziioannou, Vasileios; van Walstijn, Maarten

    2015-03-01

    Collisions are an innate part of the function of many musical instruments. Due to the nonlinear nature of contact forces, special care has to be taken in the construction of numerical schemes for simulation and sound synthesis. Finite difference schemes and other time-stepping algorithms used for musical instrument modelling purposes are normally arrived at by discretising a Newtonian description of the system. However because impact forces are non-analytic functions of the phase space variables, algorithm stability can rarely be established this way. This paper presents a systematic approach to deriving energy conserving schemes for frictionless impact modelling. The proposed numerical formulations follow from discretising Hamilton's equations of motion, generally leading to an implicit system of nonlinear equations that can be solved with Newton's method. The approach is first outlined for point mass collisions and then extended to distributed settings, such as vibrating strings and beams colliding with rigid obstacles. Stability and other relevant properties of the proposed approach are discussed and further demonstrated with simulation examples. The methodology is exemplified through a case study on tanpura string vibration, with the results confirming the main findings of previous studies on the role of the bridge in sound generation with this type of string instrument.

  16. Construction and analysis of lattice Boltzmann methods applied to a 1D convection-diffusion equation

    International Nuclear Information System (INIS)

    Dellacherie, Stephane

    2014-01-01

    To solve the 1D (linear) convection-diffusion equation, we construct and we analyze two LBM schemes built on the D1Q2 lattice. We obtain these LBM schemes by showing that the 1D convection-diffusion equation is the fluid limit of a discrete velocity kinetic system. Then, we show in the periodic case that these LBM schemes are equivalent to a finite difference type scheme named LFCCDF scheme. This allows us, firstly, to prove the convergence in L∞ of these schemes, and to obtain discrete maximum principles for any time step in the case of the 1D diffusion equation with different boundary conditions. Secondly, this allows us to obtain most of these results for the Du Fort-Frankel scheme for a particular choice of the first iterate. We also underline that these LBM schemes can be applied to the (linear) advection equation and we obtain a stability result in L∞ under a classical CFL condition. Moreover, by proposing a probabilistic interpretation of these LBM schemes, we also obtain Monte-Carlo algorithms which approach the 1D (linear) diffusion equation. At last, we present numerical applications justifying these results. (authors)

  17. A SCHEDULING SCHEME WITH DYNAMIC FREQUENCY CLOCKING AND MULTIPLE VOLTAGES FOR LOW POWER DESIGNS

    Institute of Scientific and Technical Information of China (English)

    Wen Dongxin; Wang Ling; Yang Xiaozong

    2007-01-01

    In this letter, a scheduling scheme based on Dynamic Frequency Clocking (DFC) and multiple voltages is proposed for low power designs under the timing and the resource constraints.Unlike the conventional methods at high level synthesis where only voltages of nodes were considered,the scheme based on a gain function considers both voltage and frequency simultaneously to reduce energy consumption. Experiments with a number of DSP benchmarks show that the proposed scheme achieves an effective energy reduction.

  18. Phase-controlled all-optical switching based on coherent population oscillation in a two-level system

    International Nuclear Information System (INIS)

    Liao, Ping; Yu, Song; Luo, Bin; Shen, Jing; Gu, Wanyi; Guo, Hong

    2011-01-01

    We theoretically propose a scheme of phase-controlled all-optical switching due to the effect of degenerate four-wave mixing (FWM) and coherent population oscillation (CPO) in a two-level system driven by a strong coupling field and two weak symmetrically detuned fields. The results show that the phase of the FWM field can be utilized to switch between constructive and destructive interference, which can lead to the transmission or attenuation of the probe field and thus switch the field on or off. We also find the intensity of the coupling field and the propagation distance have great influence on the performance of the switching. In our scheme, due to the quick response in semiconductor systems, a fast all-optical switching can be realized at low light level. -- Highlights: ► We study a new all-optical switching based on coherent population oscillation. ► The phase of the FWM field can be utilized to switch the probe field on or off. ► A fast and low-light-level switching can be realized in semiconductors.

  19. India : Note on Public Financial Management and Accountability in Centrally Sponsored Schemes

    OpenAIRE

    World Bank

    2006-01-01

    The budget outlay for Centrally Sponsored Schemes (CSS) for India in 2005-06 is significantly higher as compared to the previous year's level of Rs.395,000 million. This includes increased allocations for rural roads, rural employment, and education and nutritional support for pre-school children. At present there are over 200 such schemes in operation, of which a dozen accounts for more t...

  20. Improvements and validation of the linear surface characteristics scheme

    International Nuclear Information System (INIS)

    Santandrea, S.; Jaboulay, J.C.; Bellier, P.; Fevotte, F.; Golfier, H.

    2009-01-01

    In this paper we present the last improvements of the recently proposed linear surface (LS) characteristics scheme for unstructured meshes. First we introduce a new numerical tracking technique, specifically adapted to the LS method, which tailors transverse integration weights to take into account the geometrical discontinuities that appear along the pipe affected to every trajectory in classical characteristics schemes. Another development allows using the volumetric flux variation of the LS method to re-compute step-wise constant fluxes to be used in other parts of a computational scheme. This permits to take greater advantage of the higher precision of the LS method without necessarily conceiving specialized theories for all the modular functionalities of a spectral code such as APOLLO2. Moreover we present a multi-level domain decomposition method for solving the synthetic acceleration operator that is used to accelerate the free iterations for the LS method. We discuss all these new developments by illustrating some benchmarks results obtained with the LS method. This is done by detailed comparisons with Monte-Carlo calculations. In particular we show that the new method can be used not only as a reference tool, but also inside a suitable industrial calculation scheme

  1. Regional approaches in high-rise construction

    Science.gov (United States)

    Iconopisceva, O. G.; Proskurin, G. A.

    2018-03-01

    The evolutionary process of high-rise construction is in the article focus. The aim of the study was to create a retrospective matrix reflecting the tasks of the study such as: structuring the most iconic high-rise objects within historic boundaries. The study is based on contemporary experience of high-rise construction in different countries. The main directions and regional specifics in the field of high-rise construction as well as factors influencing the further evolution process are analyzed. The main changes in architectural stylistics, form-building, constructive solutions that focus on the principles of energy efficiency and bio positivity of "sustainable buildings", as well as the search for a new typology are noted. The most universal constructive methods and solutions that turned out to be particularly popular are generalized. The new typology of high-rises and individual approach to urban context are noted. The results of the study as a graphical scheme made it possible to represent the whole high-rise evolution. The new spatial forms of high-rises lead them to new role within the urban environments. Futuristic hyperscalable concepts take the autonomous urban space functions itself and demonstrate us how high-rises can replace multifunctional urban fabric, developing it inside their shells.

  2. A decentralized control scheme for an effective coordination of phasic and tonic control in a snake-like robot

    International Nuclear Information System (INIS)

    Sato, Takahide; Kano, Takeshi; Ishiguro, Akio

    2012-01-01

    Autonomous decentralized control has attracted considerable attention because it enables us to understand the adaptive and versatile locomotion of animals and facilitates the construction of truly intelligent artificial agents. Thus far, we have developed a snake-like robot (HAUBOT I) that is driven by a decentralized control scheme based on a discrepancy function, which incorporates phasic control. In this paper, we investigate a decentralized control scheme in which phasic and tonic control are well coordinated, as an extension of our previous study. To verify the validity of the proposed control scheme, we apply it to a snake-like robot (HAUBOT II) that can adjust both the phase relationship between its body segments and the stiffness at each joint. The results indicate that the proposed control scheme enables the robot to exhibit remarkable real-time adaptability over various frictional and inclined terrains. These findings can potentially enable us to gain a deeper insight into the autonomous decentralized control mechanism underlying the adaptive and resilient locomotion of animals.

  3. Constructing the tree-level Yang-Mills S-matrix using complex factorization

    Science.gov (United States)

    Schuster, Philip C.; Toro, Natalia

    2009-06-01

    A remarkable connection between BCFW recursion relations and constraints on the S-matrix was made by Benincasa and Cachazo in 0705.4305, who noted that mutual consistency of different BCFW constructions of four-particle amplitudes generates non-trivial (but familiar) constraints on three-particle coupling constants — these include gauge invariance, the equivalence principle, and the lack of non-trivial couplings for spins > 2. These constraints can also be derived with weaker assumptions, by demanding the existence of four-point amplitudes that factorize properly in all unitarity limits with complex momenta. From this starting point, we show that the BCFW prescription can be interpreted as an algorithm for fully constructing a tree-level S-matrix, and that complex factorization of general BCFW amplitudes follows from the factorization of four-particle amplitudes. The allowed set of BCFW deformations is identified, formulated entirely as a statement on the three-particle sector, and using only complex factorization as a guide. Consequently, our analysis based on the physical consistency of the S-matrix is entirely independent of field theory. We analyze the case of pure Yang-Mills, and outline a proof for gravity. For Yang-Mills, we also show that the well-known scaling behavior of BCFW-deformed amplitudes at large z is a simple consequence of factorization. For gravity, factorization in certain channels requires asymptotic behavior ~ 1/z2.

  4. Constructing the tree-level Yang-Mills S-matrix using complex factorization

    International Nuclear Information System (INIS)

    Schuster, Philip C.; Toro, Natalia

    2009-01-01

    A remarkable connection between BCFW recursion relations and constraints on the S-matrix was made by Benincasa and Cachazo in 0705.4305, who noted that mutual consistency of different BCFW constructions of four-particle amplitudes generates non-trivial (but familiar) constraints on three-particle coupling constants - these include gauge invariance, the equivalence principle, and the lack of non-trivial couplings for spins > 2. These constraints can also be derived with weaker assumptions, by demanding the existence of four-point amplitudes that factorize properly in all unitarity limits with complex momenta. From this starting point, we show that the BCFW prescription can be interpreted as an algorithm for fully constructing a tree-level S-matrix, and that complex factorization of general BCFW amplitudes follows from the factorization of four-particle amplitudes. The allowed set of BCFW deformations is identified, formulated entirely as a statement on the three-particle sector, and using only complex factorization as a guide. Consequently, our analysis based on the physical consistency of the S-matrix is entirely independent of field theory. We analyze the case of pure Yang-Mills, and outline a proof for gravity. For Yang-Mills, we also show that the well-known scaling behavior of BCFW-deformed amplitudes at large z is a simple consequence of factorization. For gravity, factorization in certain channels requires asymptotic behavior ∼ 1/z 2 .

  5. Genetic progress in multistage dairy cattle breeding schemes using genetic markers.

    Science.gov (United States)

    Schrooten, C; Bovenhuis, H; van Arendonk, J A M; Bijma, P

    2005-04-01

    QTL explaining 5% of the additive genetic variance allowed a 35% reduction in the number of progeny tested bulls, while maintaining genetic response at the level of the base scheme. Genetic progress was up to 31.3% higher for schemes with increased embryo production and selection of embryos based on QTL information. The challenge for breeding organizations is to find the optimum breeding program with regard to additional genetic progress and additional (or reduced) cost.

  6. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  7. Hybrid model based unified scheme for endoscopic Cerenkov and radio-luminescence tomography: Simulation demonstration

    Science.gov (United States)

    Wang, Lin; Cao, Xin; Ren, Qingyun; Chen, Xueli; He, Xiaowei

    2018-05-01

    Cerenkov luminescence imaging (CLI) is an imaging method that uses an optical imaging scheme to probe a radioactive tracer. Application of CLI with clinically approved radioactive tracers has opened an opportunity for translating optical imaging from preclinical to clinical applications. Such translation was further improved by developing an endoscopic CLI system. However, two-dimensional endoscopic imaging cannot identify accurate depth and obtain quantitative information. Here, we present an imaging scheme to retrieve the depth and quantitative information from endoscopic Cerenkov luminescence tomography, which can also be applied for endoscopic radio-luminescence tomography. In the scheme, we first constructed a physical model for image collection, and then a mathematical model for characterizing the luminescent light propagation from tracer to the endoscopic detector. The mathematical model is a hybrid light transport model combined with the 3rd order simplified spherical harmonics approximation, diffusion, and radiosity equations to warrant accuracy and speed. The mathematical model integrates finite element discretization, regularization, and primal-dual interior-point optimization to retrieve the depth and the quantitative information of the tracer. A heterogeneous-geometry-based numerical simulation was used to explore the feasibility of the unified scheme, which demonstrated that it can provide a satisfactory balance between imaging accuracy and computational burden.

  8. Incentive-based Financial Support Scheme for Immature Renewable Energy Systems

    DEFF Research Database (Denmark)

    Andersen, Morten Thøtt; Frigaard, Peter Bak

    2015-01-01

    Most of today’s renewable energy systems rely heavily on investments as well as public financial support. This support is often given by means of a higher sales price for each kWh produced, i.e. feed-in tariffs (FITs), green certificates or Renewable Obligation Certificates (ROCs), or by a fixed...... amount, being a percentage of the construction costs of the facility. All these ways of financing have different downsides. The feed-in tariff based kWh prices have some incentives to improve the technology, but enables infeasible solutions to stay financially supported even while R&D is in status quo....... The fixed amount only helps with installation costs, which should not be an issue once the technology is sufficiently feasible. This means that the current ways of granting financial support all lack incentives for increasing production or decreasing construction costs. This paper presents a unique scheme...

  9. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  10. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  11. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment

    Science.gov (United States)

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-01-01

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment. PMID:28629131

  12. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.

    Science.gov (United States)

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-06-17

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.

  13. Evaluation of a pilot peer observation of teaching scheme for chair-side tutors at Glasgow University Dental School.

    Science.gov (United States)

    Cairns, A M; Bissell, V; Bovill, C

    2013-06-01

    To introduce and examine a pilot peer observation of teaching (POT) scheme within the Department of Paediatric Dentistry at Glasgow Dental School and its associated outreach centres. All tutors teaching paediatric dentistry were invited to be involved in evaluation of the POT scheme. Participants were randomly paired with a peer, who then observed their teaching and provided constructive feedback. For those consenting to be involved in the evaluation of the scheme, semi-structured, one-to-one interviews were carried out by the principal investigator. POT was found by all participants to be a beneficial process, reassuring those of their teaching styles and giving them ideas to adapt their teaching. POT is an effective method for engaging chair-side tutors in the reflection and development of their teaching practice via observations and scholarly discussion.

  14. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  15. A Novel, Automatic Quality Control Scheme for Real Time Image Transmission

    Directory of Open Access Journals (Sweden)

    S. Ramachandran

    2002-01-01

    Full Text Available A novel scheme to compute energy on-the-fly and thereby control the quality of the image frames dynamically is presented along with its FPGA implementation. This scheme is suitable for incorporation in image compression systems such as video encoders. In this new scheme, processing is automatically stopped when the desired quality is achieved for the image being processed by using a concept called pruning. Pruning also increases the processing speed by a factor of more than two when compared to the conventional method of processing without pruning. An MPEG-2 encoder implemented using this scheme is capable of processing good quality monochrome and color images of sizes up to 1024 × 768 pixels at the rate of 42 and 28 frames per second, respectively, with a compression ratio of over 17:1. The encoder is also capable of working in the fixed pruning level mode with user programmable features.

  16. Geo-Information Technology of 8-Level Responsibility: Concept and Standard of Construction Management for Implementation of The BIM-Technology in Russia

    Science.gov (United States)

    Komosko, Vladimir; Serebryakov, Sergey; Strokov, Vladimir

    2017-12-01

    Currently, the increase in construction efficiency in the world is associated with the introduction and development of information modelling of construction objects (BIM-technology). The BIM-technology is a process of collective creation and use of information about a structure that forms the basis for all decisions throughout the life cycle of an object. The BIM-technology with the help of a number of software products provides automation of production, it does not provide a methodology for the introduction of these products. The article describes the technology of 8-level responsibility, which is guaranteed to give systematically a new quality of management in construction, related to the requirements of the Russian Government Decree No. 87 of February 16, 2008. The technology of 8-level responsibility (8LR) in the detailed specification of GD No. 87, (territory, construction stage, master plan object, section (part) of the project) extends the number of inseparable levels to 8 (part of the object, element, mark, position), where the “position” is the last indivisible detail of the object. There is reason to argue that the use of the “8LR Technology” in addition to the BIM-technology will provide a synergistic effect and will remove a number of obstacles to the BIM introduction in Russia and system control in the construction and operation of objects of any complexity in Russia.

  17. MANAGEMENT OF RISKS BASED ON INTERACTION BETWEEN CONSTRUCTION EXPERT AND CUSTOMER ORGANIZATION

    Directory of Open Access Journals (Sweden)

    Александр Васильевич Харитонович

    2016-02-01

    Full Text Available The paper describes problems connected to management of risk and key characteristics of interaction of construction expert and organization-customer of expert services. We have conducted the analysis of different schemes used for management of risk, their advantages and disadvantages. In addition authors describe the main opportunities that appear in the organization as a result of the systematic engagement of an external expert at different stages of investment and construction project (getting recommendations aimed at improving of the organization adaptability to changes and risks; improving the efficiency of management of investment and construction projects etc..

  18. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  19. Construction time of PWRs

    International Nuclear Information System (INIS)

    Moreira, João M.L.; Gallinaro, Bruno; Carajilescov, Pedro

    2013-01-01

    The construction time of PWRs is studied considering published data about nuclear power plants in the world. For the 268 PWRs in operation in 2010, the mode of the construction time distribution is around 5–6 years, and 80% of the plants were built in less than 120 months. To circumvent the problem of comparing plants with different size we normalized the construction time to plants with 1 GW. We restricted the analysis to 201 PWRs which suffered less from external factors that were beyond the control of the management from 1965 to 2010. The results showed that the normalized construction time did not increase over the years and nor with the plants’ gross power level. The learning rate of the industry regarding normalized construction times showed a reduction with 95% confidence level of about 0.56±0.07 months for each 10 GW of installed capacity. Over the years the normalized construction time decreased and became more predictable. The data showed that countries with more centralized regulatory, construction and operation environments were able to build PWRs in shorter times. Countries less experienced with the nuclear technology built PWRs in longer times. - Highlights: ► The construction time of PWRs is analyzed based on historical data. ► Different factors affecting construction time are considered in the analyses. ► The normalized construction time of PWRs decreased with time and gross power level. ► Countries with more centralized institutions built PWRs more quickly

  20. Study on Noise Prediction Model and Control Schemes for Substation

    Science.gov (United States)

    Gao, Yang; Liu, Songtao

    2014-01-01

    With the government's emphasis on environmental issues of power transmission and transformation project, noise pollution has become a prominent problem now. The noise from the working transformer, reactor, and other electrical equipment in the substation will bring negative effect to the ambient environment. This paper focuses on using acoustic software for the simulation and calculation method to control substation noise. According to the characteristics of the substation noise and the techniques of noise reduction, a substation's acoustic field model was established with the SoundPLAN software to predict the scope of substation noise. On this basis, 4 reasonable noise control schemes were advanced to provide some helpful references for noise control during the new substation's design and construction process. And the feasibility and application effect of these control schemes can be verified by using the method of simulation modeling. The simulation results show that the substation always has the problem of excessive noise at boundary under the conventional measures. The excess noise can be efficiently reduced by taking the corresponding noise reduction methods. PMID:24672356

  1. A symmetrical image encryption scheme in wavelet and time domain

    Science.gov (United States)

    Luo, Yuling; Du, Minghui; Liu, Junxiu

    2015-02-01

    There has been an increasing concern for effective storages and secure transactions of multimedia information over the Internet. Then a great variety of encryption schemes have been proposed to ensure the information security while transmitting, but most of current approaches are designed to diffuse the data only in spatial domain which result in reducing storage efficiency. A lightweight image encryption strategy based on chaos is proposed in this paper. The encryption process is designed in transform domain. The original image is decomposed into approximation and detail components using integer wavelet transform (IWT); then as the more important component of the image, the approximation coefficients are diffused by secret keys generated from a spatiotemporal chaotic system followed by inverse IWT to construct the diffused image; finally a plain permutation is performed for diffusion image by the Logistic mapping in order to reduce the correlation between adjacent pixels further. Experimental results and performance analysis demonstrate the proposed scheme is an efficient, secure and robust encryption mechanism and it realizes effective coding compression to satisfy desirable storage.

  2. Scheme for radiography/tomography with a low-brilliance neutron source at the CPHS

    International Nuclear Information System (INIS)

    Huang Zhifeng; Xiao Yongshun; Zhang Ran; Li Yuanji; Han Xiaoxue; Shao Beibei; Wang Xuewu; Wei Jie; Loong, C.-K.

    2011-01-01

    A cold neutron radiography/tomography instrument was designed and will soon undergo construction at the Compact Pulsed Hadron Source (CPHS) of Tsinghua University, China. In this paper, we report the physical design of the instrument and propose a scheme to implement several techniques at a later phase to enhance the utilization of the flux on larger samples. This includes code-aperture, grating-based imaging, prompt gamma-ray analysis and 3D emission CT.

  3. Wilson expansion in the minimal subtraction scheme

    International Nuclear Information System (INIS)

    Smirnov, V.A.

    1989-01-01

    The small distance expansion of the product of composite fields is constructed for an arbitrary renormalization procedure of the type of minimal subtraction scheme. Coefficient functions of the expansion are expressed explicitly through the Green functions of composite fields. The expansion has the explicity finite form: the ultraviolet (UV) divergences of the coefficient functions and composite fields are removed by the initial renormalization procedure while the infrared (IR) divergences in massless diagrams with nonvanishing contribution into the coefficient functions are removed by the R-operation which is the IR part of the R-operation. The latter is the generalization of the dimensional renormalization in the case when both UV and IR divergences are present. To derive the expansion, a ''pre-subtracting operator'' is introduced and formulas of the counter-term technique are exploited

  4. Elucidation of molecular kinetic schemes from macroscopic traces using system identification.

    Directory of Open Access Journals (Sweden)

    Miguel Fribourg

    2017-02-01

    Full Text Available Overall cellular responses to biologically-relevant stimuli are mediated by networks of simpler lower-level processes. Although information about some of these processes can now be obtained by visualizing and recording events at the molecular level, this is still possible only in especially favorable cases. Therefore the development of methods to extract the dynamics and relationships between the different lower-level (microscopic processes from the overall (macroscopic response remains a crucial challenge in the understanding of many aspects of physiology. Here we have devised a hybrid computational-analytical method to accomplish this task, the SYStems-based MOLecular kinetic scheme Extractor (SYSMOLE. SYSMOLE utilizes system-identification input-output analysis to obtain a transfer function between the stimulus and the overall cellular response in the Laplace-transformed domain. It then derives a Markov-chain state molecular kinetic scheme uniquely associated with the transfer function by means of a classification procedure and an analytical step that imposes general biological constraints. We first tested SYSMOLE with synthetic data and evaluated its performance in terms of its rate of convergence to the correct molecular kinetic scheme and its robustness to noise. We then examined its performance on real experimental traces by analyzing macroscopic calcium-current traces elicited by membrane depolarization. SYSMOLE derived the correct, previously known molecular kinetic scheme describing the activation and inactivation of the underlying calcium channels and correctly identified the accepted mechanism of action of nifedipine, a calcium-channel blocker clinically used in patients with cardiovascular disease. Finally, we applied SYSMOLE to study the pharmacology of a new class of glutamate antipsychotic drugs and their crosstalk mechanism through a heteromeric complex of G protein-coupled receptors. Our results indicate that our methodology

  5. Effective information rates of single-carrier and multi-carrier modulation schemes for bandwidth constrained IM/DD systems

    KAUST Repository

    Mazahir, Sana

    2017-07-31

    Information-theoretic and signal processing aspects of some modulation schemes designed for intensity modulation/direct detection (IM/DD) optical wireless communication (OWC) systems are studied. Due to the constraints of IM/DD signals (non-negative real and baseband signals), the construction of these signals along with their time and frequency characteristics differ from their RF counterparts. This necessitates a careful study of such schemes under practical constraints. Three schemes are studied in this paper, namely, single carrier pulse amplitude modulation (SC-PAM), asymmetrically clipped optical OFDM (ACO-OFDM), and DC biased optical OFDM (DCO-OFDM). Our aim is to carry out a comparative study of these schemes in the presence of identical constraints on bandwidth and average optical power. The study reveals that the clipping operation required in ACO-OFDM significantly reduces its information rate, and as a result, it is outperformed by SC-PAM. Such a limitation does not apply to DCO-OFDM which has a higher information rate, even though part of the available optical power is expended in the non-information-bearing DC bias.

  6. Direct Z-scheme TiO2/CdS hierarchical photocatalyst for enhanced photocatalytic H2-production activity

    Science.gov (United States)

    Meng, Aiyun; Zhu, Bicheng; Zhong, Bo; Zhang, Liuyang; Cheng, Bei

    2017-11-01

    Photocatalytic H2 evolution, which utilizes solar energy via water splitting, is a promising route to deal with concerns about energy and environment. Herein, a direct Z-scheme TiO2/CdS binary hierarchical photocatalyst was fabricated via a successive ionic layer adsorption and reaction (SILAR) technique, and photocatalytic H2 production was measured afterwards. The as-prepared TiO2/CdS hybrid photocatalyst exhibited noticeably promoted photocatalytic H2-production activity of 51.4 μmol h-1. The enhancement of photocatalytic activity was ascribed to the hierarchical structure, as well as the efficient charge separation and migration from TiO2 nanosheets to CdS nanoparticles (NPs) at their tight contact interfaces. Moreover, the direct Z-scheme photocatalytic reaction mechanism was demonstrated to elucidate the improved photocatalytic performance of TiO2/CdS composite photocatalyst. The photoluminescence (PL) analysis of hydroxyl radicals were conducted to provide clues for the direct Z-scheme mechanism. This work provides a facile route for the construction of redox mediator-free Z-scheme photocatalytic system for photocatalytic water splitting.

  7. Phase Transitions for Quantum XY-Model on the Cayley Tree of Order Three in Quantum Markov Chain Scheme

    International Nuclear Information System (INIS)

    Mukhamedov, Farrukh; Saburov, Mansoor

    2010-06-01

    In the present paper we study forward Quantum Markov Chains (QMC) defined on a Cayley tree. Using the tree structure of graphs, we give a construction of quantum Markov chains on a Cayley tree. By means of such constructions we prove the existence of a phase transition for the XY-model on a Cayley tree of order three in QMC scheme. By the phase transition we mean the existence of two distinct QMC for the given family of interaction operators {K }. (author)

  8. Feedback Compression Schemes for Downlink Carrier Aggregation in LTE-Advanced

    DEFF Research Database (Denmark)

    Nguyen, Hung Tuan; Kovac, Istvan; Wang, Yuanye

    2011-01-01

    With full channel state information (CSI) available, it has been shown that carrier aggregation (CA) in the downlink can significantly improve the data rate experienced at the user equipments (UE) [1], [2], [3], [4]. However, full CSI feedback in all component carriers (CCs) requires a large...... portion of the uplink bandwidth and the feedback information increases linearly with the number of CCs. Therefore, the performance gain brought by deploying CA could be easily hindered if the amount of CSI feedback is not thoroughly controlled. In this paper we analyze several feedback overhead...... compression schemes in CA systems. To avoid a major re-design of the feedback schemes, only CSI compression schemes closely related to the ones specified in LTE-Release 8 and LTE-Release 9 are considered. Extensive simulations at system level were carried out to evaluate the performance of these feedback...

  9. Adaptive Robust Online Constructive Fuzzy Control of a Complex Surface Vehicle System.

    Science.gov (United States)

    Wang, Ning; Er, Meng Joo; Sun, Jing-Chao; Liu, Yan-Cheng

    2016-07-01

    In this paper, a novel adaptive robust online constructive fuzzy control (AR-OCFC) scheme, employing an online constructive fuzzy approximator (OCFA), to deal with tracking surface vehicles with uncertainties and unknown disturbances is proposed. Significant contributions of this paper are as follows: 1) unlike previous self-organizing fuzzy neural networks, the OCFA employs decoupled distance measure to dynamically allocate discriminable and sparse fuzzy sets in each dimension and is able to parsimoniously self-construct high interpretable T-S fuzzy rules; 2) an OCFA-based dominant adaptive controller (DAC) is designed by employing the improved projection-based adaptive laws derived from the Lyapunov synthesis which can guarantee reasonable fuzzy partitions; 3) closed-loop system stability and robustness are ensured by stable cancelation and decoupled adaptive compensation, respectively, thereby contributing to an auxiliary robust controller (ARC); and 4) global asymptotic closed-loop system can be guaranteed by AR-OCFC consisting of DAC and ARC and all signals are bounded. Simulation studies and comprehensive comparisons with state-of-the-arts fixed- and dynamic-structure adaptive control schemes demonstrate superior performance of the AR-OCFC in terms of tracking and approximation accuracy.

  10. Sequential injection/bead injection lab-on-valve schemes for on-line solid phase extraction and preconcentration of ultra-trace levels of heavy metals with determination by ETAAS and ICPMS

    DEFF Research Database (Denmark)

    Wang, Jianhua; Hansen, Elo Harald; Miró, Manuel

    2003-01-01

    are focused on the applications of SI-BI-LOV protocols for on-line microcolumn based solid phase extraction of ultra-trace levels of heavy metals, employing the so-called renewable surface separation and preconcentration manipulatory scheme. Two types of sorbents have been employed as packing material...

  11. Methodical approaches to value assessment and determination of the capitalization level of high-rise construction

    Science.gov (United States)

    Smirnov, Vitaly; Dashkov, Leonid; Gorshkov, Roman; Burova, Olga; Romanova, Alina

    2018-03-01

    The article presents the analysis of the methodological approaches to cost estimation and determination of the capitalization level of high-rise construction objects. Factors determining the value of real estate were considered, three main approaches for estimating the value of real estate objects are given. The main methods of capitalization estimation were analyzed, the most reasonable method for determining the level of capitalization of high-rise buildings was proposed. In order to increase the value of real estate objects, the author proposes measures that enable to increase significantly the capitalization of the enterprise through more efficient use of intangible assets and goodwill.

  12. Numerical Simulations of Reacting Flows Using Asynchrony-Tolerant Schemes for Exascale Computing

    Science.gov (United States)

    Cleary, Emmet; Konduri, Aditya; Chen, Jacqueline

    2017-11-01

    Communication and data synchronization between processing elements (PEs) are likely to pose a major challenge in scalability of solvers at the exascale. Recently developed asynchrony-tolerant (AT) finite difference schemes address this issue by relaxing communication and synchronization between PEs at a mathematical level while preserving accuracy, resulting in improved scalability. The performance of these schemes has been validated for simple linear and nonlinear homogeneous PDEs. However, many problems of practical interest are governed by highly nonlinear PDEs with source terms, whose solution may be sensitive to perturbations caused by communication asynchrony. The current work applies the AT schemes to combustion problems with chemical source terms, yielding a stiff system of PDEs with nonlinear source terms highly sensitive to temperature. Examples shown will use single-step and multi-step CH4 mechanisms for 1D premixed and nonpremixed flames. Error analysis will be discussed both in physical and spectral space. Results show that additional errors introduced by the AT schemes are negligible and the schemes preserve their accuracy. We acknowledge funding from the DOE Computational Science Graduate Fellowship administered by the Krell Institute.

  13. Hierarchical Control Scheme for Voltage Harmonics Compensation in an Islanded Droop-Controlled Microgrid

    DEFF Research Database (Denmark)

    Savaghebi, Mehdi; Guerrero, Josep M.; Jalilian, Alireza

    2011-01-01

    In this paper, a microgrid hierarchical control scheme is proposed which includes primary and secondary control levels. The primary level comprises distributed generators (DGs) local controllers. The local controller mainly consists of active and reactive power controllers, voltage and current...... controllers, and virtual impedance loop. A novel virtual impedance structure is proposed to achieve proper sharing of non-fundamental power among the microgrid DGs. The secondary level is designed to manage compensation of voltage harmonics at the microgrid load bus (LB) to which the sensitive loads may...... be connected. Also, restoration of LB voltage amplitude and microgrid frequency to the rated values is directed by the secondary level. These functions are achieved by sending proper control signals to the local controllers. The simulation results show the effectiveness of the proposed control scheme....

  14. Joint multiuser switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa

    2012-12-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, we devise two schemes for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme selects the user that reports the best channel quality. In order to alleviate the high feedback load associated with the first scheme, we develop a second scheme based on the concept of switched diversity where the base station scans the users in a sequential manner until an acceptable user is found. In addition to these two selection schemes, we consider two power adaptive settings at the secondary users based on the amount of interference available at the secondary transmitter. In the On/Off power setting, users are allowed to transmit based on whether the interference constraint is met or not, while in the full power adaptive setting, the users are allowed to vary their transmission power to satisfy the interference constraint. Finally, we present numerical results for our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load for both schemes. © 2012 IEEE.

  15. Joint multiuser switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa; Abdallah, Mohamed M.; Serpedin, Erchin; Alouini, Mohamed-Slim; Alnuweiri, Hussein M.

    2012-01-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, we devise two schemes for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme selects the user that reports the best channel quality. In order to alleviate the high feedback load associated with the first scheme, we develop a second scheme based on the concept of switched diversity where the base station scans the users in a sequential manner until an acceptable user is found. In addition to these two selection schemes, we consider two power adaptive settings at the secondary users based on the amount of interference available at the secondary transmitter. In the On/Off power setting, users are allowed to transmit based on whether the interference constraint is met or not, while in the full power adaptive setting, the users are allowed to vary their transmission power to satisfy the interference constraint. Finally, we present numerical results for our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load for both schemes. © 2012 IEEE.

  16. A Tree Based Broadcast Scheme for (m, k)-firm Real-Time Stream in Wireless Sensor Networks.

    Science.gov (United States)

    Park, HoSung; Kim, Beom-Su; Kim, Kyong Hoon; Shah, Babar; Kim, Ki-Il

    2017-11-09

    Recently, various unicast routing protocols have been proposed to deliver measured data from the sensor node to the sink node within the predetermined deadline in wireless sensor networks. In parallel with their approaches, some applications demand the specific service, which is based on broadcast to all nodes within the deadline, the feasible real-time traffic model and improvements in energy efficiency. However, current protocols based on either flooding or one-to-one unicast cannot meet the above requirements entirely. Moreover, as far as the authors know, there is no study for the real-time broadcast protocol to support the application-specific traffic model in WSN yet. Based on the above analysis, in this paper, we propose a new ( m , k )-firm-based Real-time Broadcast Protocol (FRBP) by constructing a broadcast tree to satisfy the ( m , k )-firm, which is applicable to the real-time model in resource-constrained WSNs. The broadcast tree in FRBP is constructed by the distance-based priority scheme, whereas energy efficiency is improved by selecting as few as nodes on a tree possible. To overcome the unstable network environment, the recovery scheme invokes rapid partial tree reconstruction in order to designate another node as the parent on a tree according to the measured ( m , k )-firm real-time condition and local states monitoring. Finally, simulation results are given to demonstrate the superiority of FRBP compared to the existing schemes in terms of average deadline missing ratio, average throughput and energy consumption.

  17. Predictors of Availing Maternal Health Schemes: A community based study in Gujarat, India

    Directory of Open Access Journals (Sweden)

    Kranti Suresh Vora

    2014-06-01

    Full Text Available Background: India continues to face challenges in improving key maternal health indicators with about 1/3rd of global maternal deaths happening in India. Utilization of health care services is an important issue in India with significant proportion of home deliveries and majority of mothers not receiving adequate antenatal care. Mortality among poor rural women is the highest with lowest utilization. To make maternal healthcare more equitable, numerous schemes such as Janani Suraksha Yojana, Chiranjeevi Yojana, Kasturba Poshan Sahay Yojana have been introduced. Studies suggest that utilization of such schemes by target population is low and there is a need to understand factors affecting maternal health care utilization in the context of these schemes. Current community based study was done in rural Gujarat to understand characteristics of women who utilize such schemes and predictors of utilization. Methodology: Data collection was done in two districts of Gujarat from June to August, 2013 as a pilot phase of MATIND project. Community based cross-sectional study included 827 households and socio-demographic details of 1454 women of 15-49 years age groups were collected. 265 mothers, who had delivered after 1st January, 2013 are included in the regression analyses. The data analysis carried out with R version 3.0.1 software.  Results: The analysis indicates socioeconomic variables such as caste, maternal variables such as education and health system variables such as use of government facility are important predictors of maternal health scheme utilization. Results suggest that socioeconomic and health system factors are the best predictors for availing scheme. Conclusion: Health system variables along with individual level variables are important predictors for availing maternal health schemes. The study indicates the need to examine all levels of predictors for utilizing government health schemes to maximize the benefit for underserved

  18. Gonioscopy in the dog: inter-examiner variability and the search for a grading scheme.

    Science.gov (United States)

    Oliver, J A C; Cottrell, B C; Newton, J R; Mellersh, C S

    2017-11-01

    To investigate inter-examiner variability in gonioscopic evaluation of pectinate ligament abnormality in dogs and to assess level of inter-examiner agreement for four different gonioscopy grading schemes. Two examiners performed gonioscopy in 98 eyes of 49 Welsh springer spaniel dogs and estimated the percentage circumference of iridocorneal angle affected by pectinate ligament abnormality to the nearest 5%. Percentage scores assigned to each eye by the two examiners were compared. Inter-examiner agreement was assessed following assignment of the percentage scores to each of four grading schemes by Cohen's kappa statistic. There was a strong positive correlation between the results of the two examiners (R=0·91). In general, Examiner 1 scored individual eyes higher than Examiner 2, especially for eyes in which both examiners diagnosed pectinate ligament abnormality. A "good" level of agreement could only be achieved with a gonioscopy grading scheme of no more than three categories and with a relatively large intermediate bandwidth (κ=0·68). A three-tiered grading scheme might represent an improvement on hereditary eye disease schemes which simply classify dogs to be either "affected" or "unaffected" for pectinate ligament abnormality. However, the large intermediate bandwidth of this scheme would only allow for the additional detection of those dogs with marked progression of pectinate ligament abnormality which would be considered most at risk of primary closed-angle glaucoma. © 2017 British Small Animal Veterinary Association.

  19. The combined Petrov-Galerkin method with auto-adapting schemes and its applications in numerical resolution of problems with limit layer

    International Nuclear Information System (INIS)

    Silva, R.S.; Galeao, A.C.; Carmo, E.G.D. do

    1989-07-01

    In this paper a new finite element model is constructed combining an r- refinement scheme with the CCAU method. The new formulation gives better approximation for boundary and internal layers compared to the standard CCAU, without increasing computer codes. (author) [pt

  20. Construction of a Species-Level Tree of Life for the Insects and Utility in Taxonomic Profiling.

    Science.gov (United States)

    Chesters, Douglas

    2017-05-01

    Although comprehensive phylogenies have proven an invaluable tool in ecology and evolution, their construction is made increasingly challenging both by the scale and structure of publically available sequences. The distinct partition between gene-rich (genomic) and species-rich (DNA barcode) data is a feature of data that has been largely overlooked, yet presents a key obstacle to scaling supermatrix analysis. I present a phyloinformatics framework for draft construction of a species-level phylogeny of insects (Class Insecta). Matrix-building requires separately optimized pipelines for nuclear transcriptomic, mitochondrial genomic, and species-rich markers, whereas tree-building requires hierarchical inference in order to capture species-breadth while retaining deep-level resolution. The phylogeny of insects contains 49,358 species, 13,865 genera, 760 families. Deep-level splits largely reflected previous findings for sections of the tree that are data rich or unambiguous, such as inter-ordinal Endopterygota and Dictyoptera, the recently evolved and relatively homogeneous Lepidoptera, Hymenoptera, Brachycera (Diptera), and Cucujiformia (Coleoptera). However, analysis of bias, matrix construction and gene-tree variation suggests confidence in some relationships (such as in Polyneoptera) is less than has been indicated by the matrix bootstrap method. To assess the utility of the insect tree as a tool in query profiling several tree-based taxonomic assignment methods are compared. Using test data sets with existing taxonomic annotations, a tendency is observed for greater accuracy of species-level assignments where using a fixed comprehensive tree of life in contrast to methods generating smaller de novo reference trees. Described herein is a solution to the discrepancy in the way data are fit into supermatrices. The resulting tree facilitates wider studies of insect diversification and application of advanced descriptions of diversity in community studies, among