WorldWideScience

Sample records for management efficient scheme

  1. Quality of service management efficient scheme for the universal mobile telecommunications system

    E. Zaleta–Alejandre

    2008-04-01

    Full Text Available This research work proposes a new Radio Resource Management (RRM scheme in order to accomplish the Quality of Service (QoS management for the Universal Mobile Telecommunications System (UMTS. The solution is based on UMTS standardization and a performance evaluation is presented to demonstrate its efficiency.

  2. Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

    Yuanyuan Zhang

    2015-01-01

    Full Text Available Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al. proposed an enhanced authentication scheme using smart card for digital rights management. They demonstrated that their scheme is secure enough. However, Mishra et al. pointed out that Yang et al.’s scheme suffers from the password guessing attack and the denial of service attack. Moreover, they also demonstrated that Yang et al.’s scheme is not efficient enough when the user inputs an incorrect password. In this paper, we analyze Yang et al.’s scheme again, and find that their scheme is vulnerable to the session key attack. And, there are some mistakes in their scheme. To surmount the weakness of Yang et al.’s scheme, we propose a more efficient and provable secure digital rights management authentication scheme using smart card based on elliptic curve cryptography.

  3. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    Le Xuan Hung

    2008-12-01

    Full Text Available For many sensor network applications such as military or homeland security, it is essential for users (sinks to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1 Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2 The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3 The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4 Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5 No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  4. Towards Efficient Energy Management of Smart Buildings Exploiting Heuristic Optimization with Real Time and Critical Peak Pricing Schemes

    Sheraz Aslam

    2017-12-01

    Full Text Available The smart grid plays a vital role in decreasing electricity cost through Demand Side Management (DSM. Smart homes, a part of the smart grid, contribute greatly to minimizing electricity consumption cost via scheduling home appliances. However, user waiting time increases due to the scheduling of home appliances. This scheduling problem is the motivation to find an optimal solution that could minimize the electricity cost and Peak to Average Ratio (PAR with minimum user waiting time. There are many studies on Home Energy Management (HEM for cost minimization and peak load reduction. However, none of the systems gave sufficient attention to tackle multiple parameters (i.e., electricity cost and peak load reduction at the same time as user waiting time was minimum for residential consumers with multiple homes. Hence, in this work, we propose an efficient HEM scheme using the well-known meta-heuristic Genetic Algorithm (GA, the recently developed Cuckoo Search Optimization Algorithm (CSOA and the Crow Search Algorithm (CSA, which can be used for electricity cost and peak load alleviation with minimum user waiting time. The integration of a smart Electricity Storage System (ESS is also taken into account for more efficient operation of the Home Energy Management System (HEMS. Furthermore, we took the real-time electricity consumption pattern for every residence, i.e., every home has its own living pattern. The proposed scheme is implemented in a smart building; comprised of thirty smart homes (apartments, Real-Time Pricing (RTP and Critical Peak Pricing (CPP signals are examined in terms of electricity cost estimation for both a single smart home and a smart building. In addition, feasible regions are presented for single and multiple smart homes, which show the relationship among the electricity cost, electricity consumption and user waiting time. Experimental results demonstrate the effectiveness of our proposed scheme for single and multiple smart

  5. Efficient multiparty quantum-secret-sharing schemes

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  6. Development of an efficient and economic small scale management scheme for low-and intermediate level radioactive waste and its impact on the environment

    Salomon, A.Ph.; Panem, J.A.; Manalastas, H.C.; Cortez, S.L.; Paredes, C.H.; Bartolome, Z.M.

    1976-05-01

    This paper is a preliminary report on the evolution of a pilot-scale management system for low-and intermediate level radioactive wastes to provide adequate protection to the public as well as maintain the equilibrium in the human environment. Discussions on the waste management and disposal scheme proposals, assessment of waste treatment requirements of the Atomic Research Center, Philippine Atomic Energy Commission, previous experiences in the handling and management of radioactive wastes, current practices and alternatives to meet waste management problems and research studies on waste treatment are presented. In the selection of a chemical treatment process for ARC, comparative studies on the different waste processing methods or combination of processes that will be most suitable for the waste requirements of the Center are now in progress. The decontamination efficiency and economy of the lime-soda, ferrocyanide phosphate and ferric hydroxide methods are being compared. Jar experiments were conducted in the Lime-Soda Process to establish the optima conditions for certain parameter required in order to achieve an efficient and economical treatment system applicable to the local conditions for attaining maximum removal of contamination; maximum settling time - 5 hours after treatment, optimum pH-11, 2:3 ppm ratio of Ca +2 to Co 3 -2 concentration, concentration of dosing reagents can further be increased beyond 160 ppm Ca +2 and 240 ppm Co 3 -2 . Cobalt contamination can be removed with lime-soda treatment aside from strontium

  7. Efficient Scheme for Chemical Flooding Simulation

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  8. An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage

    Xiuxiu Jiang

    2017-05-01

    Full Text Available Symmetric searchable encryption for cloud storage enables users to retrieve the documents they want in a privacy-preserving way, which has become a hotspot of research. In this paper, we propose an efficient keyword search scheme over encrypted cloud data. We firstly adopt a structure named as inverted matrix (IM to build search index. The IM is consisted of index vectors, each of which is associated with a keyword. Then we map a keyword to an address used to locate the corresponding index vector. Finally, we mask index vectors with pseudo-random bits to obtain an encrypted enlarged inverted matrix (EEIM. Through the security analysis and experimental evaluation, we demonstrate the privacy and efficiency of our scheme respectively. In addition, we further consider two extended practical search situations, i.e., occurrence queries and dynamic user management, and then give two relevant schemes.

  9. An efficient training scheme for supermodels

    Schevenhoven, Francine J.; Selten, Frank M.

    2017-06-01

    Weather and climate models have improved steadily over time as witnessed by objective skill scores, although significant model errors remain. Given these imperfect models, predictions might be improved by combining them dynamically into a so-called supermodel. In this paper a new training scheme to construct such a supermodel is explored using a technique called cross pollination in time (CPT). In the CPT approach the models exchange states during the prediction. The number of possible predictions grows quickly with time, and a strategy to retain only a small number of predictions, called pruning, needs to be developed. The method is explored using low-order dynamical systems and applied to a global atmospheric model. The results indicate that the CPT training is efficient and leads to a supermodel with improved forecast quality as compared to the individual models. Due to its computational efficiency, the technique is suited for application to state-of-the art high-dimensional weather and climate models.

  10. A Memory Efficient Network Encryption Scheme

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  11. An efficient compression scheme for bitmap indices

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2004-04-13

    When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time

  12. Logistics, Management and Efficiency

    Mircea UDRESCU; Sandu CUTURELA

    2014-01-01

    The problem related to the efficiency of the management for organization is general being the concern off all managers. In the present essay we consider that the efficacy of the organization begins from the structural systemization of the organizational management into general management, management of logistics and management of production which demands a new managerial process, more competitive based on economic efficiency.

  13. Benchmarking and energy management schemes in SMEs

    Huenges Wajer, Boudewijn [SenterNovem (Netherlands); Helgerud, Hans Even [New Energy Performance AS (Norway); Lackner, Petra [Austrian Energy Agency (Austria)

    2007-07-01

    Many companies are reluctant to focus on energy management or to invest in energy efficiency measures. Nevertheless, there are many good examples proving that the right approach to implementing energy efficiency can very well be combined with the business-priorities of most companies. SMEs in particular can benefit from a facilitated European approach because they normally have a lack of resources and time to invest in energy efficiency. In the EU supported pilot project BESS, 60 SMEs from 11 European countries of the food and drink industries successfully tested a package of interactive instruments which offers such a facilitated approach. A number of pilot companies show a profit increase of 3 up to 10 %. The package includes a user-friendly and web based E-learning scheme for implementing energy management as well as a benchmarking module for company specific comparison of energy performance indicators. Moreover, it has several practical and tested tools to support the cycle of continuous improvement of energy efficiency in the company such as checklists, sector specific measure lists, templates for auditing and energy conservation plans. An important feature and also a key trigger for companies is the possibility for SMEs to benchmark anonymously their energy situation against others of the same sector. SMEs can participate in a unique web based benchmarking system to interactively benchmark in a way which fully guarantees confidentiality and safety of company data. Furthermore, the available data can contribute to a bottom-up approach to support the objectives of (national) monitoring and targeting and thereby also contributing to the EU Energy Efficiency and Energy Services Directive. A follow up project to expand the number of participating SMEs of various sectors is currently being developed.

  14. An efficient entire chaos-based scheme for deniable authentication

    Xiao Di; Liao Xiaofeng; Wong, K.W.

    2005-01-01

    By using a chaotic encryption-hash parallel algorithm and the semi-group property of Chebyshev chaotic map, we propose a secure and efficient scheme for the deniable authentication. The scheme is efficient, practicable and reliable, with high potential to be adopted for e-commerce

  15. An efficient entire chaos-based scheme for deniable authentication

    Xiao Di [College of Computer Science and Engineering, Chongqing University, Chongqing, 400044 (China) and College of Mechanical Engineering, Chongqing University, Chongqing, 400044 (China)]. E-mail: xiaodi_cqu@hotmail.com; Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing, 400044 (China); Wong, K.W. [Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong (China)

    2005-02-01

    By using a chaotic encryption-hash parallel algorithm and the semi-group property of Chebyshev chaotic map, we propose a secure and efficient scheme for the deniable authentication. The scheme is efficient, practicable and reliable, with high potential to be adopted for e-commerce.

  16. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  17. Security and efficiency data sharing scheme for cloud storage

    Han, Ke; Li, Qingbo; Deng, Zhongliang

    2016-01-01

    With the adoption and diffusion of data sharing paradigm in cloud storage, there have been increasing demands and concerns for shared data security. Ciphertext Policy Attribute-Based Encryption (CP-ABE) is becoming a promising cryptographic solution to the security problem of shared data in cloud storage. However due to key escrow, backward security and inefficiency problems, existing CP-ABE schemes cannot be directly applied to cloud storage system. In this paper, an effective and secure access control scheme for shared data is proposed to solve those problems. The proposed scheme refines the security of existing CP-ABE based schemes. Specifically, key escrow and conclusion problem are addressed by dividing key generation center into several distributed semi-trusted parts. Moreover, secrecy revocation algorithm is proposed to address not only back secrecy but efficient problem in existing CP-ABE based scheme. Furthermore, security and performance analyses indicate that the proposed scheme is both secure and efficient for cloud storage.

  18. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  19. Payment schemes and cost efficiency: evidence from Swiss public hospitals.

    Meyer, Stefan

    2015-03-01

    This paper aims at analysing the impact of prospective payment schemes on cost efficiency of acute care hospitals in Switzerland. We study a panel of 121 public hospitals subject to one of four payment schemes. While several hospitals are still reimbursed on a per diem basis for the treatment of patients, most face flat per-case rates-or mixed schemes, which combine both elements of reimbursement. Thus, unlike previous studies, we are able to simultaneously analyse and isolate the cost-efficiency effects of different payment schemes. By means of stochastic frontier analysis, we first estimate a hospital cost frontier. Using the two-stage approach proposed by Battese and Coelli (Empir Econ 20:325-332, 1995), we then analyse the impact of these payment schemes on the cost efficiency of hospitals. Controlling for hospital characteristics, local market conditions in the 26 Swiss states (cantons), and a time trend, we show that, compared to per diem, hospitals which are reimbursed by flat payment schemes perform better in terms of cost efficiency. Our results suggest that mixed schemes create incentives for cost containment as well, although to a lesser extent. In addition, our findings indicate that cost-efficient hospitals are primarily located in cantons with competitive markets, as measured by the Herfindahl-Hirschman index in inpatient care. Furthermore, our econometric model shows that we obtain biased estimates from frontier analysis if we do not account for heteroscedasticity in the inefficiency term.

  20. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  1. An Efficient V2I Authentication Scheme for VANETs

    Yousheng Zhou

    2018-01-01

    Full Text Available The advent of intelligent transportation system has a crucial impact on the traffic safety and efficiency. To cope with security issues such as spoofing attack and forgery attack, many authentication schemes for vehicular ad hoc networks (VANETs have been developed, which are based on the hypothesis that secret keys are kept perfectly secure. However, key exposure is inevitable on account of the openness of VANET environment. To address this problem, key insulation is introduced in our proposed scheme. With a helper device, vehicles could periodically update their own secret keys. In this way, the forward and backward secrecy has been achieved. In addition, the elliptic curve operations have been integrated to improve the performance. The random oracle model is adopted to prove the security of the proposed scheme, and the experiment has been conducted to demonstrate the comparison between our scheme and the existing similar schemes.

  2. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users

    Fenghua Li

    2018-02-01

    Full Text Available With the development of online social networks (OSNs and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme. Keywords: Impression management, Relational privacy, Photo sharing, Policy recommendation, Proxemics

  3. Collation of chewing efficiency and dentures with diverse occlusal schemes

    Vijay Kumar Peddinti

    2017-01-01

    Full Text Available Background: Rehabilitation of an edentulous patient nurtures satisfaction and this lies in the chewing ability provided by the prosthesis. Aim: To evaluate and compare the masticatory efficiencies of complete dentures with different occlusal schemes. Materials and Methods: Fourteen completely edentulous patients from the age group of 50-70 years were selected according to the inclusion criteria followed in this study. The dentures were made with three different occlusal schemes, i.e., anatomic occlusion without balancing, anatomic occlusion with balancing, and lingualized occlusion and stored in water till the date of denture insertion. Post-insertion instructions were given to the patients at the time of delivery of the dentures. Patients were recalled after seven days and then masticatory efficiency was performed. The test was performed using boiled peanuts and Sieve system. Statistical Analysis: One-way analysis of variance (ANOVA test and unpaired t-test were carried out. Results: The obtained masticatory efficiency values with anatomic occlusion without balancing, anatomic occlusion with balancing, and lingualized occlusion LO were analyzed using one-way ANOVA test and unpaired “t” test. The tests showed that lingualized scheme had highest masticatory efficiency. Conclusion: Within the scope of this study, it can be concluded that the masticatory efficiency will be generally higher in patients provided with complete dentures fabricated using the lingualized occlusal scheme.

  4. Efficient scheme for parametric fitting of data in arbitrary dimensions.

    Pang, Ning-Ning; Tzeng, Wen-Jer; Kao, Hisen-Ching

    2008-07-01

    We propose an efficient scheme for parametric fitting expressed in terms of the Legendre polynomials. For continuous systems, our scheme is exact and the derived explicit expression is very helpful for further analytical studies. For discrete systems, our scheme is almost as accurate as the method of singular value decomposition. Through a few numerical examples, we show that our algorithm costs much less CPU time and memory space than the method of singular value decomposition. Thus, our algorithm is very suitable for a large amount of data fitting. In addition, the proposed scheme can also be used to extract the global structure of fluctuating systems. We then derive the exact relation between the correlation function and the detrended variance function of fluctuating systems in arbitrary dimensions and give a general scaling analysis.

  5. Static and dynamic efficiency of white certificate schemes

    Giraudet, L.G.; Finon, D.

    2011-01-01

    White Certificate Schemes mandate energy companies to promote energy efficiency through flexibility mechanisms, including the trading of energy savings. They can be characterized as a quantity-based, baseline-and-credit system for the diffusion of energy efficient technologies. This paper compares experiences with White Certificate Schemes in Great Britain, Italy and France, in order to identify the basic drivers of each, and ultimately offer an original interpretation as an adaptive instrument, in the sense that it can take different forms in response to specific institutional contexts. A first analysis shows that Schemes perform well in terms of static efficiency, i.e. they are cost-effective and generate net social benefits over the period considered, though with large discrepancies rooted in different technological potentials. Regarding dynamic efficiency, i.e. the ability to induce and sustain technological change over the long haul, market transformation occurred in Great Britain, but was poorly incentivized in Italy and France by inadequate compliance cost recovery rules. Substantial organizational change has occurred in every country, mainly by strengthening vertical relationships between obliged parties and upstream businesses. Overall, the obligation (rather than the market component) drives the early phases of the Schemes. (authors)

  6. Energy Efficient MAC Scheme for Wireless Sensor Networks with High-Dimensional Data Aggregate

    Seokhoon Kim

    2015-01-01

    Full Text Available This paper presents a novel and sustainable medium access control (MAC scheme for wireless sensor network (WSN systems that process high-dimensional aggregated data. Based on a preamble signal and buffer threshold analysis, it maximizes the energy efficiency of the wireless sensor devices which have limited energy resources. The proposed group management MAC (GM-MAC approach not only sets the buffer threshold value of a sensor device to be reciprocal to the preamble signal but also sets a transmittable group value to each sensor device by using the preamble signal of the sink node. The primary difference between the previous and the proposed approach is that existing state-of-the-art schemes use duty cycle and sleep mode to save energy consumption of individual sensor devices, whereas the proposed scheme employs the group management MAC scheme for sensor devices to maximize the overall energy efficiency of the whole WSN systems by minimizing the energy consumption of sensor devices located near the sink node. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of active time of sensor devices, transmission delay, control overhead, and energy consumption. Therefore, the proposed scheme is suitable for sensor devices in a variety of wireless sensor networking environments with high-dimensional data aggregate.

  7. Development of an efficient and economical small scale management scheme for low and intermediate-Level radioactive waste and its impact on the environment

    Salomon, A.Ph.; Panem, J.A.; Manalastas, H.C.; Cortez, S. L.; Paredes, C.H.; Bartolome, Z.M.

    1976-05-01

    This paper describes the efforts made towards the establishment of a pilot-scale management system for the low and intermediate-level radioactive wastes of the Atomic Research Center. The past and current practices in handling radioactive wastes are discussed and the assessment of their capabilities to meet the projections on the waste production is presented. The future waste management requirements of the Center was evaluated and comparative studies on the Lime-Soda and Phosphate Processes were conducted on simulated and raw liquid wastes with initial activity ranging from 10 -4 uCi/ml to 10 -2 uCi/ml, to establish the ideal parameters for best attaining maximum removal of radioactivity in liquids. The effectiveness of treatment was evaluated in terms of the decontamination factor, DF, obtained

  8. Efficient Secure and Privacy-Preserving Route Reporting Scheme for VANETs

    Zhang, Yuanfei; Pei, Qianwen; Dai, Feifei; Zhang, Lei

    2017-10-01

    Vehicular ad-hoc network (VANET) is a core component of intelligent traffic management system which could provide various of applications such as accident prediction, route reporting, etc. Due to the problems caused by traffic congestion, route reporting becomes a prospective application which can help a driver to get optimal route to save her travel time. Before enjoying the convenience of route reporting, security and privacy-preserving issues need to be concerned. In this paper, we propose a new secure and privacy-preserving route reporting scheme for VANETs. In our scheme, only an authenticated vehicle can use the route reporting service provided by the traffic management center. Further, a vehicle may receive the response from the traffic management center with low latency and without violating the privacy of the vehicle. Experiment results show that our scheme is much more efficiency than the existing one.

  9. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  10. Energy efficient scheme for cognitive radios utilizing soft sensing

    Alabbasi, Abdulrahman

    2014-04-06

    In this paper we propose an energy efficient cognitive radio system. Our design considers an underlaying resource allocation combined with soft sensing information to achieve a sub-optimum energy efficient system. The sub-optimality is achieved by optimizing over a channel inversion power policy instead of considering a water-filling power policy. We consider an Energy per Goodbit (EPG) metric to express the energy efficient objective function of the system and as an evaluation metric to our system performance. Since our optimization problem is not a known convex problem, we prove its convexity to guarantee its feasibility. We evaluate the proposed scheme comparing to a benchmark system through both analytical and numerical results.

  11. Energy efficient scheme for cognitive radios utilizing soft sensing

    Alabbasi, AbdulRahman; Rezki, Zouheir; Shihada, Basem

    2014-01-01

    In this paper we propose an energy efficient cognitive radio system. Our design considers an underlaying resource allocation combined with soft sensing information to achieve a sub-optimum energy efficient system. The sub-optimality is achieved by optimizing over a channel inversion power policy instead of considering a water-filling power policy. We consider an Energy per Goodbit (EPG) metric to express the energy efficient objective function of the system and as an evaluation metric to our system performance. Since our optimization problem is not a known convex problem, we prove its convexity to guarantee its feasibility. We evaluate the proposed scheme comparing to a benchmark system through both analytical and numerical results.

  12. ETEEM- Extended Traffic Aware Energy Efficient MAC Scheme for WSNs

    Younas Khan; Sheeraz Ahmed; Fakhri Alam Khan; Imran Ahmad; Saqib Shahid Rahim; M. Irfan Khattak

    2016-01-01

    Idle listening issue arises when a sensor node listens to medium despite the absence of data which results in consumption of energy. ETEEM is a variant of Traffic Aware Energy Efficient MAC protocol (TEEM) which focuses on energy optimization due to reduced idle listening time and much lesser overhead on energy sources. It uses a novel scheme for using idle listening time of sensor nodes. The nodes are only active for small amount of time and most of the time, will be in sleep mode when no da...

  13. Efficient JPEG 2000 Image Compression Scheme for Multihop Wireless Networks

    Halim Sghaier

    2011-08-01

    Full Text Available When using wireless sensor networks for real-time data transmission, some critical points should be considered. Restricted computational power, reduced memory, narrow bandwidth and energy supplied present strong limits in sensor nodes. Therefore, maximizing network lifetime and minimizing energy consumption are always optimization goals. To overcome the computation and energy limitation of individual sensor nodes during image transmission, an energy efficient image transport scheme is proposed, taking advantage of JPEG2000 still image compression standard using MATLAB and C from Jasper. JPEG2000 provides a practical set of features, not necessarily available in the previous standards. These features were achieved using techniques: the discrete wavelet transform (DWT, and embedded block coding with optimized truncation (EBCOT. Performance of the proposed image transport scheme is investigated with respect to image quality and energy consumption. Simulation results are presented and show that the proposed scheme optimizes network lifetime and reduces significantly the amount of required memory by analyzing the functional influence of each parameter of this distributed image compression algorithm.

  14. Efficient resource allocation scheme for visible-light communication system

    Kim, Woo-Chan; Bae, Chi-Sung; Cho, Dong-Ho; Shin, Hong-Seok; Jung, D. K.; Oh, Y. J.

    2009-01-01

    A visible-light communication utilizing LED has many advantagies such as visibility of information, high SNR (Signal to Noise Ratio), low installation cost, usage of existing illuminators, and high security. Furthermore, exponentially increasing needs and quality of LED have helped the development of visible-light communication. The visibility is the most attractive property in visible-light communication system, but it is difficult to ensure visibility and transmission efficiency simultaneously during initial access because of the small amount of initial access process signals. In this paper, we propose an efficient resource allocation scheme at initial access for ensuring visibility with high resource utilization rate and low data transmission failure rate. The performance has been evaluated through the numerical analysis and simulation results.

  15. Energy efficient appliance choice under the EU labeling scheme

    Mills, Bradford F.; Schleich, Joachim [Fraunhofer-Institut fuer System- und Innovationsforschung (ISI), Karlsruhe (Germany)

    2010-02-15

    This paper extends the existing empirical literature on consumers' choices when exposed to energy labeling schemes by allowing choices to depend on household socio-economic characteristics, technology-related factors, behavioral and motivational factors, and country conditions in a multi-country analysis. To account for a possible knowledge-based selection bias, the econometric model distinguishes label class knowledge from the energy class choice decision. As a general finding, most covariates show stronger relationships with knowledge of labeling class than with the choice of energy efficiency class. Four factors show particularly strong and expected influences on label class awareness. First, general awareness of household energy use and energy saving technologies spills over into awareness of the energy class of specific appliances. Second, socioeconomic characteristics mater, as education increases label class awareness and older age reduces awareness. Third, economic incentives matter, as stated economic importance of energy saving and higher country electricity prices both generate greater label awareness. By contrast, stated concerns about global warming do not appear to have a broad impact on awareness. Fourth, effective country implementation of the labeling scheme raises label awareness. More surprisingly, most factors that promote awareness of appliance energy classes have a limited influence on actual appliance energy class choice. Efficient energy behavior in the household is not strongly linked to appliance energy class choice. Socio-economic characteristics also have limited influence. This finding is inline with other studies that find that household socio-economic characteristics have relatively weak associations with the adoption of energy efficient technologies (Mills and Schleich 2010, Brohmann et al. 2009). In fact, with education it is vocational degrees rather than university degrees that are positively associated with the propensity to

  16. Incentives for energy efficiency in the EU emission trading scheme

    Schleich, Joachim [Fraunhofer-Institut fuer Systemtechnik und Innovationsforschung (ISI), Karlsruhe (Germany); Virginia Polytechnic Inst. and State Univ., Blacksburg, VA (United States); Rogge, Karoline [Fraunhofer-Institut fuer Systemtechnik und Innovationsforschung (ISI), Karlsruhe (Germany); ETH Zurich (Switzerland). Group for Sustainability and Technology; Betz, Regina [New South Wales Univ. (Australia). Centre for Energy and Environmental Markets

    2008-07-01

    This paper explores the incentives for energy efficiency induced by the European Union Emissions Trading Scheme (EU ETS) for installations in the energy and industry sectors. Our analysis of the National Allocation Plans for 27 EU Member States for phase 2 of the EU ETS (2008-2012) suggests that the price and cost effects for improvements in carbon and energy efficiency in the energy and industry sectors will be stronger than in phase 1 (2005-2007), but only because the European Commission has substantially reduced the number of allowances to be allocated by the Member States. To the extent that companies from these sectors (notably power producers) pass through the extra costs for carbon, higher prices for allowances translate into stronger incentives for demand- side energy efficiency. With the cuts in allocation to energy and industry sectors these will be forced to greater reductions, thus the non-ET sectors like household, tertiary and transport will have to reduce less, which is more in line with the cost-efficient share of emission reductions. The findings also imply that domestic efficiency improvements in the energy and industry sectors may remain limited since companies can make substantial use of credits from the Kyoto mechanisms. The analysis of the rules for existing installations, new projects and closures suggests that incentives for energy efficiency are higher in phase 2 than in phase 1 because of the increased application of benchmarking to new and existing installations and because a lower share of allowances will be allocated for free. Nevertheless, there is still ample scope to further improve the EU ETS so that the full potential for energy efficiency can be realized. (orig.)

  17. CHex: An Efficient RDF Storage and Indexing Scheme for Column-Oriented Databases

    Xin Wang; Shuyi Wang; Pufeng Du; Zhiyong Feng

    2011-01-01

    As increasingly large RDF data sets are being published on the Web, effcient RDF data management has become an essential factor in realizing the Semantic Web vision. However, most existing RDF storage schemes, which are built on top of row-store relational databases, are constrained in terms of efficiency and scalability. Still, the growing popularity of the RDF format used in real-world applications arguably calls for an effort to deal with these drawbacks. In this paper, we propose a novel ...

  18. Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes

    Lili Wang

    2015-01-01

    Full Text Available Proxy Mobile IPv6 (PMIPv6 is proposed as a promising network-based mobility management protocol, which does not need any participation of mobile nodes. PMIPv6 does not support the multicast well and most of the current research concentrates on the mobile multicast receiver. However, the mobile multicast sender is also very important and challenging, which has not been addressed well. Therefore, in this paper we propose two efficient PMIPv6 based mobile multicast sender support schemes which are PMIP bidirectional tunneling (PMIP-BT and PMIP direct routing (PMIP-DR. In the PMIP-BT, the multicast traffic can be delivered through the PMIPv6 bidirectional tunnel, while, in the PMIP-DR, the multicast data can be transmitted via an optimized direct multicast routing. Both of them can support the multicast sender mobility transparently enabled in the PMIPv6 networks. We evaluate the performance of the proposed schemes by theoretical analysis, and the numerical results show that the proposed schemes have a better performance in terms of the signaling cost than the current schemes. Meanwhile, the proposed schemes are also implemented on the test bed, and the experimental results not only verify the validity and feasibility of our proposed schemes, but also conclude the different scenarios to which they are applicable.

  19. Green-Frag: Energy-Efficient Frame Fragmentation Scheme for Wireless Sensor Networks

    Daghistani, Anas H.

    2013-05-15

    Power management is an active area of research in wireless sensor networks (WSNs). Efficient power management is necessary because WSNs are battery-operated devices that can be deployed in mission-critical applications. From the communications perspective, one main approach to reduce energy is to maximize throughput so the data can be transmitted in a short amount of time. Frame fragmentation techniques aim to achieve higher throughput by reducing retransmissions. Using experiments on a WSN testbed, we show that frame fragmentation helps to reduce energy consumption. We then study and compare recent frame fragmentation schemes to find the most energy-efficient scheme. Our main contribution is to propose a new frame fragmentation scheme that is optimized to be energy efficient, which is originated from the chosen frame fragmentation scheme. This new energy-efficient frame fragmentation protocol is called (Green-Frag). Green-Frag uses an algorithm that gives sensor nodes the ability to transmit data with optimal transmit power and optimal frame structure based on environmental conditions. Green-Frag takes into consideration the channel conditions, interference patterns and level, as well as the distance between sender and receiver. The thesis discusses various design and implementation considerations for Green-Frag. Also, it shows empirical results of comparing Green-Frag with other frame fragmentation protocols in terms of energy efficiency. Green-Frag performance results shows that it is capable of choosing the best transmit according to the channel conditions. Subsequently, Green-Frag achieves the least energy consumption in all environmental conditions.

  20. An efficient numerical scheme for the simulation of parallel-plate active magnetic regenerators

    Torregrosa-Jaime, Bárbara; Corberán, José M.; Payá, Jorge

    2015-01-01

    A one-dimensional model of a parallel-plate active magnetic regenerator (AMR) is presented in this work. The model is based on an efficient numerical scheme which has been developed after analysing the heat transfer mechanisms in the regenerator bed. The new finite difference scheme optimally com...... to the fully implicit scheme, the proposed scheme achieves more accurate results, prevents numerical errors and requires less computational effort. In AMR simulations the new scheme can reduce the computational time by 88%....

  1. A MEPS is a MEPS is a MEPS. Comparing Ecodesign and Top Runner schemes for setting product efficiency standards

    Siderius, P.J.S. [NL Agency, Croeselaan 15, P.O. Box 8242, 3503 RE Utrecht (Netherlands); Nakagami, H. [Jyukankyo Research Institute, 3-29, Kioi-cho, Chiyoda-ku Tokyo, 102-0094 (Japan)

    2013-02-15

    Both Top Runner in Japan and Ecodesign in the European Union are schemes to set requirements on the energy efficiency (minimum efficiency performance standards, MEPS) of a variety of products. This article provides an overview of the main characteristics and results of both schemes and gives recommendations for improving them. Both schemes contribute significantly to the energy efficiency targets set by the European Commission and the Japanese government. Although it is difficult to compare the absolute levels of the requirements, comparison of the relative improvements and of the savings on household electricity consumption (11 % in Japan, 16 % in the EU) suggest they are in the same range. Furthermore, the time needed to set or review requirements is in both schemes considerable (between 5 and 6 years on average) and the manageability increasingly will become a challenge. The appeal of the Top Runner approach is that the most efficient product (Top Runner) sets the standard for all products at the next target year. Although the Ecodesign scheme includes the elements for a Top Runner approach, it could exploit this principle more explicitly. On the other hand, the Top Runner scheme could benefit by using a real minimum efficiency performance standard instead of a fleet average. This would make the monitoring and enforcement more simple and transparent, and would open the scheme for products where the market situation is less clear.

  2. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  3. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  4. Efficient schemes for deterministic joint remote preparation of an ...

    We present three schemes for the joint remote state preparation (JRSP) of an arbitrary four-qubit W-type entangled state with complex coefficients via four and two three-qubit GHZ states as the quantum channel. In these schemes, two senders (or N senders) share the original state which they wish to help the receiver to ...

  5. Transaction costs of Tradable White Certificate schemes: The Energy Efficiency Commitment as case study

    Mundaca, Luis [International Institute for Industrial Environmental Economics at Lund University, Lund (Sweden)

    2007-08-15

    This paper analyses the nature and scale of transaction costs (TCs) borne by obliged parties under a ''Tradable White Certificate'' (TWC) scheme. Taking the first phase of the Energy Efficiency Commitment (EEC1) in Great Britain as a case study, several sources of TCs were considered, such as search for information, persuasion of customers, negotiation with business partners, and measurement and verification activities. Information was obtained through interviews and a questionnaire distributed to obliged parties. Results show that the most significant sources of TCs were related to search for information, persuading customers and negotiating with managing agents/contractors to implement energy efficiency measures. Perceived high TCs related to contract negotiation and liability risks slightly reduced the low trading level. The scale of TCs was estimated to be around 10% and 30% of total investments costs for the lighting and insulation segments, respectively. The results indicate that, despite the presence and scale of TCs, the EEC1 scheme generated energy savings that yielded net societal benefits. Estimated financial benefits range from 0.6 to 6 p/kWh for insulation and lighting savings, respectively. When avoided external costs due to electricity savings are included, estimated economic benefits range from 3 to 8 p/kWh. Several lessons from the EEC1 can be drawn for TWC schemes. Among others, it is found that informative policy instruments to raise awareness among end-users are critical if a TWC scheme is to deliver cost-effective energy savings. In all, the nature and scale of TCs under TWC schemes will differ because of a number of endogenous and exogenous determinants. (author)

  6. Transaction costs of Tradable White Certificate schemes: The Energy Efficiency Commitment as case study

    Mundaca, Luis

    2007-01-01

    This paper analyses the nature and scale of transaction costs (TCs) borne by obliged parties under a 'Tradable White Certificate' (TWC) scheme. Taking the first phase of the Energy Efficiency Commitment (EEC1) in Great Britain as a case study, several sources of TCs were considered, such as search for information, persuasion of customers, negotiation with business partners, and measurement and verification activities. Information was obtained through interviews and a questionnaire distributed to obliged parties. Results show that the most significant sources of TCs were related to search for information, persuading customers and negotiating with managing agents/contractors to implement energy efficiency measures. Perceived high TCs related to contract negotiation and liability risks slightly reduced the low trading level. The scale of TCs was estimated to be around 10% and 30% of total investments costs for the lighting and insulation segments, respectively. The results indicate that, despite the presence and scale of TCs, the EEC1 scheme generated energy savings that yielded net societal benefits. Estimated financial benefits range from 0.6 to 6 p/kWh for insulation and lighting savings, respectively. When avoided external costs due to electricity savings are included, estimated economic benefits range from 3 to 8 p/kWh. Several lessons from the EEC1 can be drawn for TWC schemes. Among others, it is found that informative policy instruments to raise awareness among end-users are critical if a TWC scheme is to deliver cost-effective energy savings. In all, the nature and scale of TCs under TWC schemes will differ because of a number of endogenous and exogenous determinants

  7. Trinary signed-digit arithmetic using an efficient encoding scheme

    Salim, W. Y.; Alam, M. S.; Fyath, R. S.; Ali, S. A.

    2000-09-01

    The trinary signed-digit (TSD) number system is of interest for ultrafast optoelectronic computing systems since it permits parallel carry-free addition and borrow-free subtraction of two arbitrary length numbers in constant time. In this paper, a simple coding scheme is proposed to encode the decimal number directly into the TSD form. The coding scheme enables one to perform parallel one-step TSD arithmetic operation. The proposed coding scheme uses only a 5-combination coding table instead of the 625-combination table reported recently for recoded TSD arithmetic technique.

  8. An efficient quantum scheme for Private Set Intersection

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very suitable for big data services in Cloud or large-scale client-server networks.

  9. Assessment of irrigation schemes in Turkey based on management ...

    This suggests that the WUAs-operated schemes are not optimally managed, possibly due to factors such as inappropriate crop pattern and intensity, irrigation infrastructure, lack of an effective monitoring and evaluation system, insufficient awareness among managers and farmers, or unstable administrative structure.

  10. A Secure and Efficient Certificateless Short Signature Scheme

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  11. Strategic purchasing and health system efficiency: A comparison of two financing schemes in Thailand.

    Patcharanarumol, Walaiporn; Panichkriangkrai, Warisa; Sommanuttaweechai, Angkana; Hanson, Kara; Wanwong, Yaowaluk; Tangcharoensathien, Viroj

    2018-01-01

    Strategic purchasing is an essential health financing function. This paper compares the strategic purchasing practices of Thailand's two tax-financed health insurance schemes, the Universal Coverage Scheme (UCS) and the Civil Servant Medical Benefit Scheme (CSMBS), and identifies factors contributing to successful universal health coverage outcomes by analysing the relationships between the purchaser and government, providers and members. The study uses a cross-sectional mixed-methods design, including document review and interviews with 56 key informants. The Comptroller General Department (CGD) of Ministry of Finance manages CSMBS as one among civil servant welfare programmes. Their purchasing is passive. Fee for service payment for outpatient care has resulted in rapid cost escalation and overspending of their annual budget. In contrast, National Health Security Office (NHSO) manages purchasing for UCS, which undertakes a range of strategic purchasing actions, including applying closed ended provider payment, promoting primary healthcare's gate keeping functions, exercising collective purchasing power and engaging views of members in decision making process. This difference in purchasing arrangements resulted in expenditure per CSMBS member being 4 times higher than UCS in 2014. The governance of the purchaser organization, the design of the purchasing arrangements including incentives and use of information, and the institutional capacities to implement purchasing functions are essential for effective strategic purchasing which can improve health system efficiency as a whole.

  12. Centrally managed name resolution schemes for EPICS

    Jun, D.

    1997-01-01

    The Experimental Physics and Industrial Control System (EPICS) uses a broadcast method to locate resources and controls distributed across control servers. There are many advantages offered by using a centrally managed name resolution method, in which resources are located using a repository. The suitability of DCE Directory Service as a name resolution method is explored, and results from a study involving DCE are discussed. An alternative nameserver method developed and in use at the Thomas Jefferson national Accelerator Facility (Jefferson Lab) is described and results of integrating this new method with existing EPICS utilities presented. The various methods discussed in the paper are compared

  13. Scalable Fault-Tolerant Location Management Scheme for Mobile IP

    JinHo Ahn

    2001-11-01

    Full Text Available As the number of mobile nodes registering with a network rapidly increases in Mobile IP, multiple mobility (home of foreign agents can be allocated to a network in order to improve performance and availability. Previous fault tolerant schemes (denoted by PRT schemes to mask failures of the mobility agents use passive replication techniques. However, they result in high failure-free latency during registration process if the number of mobility agents in the same network increases, and force each mobility agent to manage bindings of all the mobile nodes registering with its network. In this paper, we present a new fault-tolerant scheme (denoted by CML scheme using checkpointing and message logging techniques. The CML scheme achieves low failure-free latency even if the number of mobility agents in a network increases, and improves scalability to a large number of mobile nodes registering with each network compared with the PRT schemes. Additionally, the CML scheme allows each failed mobility agent to recover bindings of the mobile nodes registering with the mobility agent when it is repaired even if all the other mobility agents in the same network concurrently fail.

  14. The use and management of water in the Likangala Irrigation Scheme Complex in Southern Malawi

    Mulwafu, Wapulumuka O.; Nkhoma, Bryson G.

    This paper examines the uses and management of water for agriculture in Lake Chilwa catchment area in Zomba district of Southern Malawi. It focuses on the Likangala Rice Irrigation Scheme Complex situated along the Likangala River. The scheme is one of the largest government-run schemes. Established in the late 1960s by the government to meet the growing demand for rice, the scheme contributes greatly to the agricultural industry of the country. Besides, the scheme was established to ensure maximum utilization of Malawi's largest wetland, which, due to its hydromorphic soils and the littoral floodplains, does not favour the production of traditional upland seasonal crops such as maize. The scheme's overdependence on water from the Likangala River has attracted a considerable degree of academic interest in the use and management of the river to ensure that there is equity and efficiency for both productive and domestic users. The paper focuses on four main issues: the historical development of the scheme, the distribution of water to farmers, social relations, and the overall contribution of the scheme towards the social and economic development of the area and the country in general. The paper contends that the growing population of the basin and the increase in the number of formal and informal smallholder farmers, contributes greatly to the growth of competition and conflicts over water, which tends to undermine the economic potential of the scheme. Furthermore, the paper provides clearest indication of the need for a realistic and informed water management policy and strategy to solve the growing problem of social inequity without necessarily compromising the production of rice in the scheme.

  15. Economic Droop Scheme for Decentralized Power Management in DC Microgrids

    E. Alizadeh

    2016-12-01

    Full Text Available This paper proposes an autonomous and economic droop control scheme for DC microgrid application. In this method, a cost-effective power sharing technique among various types of DG units is properly adopted. The droop settings are determined based on an algorithm to individually manage the power management without any complicated optimization methods commonly applied in the centralized control method. In the proposed scheme, the system retains all the advantages of the traditional droop method while minimizes the generation costs of the DC microgrid. In the proposed method, all DGs are classified in a sorting rule based on their total generation cost and the reference voltage of their droop equations is then determined. The proposed scheme is applied to a typical DC microgrid consisting of four different types of DGs and a controllable load. The simulation results are presented to verify the effectiveness of the proposed method using MATLAB/SIMULINK software.

  16. An Energy Efficient Cooperative Hierarchical MIMO Clustering Scheme for Wireless Sensor Networks

    Sungyoung Lee

    2011-12-01

    Full Text Available In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO clustering scheme and traditional multihop Single-Input-Single-Output (SISO routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.

  17. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  18. An efficient and provable secure revocable identity-based encryption scheme.

    Changji Wang

    Full Text Available Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.

  19. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  20. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  1. The impact of domestic energy efficiency retrofit schemes on householder attitudes and behaviours

    Long, T.B.; Young, W.; Webber, P.; Gouldson, A.; Harwatt, H.

    2015-01-01

    Retrofitting existing housing stock to improve energy efficiency is often required to meet climate mitigation, public health and fuel poverty targets. Increasing uptake and effectiveness of retrofit schemes requires understanding of their impacts on householder attitudes and behaviours. This paper

  2. Short-term incentive schemes for hospital managers

    Lucas Malambe

    2013-10-01

    Full Text Available Orientation: Short-term incentives, considered to be an extrinsic motivation, are commonly used to motivate performance. This study explored hospital managers’ perceptions of short term incentives in maximising performance and retention. Research purpose: The study explored the experiences, views and perceptions of private hospital managers in South Africa regarding the use of short-term incentives to maximise performance and retention, as well as the applicability of the findings to public hospitals. Motivation for the study: Whilst there is an established link between performance reward schemes and organisational performance, there is little understanding of the effects of short term incentives on the performance and retention of hospital managers within the South African context. Research design, approach, and method: The study used a qualitative research design: interviews were conducted with a purposive sample of 19 hospital managers, and a thematic content analysis was performed. Main findings: Short-term incentives may not be the primary motivator for hospital managers, but they do play a critical role in sustaining motivation. Participants indicated that these schemes could also be applicable to public hospitals. Practical/managerial implications: Hospital managers are inclined to be more motivated by intrinsic than extrinsic factors. However, hospital managers (as middle managers also seem to be motivated by short-term incentives. A combination of intrinsic and extrinsic motivators should thus be used to maximise performance and retention. Contribution/value-add: Whilst the study sought to explore hospital managers’ perceptions of short-term incentives, it also found that an adequate balance between internal and external motivators is key to implementing an effective short-term incentive scheme.

  3. An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication

    Wen-Jie, Liu; Han-Wu, Chen; Zhi-Qiang, Li; Zhi-Hao, Liu; Wen-Bo, Hu; Ting-Huai, Ma

    2009-01-01

    A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer. (general)

  4. Advanced Reactive Power Reserve Management Scheme to Enhance LVRT Capability

    Hwanik Lee

    2017-10-01

    Full Text Available Abstract: To increase the utilization of wind power in the power system, grid integration standards have been proposed for the stable integration of large-scale wind power plants. In particular, fault-ride-through capability, especially Low-Voltage-Ride-Through (LVRT, has been emphasized, as it is related to tripping in wind farms. Therefore, this paper proposes the Wind power plant applicable-Effective Reactive power Reserve (Wa-ERPR, which combines both wind power plants and conventional generators at the Point of Interconnection (POI. The reactive power capability of the doubly-fed induction generator wind farm was considered to compute the total Wa-ERPR at the POI with reactive power capability of existing generators. By using the Wa-ERPR management algorithm, in case of a violation of the LVRT standards, the amount of reactive power compensation is computed using the Wa-ERPR management scheme. The proposed scheme calculates the Wa-ERPR and computes the required reactive power, reflecting the change of the system topology pre- and post-contingency, to satisfy the LVRT criterion when LVRT regulation is not satisfied at the POI. The static synchronous compensator (STATCOM with the capacity corresponding to calculated amount of reactive power through the Wa-ERPR management scheme is applied to the POI. Therefore, it is confirmed that the wind power plant satisfies the LVRT criteria by securing the appropriate reactive power at the POI, by applying of the proposed algorithm.

  5. Management initiatives in a community-based health insurance scheme.

    Sinha, Tara; Ranson, M Kent; Chatterjee, Mirai; Mills, Anne

    2007-01-01

    Community-based health insurance (CBHI) schemes have developed in response to inadequacies of alternate systems for protecting the poor against health care expenditures. Some of these schemes have arisen within community-based organizations (CBOs), which have strong links with poor communities, and are therefore well situated to offer CBHI. However, the managerial capacities of many such CBOs are limited. This paper describes management initiatives undertaken in a CBHI scheme in India, in the course of an action-research project. The existing structures and systems at the CBHI had several strengths, but fell short on some counts, which became apparent in the course of planning for two interventions under the research project. Management initiatives were introduced that addressed four features of the CBHI, viz. human resources, organizational structure, implementation systems, and data management. Trained personnel were hired and given clear roles and responsibilities. Lines of reporting and accountability were spelt out, and supportive supervision was provided to team members. The data resources of the organization were strengthened for greater utilization of this information. While the changes that were introduced took some time to be accepted by team members, the commitment of the CBHI's leadership to these initiatives was critical to their success. Copyright (c) 2007 John Wiley & Sons, Ltd.

  6. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  7. A Scheme for Evaluating Feral Horse Management Strategies

    L. L. Eberhardt

    2012-01-01

    Full Text Available Context. Feral horses are an increasing problem in many countries and are popular with the public, making management difficult. Aims. To develop a scheme useful in planning management strategies. Methods. A model is developed and applied to four different feral horse herds, three of which have been quite accurately counted over the years. Key Results. The selected model has been tested on a variety of data sets, with emphasis on the four sets of feral horse data. An alternative, nonparametric model is used to check the selected parametric approach. Conclusions. A density-dependent response was observed in all 4 herds, even though only 8 observations were available in each case. Consistency in the model fits suggests that small starting herds can be used to test various management techniques. Implications. Management methods can be tested on actual, confined populations.

  8. Combined Sector and Channel Hopping Schemes for Efficient Rendezvous in Directional Antenna Cognitive Radio Networks

    AbdulMajid M. Al-Mqdashi

    2017-01-01

    Full Text Available Rendezvous is a prerequisite and important process for secondary users (SUs to establish data communications in cognitive radio networks (CRNs. Recently, there has been a proliferation of different channel hopping- (CH- based schemes that can provide rendezvous without relying on any predetermined common control channel. However, the existing CH schemes were designed with omnidirectional antennas which can degrade their rendezvous performance when applied in CRNs that are highly crowded with primary users (PUs. In such networks, the large number of PUs may lead to the inexistence of any common available channel between neighboring SUs which result in a failure of their rendezvous process. In this paper, we consider the utilization of directional antennas in CRNs for tackling the issue. Firstly, we propose two coprimality-based sector hopping (SH schemes that can provide efficient pairwise sector rendezvous in directional antenna CRNs (DIR-CRNs. Then, we propose an efficient CH scheme that can be combined within the SH schemes for providing a simultaneous sector and channel rendezvous. The guaranteed rendezvous of our schemes are proven by deriving the theoretical upper bounds of their rendezvous delay metrics. Furthermore, extensive simulation comparisons with other related rendezvous schemes are conducted to illustrate the significant outperformance of our schemes.

  9. 3-D reconstruction using an efficient Octree encoding scheme

    Yeh, H.J.; Jagadeesh, J.M.

    1986-01-01

    Reconstruction of a three dimensional (3-D) model of biological objects from their thin section 2-D slices is a valuable tool for biomedical research. The goal of a 3-D reconstruction routine is to find the 3-D structure from a set of sliced images and display the 3-D view on a 2-D screen. Octree has been widely used as a powerful data structure to represent 3-D objects in computer. The encoding technique is specially useful for the representation of objects with irregular shape, such as biomedical objects. A method called level-wise pointerless representation which can offer much less storage requirement has been developed. In addition, a complete software package has been designed using the efficient data structure to reconstruct 3-D objects from 2-D sliced images and to display the 3-D objects on 2-D screen

  10. Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment

    Yan Zhao

    2018-01-01

    Full Text Available The rapid development of information and network technologies motivates the emergence of various new computing paradigms, such as distributed computing, cloud computing, and edge computing. This also enables more and more network enterprises to provide multiple different services simultaneously. To ensure these services can only be accessed conveniently by authorized users, many password and smart card based authentication schemes for multiserver architecture have been proposed. Recently, Truong et al. introduced an identity based user authentication scheme on elliptic curve cryptography in multiserver environment and claimed that their scheme is secure against popular attacks. However, in this paper, we point out that their scheme suffers from offline password guessing and impersonation attack and fails to achieve security requirements of this kind of authentication scheme. Moreover, we put forward a new scheme to conquer security pitfalls in the above scheme. Security analysis indicates that the proposed scheme can be free from well-known attacks. Performance discussion demonstrates that our scheme has advantages in terms of both security property and computation efficiency and thus is more desirable for practical applications in multiserver environment.

  11. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.

  12. Green-Frag: Energy-Efficient Frame Fragmentation Scheme for Wireless Sensor Networks

    Daghistani, Anas H.

    2013-01-01

    that is optimized to be energy efficient, which is originated from the chosen frame fragmentation scheme. This new energy-efficient frame fragmentation protocol is called (Green-Frag). Green-Frag uses an algorithm that gives sensor nodes the ability to transmit data

  13. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks.

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-11-12

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.

  14. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-01-01

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT. PMID:26569260

  15. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    Shalli Rani

    2015-11-01

    Full Text Available One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1 a hierarchical network design; (2 a model for the energy efficient IoT; (3 a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.

  16. Designing an Efficient Retransmission Scheme for Wireless LANs: Theory and Implementation

    Koutsonikolas, Dimitrios; Wang, Chih-Chun; Hu, Y Charlie; Shroff, Ness

    2010-01-01

    Network coding is known to benefit the downlink retransmissions by the AP in a wireless LAN from exploiriting overhearing at the client nodes. However, designing an efficient and practical retransmission scheme remains a challange. We present an (asymptotically) optimal scheme, ECR, for reduing the downlink retransmissions by the AP in a wireless LAN from exploiting overhearing at the client nodes. The design of ECR, consisting of three components: batch-based operations, a systematic pha...

  17. Efficient demodulation scheme for rolling-shutter-patterning of CMOS image sensor based visible light communications.

    Chen, Chia-Wei; Chow, Chi-Wai; Liu, Yang; Yeh, Chien-Hung

    2017-10-02

    Recently even the low-end mobile-phones are equipped with a high-resolution complementary-metal-oxide-semiconductor (CMOS) image sensor. This motivates using a CMOS image sensor for visible light communication (VLC). Here we propose and demonstrate an efficient demodulation scheme to synchronize and demodulate the rolling shutter pattern in image sensor based VLC. The implementation algorithm is discussed. The bit-error-rate (BER) performance and processing latency are evaluated and compared with other thresholding schemes.

  18. A spectrally efficient detect-and-forward scheme with two-tier adaptive cooperation

    Benjillali, Mustapha

    2011-09-01

    We propose a simple relay-based adaptive cooperation scheme to improve the spectral efficiency of "Detect-and-Forward" (DetF) half-duplex relaying in fading channels. In a new common framework, we show that the proposed scheme offers considerable gainsin terms of the achievable information ratescompared to conventional DetF relaying schemes for both orthogonal and non-orthogonal source/relay transmissions. The analysis leads on to a general adaptive cooperation strategy based on the maximization of information rates at the destination which needs to observe only the average signal-to-noise ratios of the links. © 2006 IEEE.

  19. About efficient quasi-Newtonian schemes for variational calculations in nuclear structure

    Puddu, G.

    2009-01-01

    The Broyden-Fletcher-Goldhaber-Shanno (BFGS) quasi-Newtonian scheme is known as the most efficient scheme for variational calculations of energies. This scheme is actually a member of a one-parameter family of variational methods, known as the Broyden β-family. In some applications to light nuclei using microscopically derived effective Hamiltonians starting from accurate nucleon-nucleon potentials, we actually found other members of the same family which have better performance than the BFGS method. We also extend the Broyden β -family of algorithms to a two-parameter family of rank-three updates which has even better performances. (orig.)

  20. The Australian Managed Entry Scheme: Are We Getting it Right?

    Tuffaha, Haitham W; Scuffham, Paul A

    2018-05-01

    In 2010, the Australian Government introduced the managed entry scheme (MES) to improve patient access to subsidised drugs on the Pharmaceutical Benefits Scheme and enhance the quality of evidence provided to decision makers. The aim of this paper was to critically review the Australian MES experience. We performed a comprehensive review of publicly available Pharmaceutical Benefits Advisory Committee online documents from January 2010 to July 2017. Relevant information on each MES agreement was systematically extracted, including its rationale, the conditions that guided its implementation and its policy outcomes. We identified 11 drugs where an MES was considered. Most of the identified drugs (75%) were antineoplastic agents and the main uncertainty was the overall survival benefit. More than half of the MES proposals were made by sponsors and most of the schemes were considered after previous rejected/deferred submissions for reimbursement. An MES was not established in 8 of 11 drugs (73%) despite the high evidence uncertainty. Nevertheless, six of these eight drugs were listed after the sponsors reduced their prices. Three MESs were established and implemented by Deeds of Agreement. The three cases were concluded and the required data were submitted within the agreed time frames. The need for feasibility and value of an MES should be carefully considered by stakeholders before embarking on such an agreement. It is essential to engage major stakeholders, including patient representatives, in this process. The conditions governing MESs should be clear, transparent and balanced to address the expectations of various stakeholders.

  1. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  2. A comparison of carbon allocation schemes: On the equity-efficiency tradeoff

    Pan, Xunzhang; Teng, Fei; Wang, Gehua

    2014-01-01

    In the long-term stabilization targets of greenhouse gases concentrations, various carbon emission rights allocation schemes have been proposed. To compare and evaluate them, the most essential is the equity-efficiency tradeoff. This paper measures the equity and the efficiency in the global rather than the narrower national perspective. Specifically, the equity of the first allocation is quantified by the carbon Gini coefficient defined by per capita cumulative emission, and the economic efficiency to accomplish obligations is described with the discounted global abatement costs. Under 20 key allocation schemes, the numerical comparison on the equity-efficiency tradeoff side is carried out through the Equitable Access to Sustainable Development model. Our studies indicate that the equity and the efficiency of future emission space allocation approximately show a three-stage relationship. - Highlights: • The equity-efficiency tradeoff among 20 key allocation schemes is carried out. • Both the equity and the efficiency are measured in the global perspective. • The Equitable Access to Sustainable Development model is adopted as the study tool. • A practical trade framework is indispensable to efficiently address climate change. • The equity and the efficiency generally show a three-stage tradeoff relationship

  3. EPPRD: An Efficient Privacy-Preserving Power Requirement and Distribution Aggregation Scheme for a Smart Grid.

    Zhang, Lei; Zhang, Jing

    2017-08-07

    A Smart Grid (SG) facilitates bidirectional demand-response communication between individual users and power providers with high computation and communication performance but also brings about the risk of leaking users' private information. Therefore, improving the individual power requirement and distribution efficiency to ensure communication reliability while preserving user privacy is a new challenge for SG. Based on this issue, we propose an efficient and privacy-preserving power requirement and distribution aggregation scheme (EPPRD) based on a hierarchical communication architecture. In the proposed scheme, an efficient encryption and authentication mechanism is proposed for better fit to each individual demand-response situation. Through extensive analysis and experiment, we demonstrate how the EPPRD resists various security threats and preserves user privacy while satisfying the individual requirement in a semi-honest model; it involves less communication overhead and computation time than the existing competing schemes.

  4. Tracking the maximum efficiency point for the FC system based on extremum seeking scheme to control the air flow

    Bizon, Nicu

    2014-01-01

    Highlights: • The Maximum Efficiency Point (MEP) is tracked based on air flow rate. • The proposed Extremum Seeking (ES) control assures high performances. • About 10 kW/s search speed and 99.99% stationary accuracy can be obtained. • The energy efficiency increases with 3–12%, according to the power losses. • The control strategy is robust based on self-optimizing ES scheme proposed. - Abstract: An advanced control of the air compressor for the Proton Exchange Membrane Fuel Cell (PEMFC) system is proposed in this paper based on Extremum Seeking (ES) control scheme. The FC net power is mainly depended on the air and hydrogen flow rate and pressure, and heat and water management. This paper proposes to compute the optimal value for the air flow rate based on the advanced ES control scheme in order to maximize the FC net power. In this way, the Maximum Efficiency Point (MEP) will be tracked in real time, with about 10 kW/s search speed and a stationary accuracy of 0.99. Thus, energy efficiency will be close to the maximum value that can be obtained for a given PEMFC stack and compressor group under dynamic load. It is shown that the MEP tracking allows an increasing of the FC net power with 3–12%, depending on the percentage of the FC power supplied to the compressor and the level of the load power. Simulations shows that the performances mentioned above are effective

  5. An Energy-Efficient Scheme for Multirelay Cooperative Networks with Energy Harvesting

    Dingcheng Yang

    2016-01-01

    Full Text Available This study investigates an energy-efficient scheme in multirelay cooperative networks with energy harvesting where multiple sessions need to communicate with each other via the relay node. A two-step optimal method is proposed which maximizes the system energy efficiency, while taking into account the receiver circuit energy consumption. Firstly, the optimal power allocation for relay nodes is determined to maximize the system throughput; this is based on directional water-filling algorithm. Secondly, using quantum particle swarm optimization (QPSO, a joint relay node selection and session grouping optimization is proposed. With this algorithm, sessions can be classified into multiple groups that are assisted by the specific relay node with the maximum energy efficiency. This approach leads to a better global optimization in searching ability and efficiency. Simulation results show that the proposed scheme can improve the energy efficiency effectively compared with direct transmission and opportunistic relay-selected cooperative transmission.

  6. Containment Domains: A Scalable, Efficient and Flexible Resilience Scheme for Exascale Systems

    Jinsuk Chung

    2013-01-01

    Full Text Available This paper describes and evaluates a scalable and efficient resilience scheme based on the concept of containment domains. Containment domains are a programming construct that enable applications to express resilience needs and to interact with the system to tune and specialize error detection, state preservation and restoration, and recovery schemes. Containment domains have weak transactional semantics and are nested to take advantage of the machine and application hierarchies and to enable hierarchical state preservation, restoration and recovery. We evaluate the scalability and efficiency of containment domains using generalized trace-driven simulation and analytical analysis and show that containment domains are superior to both checkpoint restart and redundant execution approaches.

  7. An Efficient Offloading Scheme For MEC System Considering Delay and Energy Consumption

    Sun, Yanhua; Hao, Zhe; Zhang, Yanhua

    2018-01-01

    With the increasing numbers of mobile devices, mobile edge computing (MEC) which provides cloud computing capabilities proximate to mobile devices in 5G networks has been envisioned as a promising paradigm to enhance users experience. In this paper, we investigate a joint consideration of delay and energy consumption offloading scheme (JCDE) for MEC system in 5G heterogeneous networks. An optimization is formulated to minimize the delay as well as energy consumption of the offloading system, which the delay and energy consumption of transmitting and calculating tasks are taken into account. We adopt an iterative greedy algorithm to solve the optimization problem. Furthermore, simulations were carried out to validate the utility and effectiveness of our proposed scheme. The effect of parameter variations on the system is analysed as well. Numerical results demonstrate delay and energy efficiency promotion of our proposed scheme compared with another paper’s scheme.

  8. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  9. A Comparison of Global Indexing Schemes to Facilitate Earth Science Data Management

    Griessbaum, N.; Frew, J.; Rilee, M. L.; Kuo, K. S.

    2017-12-01

    Recent advances in database technology have led to systems optimized for managing petabyte-scale multidimensional arrays. These array databases are a good fit for subsets of the Earth's surface that can be projected into a rectangular coordinate system with acceptable geometric fidelity. However, for global analyses, array databases must address the same distortions and discontinuities that apply to map projections in general. The array database SciDB supports enormous databases spread across thousands of computing nodes. Additionally, the following SciDB characteristics are particularly germane to the coordinate system problem: SciDB efficiently stores and manipulates sparse (i.e. mostly empty) arrays. SciDB arrays have 64-bit indexes. SciDB supports user-defined data types, functions, and operators. We have implemented two geospatial indexing schemes in SciDB. The simplest uses two array dimensions to represent longitude and latitude. For representation as 64-bit integers, the coordinates are multiplied by a scale factor large enough to yield an appropriate Earth surface resolution (e.g., a scale factor of 100,000 yields a resolution of approximately 1m at the equator). Aside from the longitudinal discontinuity, the principal disadvantage of this scheme is its fixed scale factor. The second scheme uses a single array dimension to represent the bit-codes for locations in a hierarchical triangular mesh (HTM) coordinate system. A HTM maps the Earth's surface onto an octahedron, and then recursively subdivides each triangular face to the desired resolution. Earth surface locations are represented as the concatenation of an octahedron face code and a quadtree code within the face. Unlike our integerized lat-lon scheme, the HTM allow for objects of different size (e.g., pixels with differing resolutions) to be represented in the same indexing scheme. We present an evaluation of the relative utility of these two schemes for managing and analyzing MODIS swath data.

  10. Counter-Based Broadcast Scheme Considering Reachability, Network Density, and Energy Efficiency for Wireless Sensor Networks.

    Jung, Ji-Young; Seo, Dong-Yoon; Lee, Jung-Ryun

    2018-01-04

    A wireless sensor network (WSN) is emerging as an innovative method for gathering information that will significantly improve the reliability and efficiency of infrastructure systems. Broadcast is a common method to disseminate information in WSNs. A variety of counter-based broadcast schemes have been proposed to mitigate the broadcast-storm problems, using the count threshold value and a random access delay. However, because of the limited propagation of the broadcast-message, there exists a trade-off in a sense that redundant retransmissions of the broadcast-message become low and energy efficiency of a node is enhanced, but reachability become low. Therefore, it is necessary to study an efficient counter-based broadcast scheme that can dynamically adjust the random access delay and count threshold value to ensure high reachability, low redundant of broadcast-messages, and low energy consumption of nodes. Thus, in this paper, we first measure the additional coverage provided by a node that receives the same broadcast-message from two neighbor nodes, in order to achieve high reachability with low redundant retransmissions of broadcast-messages. Second, we propose a new counter-based broadcast scheme considering the size of the additional coverage area, distance between the node and the broadcasting node, remaining battery of the node, and variations of the node density. Finally, we evaluate performance of the proposed scheme compared with the existing counter-based broadcast schemes. Simulation results show that the proposed scheme outperforms the existing schemes in terms of saved rebroadcasts, reachability, and total energy consumption.

  11. An Energy-Efficient Game-Theory-Based Spectrum Decision Scheme for Cognitive Radio Sensor Networks.

    Salim, Shelly; Moh, Sangman

    2016-06-30

    A cognitive radio sensor network (CRSN) is a wireless sensor network in which sensor nodes are equipped with cognitive radio. In this paper, we propose an energy-efficient game-theory-based spectrum decision (EGSD) scheme for CRSNs to prolong the network lifetime. Note that energy efficiency is the most important design consideration in CRSNs because it determines the network lifetime. The central part of the EGSD scheme consists of two spectrum selection algorithms: random selection and game-theory-based selection. The EGSD scheme also includes a clustering algorithm, spectrum characterization with a Markov chain, and cluster member coordination. Our performance study shows that EGSD outperforms the existing popular framework in terms of network lifetime and coordination overhead.

  12. An Energy-Efficient Game-Theory-Based Spectrum Decision Scheme for Cognitive Radio Sensor Networks

    Shelly Salim

    2016-06-01

    Full Text Available A cognitive radio sensor network (CRSN is a wireless sensor network in which sensor nodes are equipped with cognitive radio. In this paper, we propose an energy-efficient game-theory-based spectrum decision (EGSD scheme for CRSNs to prolong the network lifetime. Note that energy efficiency is the most important design consideration in CRSNs because it determines the network lifetime. The central part of the EGSD scheme consists of two spectrum selection algorithms: random selection and game-theory-based selection. The EGSD scheme also includes a clustering algorithm, spectrum characterization with a Markov chain, and cluster member coordination. Our performance study shows that EGSD outperforms the existing popular framework in terms of network lifetime and coordination overhead.

  13. Regulation control and energy management scheme for wireless power transfer

    Miller, John M.

    2015-12-29

    Power transfer rate at a charging facility can be maximized by employing a feedback scheme. The state of charge (SOC) and temperature of the regenerative energy storage system (RESS) pack of a vehicle is monitored to determine the load due to the RESS pack. An optimal frequency that cancels the imaginary component of the input impedance for the output signal from a grid converter is calculated from the load of the RESS pack, and a frequency offset f* is made to the nominal frequency f.sub.0 of the grid converter output based on the resonance frequency of a magnetically coupled circuit. The optimal frequency can maximize the efficiency of the power transfer. Further, an optimal grid converter duty ratio d* can be derived from the charge rate of the RESS pack. The grid converter duty ratio d* regulates wireless power transfer (WPT) power level.

  14. Smart LED allocation scheme for efficient multiuser visible light communication networks.

    Sewaiwar, Atul; Tiwari, Samrat Vikramaditya; Chung, Yeon Ho

    2015-05-18

    In a multiuser bidirectional visible light communication (VLC), a large number of LEDs or an LED array needs to be allocated in an efficient manner to ensure sustainable data rate and link quality. Moreover, in order to support an increasing or decreasing number of users in the network, the LED allocation is required to be performed dynamically. In this paper, a novel smart LED allocation scheme for efficient multiuser VLC networks is presented. The proposed scheme allocates RGB LEDs to multiple users in a dynamic and efficient fashion, while satisfying illumination requirements in an indoor environment. The smart LED array comprised of RGB LEDs is divided into sectors according to the location of the users. The allocated sectors then provide optical power concentration toward the users for efficient and reliable data transmission. An algorithm for the dynamic allocation of the LEDs is also presented. To verify its effective resource allocation feature of the proposed scheme, simulations were performed. It is found that the proposed smart LED allocation scheme provides the effect of optical beamforming toward individual users, thereby increasing the collective power concentration of the optical signals on the desirable users and resulting in significantly increased data rate, while ensuring sufficient illumination in a multiuser VLC environment.

  15. Energy-Efficient Optimization for HARQ Schemes over Time-Correlated Fading Channels

    Shi, Zheng

    2018-03-19

    Energy efficiency of three common hybrid automatic repeat request (HARQ) schemes including Type I HARQ, HARQ with chase combining (HARQ-CC) and HARQ with incremental redundancy (HARQ-IR), is analyzed and joint power allocation and rate selection to maximize the energy efficiency is investigated in this paper. Unlike prior literature, time-correlated fading channels is considered and two widely concerned quality of service (QoS) constraints, i.e., outage and goodput constraints, are also considered in the optimization, which further differentiates this work from prior ones. Using a unified expression of asymptotic outage probabilities, optimal transmission powers and optimal rate are derived in closed-forms to maximize the energy efficiency while satisfying the QoS constraints. These closed-form solutions then enable a thorough analysis of the maximal energy efficiencies of various HARQ schemes. It is revealed that with low outage constraint, the maximal energy efficiency achieved by Type I HARQ is $\\\\frac{1}{4\\\\ln2}$ bits/J, while HARQ-CC and HARQ-IR can achieve the same maximal energy efficiency as $\\\\frac{\\\\kappa_\\\\infty}{4\\\\ln2}$ bits/J where $\\\\kappa_\\\\infty = 1.6617$. Moreover, time correlation in the fading channels has a negative impact on the energy efficiency, while large maximal allowable number of transmissions is favorable for the improvement of energy efficiency. The effectiveness of the energy-efficient optimization is verified by extensive simulations and the results also show that HARQ-CC can achieve the best tradeoff between energy efficiency and spectral efficiency among the three HARQ schemes.

  16. An Optimization Scheme for Water Pump Control in Smart Fish Farm with Efficient Energy Consumption

    Israr Ullah

    2018-06-01

    Full Text Available Healthy fish production requires intensive care and ensuring stable and healthy production environment inside the farm tank is a challenging task. An Internet of Things (IoT based automated system is highly desirable that can continuously monitor the fish tanks with optimal resources utilization. Significant cost reduction can be achieved if farm equipment and water pumps are operated only when required using optimization schemes. In this paper, we present a general system design for smart fish farms. We have developed an optimization scheme for water pump control to maintain desired water level in fish tank with efficient energy consumption through appropriate selection of pumping flow rate and tank filling level. Proposed optimization scheme attempts to achieve a trade-off between pumping duration and flow rate through selection of optimized water level. Kalman filter algorithm is applied to remove error in sensor readings. We observed through simulation results that optimization scheme achieve significant reduction in energy consumption as compared to the two alternate schemes, i.e., pumping with maximum and minimum flow rates. Proposed system can help in collecting the data about the farm for long-term analysis and better decision making in future for efficient resource utilization and overall profit maximization.

  17. Efficient decoupling schemes with bounded controls based on Eulerian orthogonal arrays

    Wocjan, Pawel

    2006-01-01

    The task of decoupling, i.e., removing unwanted internal couplings of a quantum system and its couplings to an environment, plays an important role in quantum control theory. There are many efficient decoupling schemes based on combinatorial concepts such as orthogonal arrays, difference schemes, and Hadamard matrices. So far these combinatorial decoupling schemes have relied on the ability to effect sequences of instantaneous, arbitrarily strong control Hamiltonians (bang-bang controls). To overcome the shortcomings of bang-bang control, Viola and Knill proposed a method called 'Eulerian decoupling' that allows the use of bounded-strength controls for decoupling. However, their method was not directly designed to take advantage of the local structure of internal couplings and couplings to an environment that typically occur in multipartite quantum systems. In this paper we define a combinatorial structure called Eulerian orthogonal array. It merges the desirable properties of orthogonal arrays and Eulerian cycles in Cayley graphs (that are the basis of Eulerian decoupling). We show that this structure gives rise to decoupling schemes with bounded-strength control Hamiltonians that can be used to remove both internal couplings and couplings to an environment of a multipartite quantum system. Furthermore, we show how to construct Eulerian orthogonal arrays having good parameters in order to obtain efficient decoupling schemes

  18. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  19. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  20. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Yanrong Lu

    2016-06-01

    Full Text Available WSNs (Wireless sensor networks are nowadays viewed as a vital portion of the IoTs (Internet of Things. Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  1. A novel and efficient user access control scheme for wireless body area sensor networks

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  2. Optimal Tradable Credits Scheme and Congestion Pricing with the Efficiency Analysis to Congestion

    Ge Gao

    2015-01-01

    Full Text Available We allow for three traffic scenarios: the tradable credits scheme, congestion pricing, and no traffic measure. The utility functions of different modes (car, bus, and bicycle are developed by considering the income’s impact on travelers’ behaviors. Their purpose is to analyze the demand distribution of different modes. A social optimization model is built aiming at maximizing the social welfare. The optimal tradable credits scheme (distribution of credits, credits charging, and the credit price, congestion pricing fees, bus frequency, and bus fare are obtained by solving the model. Mode choice behavior under the tradable credits scheme is also studied. Numerical examples are presented to demonstrate the model’s availability and explore the effects of the three schemes on traffic system’s performance. Results show congestion pricing would earn more social welfare than the other traffic measures. However, tradable credits scheme will give travelers more consumer surplus than congestion pricing. Travelers’ consumer surplus with congestion pricing is the minimum, which injures the travelers’ benefits. Tradable credits scheme is considered the best scenario by comparing the three scenarios’ efficiency.

  3. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.

    Yu, Si; Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.

  4. Development of an estuarine assessment scheme for the management of a highly urbanised catchment/estuary system, Sydney estuary, Australia.

    Birch, G F; Gunns, T J; Chapman, D; Harrison, D

    2016-05-01

    As coastal populations increase, considerable pressures are exerted on estuarine environments. Recently, there has been a trend towards the development and use of estuarine assessment schemes as a decision support tool in the management of these environments. These schemes offer a method by which complex environmental data is converted into a readily understandable and communicable format for informed decision making and effective distribution of limited management resources. Reliability and effectiveness of these schemes are often limited due to a complex assessment framework, poor data management and use of ineffective environmental indicators. The current scheme aims to improve reliability in the reporting of estuarine condition by including a concise assessment framework, employing high-value indicators and, in a unique approach, employing fuzzy logic in indicator evaluation. Using Sydney estuary as a case study, each of the 15 sub-catchment/sub-estuary systems were assessed using the current scheme. Results identified that poor sediment quality was a significant issue in Blackwattle/Rozelle Bay, Iron Cove and Hen and Chicken Bay while poor water quality was of particular concern in Duck River, Homebush Bay and the Parramatta River. Overall results of the assessment scheme were used to prioritise the management of each sub-catchment/sub-estuary assessed with Blackwattle/Rozelle Bay, Homebush Bay, Iron Cove and Duck River considered to be in need of a high priority management response. A report card format, using letter grades, was employed to convey the results of the assessment in a readily understood manner to estuarine managers and members of the public. Letter grades also provide benchmarking and performance monitoring ability, allowing estuarine managers to set improvement targets and assesses the effectiveness of management strategies. The current assessment scheme provides an effective, integrated and consistent assessment of estuarine health and

  5. EVALUATION OF THERMAL EFFICIENCY OF THE TECHNOLOGICAL SCHEME OF APPLE CHIPS AND DRIED FRUITS PRODUCTION

    G. V. Kalashnikov

    2014-01-01

    Full Text Available The estimation of thermodynamic perfection of separate technological processes is executed at heat-moisture of handling of fruit and a line of manufacture of fruit apple chips and dried fruits. The technological scheme of a line of processing of fruits and manufactures of fruit chips on the basis of convection and the microwave-dryings suggested resource-saving. The technique is made and results of calculation of thermal expenses for various schemes of manufacture of apple chips are resulted. For the offered scheme material, thermal and power streams on the basis of balance parities of technological processes are certain. The comparative thermal production efficiency of apple chips for a base foreign variant and the offered technological scheme with the closed cycle of use of the heat-carrier and the combined convection-microwave-drying is shown. In this paper we define the thermal and energy flows for the processes of convective drying, pre-microwave drying, hydrothermal treatment and final microwave drying plant material, which are one of the main stages of the production of all kinds of fruit and vegetable concentrates, including fruit apple chips. Resource-saving ways moisture-heat of handling (hydration, blanching, drying, etc. produce raw materials in the production of food concentrates suggested a reduced water flow with a high degree of use of its potential power and microwave sources. To assess the thermal efficiency of the various processes and production schemes used as indicators of thermal efficiency and proposed value of specific heat (kJ / kg given mass productivity per unit of feedstock and translational moisture. The values of the mass fraction of the heat of material flows for the base and the proposed resource-saving production scheme fruit chips, for example, apple, based on a combination of convection-microwave drying each control surface.

  6. LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks

    Song Li

    2017-01-01

    Full Text Available From smart watch to remote healthcare system, wireless body sensor networks (WBSNs play an important role in modern healthcare system. However, the weak capacity of devices has limited WBSNs development. Considering the huge processing and storage capacity of the cloud, it can be merged with WBSNs to make up for the deficiencies of weak capacity. Based on this consideration, the concept of cloud-assisted WBSNs has been proposed recently. In contrast to generic data, the data in cloud-assisted WBSNs will be used for providing medical diagnosis, so the integrity of data is very important because any modification will result in severe consequences such as misdiagnosis. The public auditing scheme could provide an efficient solution to check the data integrity remotely without downloading them. However, the traditional public auditing scheme for cloud cannot be used directly due to the high data density and weak processing capacity in WBSNs. So, in this paper, we proposed a lightweight and efficient public auditing scheme, LEPA, for cloud-assisted WBSNs. Compared with similar schemes, the WBSNs’ client only needs to do one symmetrical encryption with low computational cost in LEPA. Security proof shows that LEPA can resist two types of adversaries in random oracle model. The efficiency evaluation also shows that LEPA outperforms previous proposals.

  7. Mean-variance portfolio selection and efficient frontier for defined contribution pension schemes

    Hoejgaard, B.; Vigna, E.

    2007-01-01

    We solve a mean-variance portfolio selection problem in the accumulation phase of a defined contribution pension scheme. The efficient frontier, which is found for the 2 asset case as well as the n + 1 asset case, gives the member the possibility to decide his own risk/reward profile. The mean-variance approach is then compared to other investment strategies adopted in DC pension schemes, namely the target-based approach and the lifestyle strategy. The comparison is done both in a theoretical...

  8. BANDWIDTH AND EFFICIENT ENCODING SCHEME COMBINING TCM-UGM TO STBC

    ABDELMOUNAIM MOULAY LAKHDAR; MOHAMMED BELADGHAM; ABDESSELAM BASSOU,; MOHAMED BENAISSA

    2011-01-01

    In this paper, a bandwidth efficient encoding scheme is proposed. It combines the modified version of trellis coded-modulation (called trellis coded-modulation with Ungerboeck-Gray mapping, TCM-UGM) to space-time block code (STBC). The performance of this encoding scheme is investigated over memoryless Rayleigh fading (MRF) channel for throughput 2 bits/s/Hz. The simulation result, using 2/3 rate 16-state TCM-UGM encoder, two transmit antennas and two receive antennas, shows clearly that the ...

  9. Efficient scheme for three-photon Greenberger–Horne–Zeilinger state generation

    Ding, Dong [College of Physics Science and Information Engineering, Hebei Normal University, Shijiazhuang, 050024 (China); Department of Basic Curriculum, North China Institute of Science and Technology, Beijing, 101601 (China); Yan, Feng-Li, E-mail: flyan@hebtu.edu.cn [College of Physics Science and Information Engineering, Hebei Normal University, Shijiazhuang, 050024 (China)

    2013-06-17

    We propose an efficient scheme for the generation of three-photon Greenberger–Horne–Zeilinger (GHZ) state with linear optics, nonlinear optics and postselection. Several devices are designed and a two-mode quantum nondemolition detection is introduced to obtain the desired state. It is worth noting that the states which have entanglement in both polarization and spatial degrees of freedom are created in one of the designed setups. The method described in the present scheme can create a large number of three-photon GHZ states in principle. We also discuss an approach to generate the desired GHZ state in the presence of channel noise.

  10. Efficient scheme for three-photon Greenberger–Horne–Zeilinger state generation

    Ding, Dong; Yan, Feng-Li

    2013-01-01

    We propose an efficient scheme for the generation of three-photon Greenberger–Horne–Zeilinger (GHZ) state with linear optics, nonlinear optics and postselection. Several devices are designed and a two-mode quantum nondemolition detection is introduced to obtain the desired state. It is worth noting that the states which have entanglement in both polarization and spatial degrees of freedom are created in one of the designed setups. The method described in the present scheme can create a large number of three-photon GHZ states in principle. We also discuss an approach to generate the desired GHZ state in the presence of channel noise.

  11. Highly efficient light management for perovskite solar cells.

    Wang, Dong-Lin; Cui, Hui-Juan; Hou, Guo-Jiao; Zhu, Zhen-Gang; Yan, Qing-Bo; Su, Gang

    2016-01-06

    Organic-inorganic halide perovskite solar cells have enormous potential to impact the existing photovoltaic industry. As realizing a higher conversion efficiency of the solar cell is still the most crucial task, a great number of schemes were proposed to minimize the carrier loss by optimizing the electrical properties of the perovskite solar cells. Here, we focus on another significant aspect that is to minimize the light loss by optimizing the light management to gain a high efficiency for perovskite solar cells. In our scheme, the slotted and inverted prism structured SiO2 layers are adopted to trap more light into the solar cells, and a better transparent conducting oxide layer is employed to reduce the parasitic absorption. For such an implementation, the efficiency and the serviceable angle of the perovskite solar cell can be promoted impressively. This proposal would shed new light on developing the high-performance perovskite solar cells.

  12. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

    Danyang Qin

    2016-01-01

    Full Text Available Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.

  13. Anomaly Detection for Internet of Vehicles: A Trust Management Scheme with Affinity Propagation

    Shu Yang

    2016-01-01

    Full Text Available Anomaly detection is critical for intelligent vehicle (IV collaboration. Forming clusters/platoons, IVs can work together to accomplish complex jobs that they are unable to perform individually. To improve security and efficiency of Internet of Vehicles, IVs’ anomaly detection has been extensively studied and a number of trust-based approaches have been proposed. However, most of these proposals either pay little attention to leader-based detection algorithm or ignore the utility of networked Roadside-Units (RSUs. In this paper, we introduce a trust-based anomaly detection scheme for IVs, where some malicious or incapable vehicles are existing on roads. The proposed scheme works by allowing IVs to detect abnormal vehicles, communicate with each other, and finally converge to some trustworthy cluster heads (CHs. Periodically, the CHs take responsibility for intracluster trust management. Moreover, the scheme is enhanced with a distributed supervising mechanism and a central reputation arbitrator to assure robustness and fairness in detecting process. The simulation results show that our scheme can achieve a low detection failure rate below 1%, demonstrating its ability to detect and filter the abnormal vehicles.

  14. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  15. Status Review of Renewable and Energy Efficiency Support Schemes in Europe

    NONE

    2012-09-15

    This document forms the latest update to the regular CEER Status Review of Renewable Energy and Energy Efficiency Support Schemes in Europe and builds on the previous CEER report C10-SDE-19-04a. The purpose of Status Review publications is to collect comparable data on RES support in Europe in order to provide policy-makers, regulators and industry participants with information on support schemes for electricity from renewable energy sources, by technology and type of instrument (e.g. Feed-in tariffs and Green Certificates). To collect this data, a questionnaire was circulated to CEER members in July 2012, to explore the renewable electricity support schemes currently in place in Member States across Europe.

  16. Studying and comparing spectrum efficiency and error probability in GMSK and DBPSK modulation schemes

    Juan Mario Torres Nova

    2008-09-01

    Full Text Available Gaussian minimum shift keying (GMSK and differential binary phase shift keying (DBPSK are two digital modulation schemes which are -frequently used in radio communication systems; however, there is interdependence in the use of its benefits (spectral efficiency, low bit error rate, low inter symbol interference, etc. Optimising one parameter creates problems for another; for example, the GMSK scheme succeeds in reducing bandwidth when introducing a Gaussian filter into an MSK (minimum shift ke-ying modulator in exchange for increasing inter-symbol interference in the system. The DBPSK scheme leads to lower error pro-bability, occupying more bandwidth; it likewise facilitates synchronous data transmission due to the receiver’s bit delay when re-covering a signal.

  17. Delivering energy efficiency and carbon reduction schemes in England: Lessons from Green Deal Pioneer Places

    Marchand, Robert D.; Koh, S.C. Lenny; Morris, Jonathan C.

    2015-01-01

    Against a background of growing international and national carbon reduction legislation, the UK government introduced the “Green Deal” to deliver a significant increase in housing energy efficiency and reduction in carbon emissions. This paper reflects on one English local authority's experience delivering a programme intended to foster local interest in the Green Deal. Drawing on social surveys and pre and post Green Deal intervention interviews with five demonstrator homes (households that applied to receive a Green Deal package fully funded by the scheme, providing a test bed for the Green Deal recruitment and installation process), this paper shows that awareness and understanding of the Green Deal scheme is low. There is opposition to the cost of finance offered but a strong interest in improving household warmth and for funding improvements through payments added to the electricity bill. Demonstrator home residents perceived Green Deals had improved the warmth and quality of their home, but saving money was the primary motivator for their involvement, not increasing warmth. Whilst Green Deal has not delivered the level of success that was hoped, much can be learned from the scheme to improve future energy efficiency schemes that will be necessary to deliver emission reduction commitments. -- Highlights: •Resident awareness and understanding of the Green Deal is low. •Green Deal assessment costs and loan interest rates are biggest barriers to uptake. •Funding energy improvements via a charge on electricity bill welcomed by residents. •Saving money rather than increasing warmth main motivator for scheme involvement. •Insights from this work should be used to inform future emission reduction schemes

  18. Designing Pay-As-You-Throw schemes in municipal waste management services: A holistic approach

    Elia, Valerio; Gnoni, Maria Grazia; Tornese, Fabiana

    2015-01-01

    Highlights: • Pay-As-You-Throw (PAYT) schemes are becoming widespread in several countries. • Economic, organizational and technological issues have to be integrated in an efficient PAYT model design. • Efficiency refers to a PAYT system which support high citizen participation rates as well as economic sustainability. • Different steps and constraints have to be evaluated from collection services to type technologies. • An holistic approach is discussed to support PAYT systems diffusion. - Abstract: Pay-As-You-Throw (PAYT) strategies are becoming widely applied in solid waste management systems; the main purpose is to support a more sustainable – from economic, environmental and social points of view – management of waste flows. Adopting PAYT charging models increases the complexity level of the waste management service as new organizational issues have to be evaluated compared to flat charging models. In addition, innovative technological solutions could also be adopted to increase the overall efficiency of the service. Unit pricing, user identification and waste measurement represent the three most important processes to be defined in a PAYT system. The paper proposes a holistic framework to support an effective design and management process. The framework defines most critical processes and effective organizational and technological solutions for supporting waste managers as well as researchers

  19. Designing Pay-As-You-Throw schemes in municipal waste management services: A holistic approach

    Elia, Valerio; Gnoni, Maria Grazia, E-mail: mariagrazia.gnoni@unisalento.it; Tornese, Fabiana

    2015-10-15

    Highlights: • Pay-As-You-Throw (PAYT) schemes are becoming widespread in several countries. • Economic, organizational and technological issues have to be integrated in an efficient PAYT model design. • Efficiency refers to a PAYT system which support high citizen participation rates as well as economic sustainability. • Different steps and constraints have to be evaluated from collection services to type technologies. • An holistic approach is discussed to support PAYT systems diffusion. - Abstract: Pay-As-You-Throw (PAYT) strategies are becoming widely applied in solid waste management systems; the main purpose is to support a more sustainable – from economic, environmental and social points of view – management of waste flows. Adopting PAYT charging models increases the complexity level of the waste management service as new organizational issues have to be evaluated compared to flat charging models. In addition, innovative technological solutions could also be adopted to increase the overall efficiency of the service. Unit pricing, user identification and waste measurement represent the three most important processes to be defined in a PAYT system. The paper proposes a holistic framework to support an effective design and management process. The framework defines most critical processes and effective organizational and technological solutions for supporting waste managers as well as researchers.

  20. Study on the development of an efficient and economical small scale management scheme for low and intermediate level radioactive wastes and its impact on the environment. Part of a coordinated programme

    Bartolome, Z.

    1976-05-01

    Efforts were made towards the establishment of a pilot-scale management system for the low and intermediate-level radioactive wastes of the Atomic Research Center. Practices in handling radioactive wastes are discussed and the assessment of their capabilities to meet the projections on the waste production is presented. The future waste management requirements of the Center was evaluated and comparative studies on the Lime-Soda and Phosphate Processes were conducted on simulated and raw liquid wastes with initial activity ranging from 10 -4 uCi/ml to 10 -2 uCi/ml, to establish the ideal parameters for best attaining maximum removal of radioactivity in liquids. The effectiveness of treatment was evaluated in terms of the decontamination factor, DF, obtained

  1. Bridging the industrial energy efficiency gap – Assessing the evidence from the Italian white certificate scheme

    Stede, Jan

    2017-01-01

    The Italian white certificate scheme is the main national policy instrument to incentivise energy efficiency of the industrial sector, with savings from white certificates amounting to 2% of Italy's 2012 primary energy consumption. The mechanism sets binding energy-saving targets on electricity and gas distributors with at least 50,000 clients and includes a voluntary opt-in model for participation from other parties. This paper investigates and assesses the elements of the scheme that help overcome several barriers to deliver industrial energy efficiency. Results from a survey conducted among leading experts indicate that the Italian system provides a strong financial incentive to energy efficiency investments, covering a significant share of investment costs and thus reducing payback time. Moreover, the scheme fosters the development of energy service companies (ESCOs), which are key to developing, installing and arranging finance for projects on the ground. In conjunction with other policies, the mechanism also raises awareness of energy efficiency investment opportunities, thus helping overcome the market failure of insufficient information. Core challenges remain, including tackling regulatory uncertainty and improving access to finance. - Highlights: • Due to a strong monetary incentive, energy savings are mainly achieved in industry. • White certificates cover around 25 per cent of investment costs in Italian industry. • Active energy services sector with >100 energy service companies built from scratch. • Tackling regulatory uncertainty is the key challenge.

  2. Adaptive multi-objective Optimization scheme for cognitive radio resource management

    Alqerm, Ismail

    2014-12-01

    Cognitive Radio is an intelligent Software Defined Radio that is capable to alter its transmission parameters according to predefined objectives and wireless environment conditions. Cognitive engine is the actuator that performs radio parameters configuration by exploiting optimization and machine learning techniques. In this paper, we propose an Adaptive Multi-objective Optimization Scheme (AMOS) for cognitive radio resource management to improve spectrum operation and network performance. The optimization relies on adapting radio transmission parameters to environment conditions using constrained optimization modeling called fitness functions in an iterative manner. These functions include minimizing power consumption, Bit Error Rate, delay and interference. On the other hand, maximizing throughput and spectral efficiency. Cross-layer optimization is exploited to access environmental parameters from all TCP/IP stack layers. AMOS uses adaptive Genetic Algorithm in terms of its parameters and objective weights as the vehicle of optimization. The proposed scheme has demonstrated quick response and efficiency in three different scenarios compared to other schemes. In addition, it shows its capability to optimize the performance of TCP/IP layers as whole not only the physical layer.

  3. Enhanced efficiency of plasma acceleration in the laser-induced cavity pressure acceleration scheme

    Badziak, J; Rosiński, M; Jabłoński, S; Pisarczyk, T; Chodukowski, T; Parys, P; Rączka, P; Krousky, E; Ullschmied, J; Liska, R; Kucharik, M

    2015-01-01

    Among various methods for the acceleration of dense plasmas the mechanism called laser-induced cavity pressure acceleration (LICPA) is capable of achieving the highest energetic efficiency. In the LICPA scheme, a projectile placed in a cavity is accelerated along a guiding channel by the laser-induced thermal plasma pressure or by the radiation pressure of an intense laser radiation trapped in the cavity. This arrangement leads to a significant enhancement of the hydrodynamic or electromagnetic forces driving the projectile, relative to standard laser acceleration schemes. The aim of this paper is to review recent experimental and numerical works on LICPA with the emphasis on the acceleration of heavy plasma macroparticles and dense ion beams. The main experimental part concerns the research carried out at the kilojoule sub-nanosecond PALS laser facility in Prague. Our measurements performed at this facility, supported by advanced two-dimensional hydrodynamic simulations, have demonstrated that the LICPA accelerator working in the long-pulse hydrodynamic regime can be a highly efficient tool for the acceleration of heavy plasma macroparticles to hyper-velocities and the generation of ultra-high-pressure (>100 Mbar) shocks through the collision of the macroparticle with a solid target. The energetic efficiency of the macroparticle acceleration and the shock generation has been found to be significantly higher than that for other laser-based methods used so far. Using particle-in-cell simulations it is shown that the LICPA scheme is highly efficient also in the short-pulse high-intensity regime and, in particular, may be used for production of intense ion beams of multi-MeV to GeV ion energies with the energetic efficiency of tens of per cent, much higher than for conventional laser acceleration schemes. (paper)

  4. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    Ji-Jian Chin

    2014-01-01

    Full Text Available Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user’s secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  5. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  6. Efficient Closed-Loop Schemes for MIMO-OFDM-Based WLANs

    Jiang Yi

    2006-01-01

    Full Text Available The single-input single-output (SISO orthogonal frequency-division multiplexing (OFDM systems for wireless local area networks (WLAN defined by the IEEE 802.11a standard can support data rates up to 54 Mbps. In this paper, we consider deploying two transmit and two receive antennas to increase the data rate up to 108 Mbps. Applying our recent multiple-input multiple-output (MIMO transceiver designs, that is, the geometric mean decomposition (GMD and the uniform channel decomposition (UCD schemes, we propose simple and efficient closed-loop MIMO-OFDM designs for much improved performance, compared to the standard singular value decomposition (SVD based schemes as well as the open-loop V-BLAST (vertical Bell Labs layered space-time based counterparts. In the explicit feedback mode, precoder feedback is needed for the proposed schemes. We show that the overhead of feedback can be made very moderate by using a vector quantization method. In the time-division duplex (TDD mode where the channel reciprocity is exploited, our schemes turn out to be robust against the mismatch between the uplink and downlink channels. The advantages of our schemes are demonstrated via extensive numerical examples.

  7. A performance improvement and cost-efficient ACO-OFDM scheme for visible light communications

    Zhang, Tiantian; Zhou, Ji; Zhang, Zhenshan; Qiao, Yaojun; Su, Fei; Yang, Aiying

    2017-11-01

    In this paper, we propose a performance improvement and cost-efficient discrete Hartley transform (DHT)-based asymmetrically clipped optical orthogonal frequency division multiplexing (ACO-OFDM) scheme for visible light communications (VLC). The simple one-dimensional modulation constellation and simplified encoding structure reduce the complexity of system considerably. The DHT-spreading technique is employed to reduce peak-to-average power ratio (PAPR) of ACO-OFDM signals. Moreover, the intra-symbol frequency-domain averaging (ISFA) technique is used to increase the accuracy of channel estimation by removing the effect of ambient noise in the VLC channel effectively. To verify the feasibility of the proposed scheme, we study its performance via simulation. This scheme reduces the requirement to the resolution of DAC and increases the tolerance to the nonlinear characteristics of LED, both of which are cost-efficient. At forward error correction (FEC) limit (BER = 1 × 10-3), simulation results illustrate that compared with DHT-based ACO-OFDM without the ISFA technique, our scheme has 3.2 dB and 2.7 dB improvement of the required Eb /N0 when BPSK and 4-PAM are modulated, respectively.

  8. An Efficient Diffusion Scheme for Chaos-Based Digital Image Encryption

    Jun-xin Chen

    2014-01-01

    Full Text Available In recent years, amounts of permutation-diffusion architecture-based image cryptosystems have been proposed. However, the key stream elements in the diffusion procedure are merely depending on the secret key that is usually fixed during the whole encryption process. Cryptosystems of this type suffer from unsatisfactory encryption speed and are considered insecure upon known/chosen plaintext attacks. In this paper, an efficient diffusion scheme is proposed. This scheme consists of two diffusion procedures, with a supplementary diffusion procedure padded after the normal diffusion. In the supplementary diffusion module, the control parameter of the selected chaotic map is altered by the resultant image produced after the normal diffusion operation. As a result, a slight difference in the plain image can be transferred to the chaotic iteration and bring about distinct key streams, and hence totally different cipher images will be produced. Therefore, the scheme can remarkably accelerate the diffusion effect of the cryptosystem and will effectively resist known/chosen plaintext attacks. Theoretical analyses and experimental results prove the high security performance and satisfactory operation efficiency of the proposed scheme.

  9. An efficient numerical progressive diagonalization scheme for the quantum Rabi model revisited

    Pan, Feng; Bao, Lina; Dai, Lianrong; Draayer, Jerry P

    2017-01-01

    An efficient numerical progressive diagonalization scheme for the quantum Rabi model is revisited. The advantage of the scheme lies in the fact that the quantum Rabi model can be solved almost exactly by using the scheme that only involves a finite set of one variable polynomial equations. The scheme is especially efficient for a specified eigenstate of the model, for example, the ground state. Some low-lying level energies of the model for several sets of parameters are calculated, of which one set of the results is compared to that obtained from the Braak’s exact solution proposed recently. It is shown that the derivative of the entanglement measure defined in terms of the reduced von Neumann entropy with respect to the coupling parameter does reach the maximum near the critical point deduced from the classical limit of the Dicke model, which may provide a probe of the critical point of the crossover in finite quantum many-body systems, such as that in the quantum Rabi model. (paper)

  10. Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

    Tong Li

    2017-01-01

    Full Text Available Wireless body area networks (WBANs are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. The sensor nodes in WBANs collect the client’s physiological data and transmit it to the medical center. However, the clients’ personal information is sensitive and there are many security threats in the extra-body communication. Therefore, the security and privacy of client’s physiological data need to be ensured. Many authentication protocols for WBANs have been proposed in recent years. However, the existing protocols fail to consider the key update phase. In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. In addition, session keys are generated during the registration phase and kept secretly, thus reducing computation cost in the authentication phase. The performance analysis demonstrates that our scheme is more efficient than the currently popular related schemes.

  11. An efficient chaotic source coding scheme with variable-length blocks

    Lin Qiu-Zhen; Wong Kwok-Wo; Chen Jian-Yong

    2011-01-01

    An efficient chaotic source coding scheme operating on variable-length blocks is proposed. With the source message represented by a trajectory in the state space of a chaotic system, data compression is achieved when the dynamical system is adapted to the probability distribution of the source symbols. For infinite-precision computation, the theoretical compression performance of this chaotic coding approach attains that of optimal entropy coding. In finite-precision implementation, it can be realized by encoding variable-length blocks using a piecewise linear chaotic map within the precision of register length. In the decoding process, the bit shift in the register can track the synchronization of the initial value and the corresponding block. Therefore, all the variable-length blocks are decoded correctly. Simulation results show that the proposed scheme performs well with high efficiency and minor compression loss when compared with traditional entropy coding. (general)

  12. Efficient coding schemes with power allocation using space-time-frequency spreading

    Jiang Haining; Luo Hanwen; Tian Jifeng; Song Wentao; Liu Xingzhao

    2006-01-01

    An efficient space-time-frequency (STF) coding strategy for multi-input multi-output orthogonal frequency division multiplexing (MIMO-OFDM) systems is presented for high bit rate data transmission over frequency selective fading channels. The proposed scheme is a new approach to space-time-frequency coded OFDM (COFDM) that combines OFDM with space-time coding, linear precoding and adaptive power allocation to provide higher quality of transmission in terms of the bit error rate performance and power efficiency. In addition to exploiting the maximum diversity gain in frequency, time and space, the proposed scheme enjoys high coding advantages and low-complexity decoding. The significant performance improvement of our design is confirmed by corroborating numerical simulations.

  13. Energy-Efficient Data Gathering Scheme Based on Broadcast Transmissions in Wireless Sensor Networks

    Soobin Lee

    2013-01-01

    previous works have proposed ideas that reduce the energy consumption of the network by exploiting the spatial correlation between sensed information. In this paper, we propose a distributed data compression framework that exploits the broadcasting characteristic of the wireless medium to improve energy efficiency. We analyze the performance of the proposed framework numerically and compare it with the performance of previous works using simulation. The proposed scheme performs better when the sensing information is correlated.

  14. Approaches of Improving University Assets Management Efficiency

    Wang, Jingliang

    2015-01-01

    University assets management, as an important content of modern university management, is generally confronted with the issue of low efficiency. Currently, to address the problems exposed in university assets management and take appropriate modification measures is an urgent issue in front of Chinese university assets management sectors. In this…

  15. A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy

    Chong Fu

    2018-01-01

    Full Text Available This paper suggests a new chaos-based color image cipher with an efficient substitution keystream generation strategy. The hyperchaotic Lü system and logistic map are employed to generate the permutation and substitution keystream sequences for image data scrambling and mixing. In the permutation stage, the positions of colored subpixels in the input image are scrambled using a pixel-swapping mechanism, which avoids two main problems encountered when using the discretized version of area-preserving chaotic maps. In the substitution stage, we introduce an efficient keystream generation method that can extract three keystream elements from the current state of the iterative logistic map. Compared with conventional method, the total number of iterations is reduced by 3 times. To ensure the robustness of the proposed scheme against chosen-plaintext attack, the current state of the logistic map is perturbed during each iteration and the disturbance value is determined by plain-pixel values. The mechanism of associating the keystream sequence with plain-image also helps accelerate the diffusion process and increase the degree of randomness of the keystream sequence. Experimental results demonstrate that the proposed scheme has a satisfactory level of security and outperforms the conventional schemes in terms of computational efficiency.

  16. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.

  17. Mean-variance portfolio selection and efficient frontier for defined contribution pension schemes

    Højgaard, Bjarne; Vigna, Elena

    We solve a mean-variance portfolio selection problem in the accumulation phase of a defined contribution pension scheme. The efficient frontier, which is found for the 2 asset case as well as the n + 1 asset case, gives the member the possibility to decide his own risk/reward profile. The mean...... as a mean-variance optimization problem. It is shown that the corresponding mean and variance of the final fund belong to the efficient frontier and also the opposite, that each point on the efficient frontier corresponds to a target-based optimization problem. Furthermore, numerical results indicate...... that the largely adopted lifestyle strategy seems to be very far from being efficient in the mean-variance setting....

  18. Dielectric passivation schemes for high efficiency n-type c-si solar cells

    Saynova, D.S.; Romijn, I.G.; Cesar, I.; Lamers, M.W.P.E.; Gutjahr, A. [ECN Solar Energy, P.O. Box 1, NL-1755 ZG Petten (Netherlands); Dingemans, G. [ASM, Kapeldreef 75, B-3001 Leuven (Belgium); Knoops, H.C.M.; Van de Loo, B.W.H.; Kessels, W.M.M. [Eindhoven University of Technology, Department of Appl. Physics, P.O. Box 513, 5600 MB Eindhoven (Netherlands); Siarheyeva, O.; Granneman, E. [Levitech BV, Versterkerstraat 10, 1322AP Almere (Netherlands); Venema, P.R.; Vlooswijk, A.H.G. [Tempress Systems BV, Radeweg 31, 8171 Vaassen (Netherlands); Gautero, L.; Borsa, D.M.

    2013-10-15

    We investigate the impact of different dielectric layers and stacks on the passivation properties of boron doped p{sup ++}-emitters and phosphorous doped n{sup +}-BSFs which are relevant for competitive n-type cell conversion efficiencies. The applied passivation schemes are associated with specific properties at c-Si/dielectric interface and functional mechanisms. In this way we aim to gain a deeper understanding of the passivation mechanism of the differently doped fields within the n-type cells and identify options to further improve the efficiency. The deposition technologies in our study comprise industrial PECVD systems and/or ALD both in industrial and lab scale configurations. In case of p{sup ++}-emitters the best results were achieved by combining field effect and chemical passivation using stacks of low temperature wet chemical oxide and thin ALD-AlOx capped with PECVD-SiNx. The corresponding Implied Voc values were of about (673{+-}2) mV and J{sub 0} of (68{+-}2) fA/cm{sup 2}. For the n{sup +}-BSF passivation the passivation scheme based on SiOx with or without additional AlOx film deposited by a lab scale temporal ALD processes and capped with PECVD-SiNx layer yielded a comparable Implied Voc of (673{+-}2) mV, but then corresponding to J{sub 0} value of (80{+-}15) fA/cm{sup 2}. This passivation scheme is mainly based on the chemical passivation and was also suitable for p{sup ++} surface. This means that we have demonstrated that for n-Pasha cells both the emitter and BSF can be passivated with the same type of passivation that should lead to > 20% cell efficiency. This offers the possibility for transfer this passivation scheme to advanced cell architectures, such as IBC.

  19. Efficiency analysis system of material management

    Bogusław Śliwczyński

    2012-12-01

    Full Text Available Background: Significant scope of enterprise's efficiency management is improving of material management process both the strategic and operational level. The complexity of material flow processes can lead to a threat such as distraction and disintegration of analysis focusing on many different factors influenced on effective sourcing and procurement management, transport and warehousing processes, inventory management, working capital and cash flow management. Material and methods: The presented article focuses on multidimensional and multi-criteria analysis of material management efficiency that is considered as decision support system. Authors have presented results of the research regarding ineffective material management confirm insufficient analytical supporting in various decisions of procurement operations. Results and conclusions: Based on research results authors presented in the article model of efficiency analysis system of material management.

  20. A spatiotemporal-based scheme for efficient registration-based segmentation of thoracic 4-D MRI.

    Yang, Y; Van Reeth, E; Poh, C L; Tan, C H; Tham, I W K

    2014-05-01

    Dynamic three-dimensional (3-D) (four-dimensional, 4-D) magnetic resonance (MR) imaging is gaining importance in the study of pulmonary motion for respiratory diseases and pulmonary tumor motion for radiotherapy. To perform quantitative analysis using 4-D MR images, segmentation of anatomical structures such as the lung and pulmonary tumor is required. Manual segmentation of entire thoracic 4-D MRI data that typically contains many 3-D volumes acquired over several breathing cycles is extremely tedious, time consuming, and suffers high user variability. This requires the development of new automated segmentation schemes for 4-D MRI data segmentation. Registration-based segmentation technique that uses automatic registration methods for segmentation has been shown to be an accurate method to segment structures for 4-D data series. However, directly applying registration-based segmentation to segment 4-D MRI series lacks efficiency. Here we propose an automated 4-D registration-based segmentation scheme that is based on spatiotemporal information for the segmentation of thoracic 4-D MR lung images. The proposed scheme saved up to 95% of computation amount while achieving comparable accurate segmentations compared to directly applying registration-based segmentation to 4-D dataset. The scheme facilitates rapid 3-D/4-D visualization of the lung and tumor motion and potentially the tracking of tumor during radiation delivery.

  1. Developing Efficient Coordination Schemes to Control Over-Pumping in the Heihe River Basin, China

    Pedrazzini, G.

    2015-12-01

    Many wicked water resources problems are approached in a social planner perspective. This not always matches the real institutional and policy-making context, where, rather, multiple decision-makers (DMs) can act independently, or weakly cooperate, ultimately producing system-wide inefficient trade-offs. The idea in this work is to adopt a more realistic approach, where the multi-DMs nature of the problem is preserved and the uncoordinated DMs are driven, thorough coordination mechanisms, towards a more system-wide efficient solution. An agent-based modelling framework linked to a surface and groundwater model is used to design these coordination mechanisms as constraints to the independent agents (i.e., DMs) behaviour. In the Heihe Basin the ongoing introduction of smart meter IC-card systems on farmers' pumping wells will soon allow monitoring and control of abstractions with the goal of preventing further depletion of the resource. The major interest of policy makers in the region concerns the development of new and the improvement of existing legislation on pricing schemes and/or groundwater quotas. The model outcome where agents act rationally but selfishly is compared to the optimal solution at system-level assuming perfect coordination and cooperation. The optimal solutions with respect to the given utility functions are computed using nonlinear optimization with a rolling out time horizon. The Pareto-Frontier is synthesized through an exhaustive sampling of the weight coefficient space and related to the current and to the historical management of the last 4 decades. The best parameter values for the proposed coordination mechanisms are determined and the alternatives are compared with respect to their efficiency and acceptability. Preliminary results suggest that a regulatory tax on groundwater of about a factor 10 of the current resource fee is required to increase the elasticity of the groundwater demand curve such that reducing consumption becomes

  2. An Efficient Explicit Finite-Difference Scheme for Simulating Coupled Biomass Growth on Nutritive Substrates

    G. F. Sun

    2015-01-01

    Full Text Available A novel explicit finite-difference (FD method is presented to simulate the positive and bounded development process of a microbial colony subjected to a substrate of nutrients, which is governed by a nonlinear parabolic partial differential equations (PDE system. Our explicit FD scheme is uniquely designed in such a way that it transfers the nonlinear terms in the original PDE into discrete sets of linear ones in the algebraic equation system that can be solved very efficiently, while ensuring the stability and the boundedness of the solution. This is achieved through (1 a proper design of intertwined FD approximations for the diffusion function term in both time and spatial variations and (2 the control of the time-step through establishing theoretical stability criteria. A detailed theoretical stability analysis is conducted to reveal that our FD method is indeed stable. Our examples verified the fact that the numerical solution can be ensured nonnegative and bounded to simulate the actual physics. Numerical examples have also been presented to demonstrate the efficiency of the proposed scheme. The present scheme is applicable for solving similar systems of PDEs in the investigation of the dynamics of biological films.

  3. Evaluation of alternative waste management schemes for LWR hulls and caps

    Chaudon, L.; Cecille, L.; Klein, M.; Kowa, S.; Mehling, O.; Thiels, G.

    1990-01-01

    LWR hulls and caps represent one of the major sources of α bearing solid waste generated in the nuclear fuel cycle. For this reason, the CEC launched a theoretical study to evaluate alternative schemes for the overall management of this waste. Both volume reduction techniques and α decontamination of the hulls were assessed. The study demonstrated that the transport and disposal of the conditioned waste in deep geological formations play a dominant part in the total management costs. Important cost savings can be achieved through the implementation of efficient volume reduction techniques, i.e. melting or compaction. As an alternative approach, exhaustive α decontamination of the hulls appears promising, provided that the conditioned waste can be made to comply with the disposal criteria of mines. Finally, prolongation of the interim storage period for the waste packages from 1 to 30 years may prove beneficial on the transport costs

  4. Efficient and Effective Project Management

    Dusan Pene

    2014-03-01

    Full Text Available The purpose of the article is to investigate different authorities and responsibilities of a project manager and of a project leader. Considering the fact that nowadays the project management is becoming the important factor in performing and leading the investments which are modified by modern leadership theories, we can say that the key element is the sovereign leadership of a manager and a project leader. The current multi-project environments and modern techniques at the project management area need the interdisciplinary leadership approach and at the same time they enable the strengthening of company’s competitive features so they are consistently satisfying high project expectations of the project investor or a client.

  5. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    Bashir, Ali Kashif; Lim, Se-Jung; Hussain, Chauhdary Sajjad; Park, Myong-Soon

    2011-01-01

    RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes. PMID:22163999

  6. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    Myong-Soon Park

    2011-07-01

    Full Text Available RFID (Radio frequency identification and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes.

  7. Estimation of efficiency project management

    Novotorov Vladimir Yurevich

    2011-03-01

    Full Text Available In modern conditions, the effectiveness of the enterprises all in a greater degree depends on methods of management and business dealing forms. The organizations should choose the most effective for themselves strategy of management taking into account the existing legislation, concrete conditions of activity, financial and economic, investment potential and development strategy. Introduction of common system of planning and realization of strategy of the organization, it will allow to provide even development and long-term social and economic growth of the companies.

  8. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  9. An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme

    Lu Ou

    2018-01-01

    Full Text Available Location-based services (LBSs are increasingly popular in today’s society. People reveal their location information to LBS providers to obtain personalized services such as map directions, restaurant recommendations, and taxi reservations. Usually, LBS providers offer user privacy protection statement to assure users that their private location information would not be given away. However, many LBSs run on third-party cloud infrastructures. It is challenging to guarantee user location privacy against curious cloud operators while still permitting users to query their own location information data. In this paper, we propose an efficient privacy-preserving cloud-based LBS query scheme for the multiuser setting. We encrypt LBS data and LBS queries with a hybrid encryption mechanism, which can efficiently implement privacy-preserving search over encrypted LBS data and is very suitable for the multiuser setting with secure and effective user enrollment and user revocation. This paper contains security analysis and performance experiments to demonstrate the privacy-preserving properties and efficiency of our proposed scheme.

  10. Efficient quantum secret sharing scheme with two-particle entangled states

    Zhu Zhen-Chao; Fu An-Min; Zhang Yu-Qing

    2011-01-01

    This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time. (general)

  11. An Efficient Scheme for Aggregation and Presentation of Network Performance in Distributed Brokering Systems

    Gurhan Gunduz

    2003-12-01

    Full Text Available The Internet is presently being used to support increasingly complex interaction models as a result of more and more applications, services and frameworks becoming network centric. Efficient utilization of network and networkedresources is of paramount importance. Network performance gathering is a precursor to any scheme that seeks to provide adaptive routing capabilities for interactions. In this paper we present a network performance aggregation framework that is extensible and appropriate for distributed messaging systems that span multiple realms, disparate communication protocols and support different applications.

  12. Cap and trade schemes on waste management: A case study of the Landfill Allowance Trading Scheme (LATS) in England

    Calaf-Forn, Maria; Roca, Jordi; Puig-Ventosa, Ignasi

    2014-01-01

    Highlights: • LATS has been effective to achieve a reduction of the amount of landfilled waste. • LATS has been one of the few environmental instruments for waste management with a cap and trade methodology. • LATS has achieved to increase recycling of the biodegradable and other waste fractions. - Abstract: The Landfill Allowance Trading Scheme (LATS) is one of the main instruments used in England to enforce the landfill diversion targets established in the Directive 1999/31/EC of the European Parliament and of the Council of 26 April 1999 on the landfill of waste (Landfill Directive). Through the LATS, biodegradable municipal waste (BMW) allowances for landfilling are allocated to each local authority, otherwise known as waste disposal authorities (WDAs). The quantity of landfill allowances received is expected to decrease continuously from 2005/06 to 2019/20 so as to meet the objectives of the Landfill Directive. To achieve their commitments, WDAs can exchange, buy, sell or transfer allowances among each other, or may re-profile their own allocation through banking and/or borrowing. Despite the goals for the first seven years – which included two target years (2005/06 and 2009/10) – being widely achieved (the average allocation of allowances per WDA was 22.9% higher than those finally used), market activity among WDAs was high and prices were not very stable. Results in terms of waste reduction and recycling levels have been satisfactory. The reduction of BMW landfilled (in percentage) was higher during the first seven years of the LATS period (2005/06–2011/12) (around 7% annually) than during the previous period (2001/02–2004/05) (4.2% annually). Since 2008, the significance of the LATS diminished because of an increase in the rate of the UK Landfill Tax. The LATS was suppressed after the 2012/13 target year, before what it was initially scheduled. The purpose of this paper is to describe the particularities of the LATS, analyse its performance as

  13. Cap and trade schemes on waste management: A case study of the Landfill Allowance Trading Scheme (LATS) in England

    Calaf-Forn, Maria, E-mail: mcalaf@ent.cat [Institut de Ciència i Tecnologia Ambientals (ICTA), Universitat Autònoma de Barcelona (UAB), E-08193 Bellaterra, Barcelona (Spain); ENT Environment and Management, Carrer Sant Joan 39, First Floor, E-08800 Vilanova i la Geltrú, Barcelona (Spain); Roca, Jordi [Departament de Teoria Econòmica, Universitat de Barcelona (UB), Diagonal, 696, E-08034 Barcelona (Spain); Puig-Ventosa, Ignasi [ENT Environment and Management, Carrer Sant Joan 39, First Floor, E-08800 Vilanova i la Geltrú, Barcelona (Spain)

    2014-05-01

    Highlights: • LATS has been effective to achieve a reduction of the amount of landfilled waste. • LATS has been one of the few environmental instruments for waste management with a cap and trade methodology. • LATS has achieved to increase recycling of the biodegradable and other waste fractions. - Abstract: The Landfill Allowance Trading Scheme (LATS) is one of the main instruments used in England to enforce the landfill diversion targets established in the Directive 1999/31/EC of the European Parliament and of the Council of 26 April 1999 on the landfill of waste (Landfill Directive). Through the LATS, biodegradable municipal waste (BMW) allowances for landfilling are allocated to each local authority, otherwise known as waste disposal authorities (WDAs). The quantity of landfill allowances received is expected to decrease continuously from 2005/06 to 2019/20 so as to meet the objectives of the Landfill Directive. To achieve their commitments, WDAs can exchange, buy, sell or transfer allowances among each other, or may re-profile their own allocation through banking and/or borrowing. Despite the goals for the first seven years – which included two target years (2005/06 and 2009/10) – being widely achieved (the average allocation of allowances per WDA was 22.9% higher than those finally used), market activity among WDAs was high and prices were not very stable. Results in terms of waste reduction and recycling levels have been satisfactory. The reduction of BMW landfilled (in percentage) was higher during the first seven years of the LATS period (2005/06–2011/12) (around 7% annually) than during the previous period (2001/02–2004/05) (4.2% annually). Since 2008, the significance of the LATS diminished because of an increase in the rate of the UK Landfill Tax. The LATS was suppressed after the 2012/13 target year, before what it was initially scheduled. The purpose of this paper is to describe the particularities of the LATS, analyse its performance as

  14. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism

    Ye, Ruisong

    2011-10-01

    This paper proposes a novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, in which permuting the positions of image pixels incorporates with changing the gray values of image pixels to confuse the relationship between cipher-image and plain-image. In the permutation process, a generalized Arnold map is utilized to generate one chaotic orbit used to get two index order sequences for the permutation of image pixel positions; in the diffusion process, a generalized Arnold map and a generalized Bernoulli shift map are employed to yield two pseudo-random gray value sequences for a two-way diffusion of gray values. The yielded gray value sequences are not only sensitive to the control parameters and initial conditions of the considered chaotic maps, but also strongly depend on the plain-image processed, therefore the proposed scheme can resist statistical attack, differential attack, known-plaintext as well as chosen-plaintext attack. Experimental results are carried out with detailed analysis to demonstrate that the proposed image encryption scheme possesses large key space to resist brute-force attack as well.

  15. Multicarrier Spread Spectrum Modulation Schemes and Efficient FFT Algorithms for Cognitive Radio Systems

    Mohandass Sundararajan

    2014-07-01

    Full Text Available Spread spectrum (SS and multicarrier modulation (MCM techniques are recognized as potential candidates for the design of underlay and interweave cognitive radio (CR systems, respectively. Direct Sequence Code Division Multiple Access (DS-CDMA is a spread spectrum technique generally used in underlay CR systems. Orthogonal Frequency Division Multiplexing (OFDM is the basic MCM technique, primarily used in interweave CR systems. There are other MCM schemes derived from OFDM technique, like Non-Contiguous OFDM, Spread OFDM, and OFDM-OQAM, which are more suitable for CR systems. Multicarrier Spread Spectrum Modulation (MCSSM schemes like MC-CDMA, MC-DS-CDMA and SS-MC-CDMA, combine DS-CDMA and OFDM techniques in order to improve the CR system performance and adaptability. This article gives a detailed survey of the various spread spectrum and multicarrier modulation schemes proposed in the literature. Fast Fourier Transform (FFT plays a vital role in all the multicarrier modulation techniques. The FFT part of the modem can be used for spectrum sensing. The performance of the FFT operator plays a crucial role in the overall performance of the system. Since the cognitive radio is an adaptive system, the FFT operator must also be adaptive for various input/output values, in order to save energy and time taken for execution. This article also includes the various efficient FFT algorithms proposed in the literature, which are suitable for CR systems.

  16. Development of efficient GPU parallelization of WRF Yonsei University planetary boundary layer scheme

    M. Huang

    2015-09-01

    Full Text Available The planetary boundary layer (PBL is the lowest part of the atmosphere and where its character is directly affected by its contact with the underlying planetary surface. The PBL is responsible for vertical sub-grid-scale fluxes due to eddy transport in the whole atmospheric column. It determines the flux profiles within the well-mixed boundary layer and the more stable layer above. It thus provides an evolutionary model of atmospheric temperature, moisture (including clouds, and horizontal momentum in the entire atmospheric column. For such purposes, several PBL models have been proposed and employed in the weather research and forecasting (WRF model of which the Yonsei University (YSU scheme is one. To expedite weather research and prediction, we have put tremendous effort into developing an accelerated implementation of the entire WRF model using graphics processing unit (GPU massive parallel computing architecture whilst maintaining its accuracy as compared to its central processing unit (CPU-based implementation. This paper presents our efficient GPU-based design on a WRF YSU PBL scheme. Using one NVIDIA Tesla K40 GPU, the GPU-based YSU PBL scheme achieves a speedup of 193× with respect to its CPU counterpart running on one CPU core, whereas the speedup for one CPU socket (4 cores with respect to 1 CPU core is only 3.5×. We can even boost the speedup to 360× with respect to 1 CPU core as two K40 GPUs are applied.

  17. Damping efficiency of the Tchamwa-Wielgosz explicit dissipative scheme under instantaneous loading conditions

    Mahéo, Laurent; Grolleau, Vincent; Rio, Gérard

    2009-11-01

    To deal with dynamic and wave propagation problems, dissipative methods are often used to reduce the effects of the spurious oscillations induced by the spatial and time discretization procedures. Among the many dissipative methods available, the Tchamwa-Wielgosz (TW) explicit scheme is particularly useful because it damps out the spurious oscillations occurring in the highest frequency domain. The theoretical study performed here shows that the TW scheme is decentered to the right, and that the damping can be attributed to a nodal displacement perturbation. The FEM study carried out using instantaneous 1-D and 3-D compression loads shows that it is useful to display the damping versus the number of time steps in order to obtain a constant damping efficiency whatever the size of element used for the regular meshing. A study on the responses obtained with irregular meshes shows that the TW scheme is only slightly sensitive to the spatial discretization procedure used. To cite this article: L. Mahéo et al., C. R. Mecanique 337 (2009).

  18. An Efficient Secure Scheme Based on Hierarchical Topology in the Smart Home Environment

    Mansik Kim

    2017-08-01

    Full Text Available As the Internet of Things (IoT has developed, the emerging sensor network (ESN that integrates emerging technologies, such as autonomous driving, cyber-physical systems, mobile nodes, and existing sensor networks has been in the limelight. Smart homes have been researched and developed by various companies and organizations. Emerging sensor networks have some issues of providing secure service according to a new environment, such as a smart home, and the problems of low power and low-computing capacity for the sensor that previous sensor networks were equipped with. This study classifies various sensors used in smart homes into three classes and contains the hierarchical topology for efficient communication. In addition, a scheme for establishing secure communication among sensors based on physical unclonable functions (PUFs that cannot be physically cloned is suggested in regard to the sensor’s low performance. In addition, we analyzed this scheme by conducting security and performance evaluations proving to constitute secure channels while consuming fewer resources. We believe that our scheme can provide secure communication by using fewer resources in a smart home environment in the future.

  19. Efficient Resource Management in Cloud Computing

    Rushikesh Shingade; Amit Patil; Shivam Suryawanshi; M. Venkatesan

    2015-01-01

    Cloud computing, one of the widely used technology to provide cloud services for users who are charged for receiving services. In the aspect of a maximum number of resources, evaluating the performance of Cloud resource management policies are difficult to optimize efficiently. There are different simulation toolkits available for simulation and modelling the Cloud computing environment like GridSim CloudAnalyst, CloudSim, GreenCloud, CloudAuction etc. In proposed Efficient Resource Manage...

  20. Correct mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme on ping-pong protocol

    Zhang, Zhanjun

    2004-01-01

    Comment: The wrong mutual information, quantum bit error rate and secure transmission efficiency in Wojcik's eavesdropping scheme [PRL90(03)157901]on ping-pong protocol have been pointed out and corrected

  1. [Wound information management system: a standardized scheme for acquisition, storage and management of wound information].

    Liu, Hu; Su, Rong-jia; Wu, Min-jie; Zhang, Yi; Qiu, Xiang-jun; Feng, Jian-gang; Xie, Ting; Lu, Shu-liang

    2012-06-01

    To form a wound information management scheme with objectivity, standardization, and convenience by means of wound information management system. A wound information management system was set up with the acquisition terminal, the defined wound description, the data bank, and related softwares. The efficacy of this system was evaluated in clinical practice. The acquisition terminal was composed of the third generation mobile phone and the software. It was feasible to get access to the wound information, including description, image, and therapeutic plan from the data bank by mobile phone. During 4 months, a collection of a total of 232 wound treatment information was entered, and accordingly standardized data of 38 patients were formed automatically. This system can provide standardized wound information management by standardized techniques of acquisition, transmission, and storage of wound information. It can be used widely in hospitals, especially primary medical institutions. Data resource of the system makes it possible for epidemiological study with large sample size in future.

  2. A New Energy-Efficient Data Transmission Scheme Based on DSC and Virtual MIMO for Wireless Sensor Network

    Li, Na; Zhang, Liwen; Li, Bing

    2015-01-01

    Energy efficiency in wireless sensor network (WSN) is one of the primary performance parameters. For improving the energy efficiency of WSN, we introduce distributed source coding (DSC) and virtual multiple-input multiple-output (MIMO) into wireless sensor network and then propose a new data transmission scheme called DSC-MIMO. DSC-MIMO compresses the source data using distributed source coding before transmitting, which is different from the existing communication schemes. Data compression c...

  3. Psychosocial routes from housing investment to health: Evidence from England's home energy efficiency scheme

    Gilbertson, Jan; Grimsley, Michael; Green, Geoff

    2012-01-01

    Over the past decade the Warm Front Scheme has been the English Government's principal programme for improving domestic energy efficiency and reducing fuel poverty. This paper reports on a cross-sectional survey of low income householders participating in the Warm Front Scheme in five urban areas of England. Surveys were conducted of 2685 individuals, before and or after intervention. Pathways to self reported health were modelled by logistic regression. Of all the dimensions of health examined, only self reported mental health is directly associated with Warm Front measures. Intermediary variables associated with Warm Front intervention were shown to be significantly correlated with more dimensions of self reported health status. Higher temperatures, satisfaction with the heating system, greater thermal comfort, reductions in fuel poverty and lower stress were significantly correlated with improved health. Alleviating fuel poverty and reducing stress appeared to be the main route to health. We conclude there are complex and indirect relationships linking energy efficiency measures to outcomes on all dimensions of health which contribute to significant material and psychosocial benefits. The impact of the Warm Front Scheme cannot be fully understood by a limited analysis which merely relates indoor temperature and property characteristics to physiological health outcomes. - Highlights: ► Warm Front improvements are linked to significant material and psychosocial benefits. ► The alleviation of fuel poverty and the reduction of stress emerge as the likely route to health. ► The scope for improving health is greater than implied by the UK Government's Fuel Poverty Strategy. ► A dual but integrated approach to alleviating cold living conditions and fuel poverty is required.

  4. Towards social autonomous vehicles: Efficient collision avoidance scheme using Richardson's arms race model.

    Riaz, Faisal; Niazi, Muaz A

    2017-01-01

    This paper presents the concept of a social autonomous agent to conceptualize such Autonomous Vehicles (AVs), which interacts with other AVs using social manners similar to human behavior. The presented AVs also have the capability of predicting intentions, i.e. mentalizing and copying the actions of each other, i.e. mirroring. Exploratory Agent Based Modeling (EABM) level of the Cognitive Agent Based Computing (CABC) framework has been utilized to design the proposed social agent. Furthermore, to emulate the functionality of mentalizing and mirroring modules of proposed social agent, a tailored mathematical model of the Richardson's arms race model has also been presented. The performance of the proposed social agent has been validated at two levels-firstly it has been simulated using NetLogo, a standard agent-based modeling tool and also, at a practical level using a prototype AV. The simulation results have confirmed that the proposed social agent-based collision avoidance strategy is 78.52% more efficient than Random walk based collision avoidance strategy in congested flock-like topologies. Whereas practical results have confirmed that the proposed scheme can avoid rear end and lateral collisions with the efficiency of 99.876% as compared with the IEEE 802.11n-based existing state of the art mirroring neuron-based collision avoidance scheme.

  5. Towards social autonomous vehicles: Efficient collision avoidance scheme using Richardson’s arms race model

    Niazi, Muaz A.

    2017-01-01

    This paper presents the concept of a social autonomous agent to conceptualize such Autonomous Vehicles (AVs), which interacts with other AVs using social manners similar to human behavior. The presented AVs also have the capability of predicting intentions, i.e. mentalizing and copying the actions of each other, i.e. mirroring. Exploratory Agent Based Modeling (EABM) level of the Cognitive Agent Based Computing (CABC) framework has been utilized to design the proposed social agent. Furthermore, to emulate the functionality of mentalizing and mirroring modules of proposed social agent, a tailored mathematical model of the Richardson’s arms race model has also been presented. The performance of the proposed social agent has been validated at two levels–firstly it has been simulated using NetLogo, a standard agent-based modeling tool and also, at a practical level using a prototype AV. The simulation results have confirmed that the proposed social agent-based collision avoidance strategy is 78.52% more efficient than Random walk based collision avoidance strategy in congested flock-like topologies. Whereas practical results have confirmed that the proposed scheme can avoid rear end and lateral collisions with the efficiency of 99.876% as compared with the IEEE 802.11n-based existing state of the art mirroring neuron-based collision avoidance scheme. PMID:29040294

  6. An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks

    Nogbou G. Anoh

    2017-02-01

    Full Text Available Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP algorithm which offers better performance than the Dedicated Protection (DP algorithm.

  7. Towards social autonomous vehicles: Efficient collision avoidance scheme using Richardson's arms race model.

    Faisal Riaz

    Full Text Available This paper presents the concept of a social autonomous agent to conceptualize such Autonomous Vehicles (AVs, which interacts with other AVs using social manners similar to human behavior. The presented AVs also have the capability of predicting intentions, i.e. mentalizing and copying the actions of each other, i.e. mirroring. Exploratory Agent Based Modeling (EABM level of the Cognitive Agent Based Computing (CABC framework has been utilized to design the proposed social agent. Furthermore, to emulate the functionality of mentalizing and mirroring modules of proposed social agent, a tailored mathematical model of the Richardson's arms race model has also been presented. The performance of the proposed social agent has been validated at two levels-firstly it has been simulated using NetLogo, a standard agent-based modeling tool and also, at a practical level using a prototype AV. The simulation results have confirmed that the proposed social agent-based collision avoidance strategy is 78.52% more efficient than Random walk based collision avoidance strategy in congested flock-like topologies. Whereas practical results have confirmed that the proposed scheme can avoid rear end and lateral collisions with the efficiency of 99.876% as compared with the IEEE 802.11n-based existing state of the art mirroring neuron-based collision avoidance scheme.

  8. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.

  9. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  10. Efficient silvicultural practices for eastern hardwood management

    Gary W. Miller; John E. Baumgras

    1994-01-01

    Eastern hardwood forests are now managed to meet a wide range of objectives, resulting in the need for silvicultural alternatives that provide timber, wildlife, aesthetics, recreation, and other benefits. However, forest management practices must continue to be efficient in terms of profiting from current harvests, protecting the environment, and sustaining production...

  11. Establishing the long-term fuel management scheme using point reactivity model

    Park, Yong-Soo; Kim, Jae-Hak; Lee, Young-Ouk; Song, Jae-Woong; Zee, Sung-Kyun

    1994-01-01

    A new approach to establish the long-term fuel management scheme is presented in this paper. The point reactivity model is used to predict the core average reactivity. An attempt to calculate batchwise power fraction is introduced through the two-dimensional nodal power algorithm based on the modified one-group diffusion equation and the number of fuel assemblies on the core periphery. Suggested is an empirical formula to estimate the radial leakage reactivity with ripe core design experience reflected. This approach predicts the cycle lengths and the discharge burnups of individual fuel batches up to an equilibrium core when the proper input data such as batch enrichment, batch size, type and content of burnable poison and reloading strategies are given. Eight benchmark calculations demonstrate that the new approach used in this study is reasonably accurate and highly efficient for the purpose of scoping calculation when compared with design code predictions. (author)

  12. Financing schemes increasing energy efficiency and renewable energy use in public and private buildings. Comparative study

    2014-03-01

    resources to financial engineering and creation of innovative financing schemes that will help them keep the money spent on energy near home. They strive for sustainable, long-term financing solutions capable to generate large-scale investments. Indeed, financing energy transition will require strong technical, financial, legal and coordination skills and expertise in local authorities. Many different players at all levels of governance have already tested and implemented successful innovative financing schemes. However, the existing and emerging financing solutions remain isolated and not well known. Energy Cities - the European association of local authorities in energy transition - aims at strengthening the skills of local authorities in this field and facilitating the exchange of their experiences so that successful schemes can be more easily replicated all over the EU and beyond. Thus, Energy Cities identified 9 existing local, regional and national financing schemes aiming at increasing energy efficiency and renewable energy use in public and private buildings, which are usually the biggest energy consumer at local level. They are presented in this study. The financing schemes have been selected with the aim to present a myriad of different solutions that are implemented to address the same problem: - Local investment funds (Almada in Portugal, Amsterdam in the Netherlands and Region Centre in France). - Local public and semi-public companies (Ile de France and Rhone-Alpes Regions in France). - Revolving funds linked to grants and soft-loan schemes (Lithuania, Estonia, Brussels-Capital Region, Delft in the Netherlands)

  13. The performance evaluation of a new neural network based traffic management scheme for a satellite communication network

    Ansari, Nirwan; Liu, Dequan

    1991-01-01

    A neural-network-based traffic management scheme for a satellite communication network is described. The scheme consists of two levels of management. The front end of the scheme is a derivation of Kohonen's self-organization model to configure maps for the satellite communication network dynamically. The model consists of three stages. The first stage is the pattern recognition task, in which an exemplar map that best meets the current network requirements is selected. The second stage is the analysis of the discrepancy between the chosen exemplar map and the state of the network, and the adaptive modification of the chosen exemplar map to conform closely to the network requirement (input data pattern) by means of Kohonen's self-organization. On the basis of certain performance criteria, whether a new map is generated to replace the original chosen map is decided in the third stage. A state-dependent routing algorithm, which arranges the incoming call to some proper path, is used to make the network more efficient and to lower the call block rate. Simulation results demonstrate that the scheme, which combines self-organization and the state-dependent routing mechanism, provides better performance in terms of call block rate than schemes that only have either the self-organization mechanism or the routing mechanism.

  14. A new cooperative MIMO scheme based on SM for energy-efficiency improvement in wireless sensor network.

    Peng, Yuyang; Choi, Jaeho

    2014-01-01

    Improving the energy efficiency in wireless sensor networks (WSN) has attracted considerable attention nowadays. The multiple-input multiple-output (MIMO) technique has been proved as a good candidate for improving the energy efficiency, but it may not be feasible in WSN which is due to the size limitation of the sensor node. As a solution, the cooperative multiple-input multiple-output (CMIMO) technique overcomes this constraint and shows a dramatically good performance. In this paper, a new CMIMO scheme based on the spatial modulation (SM) technique named CMIMO-SM is proposed for energy-efficiency improvement. We first establish the system model of CMIMO-SM. Based on this model, the transmission approach is introduced graphically. In order to evaluate the performance of the proposed scheme, a detailed analysis in terms of energy consumption per bit of the proposed scheme compared with the conventional CMIMO is presented. Later, under the guide of this new scheme we extend our proposed CMIMO-SM to a multihop clustered WSN for further achieving energy efficiency by finding an optimal hop-length. Equidistant hop as the traditional scheme will be compared in this paper. Results from the simulations and numerical experiments indicate that by the use of the proposed scheme, significant savings in terms of total energy consumption can be achieved. Combining the proposed scheme with monitoring sensor node will provide a good performance in arbitrary deployed WSN such as forest fire detection system.

  15. A multi-agent based distributed energy management scheme for smart grid applications

    Radhakrishnan, Bharat Menon; Srinivasan, Dipti

    2016-01-01

    A multi-agent system based distributed EMS (energy management system) is proposed in this paper to perform optimal energy allocation and management for grids comprising of renewables, storage and distributed generation. The reliable and efficient operation of smart grids is slackened due to the presence of intermittent renewables. As the load demand and renewables are uncertain throughout the day, an energy management system is essential to ensure grid stability and achieve reductions in operation costs and CO_2 emissions. The main objectives of the proposed algorithm is to maintain power balance in the system and to ensure long cycle life for storage units by controlling their SOC (state of charge). The proposed EMS scheme is tested and validated on a practical test system, which replicates a small-scale smart grid with a variety of distributed sources, storage devices, loads, power electronic converters, and SCADA (supervisory control and data acquisition) system. This system is also connected to the utility grid and the power exchange is controlled with the help of a battery system through a fuzzy based decision-making framework. The proposed algorithm is also extensively verified and tested using a series of sensitivity analyses and benchmarking with existing algorithms. - Highlights: • An agent-based decentralized algorithm is proposed to perform energy management. • The multi-agent system approach eliminates the possibility of single point failures. • Adaptive fuzzy systems make the decision making more reliable, flexible and robust. • The algorithm is extensively tested and validated using sensitivity and verification analyses.

  16. Energy-Efficient Deadline-Aware Data-Gathering Scheme Using Multiple Mobile Data Collectors.

    Dasgupta, Rumpa; Yoon, Seokhoon

    2017-04-01

    In wireless sensor networks, the data collected by sensors are usually forwarded to the sink through multi-hop forwarding. However, multi-hop forwarding can be inefficient due to the energy hole problem and high communications overhead. Moreover, when the monitored area is large and the number of sensors is small, sensors cannot send the data via multi-hop forwarding due to the lack of network connectivity. In order to address those problems of multi-hop forwarding, in this paper, we consider a data collection scheme that uses mobile data collectors (MDCs), which visit sensors and collect data from them. Due to the recent breakthroughs in wireless power transfer technology, MDCs can also be used to recharge the sensors to keep them from draining their energy. In MDC-based data-gathering schemes, a big challenge is how to find the MDCs' traveling paths in a balanced way, such that their energy consumption is minimized and the packet-delay constraint is satisfied. Therefore, in this paper, we aim at finding the MDCs' paths, taking energy efficiency and delay constraints into account. We first define an optimization problem, named the delay-constrained energy minimization (DCEM) problem, to find the paths for MDCs. An integer linear programming problem is formulated to find the optimal solution. We also propose a two-phase path-selection algorithm to efficiently solve the DCEM problem. Simulations are performed to compare the performance of the proposed algorithms with two heuristics algorithms for the vehicle routing problem under various scenarios. The simulation results show that the proposed algorithms can outperform existing algorithms in terms of energy efficiency and packet delay.

  17. Adaptive multi-objective Optimization scheme for cognitive radio resource management

    Alqerm, Ismail; Shihada, Basem

    2014-01-01

    configuration by exploiting optimization and machine learning techniques. In this paper, we propose an Adaptive Multi-objective Optimization Scheme (AMOS) for cognitive radio resource management to improve spectrum operation and network performance

  18. Decentralising Zimbabwe’s water management: The case of Guyu-Chelesa irrigation scheme

    Tambudzai, Rashirayi; Everisto, Mapedza; Gideon, Zhou

    Smallholder irrigation schemes are largely supply driven such that they exclude the beneficiaries on the management decisions and the choice of the irrigation schemes that would best suit their local needs. It is against this background that the decentralisation framework and the Dublin Principles on Integrated Water Resource Management (IWRM) emphasise the need for a participatory approach to water management. The Zimbabwean government has gone a step further in decentralising the management of irrigation schemes, that is promoting farmer managed irrigation schemes so as to ensure effective management of scarce community based land and water resources. The study set to investigate the way in which the Guyu-Chelesa irrigation scheme is managed with specific emphasis on the role of the Irrigation Management Committee (IMC), the level of accountability and the powers devolved to the IMC. Merrey’s 2008 critique of IWRM also informs this study which views irrigation as going beyond infrastructure by looking at how institutions and decision making processes play out at various levels including at the irrigation scheme level. The study was positioned on the hypothesis that ‘decentralised or autonomous irrigation management enhances the sustainability and effectiveness of irrigation schemes’. To validate or falsify the stated hypothesis, data was gathered using desk research in the form of reviewing articles, documents from within the scheme and field research in the form of questionnaire surveys, key informant interviews and field observation. The Statistical Package for Social Sciences was used to analyse data quantitatively, whilst content analysis was utilised to analyse qualitative data whereby data was analysed thematically. Comparative analysis was carried out as Guyu-Chelesa irrigation scheme was compared with other smallholder irrigation scheme’s experiences within Zimbabwe and the Sub Saharan African region at large. The findings were that whilst the

  19. RLAM: A Dynamic and Efficient Reinforcement Learning-Based Adaptive Mapping Scheme in Mobile WiMAX Networks

    M. Louta

    2014-01-01

    Full Text Available WiMAX (Worldwide Interoperability for Microwave Access constitutes a candidate networking technology towards the 4G vision realization. By adopting the Orthogonal Frequency Division Multiple Access (OFDMA technique, the latest IEEE 802.16x amendments manage to provide QoS-aware access services with full mobility support. A number of interesting scheduling and mapping schemes have been proposed in research literature. However, they neglect a considerable asset of the OFDMA-based wireless systems: the dynamic adjustment of the downlink-to-uplink width ratio. In order to fully exploit the supported mobile WiMAX features, we design, develop, and evaluate a rigorous adaptive model, which inherits its main aspects from the reinforcement learning field. The model proposed endeavours to efficiently determine the downlink-to-uplinkwidth ratio, on a frame-by-frame basis, taking into account both the downlink and uplink traffic in the Base Station (BS. Extensive evaluation results indicate that the model proposed succeeds in providing quite accurate estimations, keeping the average error rate below 15% with respect to the optimal sub-frame configurations. Additionally, it presents improved performance compared to other learning methods (e.g., learning automata and notable improvements compared to static schemes that maintain a fixed predefined ratio in terms of service ratio and resource utilization.

  20. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  1. Markets for energy efficiency: Exploring the implications of an EU-wide 'Tradable White Certificate' scheme

    Mundaca, Luis

    2008-01-01

    Recent developments in European energy policy reveal an increasing interest in implementing the so-called 'Tradable White Certificate' (TWC) schemes to improve energy efficiency. Based on three evaluation criteria (cost-effectiveness, environmental effectiveness and distributional equity) this paper analyses the implications of implementing a European-wide TWC scheme targeting the household and commercial sectors. Using a bottom-up model, quantitative results show significant cost-effective potentials for improvements (ca. 1400 TWh in cumulative energy savings by 2020), with the household sector, gas and space heating representing most of the TWC supply in terms of eligible sector, fuel and energy service demand, respectively. If a single market price of negative externalities is considered, a societal cost-effective potential of energy savings above 30% (compared to the baseline) is observed. In environmental terms, the resulting greenhouse gas emission reductions are around 200 Mt CO 2-eq by 2010, representing nearly 60% of the EU-Kyoto-target. From the qualitative perspective, several embedded ancillary benefits are identified (e.g. employment generation, improved comfort level, reduced 'fuel poverty', security of energy supply). Whereas an EU-wide TWC increases liquidity and reduces the risks of market power, autarky compliance strategies may be expected in order to capture co-benefits nationally. Cross subsidies could occur due to investment recovery mechanisms and there is a risk that effects may be regressive for low-income households. Assumptions undertaken by the modelling approach strongly indicate that high effectiveness of other policy instruments is needed for an EU-wide TWC scheme to be cost-effective

  2. Implementation of a compressive sampling scheme for wireless sensors to achieve energy efficiency in a structural health monitoring system

    O'Connor, Sean M.; Lynch, Jerome P.; Gilbert, Anna C.

    2013-04-01

    Wireless sensors have emerged to offer low-cost sensors with impressive functionality (e.g., data acquisition, computing, and communication) and modular installations. Such advantages enable higher nodal densities than tethered systems resulting in increased spatial resolution of the monitoring system. However, high nodal density comes at a cost as huge amounts of data are generated, weighing heavy on power sources, transmission bandwidth, and data management requirements, often making data compression necessary. The traditional compression paradigm consists of high rate (>Nyquist) uniform sampling and storage of the entire target signal followed by some desired compression scheme prior to transmission. The recently proposed compressed sensing (CS) framework combines the acquisition and compression stage together, thus removing the need for storage and operation of the full target signal prior to transmission. The effectiveness of the CS approach hinges on the presence of a sparse representation of the target signal in a known basis, similarly exploited by several traditional compressive sensing applications today (e.g., imaging, MRI). Field implementations of CS schemes in wireless SHM systems have been challenging due to the lack of commercially available sensing units capable of sampling methods (e.g., random) consistent with the compressed sensing framework, often moving evaluation of CS techniques to simulation and post-processing. The research presented here describes implementation of a CS sampling scheme to the Narada wireless sensing node and the energy efficiencies observed in the deployed sensors. Of interest in this study is the compressibility of acceleration response signals collected from a multi-girder steel-concrete composite bridge. The study shows the benefit of CS in reducing data requirements while ensuring data analysis on compressed data remain accurate.

  3. An Efficient State–Parameter Filtering Scheme Combining Ensemble Kalman and Particle Filters

    Ait-El-Fquih, Boujemaa

    2017-12-11

    This work addresses the state-parameter filtering problem for dynamical systems with relatively large-dimensional state and low-dimensional parameters\\' vector. A Bayesian filtering algorithm combining the strengths of the particle filter (PF) and the ensemble Kalman filter (EnKF) is proposed. At each assimilation cycle of the proposed EnKF-PF, the PF is first used to sample the parameters\\' ensemble followed by the EnKF to compute the state ensemble conditional on the resulting parameters\\' ensemble. The proposed scheme is expected to be more efficient than the traditional state augmentation techniques, which suffer from the curse of dimensionality and inconsistency that is particularly pronounced when the state is a strongly nonlinear function of the parameters. In the new scheme, the EnKF and PF interact via their ensembles\\' members, in contrast with the recently introduced two-stage EnKF-PF (TS-EnKF-PF), which exchanges point estimates between EnKF and PF while requiring almost double the computational load. Numerical experiments are conducted with the Lorenz-96 model to assess the behavior of the proposed filter and to evaluate its performances against the joint PF, joint EnKF, and TS-EnKF-PF. Numerical results suggest that the EnKF-PF performs best in all tested scenarios. It was further found to be more robust, successfully estimating both state and parameters in different sensitivity experiments.

  4. Energy-Efficient Broadcasting Scheme for Smart Industrial Wireless Sensor Networks

    Zhuangbin Chen

    2017-01-01

    Full Text Available In smart Industrial Wireless Sensor Networks (IWSNs, sensor nodes usually adopt a programmable technology. These smart devices can obtain new or special functions by reprogramming: they upgrade their soft systems through receiving new version of program codes. If sensor nodes need to be upgraded, the sink node will propagate program code packets to them through “one-to-many” broadcasting, and therefore new capabilities can be obtained, forming the so-called Software Defined Network (SDN. However, due to the high volume of code packet, the constraint energy of sensor node, and the unreliable link quality of wireless network, rapidly broadcasting the code packets to all nodes in network can be a challenge issue. In this paper, a novel Energy-efficient Broadcast scheme with adjustable broadcasting radius is proposed aiming to improve the performance of network upgrade. In our scheme, the nonhotspots sensor nodes take full advantage of their residual energy caused in data collection period to improve the packet reception probability and reduce the broadcasting delay of code packet transmission by enlarging the broadcasting radius, that is, the transmitting power. The theoretical analyses and experimental results show that, compared with previous work, our approach can averagely reduce the Network Upgrade Delay (NUD by 14.8%–45.2% and simultaneously increase the reliability without harming the lifetime of network.

  5. An Efficient State–Parameter Filtering Scheme Combining Ensemble Kalman and Particle Filters

    Ait-El-Fquih, Boujemaa; Hoteit, Ibrahim

    2017-01-01

    This work addresses the state-parameter filtering problem for dynamical systems with relatively large-dimensional state and low-dimensional parameters' vector. A Bayesian filtering algorithm combining the strengths of the particle filter (PF) and the ensemble Kalman filter (EnKF) is proposed. At each assimilation cycle of the proposed EnKF-PF, the PF is first used to sample the parameters' ensemble followed by the EnKF to compute the state ensemble conditional on the resulting parameters' ensemble. The proposed scheme is expected to be more efficient than the traditional state augmentation techniques, which suffer from the curse of dimensionality and inconsistency that is particularly pronounced when the state is a strongly nonlinear function of the parameters. In the new scheme, the EnKF and PF interact via their ensembles' members, in contrast with the recently introduced two-stage EnKF-PF (TS-EnKF-PF), which exchanges point estimates between EnKF and PF while requiring almost double the computational load. Numerical experiments are conducted with the Lorenz-96 model to assess the behavior of the proposed filter and to evaluate its performances against the joint PF, joint EnKF, and TS-EnKF-PF. Numerical results suggest that the EnKF-PF performs best in all tested scenarios. It was further found to be more robust, successfully estimating both state and parameters in different sensitivity experiments.

  6. Improving the plunge grinding technology efficiency through a rigid scheme use

    І. О. Рябенков

    2016-07-01

    Full Text Available Theoretical bases of grinding technology researches results form the basis of this work. It has been shown that grinding efficiency increase can be achieved through the use of new kinematic grinding schemes and progressive designs of abrasive tools. However, not enough attention is paid to the calculation of the main technological machining parameters with due regard to separate processes of cutting and friction at grinding, thus restricting the effective application of these kinematic grinding schemes and scientifically grounded selection of optimal processing conditions. In this paper a mathematical model has been developed for determining the material removal rate and cutting force at plunge grinding, what made it possible to substantiate reducing the power strength at grinding and to increase productivity. Calculations revealed that the cutting force at plunge grinding is conditioned by the disk bond friction against the material being processed, the intensity of which in the course of processing time increases proportionally due to an increase of elastic movements in the technological system. Proceeding from these results the optimum grinding conditions based on the use of the abrasive disk that works under self-sharpening conditions, thus eliminating the disk bond friction against the material being processed, have been grounded. In this case, the abrasive disk provides complete removal of the processed material supplied to the cutting zone at the nominal speed of a workpiece movement. Also the ability to reduce cutting forces through the increase of the disk speed and the workpiece speed ratio has been shown

  7. Comparative Analysis of Mobility Management Schemes in a Low Earth Orbit Satellite Network

    Conkling, Stephen

    2000-01-01

    .... This resource must be used efficiently, and this involves reducing the management overhead. This thesis investigates one aspect of management overhead, the bandwidth cost associated with mobility...

  8. High thermal efficiency x-ray energy conversion scheme for advanced fusion reactors

    Quimby, D.C.; Taussig, R.T.; Hertzberg, A.

    1977-01-01

    This paper reports on a new radiation energy conversion scheme which appears to be capable of producing electricity from the high quality x-ray energy with efficiencies of 60 to 70 percent. This new reactor concept incorporates a novel x-ray radiation boiler and a new thermal conversion device known as an energy exchanger. The low-Z first walls of the radiation boiler are semi-transparent to x-rays, and are kept cool by incoming working fluid, which is subsequently heated to temperatures of 2000 to 3000 0 K in the interior of the boiler by volumetric x-ray absorption. The radiation boiler may be a compact part of the reactor shell since x-rays are readily absorbed in high-Z materials. The energy exchanger transfers the high-temperature working fluid energy to a lower temperature gas which drives a conventional turbine. The overall efficiency of the cycle is characterized by the high temperature of the working fluid. The high thermal efficiencies which appear achievable with this cycle would make an otherwise marginal advanced fusion reactor into an attractive net power producer. The operating principles, initial conceptual design, and engineering problems of the radiation boiler and thermal cycle are presented

  9. An efficient coupled polynomial interpolation scheme for shear mode sandwich beam finite element

    Litesh N. Sulbhewar

    Full Text Available An efficient piezoelectric sandwich beam finite element is presented here. It employs the coupled polynomial field interpolation scheme for field variables which incorporates electromechanical coupling at interpolation level itself; unlike conventional sandwich beam theory (SBT based formulations available in the literature. A variational formulation is used to derive the governing equations, which are used to establish the relationships between field variables. These relations lead to the coupled polynomial field descriptions of variables, unlike conventional SBT formulations which use assumed independent polynomials. The relative axial displacement is expressed only by coupled terms containing contributions from other mechanical and electrical variables, thus eliminating use of the transverse displacement derivative as a degree of freedom. A set of coupled shape function based on these polynomials has shown the improvement in the convergence characteristics of the SBT based formulation. This improvement in the performance is achieved with one nodal degree of freedom lesser than the conventional SBT formulations.

  10. Transport Schemes for Fiber-Wireless Technology: Transmission Performance and Energy Efficiency

    Christina Lim

    2014-04-01

    Full Text Available Fiber-wireless technology has been actively researched as a potential candidate for next generation broadband wireless signal distribution. Despite the popularity, this hybrid scheme has many technical challenges that impede the uptake and commercial deployment. One of the inherent issues is the transport of the wireless signals over a predominantly digital optical network in today’s telecommunication infrastructure. Many different approaches have been introduced and demonstrated with digitized RF transport of the wireless signals being the most compatible with the existing optical fiber networks. In this paper, we review our work in the area of digitized RF transport to address the inherent issues related to analog transport in the fiber-wireless links and compare the transmission performance and energy efficiency with the other transport strategies.

  11. Energy efficient thermal management of data centers

    Kumar, Pramod

    2012-01-01

    Energy Efficient Thermal Management of Data Centers examines energy flow in today's data centers. Particular focus is given to the state-of-the-art thermal management and thermal design approaches now being implemented across the multiple length scales involved. The impact of future trends in information technology hardware, and emerging software paradigms such as cloud computing and virtualization, on thermal management are also addressed. The book explores computational and experimental characterization approaches for determining temperature and air flow patterns within data centers. Thermodynamic analyses using the second law to improve energy efficiency are introduced and used in proposing improvements in cooling methodologies. Reduced-order modeling and robust multi-objective design of next generation data centers are discussed. This book also: Provides in-depth treatment of energy efficiency ideas based on  fundamental heat transfer, fluid mechanics, thermodynamics, controls, and computer science Focus...

  12. Designing incentive schemes for promoting energy-efficient appliances: A new methodology and a case study for Spain

    Galarraga, Ibon; Abadie, Luis M.; Kallbekken, Steffen

    2016-01-01

    The energy-efficiency gap has been high on research and policy agendas for several decades. Incentive schemes such as subsidies, taxes and bonus-malus schemes are widely used to promote energy-efficient appliances. Most research, however, considers instruments in isolation, and only rarely in the context of political constraints on instrument use, or for alternative policy goals. This paper presents a methodology for the optimal design of incentive schemes based on the minimisation of Dead Weight Loss for different policy goals and policy restrictions. The use of the methodology is illustrated by designing optimal combinations of taxes and subsidies in Spain for three types of appliance: dishwashers, refrigerators and washing machines. The optimal policies are designed subject to different policy goals such as achieving a fixed reduction in emissions or a certain increased market share for efficient appliances, and for policy constraints such as budget neutrality. The methodology developed here can also be used to evaluate past and current incentive schemes. - Highlights: • A new methodology for the optimal design of incentive schemes is presented. • This is done minimising the Dead Weight Loss for different goals and restrictions. • Efficient bonus malus schemes can be designed with this method.

  13. Analysing the interactions between renewable energy promotion and energy efficiency support schemes: The impact of different instruments and design elements

    Rio, Pablo del

    2010-01-01

    CO 2 emissions reduction, renewable energy deployment and energy efficiency are three main energy/environmental goals, particularly in Europe. Their relevance has led to the implementation of support schemes in these realms. Their coexistence may lead to overlaps, synergies and conflicts between them. The aim of this paper is to analyse the interactions between energy efficiency measures and renewable energy promotion, whereas previous analyses have focused on the interactions between emissions trading schemes (ETS) and energy efficiency measures and ETS and renewable energy promotion schemes. Furthermore, the analysis in this paper transcends the 'certificate' debate (i.e., tradable green and white certificates) and considers other instruments, particularly feed-in tariffs for renewable electricity. The goal is to identify positive and negative interactions between energy efficiency and renewable electricity promotion and to assess whether the choice of specific instruments and design elements within those instruments affects the results of the interactions.

  14. Analysing the interactions between renewable energy promotion and energy efficiency support schemes: The impact of different instruments and design elements

    Rio, Pablo del, E-mail: pablo.delrio@cchs.csic.e [Instituto de Politicas y Bienes Publicos, Consejo Superior de Investigaciones Cientificas (CSIC), C/Albasanz 26-28, 28037 Madrid (Spain)

    2010-09-15

    CO{sub 2} emissions reduction, renewable energy deployment and energy efficiency are three main energy/environmental goals, particularly in Europe. Their relevance has led to the implementation of support schemes in these realms. Their coexistence may lead to overlaps, synergies and conflicts between them. The aim of this paper is to analyse the interactions between energy efficiency measures and renewable energy promotion, whereas previous analyses have focused on the interactions between emissions trading schemes (ETS) and energy efficiency measures and ETS and renewable energy promotion schemes. Furthermore, the analysis in this paper transcends the 'certificate' debate (i.e., tradable green and white certificates) and considers other instruments, particularly feed-in tariffs for renewable electricity. The goal is to identify positive and negative interactions between energy efficiency and renewable electricity promotion and to assess whether the choice of specific instruments and design elements within those instruments affects the results of the interactions.

  15. Analysing the interactions between renewable energy promotion and energy efficiency support schemes. The impact of different instruments and design elements

    Del Rio, Pablo [Instituto de Politicas y Bienes Publicos, Consejo Superior de Investigaciones Cientificas (CSIC), C/Albasanz 26-28, 28037 Madrid (Spain)

    2010-09-15

    CO{sub 2} emissions reduction, renewable energy deployment and energy efficiency are three main energy/environmental goals, particularly in Europe. Their relevance has led to the implementation of support schemes in these realms. Their coexistence may lead to overlaps, synergies and conflicts between them. The aim of this paper is to analyse the interactions between energy efficiency measures and renewable energy promotion, whereas previous analyses have focused on the interactions between emissions trading schemes (ETS) and energy efficiency measures and ETS and renewable energy promotion schemes. Furthermore, the analysis in this paper transcends the certificate debate (i.e., tradable green and white certificates) and considers other instruments, particularly feed-in tariffs for renewable electricity. The goal is to identify positive and negative interactions between energy efficiency and renewable electricity promotion and to assess whether the choice of specific instruments and design elements within those instruments affects the results of the interactions. (author)

  16. Distributed multi-agent scheme for reactive power management with renewable energy

    Rahman, M.S.; Mahmud, M.A.; Pota, H.R.; Hossain, M.J.

    2014-01-01

    Highlights: • A distributed multi-agent scheme is proposed to enhance the dynamic voltage stability. • A control agent is designed where control actions are performed through PI controller. • Proposed scheme is compared with the conventional approach with DSTATCOM. • Proposed scheme adapts the capability of estimation and control under various operating conditions. - Abstract: This paper presents a new distributed multi-agent scheme for reactive power management in smart coordinated distribution networks with renewable energy sources (RESs) to enhance the dynamic voltage stability, which is mainly based on controlling distributed static synchronous compensators (DSTATCOMs). The proposed control scheme is incorporated in a multi-agent framework where the intelligent agents simultaneously coordinate with each other and represent various physical models to provide information and energy flow among different physical processes. The reactive power is estimated from the topology of distribution networks and with this information, necessary control actions are performed through the proposed proportional integral (PI) controller. The performance of the proposed scheme is evaluated on a 8-bus distribution network under various operating conditions. The performance of the proposed scheme is validated through simulation results and these results are compared to that of conventional PI-based DSTATCOM control scheme. From simulation results, it is found that the distributed MAS provides excellence performance for improving voltage profiles by managing reactive power in a smarter way

  17. Self-consistent clustering analysis: an efficient multiscale scheme for inelastic heterogeneous materials

    Liu, Z.; Bessa, M. A.; Liu, W.K.

    2017-10-25

    A predictive computational theory is shown for modeling complex, hierarchical materials ranging from metal alloys to polymer nanocomposites. The theory can capture complex mechanisms such as plasticity and failure that span across multiple length scales. This general multiscale material modeling theory relies on sound principles of mathematics and mechanics, and a cutting-edge reduced order modeling method named self-consistent clustering analysis (SCA) [Zeliang Liu, M.A. Bessa, Wing Kam Liu, “Self-consistent clustering analysis: An efficient multi-scale scheme for inelastic heterogeneous materials,” Comput. Methods Appl. Mech. Engrg. 306 (2016) 319–341]. SCA reduces by several orders of magnitude the computational cost of micromechanical and concurrent multiscale simulations, while retaining the microstructure information. This remarkable increase in efficiency is achieved with a data-driven clustering method. Computationally expensive operations are performed in the so-called offline stage, where degrees of freedom (DOFs) are agglomerated into clusters. The interaction tensor of these clusters is computed. In the online or predictive stage, the Lippmann-Schwinger integral equation is solved cluster-wise using a self-consistent scheme to ensure solution accuracy and avoid path dependence. To construct a concurrent multiscale model, this scheme is applied at each material point in a macroscale structure, replacing a conventional constitutive model with the average response computed from the microscale model using just the SCA online stage. A regularized damage theory is incorporated in the microscale that avoids the mesh and RVE size dependence that commonly plagues microscale damage calculations. The SCA method is illustrated with two cases: a carbon fiber reinforced polymer (CFRP) structure with the concurrent multiscale model and an application to fatigue prediction for additively manufactured metals. For the CFRP problem, a speed up estimated to be about

  18. An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink

    Kim Yong-Seok

    2008-01-01

    Full Text Available An efficient scheduling scheme is proposed to increase the available capacity of VoIP services over evolved UTRA uplink. On top of the advantages of persistent scheduling, the proposed scheme adaptively share the resources of two VoIP users to get early-termination gain of dynamic scheduler. Through system-level simulations, the performance of the proposed algorithm is evaluated in terms of the capacity enhancement of VoIP services. Comparisons with the original persistent scheduling and the HSUPA scheduler reveal that the proposed scheme increases the capacity of VoIP services up to 20%.

  19. A discontinous Galerkin finite element method with an efficient time integration scheme for accurate simulations

    Liu, Meilin; Bagci, Hakan

    2011-01-01

    A discontinuous Galerkin finite element method (DG-FEM) with a highly-accurate time integration scheme is presented. The scheme achieves its high accuracy using numerically constructed predictor-corrector integration coefficients. Numerical results

  20. Application of a robust and efficient Lagrangian particle scheme to soot transport in turbulent flames

    Attili, Antonio; Bisetti, Fabrizio

    2013-01-01

    . The proposed scheme exhibits superior properties with respect to conventional Eulerian schemes in terms of stability, accuracy, and grid convergence. Taking into account the quality of the solution, the Lagrangian approach can be computationally more economical

  1. Nanooptics for high efficient photon managment

    Wyrowski, Frank; Schimmel, Hagen

    2005-09-01

    Optical systems for photon management, that is the generation of tailored electromagnetic fields, constitute one of the keys for innovation through photonics. An important subfield of photon management deals with the transformation of an incident light field into a field of specified intensity distribution. In this paper we consider some basic aspects of the nature of systems for those light transformations. It turns out, that the transversal redistribution of energy (TRE) is of central concern to achieve systems with high transformation efficiency. Besides established techniques nanostructured optical elements (NOE) are demanded to implement transversal energy redistribution. That builds a bridge between the needs of photon management, optical engineering, and nanooptics.

  2. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.

  3. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks.

    He, Huaguang; Li, Taoshen; Feng, Luting; Ye, Jin

    2017-07-15

    Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust the transmission rate is core work for transport protocol design. However, recent works have shown that the existing cross-layer congestion detection solutions are too complex to be deployed or not able to characterize the congestion accurately. We first propose a new congestion metric called frame transmission efficiency (i.e., the ratio of successful transmission delay to the frame service delay), which describes the medium contention in a fast and accurate manner. We further present the design and implementation of RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), a general supporting scheme that adjusts the transport sending rate through a standard ECN (Explicit Congestion Notification) signaling method. Our method can be deployed on commodity switches with small firmware updates, while making no modification on end hosts. We integrate RECN transparently (i.e., without modification) with TCP on NS2 simulation. The experimental results show that RECN remarkably improves network goodput across multiple concurrent TCP flows.

  4. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  5. Area-based management and fishing efficiency

    Marchal, P.; Ulrich, C.; Pastoors, M.

    2002-01-01

    The scope of this study is to investigate the extent to which area-based management may have influenced the fishing efficiency of the Danish and Dutch demersal fleets harvesting cod, plaice and sole in the North Sea. Special consideration is given to the `plaice box', a restricted area where fishing

  6. Studies on equilibrium fuel management schemes on the Dragon HTR core design

    Daub, J; Pedersen, J

    1971-02-03

    The Dragon Project has recently started investigations on fuel management in HTR's with the assumed Dragon design. The study covers the results of investigations into a number of equilibrium fuel management schemes with the 1-dimensional FLATTER code and calculations of the corresponding total power generating costs with the programme TECO.

  7. PERFORMANCE MANAGEMENT AND EFFICIENCY OF COMMUNICATION

    LIVIU NEAMTU

    2017-12-01

    Full Text Available Performance management is, in fact, that systemic coordination process through communication of actions undertaken by the firm in the context of an environment which is in a continuous movement and transformation, which anticipates changes, taking appropriate response measures, time-reacting, dynamically, flexible and quickly to these changes through appropriate strategies, which application in practice is monitored, controlled and adjusted continuously. Performance management is defined as complete and complex levels of communication on organizing through strategies, policy decisions, coordination with business plans and innovative programs and tactics along with the steps required to implement these levels in the company's activity. Performance management is the management of the company based on communication and participativ management; therefore the efficiency of communication and participativ management is the foundation of performance management, it outlines the priorities, thus becoming the basic factor in the development of management programs and in the course of their ongoing. Consequently, for running relevant and profitable a business, a company needs performance management areas well-delineated, with specific tasks, that can transform customer or generally the society needs into profitable business opportunities.

  8. Unified Importance Sampling Schemes for Efficient Simulation of Outage Capacity over Generalized Fading Channels

    Rached, Nadhir B.; Kammoun, Abla; Alouini, Mohamed-Slim; Tempone, Raul

    2015-01-01

    The outage capacity (OC) is among the most important performance metrics of communication systems operating over fading channels. Of interest in the present paper is the evaluation of the OC at the output of the Equal Gain Combining (EGC) and the Maximum Ratio Combining (MRC) receivers. In this case, it can be seen that this problem turns out to be that of computing the Cumulative Distribution Function (CDF) for the sum of independent random variables. Since finding a closedform expression for the CDF of the sum distribution is out of reach for a wide class of commonly used distributions, methods based on Monte Carlo (MC) simulations take pride of price. In order to allow for the estimation of the operating range of small outage probabilities, it is of paramount importance to develop fast and efficient estimation methods as naive Monte Carlo (MC) simulations would require high computational complexity. In this line, we propose in this work two unified, yet efficient, hazard rate twisting Importance Sampling (IS) based approaches that efficiently estimate the OC of MRC or EGC diversity techniques over generalized independent fading channels. The first estimator is shown to possess the asymptotic optimality criterion and applies for arbitrary fading models, whereas the second one achieves the well-desired bounded relative error property for the majority of the well-known fading variates. Moreover, the second estimator is shown to achieve the asymptotic optimality property under the particular Log-normal environment. Some selected simulation results are finally provided in order to illustrate the substantial computational gain achieved by the proposed IS schemes over naive MC simulations.

  9. Unified Importance Sampling Schemes for Efficient Simulation of Outage Capacity over Generalized Fading Channels

    Rached, Nadhir B.

    2015-11-13

    The outage capacity (OC) is among the most important performance metrics of communication systems operating over fading channels. Of interest in the present paper is the evaluation of the OC at the output of the Equal Gain Combining (EGC) and the Maximum Ratio Combining (MRC) receivers. In this case, it can be seen that this problem turns out to be that of computing the Cumulative Distribution Function (CDF) for the sum of independent random variables. Since finding a closedform expression for the CDF of the sum distribution is out of reach for a wide class of commonly used distributions, methods based on Monte Carlo (MC) simulations take pride of price. In order to allow for the estimation of the operating range of small outage probabilities, it is of paramount importance to develop fast and efficient estimation methods as naive Monte Carlo (MC) simulations would require high computational complexity. In this line, we propose in this work two unified, yet efficient, hazard rate twisting Importance Sampling (IS) based approaches that efficiently estimate the OC of MRC or EGC diversity techniques over generalized independent fading channels. The first estimator is shown to possess the asymptotic optimality criterion and applies for arbitrary fading models, whereas the second one achieves the well-desired bounded relative error property for the majority of the well-known fading variates. Moreover, the second estimator is shown to achieve the asymptotic optimality property under the particular Log-normal environment. Some selected simulation results are finally provided in order to illustrate the substantial computational gain achieved by the proposed IS schemes over naive MC simulations.

  10. MODEL OF PHYTOPLANKTON COMPETITION FOR LIMITING AND NONLIMITING NUTRIENTS: IMPLICATIONS FOR DEVELOPMENT OF ESTUARINE AND NEARSHORE MANAGEMENT SCHEMES

    The global increase of noxious bloom occurrences has increased the need for phytoplankton management schemes. Such schemes require the ability to predict phytoplankton succession. Equilibrium Resources Competition theory, which is popular for predicting succession in lake systems...

  11. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    Anfeng Liu

    2015-12-01

    Full Text Available In this paper, a Per-Hop Acknowledgement (PHACK-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes.

  12. Modeling and performance analysis of an improved movement-based location management scheme for packet-switched mobile communication systems.

    Chung, Yun Won; Kwon, Jae Kyun; Park, Suwon

    2014-01-01

    One of the key technologies to support mobility of mobile station (MS) in mobile communication systems is location management which consists of location update and paging. In this paper, an improved movement-based location management scheme with two movement thresholds is proposed, considering bursty data traffic characteristics of packet-switched (PS) services. The analytical modeling for location update and paging signaling loads of the proposed scheme is developed thoroughly and the performance of the proposed scheme is compared with that of the conventional scheme. We show that the proposed scheme outperforms the conventional scheme in terms of total signaling load with an appropriate selection of movement thresholds.

  13. Australian managed entry scheme: a new manageable process for the reimbursement of new medicines?

    Wonder, Michael; Backhouse, Martin E; Sullivan, Sean D

    2012-05-01

    The global prescription medicines industry argues that it needs high prices for new medicines to meet ever-increasing development costs. While many payers are prepared to pay high prices if they represent good value for money, they first need to feel assured that the value for money estimates are robust. Insofar as new medicines enter the market with limited and uncertain data relating to their performance in normal clinical practice, the value for money case for some medicines may well be driven largely by assumptions than by empirical evidence. The concern to manufacturers is that payers respond to this uncertainty by listing the product at a lower price (which may not satisfy the producer) or not listing the product until more evidence is available (which may not satisfy clinicians and patients). Is there a solution that will satisfy all key stakeholders? Will clinicians and patients continue to have timely access to new medicines and will payers have sustainable reimbursement systems? Will the industry continue to be rewarded with high prices for new medicines so long as they represent good value for money? In 2011, the Australian Government introduced a managed entry scheme whereby the Pharmaceutical Benefits Advisory Committee will recommend the listing of a new medicine at a price justified by the existing evidence, pending the availability of more conclusive evidence of cost-effectiveness to support its continued listing at a higher price. This commentary examines the Australian Government's managed entry scheme and issues that are likely to arise from its implementation. Copyright © 2012 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  14. Decentralized production management: telecommunication and coordination schemes validation

    Caire, R.; Retiere, N.; Hadjsaid, N.

    2005-01-01

    Decentralized production development is a reality in the majority of the power networks all over the world. The deregulation of the market of energy, ecological constraints as well as the technological developments of small power production encourage this development. Distribution networks represent the portion of the power system where the development of this production is the most awaited. Some studies carried out on the interconnection of decentralized production on a large scale ratio have shown significant effects and impacts on operation of the entire electric system. Indeed, the entire distribution network is going to be deeply modified by the introduction of new functions of remote control, of specific architectures, of intelligent protection systems and of telecommunication and information technologies. With these new paradigms the ability of testing and simulating the Distribution Management Systems is more and more necessary. Also, this is a crucial requirement for new communication means in order to better define the new management strategies of the production units within the distribution networks. The aim of this paper is to present a new real time experimental bench able to validate control strategies and communication devices included in Distribution Management Systems (DMS). (authors)

  15. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

    Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-06-23

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

  16. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

    Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-01-01

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381

  17. Management of projects for energy efficiency

    Vuković Miodrag M.

    2014-01-01

    Full Text Available In an effort to lower operating costs and improve competitiveness, many organizations today are preparing projects in the field of energy saving. On the other hand, companies that provide energy services and implement these projects, need to build competences in this area to well manage the projects which are subject to energy savings and by this to justify the confidence of investors. This paper presents research that shows the most important factors for the development of local capacity in project management in the field of energy efficiency.

  18. Increasing efficiency through integrated energy data management

    Brack, M.

    2002-01-01

    This article discusses how improved management of energy data can bring about the increase in efficiency that is necessary for an electricity enterprise operating in a liberalised electricity market. The relevant technical and business processes involved for a typical power distribution utility are described. The present situation is reviewed and the various physical, data-logistics and commercial 'domains' involved are examined. Possible solutions for energy data logistics and integrated data management are discussed from the points of view of the operating utility, the power supplier and those responsible for balancing out supply and demand

  19. Consolidating the social health insurance schemes in China: towards an equitable and efficient health system.

    Meng, Qingyue; Fang, Hai; Liu, Xiaoyun; Yuan, Beibei; Xu, Jin

    2015-10-10

    Fragmentation in social health insurance schemes is an important factor for inequitable access to health care and financial protection for people covered by different health insurance schemes in China. To fulfil its commitment of universal health coverage by 2020, the Chinese Government needs to prioritise addressing this issue. After analysing the situation of fragmentation, this Review summarises efforts to consolidate health insurance schemes both in China and internationally. Rural migrants, elderly people, and those with non-communicable diseases in China will greatly benefit from consolidation of the existing health insurance schemes with extended funding pools, thereby narrowing the disparities among health insurance schemes in fund level and benefit package. Political commitments, institutional innovations, and a feasible implementation plan are the major elements needed for success in consolidation. Achievement of universal health coverage in China needs systemic strategies including consolidation of the social health insurance schemes. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. An adaptive short-term prediction scheme for wind energy storage management

    Blonbou, Ruddy; Monjoly, Stephanie; Dorville, Jean-Francois

    2011-01-01

    Research highlights: → We develop a real time algorithm for grid-connected wind energy storage management. → The method aims to guarantee, with ±5% error margin, the power sent to the grid. → Dynamic scheduling of energy storage is based on short-term energy prediction. → Accurate predictions reduce the need in storage capacity. -- Abstract: Efficient forecasting scheme that includes some information on the likelihood of the forecast and based on a better knowledge of the wind variations characteristics along with their influence on power output variation is of key importance for the optimal integration of wind energy in island's power system. In the Guadeloupean archipelago (French West-Indies), with a total wind power capacity of 25 MW; wind energy can represent up to 5% of the instantaneous electricity production. At this level, wind energy contribution can be equivalent to the current network primary control reserve, which causes balancing difficult. The share of wind energy is due to grow even further since the objective is set to reach 118 MW by 2020. It is an absolute evidence for the network operator that due to security concerns of the electrical grid, the share of wind generation should not increase unless solutions are found to solve the prediction problem. The University of French West-Indies and Guyana has developed a short-term wind energy prediction scheme that uses artificial neural networks and adaptive learning procedures based on Bayesian approach and Gaussian approximation. This paper reports the results of the evaluation of the proposed approach; the improvement with respect to the simple persistent prediction model was globally good. A discussion on how such a tool combined with energy storage capacity could help to smooth the wind power variation and improve the wind energy penetration rate into island utility network is also proposed.

  1. A High-Efficiency Voltage Equalization Scheme for Supercapacitor Energy Storage System in Renewable Generation Applications

    Liran Li

    2016-06-01

    Full Text Available Due to its fast charge and discharge rate, a supercapacitor-based energy storage system is especially suitable for power smoothing in renewable energy generation applications. Voltage equalization is essential for series-connected supercapacitors in an energy storage system, because it supports the system’s sustainability and maximizes the available cell energy. In this paper, we present a high-efficiency voltage equalization scheme for supercapacitor energy storage systems in renewable generation applications. We propose an improved isolated converter topology that uses a multi-winding transformer. An improved push-pull forward circuit is applied on the primary side of the transformer. A coupling inductor is added on the primary side to allow the switches to operate under the zero-voltage switching (ZVS condition, which reduces switching losses. The diodes in the rectifier are replaced with metal-oxide-semiconductor field-effect transistors (MOSFETs to reduce the power dissipation of the secondary side. In order to simplify the control, we designed a controllable rectifying circuit to achieve synchronous rectifying on the secondary side of the transformer. The experimental results verified the effectiveness of the proposed design.

  2. Energy efficient distributed cluster head scheduling scheme for two tiered wireless sensor network

    G. Kannan

    2015-07-01

    Full Text Available Wireless Sensor Network (WSN provides a significant contribution in the emerging fields such as ambient intelligence and ubiquitous computing. In WSN, optimization and load balancing of network resources are critical concern to provide the intelligence for long duration. Since clustering the sensor nodes can significantly enhance overall system scalability and energy efficiency this paper presents a distributed cluster head scheduling (DCHS algorithm to achieve the network longevity in WSN. The major novelty of this work is that the network is divided into primary and secondary tiers based on received signal strength indication of sensor nodes from the base station. The proposed DCHS supports for two tier WSN architecture and gives suggestion to elect the cluster head nodes and gateway nodes for both primary and secondary tiers. The DCHS mechanism satisfies an ideal distribution of the cluster head among the sensor nodes and avoids frequent selection of cluster head, based on Received Signal Strength Indication (RSSI and residual energy level of the sensor nodes. Since the RSSI is the key parameter for this paper, the practical experiment was conducted to measure RSSI value by using MSP430F149 processor and CC2500 transceiver. The measured RSSI values were given input to the event based simulator to test the DCHS mechanism. The real time experimental study validated the proposed scheme for various scenarios.

  3. A discontinous Galerkin finite element method with an efficient time integration scheme for accurate simulations

    Liu, Meilin

    2011-07-01

    A discontinuous Galerkin finite element method (DG-FEM) with a highly-accurate time integration scheme is presented. The scheme achieves its high accuracy using numerically constructed predictor-corrector integration coefficients. Numerical results show that this new time integration scheme uses considerably larger time steps than the fourth-order Runge-Kutta method when combined with a DG-FEM using higher-order spatial discretization/basis functions for high accuracy. © 2011 IEEE.

  4. Efficient Hybrid Watermarking Scheme for Security and Transmission Bit Rate Enhancement of 3D Color-Plus-Depth Video Communication

    El-Shafai, W.; El-Rabaie, S.; El-Halawany, M.; Abd El-Samie, F. E.

    2018-03-01

    Three-Dimensional Video-plus-Depth (3DV + D) comprises diverse video streams captured by different cameras around an object. Therefore, there is a great need to fulfill efficient compression to transmit and store the 3DV + D content in compressed form to attain future resource bounds whilst preserving a decisive reception quality. Also, the security of the transmitted 3DV + D is a critical issue for protecting its copyright content. This paper proposes an efficient hybrid watermarking scheme for securing the 3DV + D transmission, which is the homomorphic transform based Singular Value Decomposition (SVD) in Discrete Wavelet Transform (DWT) domain. The objective of the proposed watermarking scheme is to increase the immunity of the watermarked 3DV + D to attacks and achieve adequate perceptual quality. Moreover, the proposed watermarking scheme reduces the transmission-bandwidth requirements for transmitting the color-plus-depth 3DV over limited-bandwidth wireless networks through embedding the depth frames into the color frames of the transmitted 3DV + D. Thus, it saves the transmission bit rate and subsequently it enhances the channel bandwidth-efficiency. The performance of the proposed watermarking scheme is compared with those of the state-of-the-art hybrid watermarking schemes. The comparisons depend on both the subjective visual results and the objective results; the Peak Signal-to-Noise Ratio (PSNR) of the watermarked frames and the Normalized Correlation (NC) of the extracted watermark frames. Extensive simulation results on standard 3DV + D sequences have been conducted in the presence of attacks. The obtained results confirm that the proposed hybrid watermarking scheme is robust in the presence of attacks. It achieves not only very good perceptual quality with appreciated PSNR values and saving in the transmission bit rate, but also high correlation coefficient values in the presence of attacks compared to the existing hybrid watermarking schemes.

  5. Analysis and performance assessment of a fragment retransmission scheme for energy efficient IEEE 802.11 WLANs.

    Mafole, Prosper; Aritsugi, Masayoshi

    2016-01-01

    Backoff-free fragment retransmission (BFFR) scheme enhances the performance of legacy MAC layer fragmentation by eliminating contention overhead. The eliminated overhead is the result of backoff executed before a retransmission attempt is made when fragment transmission failure occurs within a fragment burst. This paper provides a mathematical analysis of BFFR energy efficiency and further assesses, by means of simulations, the energy efficiency, throughput and delay obtained when BFFR is used. The validity of the new scheme is evaluated in different scenarios namely, constant bit rate traffic, realistic bursty internet traffic, node mobility, rigid and elastic flows and their combinations at different traffic loads. We also evaluate and discuss the impact of BFFR on MAC fairness when the number of nodes is varied from 4 to 10. It is shown that BFFR has advantages over legacy MAC fragmentation scheme in all the scenarios.

  6. Area-based management and fishing efficiency

    Marchal, P.; Ulrich, Clara; Pastoors, M.

    2002-01-01

    The scope of this study is to investigate the extent to which area-based management may have influenced the fishing efficiency of the Danish and Dutch demersal fleets harvesting cod, plaice and sole in the North Sea. Special consideration is given to the 'plaice box', a restricted area where...... fishing is prohibited to towed-gear fleets of horsepower exceeding 300 hp. An index of fishing power is calculated as the log-ratio between the catch per unit effort (CPUE) of any vessel and some survey abundance index. Annual trends in fishing are calculated as the year-effect derived from a general...... linear model (GLM) analysis of the index of fishing power. The fishing efficiency of Danish gill-netters and, to some extent, Danish seiners, has overall increased inside the 'plaice box', whilst remaining relatively stable outside. However, the fishing efficiency of the other exemption fleets has...

  7. Static and dynamic efficiency of white certificate schemes; L'efficacite statique et dynamique des dispositifs de -certificats blancs-

    Giraudet, L.G. [CIRED-ENPC, 94 - Nogent-sur-Marne (France); Finon, D. [CIRED-CNRS, 94 - Nogent-sur-Marne (France)

    2011-07-15

    White Certificate Schemes mandate energy companies to promote energy efficiency through flexibility mechanisms, including the trading of energy savings. They can be characterized as a quantity-based, baseline-and-credit system for the diffusion of energy efficient technologies. This paper compares experiences with White Certificate Schemes in Great Britain, Italy and France, in order to identify the basic drivers of each, and ultimately offer an original interpretation as an adaptive instrument, in the sense that it can take different forms in response to specific institutional contexts. A first analysis shows that Schemes perform well in terms of static efficiency, i.e. they are cost-effective and generate net social benefits over the period considered, though with large discrepancies rooted in different technological potentials. Regarding dynamic efficiency, i.e. the ability to induce and sustain technological change over the long haul, market transformation occurred in Great Britain, but was poorly incentivized in Italy and France by inadequate compliance cost recovery rules. Substantial organizational change has occurred in every country, mainly by strengthening vertical relationships between obliged parties and upstream businesses. Overall, the obligation (rather than the market component) drives the early phases of the Schemes. (authors)

  8. An efficient single-step scheme for manipulating quantum information of two trapped ions beyond the Lamb-Dicke limit

    Wei, L.F.; Nori, Franco

    2003-01-01

    Based on the exact conditional quantum dynamics for a two-ion system, we propose an efficient single-step scheme for coherently manipulating quantum information of two trapped cold ions by using a pair of synchronous laser pulses. Neither the auxiliary atomic level nor the Lamb-Dicke approximation are needed

  9. Costs, equity, efficiency and feasibility of identifying the poor in Ghana's National Health Insurance Scheme: empirical analysis of various strategies.

    Aryeetey, G.C.N.O.; Jehu-Appiah, C.; Spaan, E.; Agyepong, I.; Baltussen, R.M.

    2012-01-01

    Objectives To analyse the costs and evaluate the equity, efficiency and feasibility of four strategies to identify poor households for premium exemptions in Ghana's National Health Insurance Scheme (NHIS): means testing (MT), proxy means testing (PMT), participatory wealth ranking (PWR) and

  10. DEP2SA: A Decentralised Efficient Privacy-Preserving and Selective Aggregation Scheme in Advanced Metering Infrastructure

    Mustafa, Mustafa; Zhang, Ning; Kalogridis, Georgios; Fan, Zhong

    2015-01-01

    This paper proposes a novel solution, called a decentralised, efficient, privacy-preserving and selective aggregation (DEP2SA) scheme, designed to support secure and user privacy-preserving data collection in the advanced metering infrastructure. DEP2SA is more efficient and applicable in real-life deployment, as compared with the state of the art, by adopting and adapting a number of key technologies: (1) it uses a multi-recipient system model, making it more applicable to a liberalised elec...

  11. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  12. Analysis of energy efficiency retrofit schemes for heating, ventilating and air-conditioning systems in existing office buildings based on the modified bin method

    Wang, Zhaoxia; Ding, Yan; Geng, Geng; Zhu, Neng

    2014-01-01

    Highlights: • A modified bin method is adopted to propose and optimize the EER schemes. • A case study is presented to demonstrate the analysis procedures of EER schemes. • Pertinent EER schemes for HVAC systems are proposed for the object building. - Abstract: Poor thermal performance of building envelop and low efficiencies of heating, ventilating and air-conditioning (HVAC) systems can always be found in the existing office buildings with large energy consumption. This paper adopted a modified bin method to propose and optimize the energy efficiency retrofit (EER) schemes. An existing office building in Tianjin was selected as an example to demonstrate the procedures of formulating the design scheme. Pertinent retrofit schemes for HVAC system were proposed after the retrofit of building envelop. With comprehensive consideration of energy efficiency and economic benefits, the recommended scheme that could improve the overall energy efficiency by 71.20% was determined

  13. Efficient Bandwidth Management for Ethernet Passive Optical Networks

    Elrasad, Amr Elsayed M.

    2016-05-15

    The increasing bandwidth demands in access networks motivates network operators, networking devices manufacturers, and standardization institutions to search for new approaches for access networks. These approaches should support higher bandwidth, longer distance between end user and network operator, and less energy consumption. Ethernet Passive Optical Network (EPON) is a favorable choice for broadband access networks. EPONs support transmission rates up to 10 Gbps. EPONs also support distance between end users and central office up to 20 Km. Moreover, optical networks have the least energy consumption among all types of networks. In this dissertation, we focus on reducing delay and saving energy in EPONs. Reducing delay is essential for delay-sensitive traffic, while minimizing energy consumption is an environmental necessity and also reduces the network operating costs. We identify five challenges, namely excess bandwidth allocation, frame delineation, congestion resolution, large round trip time delay in long-reach EPONs (LR-EPONs), and energy saving. We provide a Dynamic Bandwidth Allocation (DBA) approach for each challenge. We also propose a novel scheme that combines the features of the proposed approaches in one highly performing scheme. Our approach is to design novel DBA protocols that can further reduce the delay and be simultaneously simple and fair. We also present a dynamic bandwidth allocation scheme for Green EPONs taking into consideration maximizing energy saving under target delay constraints. Regarding excess bandwidth allocation, we develop an effective DBA scheme called Delayed Excess Scheduling (DES). DES achieves significant delay and jitter reduction and is more suitable for industrial deployment due to its simplicity. Utilizing DES in hybrid TDM/WDM EPONs (TWDM-EPONs) is also investigated. We also study eliminating the wasted bandwidth due to frame delineation. We develop an interactive DBA scheme, Efficient Grant Sizing Interleaved

  14. An adaptive hybrid EnKF-OI scheme for efficient state-parameter estimation of reactive contaminant transport models

    El Gharamti, Mohamad; Valstar, Johan R.; Hoteit, Ibrahim

    2014-01-01

    Reactive contaminant transport models are used by hydrologists to simulate and study the migration and fate of industrial waste in subsurface aquifers. Accurate transport modeling of such waste requires clear understanding of the system's parameters, such as sorption and biodegradation. In this study, we present an efficient sequential data assimilation scheme that computes accurate estimates of aquifer contamination and spatially variable sorption coefficients. This assimilation scheme is based on a hybrid formulation of the ensemble Kalman filter (EnKF) and optimal interpolation (OI) in which solute concentration measurements are assimilated via a recursive dual estimation of sorption coefficients and contaminant state variables. This hybrid EnKF-OI scheme is used to mitigate background covariance limitations due to ensemble under-sampling and neglected model errors. Numerical experiments are conducted with a two-dimensional synthetic aquifer in which cobalt-60, a radioactive contaminant, is leached in a saturated heterogeneous clayey sandstone zone. Assimilation experiments are investigated under different settings and sources of model and observational errors. Simulation results demonstrate that the proposed hybrid EnKF-OI scheme successfully recovers both the contaminant and the sorption rate and reduces their uncertainties. Sensitivity analyses also suggest that the adaptive hybrid scheme remains effective with small ensembles, allowing to reduce the ensemble size by up to 80% with respect to the standard EnKF scheme. © 2014 Elsevier Ltd.

  15. A simple, robust and efficient high-order accurate shock-capturing scheme for compressible flows: Towards minimalism

    Ohwada, Taku; Shibata, Yuki; Kato, Takuma; Nakamura, Taichi

    2018-06-01

    Developed is a high-order accurate shock-capturing scheme for the compressible Euler/Navier-Stokes equations; the formal accuracy is 5th order in space and 4th order in time. The performance and efficiency of the scheme are validated in various numerical tests. The main ingredients of the scheme are nothing special; they are variants of the standard numerical flux, MUSCL, the usual Lagrange's polynomial and the conventional Runge-Kutta method. The scheme can compute a boundary layer accurately with a rational resolution and capture a stationary contact discontinuity sharply without inner points. And yet it is endowed with high resistance against shock anomalies (carbuncle phenomenon, post-shock oscillations, etc.). A good balance between high robustness and low dissipation is achieved by blending three types of numerical fluxes according to physical situation in an intuitively easy-to-understand way. The performance of the scheme is largely comparable to that of WENO5-Rusanov, while its computational cost is 30-40% less than of that of the advanced scheme.

  16. An adaptive hybrid EnKF-OI scheme for efficient state-parameter estimation of reactive contaminant transport models

    El Gharamti, Mohamad

    2014-09-01

    Reactive contaminant transport models are used by hydrologists to simulate and study the migration and fate of industrial waste in subsurface aquifers. Accurate transport modeling of such waste requires clear understanding of the system\\'s parameters, such as sorption and biodegradation. In this study, we present an efficient sequential data assimilation scheme that computes accurate estimates of aquifer contamination and spatially variable sorption coefficients. This assimilation scheme is based on a hybrid formulation of the ensemble Kalman filter (EnKF) and optimal interpolation (OI) in which solute concentration measurements are assimilated via a recursive dual estimation of sorption coefficients and contaminant state variables. This hybrid EnKF-OI scheme is used to mitigate background covariance limitations due to ensemble under-sampling and neglected model errors. Numerical experiments are conducted with a two-dimensional synthetic aquifer in which cobalt-60, a radioactive contaminant, is leached in a saturated heterogeneous clayey sandstone zone. Assimilation experiments are investigated under different settings and sources of model and observational errors. Simulation results demonstrate that the proposed hybrid EnKF-OI scheme successfully recovers both the contaminant and the sorption rate and reduces their uncertainties. Sensitivity analyses also suggest that the adaptive hybrid scheme remains effective with small ensembles, allowing to reduce the ensemble size by up to 80% with respect to the standard EnKF scheme. © 2014 Elsevier Ltd.

  17. Efficient C1-continuous phase-potential upwind (C1-PPU) schemes for coupled multiphase flow and transport with gravity

    Jiang, Jiamin; Younis, Rami M.

    2017-10-01

    In the presence of counter-current flow, nonlinear convergence problems may arise in implicit time-stepping when the popular phase-potential upwinding (PPU) scheme is used. The PPU numerical flux is non-differentiable across the co-current/counter-current flow regimes. This may lead to cycles or divergence in the Newton iterations. Recently proposed methods address improved smoothness of the numerical flux. The objective of this work is to devise and analyze an alternative numerical flux scheme called C1-PPU that, in addition to improving smoothness with respect to saturations and phase potentials, also improves the level of scalar nonlinearity and accuracy. C1-PPU involves a novel use of the flux limiter concept from the context of high-resolution methods, and allows a smooth variation between the co-current/counter-current flow regimes. The scheme is general and applies to fully coupled flow and transport formulations with an arbitrary number of phases. We analyze the consistency property of the C1-PPU scheme, and derive saturation and pressure estimates, which are used to prove the solution existence. Several numerical examples for two- and three-phase flows in heterogeneous and multi-dimensional reservoirs are presented. The proposed scheme is compared to the conventional PPU and the recently proposed Hybrid Upwinding schemes. We investigate three properties of these numerical fluxes: smoothness, nonlinearity, and accuracy. The results indicate that in addition to smoothness, nonlinearity may also be critical for convergence behavior and thus needs to be considered in the design of an efficient numerical flux scheme. Moreover, the numerical examples show that the C1-PPU scheme exhibits superior convergence properties for large time steps compared to the other alternatives.

  18. Application of a robust and efficient Lagrangian particle scheme to soot transport in turbulent flames

    Attili, Antonio

    2013-09-01

    A Lagrangian particle scheme is applied to the solution of soot dynamics in turbulent nonpremixed flames. Soot particulate is described using a method of moments and the resulting set of continuum advection-reaction equations is solved using the Lagrangian particle scheme. The key property of the approach is the independence between advection, described by the movement of Lagrangian notional particles along pathlines, and internal aerosol processes, evolving on each notional particle via source terms. Consequently, the method overcomes the issues in Eulerian grid-based schemes for the advection of moments: errors in the advective fluxes pollute the moments compromising their realizability and the stiffness of source terms weakens the stability of the method. The proposed scheme exhibits superior properties with respect to conventional Eulerian schemes in terms of stability, accuracy, and grid convergence. Taking into account the quality of the solution, the Lagrangian approach can be computationally more economical than commonly used Eulerian schemes as it allows the resolution requirements dictated by the different physical phenomena to be independently optimized. Finally, the scheme posseses excellent scalability on massively parallel computers. © 2013 Elsevier Ltd.

  19. History of demand side management and classification of demand response control schemes

    Lampropoulos, I.; Kling, W.L.; Ribeiro, P.F.; Berg, van den J.

    2013-01-01

    The scope of this paper is to provide a review on the topic of demand side management. A historical overview provides a critical insight to applied cases, while the discovery of new evidence calls for reconsideration of the design of demand response control schemes. The developments at the demand

  20. KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks

    Gong, Zheng; Tang, Qiang; Law, Y.W.; Chen, Hongyang; Lai, X.; Yung, M.

    2010-01-01

    The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossip-based wireless medical sensor network (WMSN) for ambient assisted living. Our security model

  1. One-step trinary signed-digit arithmetic using an efficient encoding scheme

    Salim, W. Y.; Fyath, R. S.; Ali, S. A.; Alam, Mohammad S.

    2000-11-01

    The trinary signed-digit (TSD) number system is of interest for ultra fast optoelectronic computing systems since it permits parallel carry-free addition and borrow-free subtraction of two arbitrary length numbers in constant time. In this paper, a simple coding scheme is proposed to encode the decimal number directly into the TSD form. The coding scheme enables one to perform parallel one-step TSD arithmetic operation. The proposed coding scheme uses only a 5-combination coding table instead of the 625-combination table reported recently for recoded TSD arithmetic technique.

  2. Matching soil salinization and cropping systems in communally managed irrigation schemes

    Malota, Mphatso; Mchenga, Joshua

    2018-03-01

    Occurrence of soil salinization in irrigation schemes can be a good indicator to introduce high salt tolerant crops in irrigation schemes. This study assessed the level of soil salinization in a communally managed 233 ha Nkhate irrigation scheme in the Lower Shire Valley region of Malawi. Soil samples were collected within the 0-0.4 m soil depth from eight randomly selected irrigation blocks. Irrigation water samples were also collected from five randomly selected locations along the Nkhate River which supplies irrigation water to the scheme. Salinity of both the soil and the irrigation water samples was determined using an electrical conductivity (EC) meter. Analysis of the results indicated that even for very low salinity tolerant crops (ECi water was suitable for irrigation purposes. However, root-zone soil salinity profiles depicted that leaching of salts was not adequate and that the leaching requirement for the scheme needs to be relooked and always be adhered to during irrigation operation. The study concluded that the crop system at the scheme needs to be adjusted to match with prevailing soil and irrigation water salinity levels.

  3. A plausible congestion management scheme for the internal electricity market of the European Union

    Perez-Arriaga, I.J.; Olmos, L.

    2005-01-01

    This paper proposes a scheme for the management of network congestion in the Internal Electricity Market (IEM) of the European Union. This scheme tries to combine the rigor in the treatment of the energy and transmission capacity transactions with the flexibility and pragmatism that are necessary to make the scheme compatible with the current diversity of regulatory approaches and market structures in the Member States participating in the IEM. First, a reference scheme is presented with a complete formulation that jointly deals with the energy and capacity markets. Because of the implementation difficulties of this conceptually ideal approach, a more pragmatic scheme is proposed instead. The core of this scheme is an explicit auction mechanism that must be run prior to any short-term (daily, typically) energy markets. In this auction, where only transmission capacity is traded, both bilateral contracts and energy bids to Power Exchanges can participate in order to acquire the capacity that is necessary to carry out their transactions. Some technical issues related to the practical implementation of the proposed approach are also examined; these include market liquidity, the financial or physical nature of the long-term contracts, the potential problems of 'slicing' transmission capacity and the allocation of congestion rents. Market power issues are ignored. (author)

  4. A plausible congestion management scheme for the internal electricity market of the European Union

    Perez-Arriaga, I.J.; Olmos, L. [Universidad Pontificia Comillas, Madrid (Spain). Instituto de Investigacion Tecnologica

    2005-06-01

    This paper proposes a scheme for the management of network congestion in the Internal Electricity Market (IEM) of the European Union. This scheme tries to combine the rigor in the treatment of the energy and transmission capacity transactions with the flexibility and pragmatism that are necessary to make the scheme compatible with the current diversity of regulatory approaches and market structures in the Member States participating in the IEM. First, a reference scheme is presented with a complete formulation that jointly deals with the energy and capacity markets. Because of the implementation difficulties of this conceptually ideal approach, a more pragmatic scheme is proposed instead. The core of this scheme is an explicit auction mechanism that must be run prior to any short-term (daily, typically) energy markets. In this auction, where only transmission capacity is traded, both bilateral contracts and energy bids to Power Exchanges can participate in order to acquire the capacity that is necessary to carry out their transactions. Some technical issues related to the practical implementation of the proposed approach are also examined; these include market liquidity, the financial or physical nature of the long-term contracts, the potential problems of 'slicing' transmission capacity and the allocation of congestion rents. Market power issues are ignored. (author)

  5. Evaluation of Rehabilitation Strategies and Management Schemes for the Improvement of Mangrove Management Programs in Lingayen Gulf

    Severino Salmo III

    2007-06-01

    Full Text Available We evaluated the mangrove rehabilitation strategies and management schemes in five municipalities in Lingayen Gulf (Bolinao, Anda, Bani, Alaminos and San Fernando. Mangrove planting appears to be the first and only option used in the area, ignoring other recommended management strategies, e.g. conservation, landscaping, and sustainable production. All planting sites were located in coastal fringes and are mostly monospeficic stands of the species Rhizophora mucronata. The planted mangroves were constrained by low seedling survival and stunted growth as probably caused by poor species-substrate matching, mono-species planting and pest infestations. Three management schemes were noted: community-managed (Bolinao and Anda, local government unit (LGU-managed (Alaminos and San Fernando, and co-managed between the LGU and the community (Bani. The community-managed mangrove areas have the benefits of voluntary efforts from community-based organizations in conducting daily management activities but were constrained with budgetary and logistical concerns. In contrast, both LGU-managed and co-managed areas received institutional and logistical supports from their respective municipal governments, but lacking community participation made mangrove management difficult. Almost two decades of mangrove management indeed helped improved the mangrove forest condition, at least in terms of forest structure. These projects demonstrated some level of success but also encountered several setbacks. Several lessons can be derived from these areas that can help improve the mangrove rehabilitation and management approaches in Lingayen Gulf. Among the recommendations are: (1 provide ordinance enacting the remaining natural secondary growth mangroves as marine protected areas, (2 promote planting in former mangrove areas by reverting abandoned, idled and unproductive aquaculture ponds to mangroves; (3 improve management schemes by formulating resource management plan

  6. Complex scheme of company image management on the stages of its life cycle

    A.V. Kolodka

    2014-01-01

    The aim of the article. The aim of the article is to create a common integrated circuit image management during a life-cycle of enterprise based on internal and external economic conditions. The results of the analysis. In the article the general scheme of image management during a life-cycle of enterprise based on internal and external economic conditions is formed. There is no single view on the question of forming general concepts and approaches to image building. That threatens making ...

  7. A spectrally efficient detect-and-forward scheme with two-tier adaptive cooperation

    Benjillali, Mustapha; Szczeciński, Leszek L.; Alouini, Mohamed-Slim

    2011-01-01

    gainsin terms of the achievable information ratescompared to conventional DetF relaying schemes for both orthogonal and non-orthogonal source/relay transmissions. The analysis leads on to a general adaptive cooperation strategy based on the maximization

  8. The impacts of household retrofit and domestic energy efficiency schemes: A large scale, ex post evaluation

    Webber, Phil; Gouldson, Andy; Kerr, Niall

    2015-01-01

    There is widespread interest in the ability of retrofit schemes to shape domestic energy use in order to tackle fuel poverty and reduce carbon emissions. Although much has been written on the topic, there have been few large-scale ex post evaluations of the actual impacts of such schemes. We address this by assessing domestic energy use before and after the Kirklees Warm Zone (KWZ) scheme, which by fitting insulation in 51,000 homes in the 2007–2010 period is one of the largest retrofit schemes completed in the UK to date. To do this, we develop and apply a new methodology that isolates the impacts of retrofit activity from broader background trends in energy use. The results suggest that the actual impacts of the KWZ scheme have been higher than predicted, and that the scale of any performance gaps or rebound effects have been lower than has often been assumed. They also suggest that impacts on energy use in lower income areas are consistent with predictions, but that impacts in middle and higher income areas are higher than predicted. These findings support the case for the wider and/or accelerated adoption of domestic retrofit schemes in other contexts. -- Highlights: •A large scale, ex post evaluation of the impacts of a household retrofit scheme. •A new methodology to separate retrofit impacts from background trends. •Shows impacts of retrofit have been 1.2–1.7 times higher than predicted. •Impacts as predicted in lower income areas, higher in middle and upper income areas. •Findings support the case for the wider and faster adoption of domestic retrofit

  9. Travelling Wave Pulse Coupled Oscillator (TWPCO) Using a Self-Organizing Scheme for Energy-Efficient Wireless Sensor Networks.

    Al-Mekhlafi, Zeyad Ghaleb; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Recently, Pulse Coupled Oscillator (PCO)-based travelling waves have attracted substantial attention by researchers in wireless sensor network (WSN) synchronization. Because WSNs are generally artificial occurrences that mimic natural phenomena, the PCO utilizes firefly synchronization of attracting mating partners for modelling the WSN. However, given that sensor nodes are unable to receive messages while transmitting data packets (due to deafness), the PCO model may not be efficient for sensor network modelling. To overcome this limitation, this paper proposed a new scheme called the Travelling Wave Pulse Coupled Oscillator (TWPCO). For this, the study used a self-organizing scheme for energy-efficient WSNs that adopted travelling wave biologically inspired network systems based on phase locking of the PCO model to counteract deafness. From the simulation, it was found that the proposed TWPCO scheme attained a steady state after a number of cycles. It also showed superior performance compared to other mechanisms, with a reduction in the total energy consumption of 25%. The results showed that the performance improved by 13% in terms of data gathering. Based on the results, the proposed scheme avoids the deafness that occurs in the transmit state in WSNs and increases the data collection throughout the transmission states in WSNs.

  10. Travelling Wave Pulse Coupled Oscillator (TWPCO) Using a Self-Organizing Scheme for Energy-Efficient Wireless Sensor Networks

    Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Recently, Pulse Coupled Oscillator (PCO)-based travelling waves have attracted substantial attention by researchers in wireless sensor network (WSN) synchronization. Because WSNs are generally artificial occurrences that mimic natural phenomena, the PCO utilizes firefly synchronization of attracting mating partners for modelling the WSN. However, given that sensor nodes are unable to receive messages while transmitting data packets (due to deafness), the PCO model may not be efficient for sensor network modelling. To overcome this limitation, this paper proposed a new scheme called the Travelling Wave Pulse Coupled Oscillator (TWPCO). For this, the study used a self-organizing scheme for energy-efficient WSNs that adopted travelling wave biologically inspired network systems based on phase locking of the PCO model to counteract deafness. From the simulation, it was found that the proposed TWPCO scheme attained a steady state after a number of cycles. It also showed superior performance compared to other mechanisms, with a reduction in the total energy consumption of 25%. The results showed that the performance improved by 13% in terms of data gathering. Based on the results, the proposed scheme avoids the deafness that occurs in the transmit state in WSNs and increases the data collection throughout the transmission states in WSNs. PMID:28056020

  11. Efficient multichannel acoustic echo cancellation using constrained tap selection schemes in the subband domain

    Desiraju, Naveen Kumar; Doclo, Simon; Wolff, Tobias

    2017-12-01

    Acoustic echo cancellation (AEC) is a key speech enhancement technology in speech communication and voice-enabled devices. AEC systems employ adaptive filters to estimate the acoustic echo paths between the loudspeakers and the microphone(s). In applications involving surround sound, the computational complexity of an AEC system may become demanding due to the multiple loudspeaker channels and the necessity of using long filters in reverberant environments. In order to reduce the computational complexity, the approach of partially updating the AEC filters is considered in this paper. In particular, we investigate tap selection schemes which exploit the sparsity present in the loudspeaker channels for partially updating subband AEC filters. The potential for exploiting signal sparsity across three dimensions, namely time, frequency, and channels, is analyzed. A thorough analysis of different state-of-the-art tap selection schemes is performed and insights about their limitations are gained. A novel tap selection scheme is proposed which overcomes these limitations by exploiting signal sparsity while not ignoring any filters for update in the different subbands and channels. Extensive simulation results using both artificial as well as real-world multichannel signals show that the proposed tap selection scheme outperforms state-of-the-art tap selection schemes in terms of echo cancellation performance. In addition, it yields almost identical echo cancellation performance as compared to updating all filter taps at a significantly reduced computational cost.

  12. Evaluation of Rehabilitation Strategies and Management Schemes for the Improvement of Mangrove Management Programs in Lingayen Gulf

    Severino Salmo III; Dante Torio; Janalezza Morvenna Esteban

    2007-01-01

    We evaluated the mangrove rehabilitation strategies and management schemes in five municipalities in Lingayen Gulf (Bolinao, Anda, Bani, Alaminos and San Fernando). Mangrove planting appears to be the first and only option used in the area, ignoring other recommended management strategies, e.g. conservation, landscaping, and sustainable production. All planting sites were located in coastal fringes and are mostly monospeficic stands of the species Rhizophora mucronata. The planted mangroves w...

  13. A Sleep-Awake Scheme Based on CoAP for Energy-Efficiency in Internet of Things

    Wenquan Jin

    2017-11-01

    Full Text Available Internet Engineering Task Force (IETF have developed Constrained Application Protocol (CoAP to enable communication between sensor or actuator nodes in constrained environments, such as small amount of memory, and low power. IETF CoAP and HTTP are used to monitor or control environments in Internet of Things (IoT and Machine-to-Machine (M2M. In this paper, we present a sleep-awake scheme based on CoAP for energy efficiency in Internet of Things. This scheme supports to increase energy efficiency of IoT nodes using CoAP protocol. We have slightly modified the IoT middleware to improve CoAP protocol to conserve energy in the IoT nodes. Also, the IoT middleware includes some functionality of the CoRE Resource Directory (RD and the Message Queue (MQ broker with IoT nodes to synchronize sleepy status.

  14. An efficient transmission power control scheme for temperature variation in wireless sensor networks.

    Lee, Jungwook; Chung, Kwangsue

    2011-01-01

    Wireless sensor networks collect data from several nodes dispersed at remote sites. Sensor nodes can be installed in harsh environments such as deserts, cities, and indoors, where the link quality changes considerably over time. Particularly, changes in transmission power may be caused by temperature, humidity, and other factors. In order to compensate for link quality changes, existing schemes detect the link quality changes between nodes and control transmission power through a series of feedback processes, but these approaches can cause heavy overhead with the additional control packets needed. In this paper, the change of the link quality according to temperature is examined through empirical experimentation. A new power control scheme combining both temperature-aware link quality compensation and a closed-loop feedback process to adapt to link quality changes is proposed. We prove that the proposed scheme effectively adapts the transmission power to the changing link quality with less control overhead and energy consumption.

  15. An Efficient Transmission Power Control Scheme for Temperature Variation in Wireless Sensor Networks

    Jungwook Lee

    2011-03-01

    Full Text Available Wireless sensor networks collect data from several nodes dispersed at remote sites. Sensor nodes can be installed in harsh environments such as deserts, cities, and indoors, where the link quality changes considerably over time. Particularly, changes in transmission power may be caused by temperature, humidity, and other factors. In order to compensate for link quality changes, existing schemes detect the link quality changes between nodes and control transmission power through a series of feedback processes, but these approaches can cause heavy overhead with the additional control packets needed. In this paper, the change of the link quality according to temperature is examined through empirical experimentation. A new power control scheme combining both temperature-aware link quality compensation and a closed-loop feedback process to adapt to link quality changes is proposed. We prove that the proposed scheme effectively adapts the transmission power to the changing link quality with less control overhead and energy consumption.

  16. An efficient shock-capturing scheme for simulating compressible homogeneous mixture flow

    Dang, Son Tung; Ha, Cong Tu; Park, Warn Gyu [School of Mechanical Engineering, Pusan National University, Busan (Korea, Republic of); Jung, Chul Min [Advanced Naval Technology CenterNSRDI, ADD, Changwon (Korea, Republic of)

    2016-09-15

    This work is devoted to the development of a procedure for the numerical solution of Navier-Stokes equations for cavitating flows with and without ventilation based on a compressible, multiphase, homogeneous mixture model. The governing equations are discretized on a general structured grid using a high-resolution shock-capturing scheme in conjunction with appropriate limiters to prevent the generation of spurious solutions near shock waves or discontinuities. Two well-known limiters are examined, and a new limiter is proposed to enhance the accuracy and stability of the numerical scheme. A sensitivity analysis is first conducted to determine the relative influences of various model parameters on the solution. These parameters are adopted for the computation of water flows over a hemispherical body, conical body and a divergent/convergent nozzle. Finally, numerical calculations of ventilated supercavitating flows over a hemispherical cylinder body with a hot propulsive jet are conducted to verify the capabilities of the numerical scheme.

  17. An efficient shock-capturing scheme for simulating compressible homogeneous mixture flow

    Dang, Son Tung; Ha, Cong Tu; Park, Warn Gyu; Jung, Chul Min

    2016-01-01

    This work is devoted to the development of a procedure for the numerical solution of Navier-Stokes equations for cavitating flows with and without ventilation based on a compressible, multiphase, homogeneous mixture model. The governing equations are discretized on a general structured grid using a high-resolution shock-capturing scheme in conjunction with appropriate limiters to prevent the generation of spurious solutions near shock waves or discontinuities. Two well-known limiters are examined, and a new limiter is proposed to enhance the accuracy and stability of the numerical scheme. A sensitivity analysis is first conducted to determine the relative influences of various model parameters on the solution. These parameters are adopted for the computation of water flows over a hemispherical body, conical body and a divergent/convergent nozzle. Finally, numerical calculations of ventilated supercavitating flows over a hemispherical cylinder body with a hot propulsive jet are conducted to verify the capabilities of the numerical scheme

  18. Key management schemes using routing information frames in secure wireless sensor networks

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  19. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  20. Energy-Efficient Relay Selection Scheme for Physical Layer Security in Cognitive Radio Networks

    Li Jiang

    2015-01-01

    selection and dynamic power allocation in order to maximize SC and to minimize energy consumption. Moreover, we consider finite-state Markov channels and residual relay energy in the relay selection and power allocation process. Specifically, the formulation of the proposed relay selection and power allocation scheme is based on the restless bandit problem, which is solved by the primal-dual index heuristic algorithm. Additionally, the obtained optimal relay selection policy has an indexability property that dramatically reduces the computational complexity. Numerical results are presented to show that our proposed scheme has the maximum SC and minimum energy consumption compared to the existing ones.

  1. Particulate Photocatalyst Sheets Based on Carbon Conductor Layer for Efficient Z-Scheme Pure-Water Splitting at Ambient Pressure.

    Wang, Qian; Hisatomi, Takashi; Suzuki, Yohichi; Pan, Zhenhua; Seo, Jeongsuk; Katayama, Masao; Minegishi, Tsutomu; Nishiyama, Hiroshi; Takata, Tsuyoshi; Seki, Kazuhiko; Kudo, Akihiko; Yamada, Taro; Domen, Kazunari

    2017-02-01

    Development of sunlight-driven water splitting systems with high efficiency, scalability, and cost-competitiveness is a central issue for mass production of solar hydrogen as a renewable and storable energy carrier. Photocatalyst sheets comprising a particulate hydrogen evolution photocatalyst (HEP) and an oxygen evolution photocatalyst (OEP) embedded in a conductive thin film can realize efficient and scalable solar hydrogen production using Z-scheme water splitting. However, the use of expensive precious metal thin films that also promote reverse reactions is a major obstacle to developing a cost-effective process at ambient pressure. In this study, we present a standalone particulate photocatalyst sheet based on an earth-abundant, relatively inert, and conductive carbon film for efficient Z-scheme water splitting at ambient pressure. A SrTiO 3 :La,Rh/C/BiVO 4 :Mo sheet is shown to achieve unassisted pure-water (pH 6.8) splitting with a solar-to-hydrogen energy conversion efficiency (STH) of 1.2% at 331 K and 10 kPa, while retaining 80% of this efficiency at 91 kPa. The STH value of 1.0% is the highest among Z-scheme pure water splitting operating at ambient pressure. The working mechanism of the photocatalyst sheet is discussed on the basis of band diagram simulation. In addition, the photocatalyst sheet split pure water more efficiently than conventional powder suspension systems and photoelectrochemical parallel cells because H + and OH - concentration overpotentials and an IR drop between the HEP and OEP were effectively suppressed. The proposed carbon-based photocatalyst sheet, which can be used at ambient pressure, is an important alternative to (photo)electrochemical systems for practical solar hydrogen production.

  2. Efficient and stable model reduction scheme for the numerical simulation of broadband acoustic metamaterials

    Hyun, Jaeyub; Kook, Junghwan; Wang, Semyung

    2015-01-01

    ) as a basis vector. The proposed AQSRV-based model reduction scheme has the following two representative features: (1) Multiple frequency subintervals and (2) Adaptive selection of the subinterval information (i.e., the proper number and location of the center frequencies) and basis vector at each subinterval...

  3. Efficient conservative ADER schemes based on WENO reconstruction and space-time predictor in primitive variables

    Zanotti, Olindo; Dumbser, Michael

    2016-01-01

    We present a new version of conservative ADER-WENO finite volume schemes, in which both the high order spatial reconstruction as well as the time evolution of the reconstruction polynomials in the local space-time predictor stage are performed in primitive variables, rather than in conserved ones. To obtain a conservative method, the underlying finite volume scheme is still written in terms of the cell averages of the conserved quantities. Therefore, our new approach performs the spatial WENO reconstruction twice: the first WENO reconstruction is carried out on the known cell averages of the conservative variables. The WENO polynomials are then used at the cell centers to compute point values of the conserved variables, which are subsequently converted into point values of the primitive variables. This is the only place where the conversion from conservative to primitive variables is needed in the new scheme. Then, a second WENO reconstruction is performed on the point values of the primitive variables to obtain piecewise high order reconstruction polynomials of the primitive variables. The reconstruction polynomials are subsequently evolved in time with a novel space-time finite element predictor that is directly applied to the governing PDE written in primitive form. The resulting space-time polynomials of the primitive variables can then be directly used as input for the numerical fluxes at the cell boundaries in the underlying conservative finite volume scheme. Hence, the number of necessary conversions from the conserved to the primitive variables is reduced to just one single conversion at each cell center. We have verified the validity of the new approach over a wide range of hyperbolic systems, including the classical Euler equations of gas dynamics, the special relativistic hydrodynamics (RHD) and ideal magnetohydrodynamics (RMHD) equations, as well as the Baer-Nunziato model for compressible two-phase flows. In all cases we have noticed that the new ADER

  4. Efficiently Inefficient Markets for Assets and Assets Management

    Garleanu, Nicolae; Heje Pedersen, Lasse

    We consider a model where investors can invest directly or search for an asset manager, information about assets is costly, and managers charge an endogenous fee. The efficiency of asset prices is linked to the efficiency of the asset management market: if investors can find managers more easily......, more money is allocated to active management, fees are lower, and asset prices are more efficient. Informed managers outperform after fees, uninformed managers underperform after fees, and the net performance of the average manager depends on the number of "noise allocators." Finally, we show why large...

  5. Energy efficiency and energy management: an abundance

    Coullet-Demaiziere, Corinne; Barthet, Marie-Claire; Tourneur, Jean-Claude; Mirguet, Olivier

    2015-01-01

    As France has just published a decree on the energy audit for large companies, and has thus been among the first countries to comply with an article of the European directive on energy efficiency, a set of articles discusses various aspects of these issues of energy efficiency and energy management. A first one presents this mandatory energy audit as a tool for a better energy efficiency, and illustrates the relationship between this commitment and the ISO 50001 standard for French large companies. A second article outlines the tools and standards of application of this energy audit in different legal texts. A third one comments the introduction of four new European arrangements on the labelling of products (indication of energy performance by retailers, objective of reduction of energy consumption, information displayed on site and on-line for various household appliances, current legislation). The next article comments the new German legislation on renewable energies which implements environmental requirements higher than European objectives, and tries to boost the carbon market. The presence of the ISO 50001 certification in the German law is also briefly addressed. Then, an article proposes an overview of a bill project, opinions of experts, and way to go for the new arrangement for energy saving certificates (CEE, certificat d'economie d'energie) launched by the French ministry of Ecology, and which aims at a 700 TWh saving. The content of each article of the bill project is presented and explained, and the relationship between certificate application and some standards is highlighted. The last article comments the decision of the European Court of Justice on the compatibility of Flemish Green Certificates with the European law

  6. Key factors of efficient organization management

    Firsankov, I. E.; Фирсанков, И. Е.

    2014-01-01

    Issues of efficiency of organization management are examined in the article. Aggressive competition between companies; what’s the difference between manager and leader; who is a leader; personal qualities of strong charismatic leaders etc. Particular attention is paid to the question of possibility to become a leader or to be born a leader. В статье рассмотрены основные черты настоящего лидера, затронута тема различия между лидером и менеджером, а также освещён вопрос о том, можно ли стать...

  7. Demand side management scheme in smart grid with cloud computing approach using stochastic dynamic programming

    S. Sofana Reka

    2016-09-01

    Full Text Available This paper proposes a cloud computing framework in smart grid environment by creating small integrated energy hub supporting real time computing for handling huge storage of data. A stochastic programming approach model is developed with cloud computing scheme for effective demand side management (DSM in smart grid. Simulation results are obtained using GUI interface and Gurobi optimizer in Matlab in order to reduce the electricity demand by creating energy networks in a smart hub approach.

  8. EUROPEAN DEVELOPMENT OF ECO‐MANAGEMENT AND AUDIT SCHEME (EMAS IN THE EUROPEAN UNION

    Justyna SŁONIMIEC

    2013-10-01

    Full Text Available The paper presents the implementation of the Environmental Management and Audit Scheme System (EMAS in Poland and the European Union. It analyzes the existing rules on the implementation and the process of its implementation. It also defines the benefits and costs arising from the registration of organizations in the system. The paper presents the current status of implementation of EMAS in the European Union.

  9. Determinants and Characteristics of Korean Companies’ Carbon Management under the Carbon Pricing Scheme

    Sunhee Suk

    2018-04-01

    Full Text Available In response to the domestic emission trading scheme, Korean companies are required to shift their strategies from voluntary or regulation-driven management approaches to innovative carbon management utilizing their carbon option linked with economic value. Using a questionnaire survey targeting companies subjected to the emission trading scheme, this study explores the status of Korean companies’ carbon management in a series of five strategies and identifies the correlation between companies’ proactive carbon strategies and pre-listed determinant factors. This study found that Korean companies’ practices in accordance with carbon pricing deviate little from conventional energy and environmental management in this phase. They are likely to be affected by the need to appear socially responsible or to make a social contribution, without having to exceed this mandate in terms activities outside of this remit. Yet, only a small proportion of companies have advanced to the stage of proactive carbon management. For them, top managers’ support and understanding are essential factors together with government pressure to factor-in issues related to carbon with their business strategies. This study provides implications for policy and corporate in promoting carbon-oriented management under the carbon policy.

  10. A unified thermostat scheme for efficient configurational sampling for classical/quantum canonical ensembles via molecular dynamics

    Zhang, Zhijun; Liu, Xinzijian; Chen, Zifei; Zheng, Haifeng; Yan, Kangyu; Liu, Jian

    2017-07-01

    We show a unified second-order scheme for constructing simple, robust, and accurate algorithms for typical thermostats for configurational sampling for the canonical ensemble. When Langevin dynamics is used, the scheme leads to the BAOAB algorithm that has been recently investigated. We show that the scheme is also useful for other types of thermostats, such as the Andersen thermostat and Nosé-Hoover chain, regardless of whether the thermostat is deterministic or stochastic. In addition to analytical analysis, two 1-dimensional models and three typical real molecular systems that range from the gas phase, clusters, to the condensed phase are used in numerical examples for demonstration. Accuracy may be increased by an order of magnitude for estimating coordinate-dependent properties in molecular dynamics (when the same time interval is used), irrespective of which type of thermostat is applied. The scheme is especially useful for path integral molecular dynamics because it consistently improves the efficiency for evaluating all thermodynamic properties for any type of thermostat.

  11. An Efficient Semi-fragile Watermarking Scheme for Tamper Localization and Recovery

    Hou, Xiang; Yang, Hui; Min, Lianquan

    2018-03-01

    To solve the problem that remote sensing images are vulnerable to be tampered, a semi-fragile watermarking scheme was proposed. Binary random matrix was used as the authentication watermark, which was embedded by quantizing the maximum absolute value of directional sub-bands coefficients. The average gray level of every non-overlapping 4×4 block was adopted as the recovery watermark, which was embedded in the least significant bit. Watermarking detection could be done directly without resorting to the original images. Experimental results showed our method was robust against rational distortions to a certain extent. At the same time, it was fragile to malicious manipulation, and realized accurate localization and approximate recovery of the tampered regions. Therefore, this scheme can protect the security of remote sensing image effectively.

  12. Efficient authentication scheme based on near-ring root extraction problem

    Muthukumaran, V.; Ezhilmaran, D.

    2017-11-01

    An authentication protocolis the type of computer communication protocol or cryptography protocol specifically designed for transfer of authentication data between two entities. We have planned a two new entity authentication scheme on the basis of root extraction problem near-ring in this article. We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform of near-ring N. The security issues also discussed.

  13. Achieving Energy Efficient Ship Operations Under Third Party Management

    Taudal Poulsen, René; Sornn-Friese, Henrik

    2015-01-01

    Profitable energy saving measures are often not fully implemented in shipping, causing energy efficiency gaps. The paper identifies energy efficiency gaps in ship operations, and explores their causes. Lack of information on energy efficiency, lack of energy training at sea and onshore and lack...... of time to produce and provide reliable energy efficiency information cause energy efficiency gaps. The paper brings together the energy efficiency and ship management literatures, demonstrating how ship management models influence energy efficiency in ship operations. Achieving energy efficiency in ship...

  14. An Efficient Addressing Scheme and Its Routing Algorithm for a Large-Scale Wireless Sensor Network

    Choi Jeonghee

    2008-01-01

    Full Text Available Abstract So far, various addressing and routing algorithms have been extensively studied for wireless sensor networks (WSNs, but many of them were limited to cover less than hundreds of sensor nodes. It is largely due to stringent requirements for fully distributed coordination among sensor nodes, leading to the wasteful use of available address space. As there is a growing need for a large-scale WSN, it will be extremely challenging to support more than thousands of nodes, using existing standard bodies. Moreover, it is highly unlikely to change the existing standards, primarily due to backward compatibility issue. In response, we propose an elegant addressing scheme and its routing algorithm. While maintaining the existing address scheme, it tackles the wastage problem and achieves no additional memory storage during a routing. We also present an adaptive routing algorithm for location-aware applications, using our addressing scheme. Through a series of simulations, we prove that our approach can achieve two times lesser routing time than the existing standard in a ZigBee network.

  15. An energy-efficient transmission scheme for real-time data in wireless sensor networks.

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2015-05-20

    The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance.

  16. Efficient numerical schemes for viscoplastic avalanches. Part 1: The 1D case

    Fernández-Nieto, Enrique D., E-mail: edofer@us.es [Departamento de Matemática Aplicada I, Universidad de Sevilla, E.T.S. Arquitectura, Avda, Reina Mercedes, s/n, 41012 Sevilla (Spain); Gallardo, José M., E-mail: jmgallardo@uma.es [Departamento de Análisis Matemático, Universidad de Málaga, F. Ciencias, Campus Teatinos S/N (Spain); Vigneaux, Paul, E-mail: Paul.Vigneaux@math.cnrs.fr [Unitée de Mathématiques Pures et Appliquées, Ecole Normale Supérieure de Lyon, 46 allée d' Italie, 69364 Lyon Cedex 07 (France)

    2014-05-01

    This paper deals with the numerical resolution of a shallow water viscoplastic flow model. Viscoplastic materials are characterized by the existence of a yield stress: below a certain critical threshold in the imposed stress, there is no deformation and the material behaves like a rigid solid, but when that yield value is exceeded, the material flows like a fluid. In the context of avalanches, it means that after going down a slope, the material can stop and its free surface has a non-trivial shape, as opposed to the case of water (Newtonian fluid). The model involves variational inequalities associated with the yield threshold: finite-volume schemes are used together with duality methods (namely Augmented Lagrangian and Bermúdez–Moreno) to discretize the problem. To be able to accurately simulate the stopping behavior of the avalanche, new schemes need to be designed, involving the classical notion of well-balancing. In the present context, it needs to be extended to take into account the viscoplastic nature of the material as well as general bottoms with wet/dry fronts which are encountered in geophysical geometries. We derived such schemes and numerical experiments are presented to show their performances.

  17. An efficient communication scheme for solving Sn equations on message-passing multiprocessors

    Azmy, Y.Y.

    1993-01-01

    Early models of Intel's hypercube multiprocessors, e.g., the iPSC/1 and iPSC/2, were characterized by the high latency of message passing. This relatively weak dependence of the communication penalty on the size of messages, in contrast to its strong dependence on the number of messages, justified using the Fan-in Fan-out algorithm (which implements a minimum spanning tree path) to perform global operations, such as global sums, etc. Recent models of message-passing computers, such as the iPSC/860 and the Paragon, have been found to possess much smaller latency, thus forcing a reexamination of the issue of performance optimization with respect to communication schemes. Essentially, the Fan-in Fan-out scheme minimizes the number of nonsimultaneous messages sent but not the volume of data traffic across the network. Furthermore, if a global operation is performed in conjunction with the message passing, a large fraction of the attached nodes remains idle as the number of utilized processors is halved in each step of the process. On the other hand, the Recursive Halving scheme offers the smallest communication cost for global operations but has some drawbacks

  18. An Efficient Addressing Scheme and Its Routing Algorithm for a Large-Scale Wireless Sensor Network

    Yongwan Park

    2008-12-01

    Full Text Available So far, various addressing and routing algorithms have been extensively studied for wireless sensor networks (WSNs, but many of them were limited to cover less than hundreds of sensor nodes. It is largely due to stringent requirements for fully distributed coordination among sensor nodes, leading to the wasteful use of available address space. As there is a growing need for a large-scale WSN, it will be extremely challenging to support more than thousands of nodes, using existing standard bodies. Moreover, it is highly unlikely to change the existing standards, primarily due to backward compatibility issue. In response, we propose an elegant addressing scheme and its routing algorithm. While maintaining the existing address scheme, it tackles the wastage problem and achieves no additional memory storage during a routing. We also present an adaptive routing algorithm for location-aware applications, using our addressing scheme. Through a series of simulations, we prove that our approach can achieve two times lesser routing time than the existing standard in a ZigBee network.

  19. Task analysis and structure scheme for center manager station in large container inspection system

    Li Zheng; Gao Wenhuan; Wang Jingjin; Kang Kejun; Chen Zhiqiang

    1997-01-01

    LCIS works as follows: the accelerator generates beam pulses which are formed into fan shape; the scanning system drags a lorry with a container passing through the beam in constant speed; the detector array detects the beam penetrating the lorry; the projection data acquisition system reads the projections and completes an inspection image of the lorry. All these works are controlled and synchronized by the center manage station. The author will describe the process of the projection data acquisition in scanning mode and the methods of real-time projection data processing. the task analysis and the structure scheme of center manager station is presented

  20. Design and simulation of a fuel cell hybrid emergency power system for a more electric aircraft: Evaluation of energy management schemes

    Njoya Motapon, Souleman

    . The energy management schemes are compared based on the following criteria: the hydrogen consumption, the state of charges of the batteries and supercapacitors and the overall system efficiency. Moreover the stress on each energy source, which impacts their life cycle, are measured using a new approach based on the wavelet transform of their instantaneous power. A simulation model and an experimental test bench are developed to validate all analysis and performances. The main results obtained are as follows: the state machine control scheme provided a slightly better efficiency and stresses on the batteries and supercapacitors. The classical PI control and the proposed scheme had the lowest fuel consumption and more use of the battery energy. As expected, the lowest fuel cell stress and lowest use of the battery energy was achieved with the frequency decoupling and fuzzy logic scheme, but at the expense of more fuel consumption and lower overall efficiency. The DC bus or supercapacitor voltage was maintained nearly constant for all the schemes. Also, the proposed strategy performed slightly better than the ECMS in terms of efficiency and fuel consumption, with an increase in fuel economy by 3 %. The energy management scheme suitable for a MEA emergency system should be a multischeme EMS such that each scheme is chosen based on a specific criterion to prioritize. As an example, depending on the operating life of each energy source, the energy management strategy can be chosen to either minimise the stress on the fuel cell system, the battery system or supercapacitor system, hence maximizing the life cycle of the hybrid power system. Also if the target is to reduce the fuel consumption, the proposed or the classical PI strategies are better alternatives.

  1. Joint Optimized CPU and Networking Control Scheme for Improved Energy Efficiency in Video Streaming on Mobile Devices

    Sung-Woong Jo

    2017-01-01

    Full Text Available Video streaming service is one of the most popular applications for mobile users. However, mobile video streaming services consume a lot of energy, resulting in a reduced battery life. This is a critical problem that results in a degraded user’s quality of experience (QoE. Therefore, in this paper, a joint optimization scheme that controls both the central processing unit (CPU and wireless networking of the video streaming process for improved energy efficiency on mobile devices is proposed. For this purpose, the energy consumption of the network interface and CPU is analyzed, and based on the energy consumption profile a joint optimization problem is formulated to maximize the energy efficiency of the mobile device. The proposed algorithm adaptively adjusts the number of chunks to be downloaded and decoded in each packet. Simulation results show that the proposed algorithm can effectively improve the energy efficiency when compared with the existing algorithms.

  2. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  3. Energy efficiency through integrated environmental management.

    Benromdhane, Souad Ahmed

    2015-05-01

    Integrated environmental management became an economic necessity after industrial development proved to be unsustainable without consideration of environmental direct and indirect impacts. Energy dependency and air pollution along with climate change grew into major challenges facing developed and developing countries alike. Thus, a new global market structure emerged and changed the way we do trade. The search intensified for alternatives to petroleum. However, scientists, policy makers, and environmental activists agreed to focus on strategic conservation and optimization of energy use. Environmental concerns will remain partially unaddressed with the current pace of consumption because greenhouse gas emissions will continue to rise with economic growth. This paper discusses energy efficiency, steady integration of alternative sources, and increased use of best available technologies. Energy criteria developed for environmental labeling certification are presented. Our intention is to encourage manufacturers and service providers to supply consumers with less polluting and energy-consuming goods and services, inform consumers of the environmental and energy impacts, and thereby instill sustainable and responsible consumption. As several programs were initiated in developed countries, environmental labeling requirements created barriers to many exports manufactured in developing countries, affecting current world trade and putting more pressure on countries to meet those requirements. Defining an institutional and legal framework of environmental labeling is a key challenge in implementing such programs for critical economic sectors like tourism, textiles, and food production where energy needs are the most important aspect to control. A case study of Tunisia and its experience with eco-labeling is presented.

  4. Functional Evaluation of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations

    Kazuya Odagiri

    2017-03-01

    Full Text Available In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM. This is the scheme for managing a whole Local Area Network (LAN through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the path between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, as the progression phase of the third phase for the last goal, we perform the functional evaluation of the cloud type virtual PBNM, which can be used by plural organizations.

  5. Fairly efficient or efficiently fair: success factors and constraints of payment and reward schemes for environmental services in Asia

    Beria, L.

    2011-01-01

    Payment for environmental service (PES) is strictly defined as a market-based environmental policy instrument to achieve environmental protection in the most efficient way. However, an increasing body of literature shows that the prescriptive conceptualization of PES cannot be easily generalized

  6. An efficient scheme for a phase field model for the moving contact line problem with variable density and viscosity

    Gao, Min

    2014-09-01

    In this paper, we develop an efficient numerical method for the two phase moving contact line problem with variable density, viscosity, and slip length. The physical model is based on a phase field approach, which consists of a coupled system of the Cahn-Hilliard and Navier-Stokes equations with the generalized Navier boundary condition [1,2,5]. To overcome the difficulties due to large density and viscosity ratio, the Navier-Stokes equations are solved by a splitting method based on a pressure Poisson equation [11], while the Cahn-Hilliard equation is solved by a convex splitting method. We show that the method is stable under certain conditions. The linearized schemes are easy to implement and introduce only mild CFL time constraint. Numerical tests are carried out to verify the accuracy, stability and efficiency of the schemes. The method allows us to simulate the interface problems with extremely small interface thickness. Three dimensional simulations are included to validate the efficiency of the method. © 2014 Elsevier Inc.

  7. Enhanced machine learning scheme for energy efficient resource allocation in 5G heterogeneous cloud radio access networks

    Alqerm, Ismail

    2018-02-15

    Heterogeneous cloud radio access networks (H-CRAN) is a new trend of 5G that aims to leverage the heterogeneous and cloud radio access networks advantages. Low power remote radio heads (RRHs) are exploited to provide high data rates for users with high quality of service requirements (QoS), while high power macro base stations (BSs) are deployed for coverage maintenance and low QoS users support. However, the inter-tier interference between the macro BS and RRHs and energy efficiency are critical challenges that accompany resource allocation in H-CRAN. Therefore, we propose a centralized resource allocation scheme using online learning, which guarantees interference mitigation and maximizes energy efficiency while maintaining QoS requirements for all users. To foster the performance of such scheme with a model-free learning, we consider users\\' priority in resource blocks (RBs) allocation and compact state representation based learning methodology to enhance the learning process. Simulation results confirm that the proposed resource allocation solution can mitigate interference, increase energy and spectral efficiencies significantly, and maintain users\\' QoS requirements.

  8. An efficient scheme for a phase field model for the moving contact line problem with variable density and viscosity

    Gao, Min; Wang, Xiao-Ping

    2014-01-01

    In this paper, we develop an efficient numerical method for the two phase moving contact line problem with variable density, viscosity, and slip length. The physical model is based on a phase field approach, which consists of a coupled system of the Cahn-Hilliard and Navier-Stokes equations with the generalized Navier boundary condition [1,2,5]. To overcome the difficulties due to large density and viscosity ratio, the Navier-Stokes equations are solved by a splitting method based on a pressure Poisson equation [11], while the Cahn-Hilliard equation is solved by a convex splitting method. We show that the method is stable under certain conditions. The linearized schemes are easy to implement and introduce only mild CFL time constraint. Numerical tests are carried out to verify the accuracy, stability and efficiency of the schemes. The method allows us to simulate the interface problems with extremely small interface thickness. Three dimensional simulations are included to validate the efficiency of the method. © 2014 Elsevier Inc.

  9. An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

    Changji Wang

    2013-01-01

    Full Text Available There is an acceleration of adoption of cloud computing among enterprises. However, moving the infrastructure and sensitive data from trusted domain of the data owner to public cloud will pose severe security and privacy risks. Attribute-based encryption (ABE is a new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. Key-policy attribute-based encryption (KP-ABE is an important type of ABE, which enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that specify which ciphertexts the key holder will be allowed to decrypt. In most existing KP-ABE scheme, the ciphertext size grows linearly with the number of attributes embedded in ciphertext. In this paper, we propose a new KP-ABE construction with constant ciphertext size. In our construction, the access policy can be expressed as any monotone access structure. Meanwhile, the ciphertext size is independent of the number of ciphertext attributes, and the number of bilinear pairing evaluations is reduced to a constant. We prove that our scheme is semantically secure in the selective-set model based on the general Diffie-Hellman exponent assumption.

  10. An Efficient Method for Detecting Misbehaving Zone Manager in MANET

    Rafsanjani, Marjan Kuchaki; Pakzad, Farzaneh; Asadinia, Sanaz

    In recent years, one of the wireless technologies increased tremendously is mobile ad hoc networks (MANETs) in which mobile nodes organize themselves without the help of any predefined infrastructure. MANETs are highly vulnerable to attack due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring, management point and lack of a clear defense line. In this paper, we report our progress in developing intrusion detection (ID) capabilities for MANET. In our proposed scheme, the network with distributed hierarchical architecture is partitioned into zones, so that in each of them there is one zone manager. The zone manager is responsible for monitoring the cluster heads in its zone and cluster heads are in charge of monitoring their members. However, the most important problem is how the trustworthiness of the zone manager can be recognized. So, we propose a scheme in which "honest neighbors" of zone manager specify the validation of their zone manager. These honest neighbors prevent false accusations and also allow manager if it is wrongly misbehaving. However, if the manger repeats its misbehavior, then it will lose its management degree. Therefore, our scheme will be improved intrusion detection and also provide a more reliable network.

  11. A measure for the efficiency of water use and its determinants, a case study of small-scale irrigation schemes in North-West Province, South Africa

    Speelman, S.; Haese, D' M.F.C.; Buysse, J.; Haese, D' L.

    2008-01-01

    This paper analyses the efficiency with which water is used in small-scale irrigation schemes in North-West Province in South Africa and studies its determinants. In the study area, small-scale irrigation schemes play an important role in rural development, but the increasing pressure on water

  12. Energy-Efficient Optimization for HARQ Schemes over Time-Correlated Fading Channels

    Shi, Zheng; Ma, Shaodan; Yang, Guanghua; Alouini, Mohamed-Slim

    2018-01-01

    in the optimization, which further differentiates this work from prior ones. Using a unified expression of asymptotic outage probabilities, optimal transmission powers and optimal rate are derived in closed-forms to maximize the energy efficiency while satisfying

  13. Efficiently Inefficient Markets for Assets and Asset Management

    Garleanu, Nicolae; Pedersen, Lasse Heje

    We consider a model where investors can invest directly or search for an asset manager, information about assets is costly, and managers charge an endogenous fee. The efficiency of asset prices is linked to the efficiency of the asset management market: if investors can find managers more easily......, more money is allocated to active management, fees are lower, and asset prices are more efficient. Informed managers outperform after fees, uninformed managers underperform after fees, and the net performance of the average manager depends on the number of "noise allocators." Small investors should...... be passive, but large and sophisticated investors benefit from searching for informed active managers since their search cost is low relative to capital. Hence, managers with larger and more sophisticated investors are expected to outperform....

  14. Efficient management vital to large, long-term engineering projects

    Wolfe, P.L.

    1989-01-01

    This article describes the ways in which firms manage large hazardous waste mitigation projects efficiently. Staffing concerns, control systems and report mechanisms critical to effective and timely management of these large-scale programs are explored

  15. Management of efficiency of agricultural production on the basis of ...

    Management of efficiency of agricultural production on the basis of margin approach. ... Journal of Fundamental and Applied Sciences ... and systematized to the management of production costs of agricultural products, the proposed definition ...

  16. Efficiency of Management Systems, Based on International Standards

    Elena B. Gafforova

    2012-03-01

    Full Text Available The article considers major trends of management systems standardization development and efficiency. The authors determine possible structure of effects in the process of integrated management systems implementation.

  17. A robust and efficient finite volume scheme for the discretization of diffusive flux on extremely skewed meshes in complex geometries

    Traoré, Philippe; Ahipo, Yves Marcel; Louste, Christophe

    2009-08-01

    In this paper an improved finite volume scheme to discretize diffusive flux on a non-orthogonal mesh is proposed. This approach, based on an iterative technique initially suggested by Khosla [P.K. Khosla, S.G. Rubin, A diagonally dominant second-order accurate implicit scheme, Computers and Fluids 2 (1974) 207-209] and known as deferred correction, has been intensively utilized by Muzaferija [S. Muzaferija, Adaptative finite volume method for flow prediction using unstructured meshes and multigrid approach, Ph.D. Thesis, Imperial College, 1994] and later Fergizer and Peric [J.H. Fergizer, M. Peric, Computational Methods for Fluid Dynamics, Springer, 2002] to deal with the non-orthogonality of the control volumes. Using a more suitable decomposition of the normal gradient, our scheme gives accurate solutions in geometries where the basic idea of Muzaferija fails. First the performances of both schemes are compared for a Poisson problem solved in quadrangular domains where control volumes are increasingly skewed in order to test their robustness and efficiency. It is shown that convergence properties and the accuracy order of the solution are not degraded even on extremely skewed mesh. Next, the very stable behavior of the method is successfully demonstrated on a randomly distorted grid as well as on an anisotropically distorted one. Finally we compare the solution obtained for quadrilateral control volumes to the ones obtained with a finite element code and with an unstructured version of our finite volume code for triangular control volumes. No differences can be observed between the different solutions, which demonstrates the effectiveness of our approach.

  18. Two staged incentive contract focused on efficiency and innovation matching in critical chain project management

    Min Zhang

    2014-09-01

    Full Text Available Purpose: The purpose of this paper is to define the relative optimal incentive contract to effectively encourage employees to improve work efficiency while actively implementing innovative behavior. Design/methodology/approach: This paper analyzes a two staged incentive contract coordinated with efficiency and innovation in Critical Chain Project Management using learning real options, based on principle-agent theory. The situational experiment is used to analyze the validity of the basic model. Finding: The two staged incentive scheme is more suitable for employees to create and implement learning real options, which will throw themselves into innovation process efficiently in Critical Chain Project Management. We prove that the combination of tolerance for early failure and reward for long-term success is effective in motivating innovation. Research limitations/implications: We do not include the individual characteristics of uncertain perception, which might affect the consistency of external validity. The basic model and the experiment design need to improve. Practical Implications: The project managers should pay closer attention to early innovation behavior and monitoring feedback of competition time in the implementation of Critical Chain Project Management. Originality/value: The central contribution of this paper is the theoretical and experimental analysis of incentive schemes for innovation in Critical Chain Project Management using the principal-agent theory, to encourage the completion of CCPM methods as well as imitative free-riding on the creative ideas of other members in the team.

  19. Willingness of upstream and downstream resource managers to engage in compensation schemes for environmental services

    Chapika Sangkapitux

    2009-04-01

    Full Text Available Providing compensation for agricultural conservation practices adopted by upstream farmers is still an alien concept in the Thai political context. The governance of common-pool natural resources, such as forest and water, has traditionally been under the control of powerful government line agencies, while the contribution of local communities to natural resource conservation have been hardly recognized by policy-makers. Drawing on a case study in Mae Sa watershed, Chiang Mai province, northern Thailand, this paper discusses the potential of developing compensation schemes in a socio-political context where upland farmers – mostly belonging to ethnic minority groups – tend to be considered a threat to the natural resource base rather than providers of environmental services. Based on data obtained from 371 households in the upstream communities and 151 households in the downstream communities of the watershed, upstream resource managers’ willingness to accept compensation for the conservation measures and downstream resource managers’ willingness to pay for water resource improvements were estimated through the use of choice experiments. Results from the study suggest that downstream resource managers would be willing to provide on average nearly 1% of their annual income for a substantial improvement of the quantity and quality of water resources, which could be achieved by compensating upstream farmers’ change of their agricultural systems towards more environment-friendly practices. Both willingness to pay of downstream respondents and willingness of upstream resource managers to accept compensation were positively correlated with age, education, participation in environmental conservation activities and previous experiences with droughts and/or erosion. The paper concludes that there is a clear potential for establishing compensation schemes for provision of environmental services in northern Thai watersheds. The important policy

  20. Soil quality under two different management schemes in coffee plantations of southern Colombia.

    Oscar Eduardo Valbuena-Calderón

    2016-12-01

    Full Text Available The aim of this work was to develop an additive soil quality index (ASQI in agrofostery managements of coffee (Coffea arabica L.. The study took place under two intense and traditional management schemes, in nine farms (32 lots in the south of Colombia, during 2013. A separation of means analysis was held through the LSD Fisher test (P<0,05 to each of the physical and chemical variables of the soil. The variables that showed differences between the schemes were submitted to a main components analysis to select the minimum data set (MDS of the components that explained the most variability and the redundancy was veri ed within the indicators, based on the correlation. The ASQI was obtained from the total sum of soil quality index (SQI of all the indicators, taking into account that the higher the score of the ASQI, the higher the quality of the soil within the study system. The selected physical variables were the content of sand and clay; while the chemical variables were: organic carbon (OC, P, CA, Mg, total bases (TB and Ca/Mg. The best ASQI was obtained from traditional management, because the value of the selected variables matched in a bigger proportion with the quality objective identi ed for the ASQI quanti cation; in this case the crop yield, based on limit values for coffee plantations.

  1. Efficient key management for cryptographically enforced access control

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  2. An efficient algorithm for bi-objective combined heat and power production planning under the emission trading scheme

    Rong, Aiying; Figueira, José Rui; Lahdelma, Risto

    2014-01-01

    Highlights: • Define fuel mix setting for the bi-objective CHP environmental/economic dispatch. • Develop an efficient algorithm for constructing the Pareto frontier for the problem. • Time complexity analysis is conducted for the proposed algorithm. • The algorithm is theoretically compared against a traditional algorithm. • The efficiency of the algorithm is justified by numerical results. - Abstract: The growing environmental awareness and the apparent conflicts between economic and environmental objectives turn energy planning problems naturally into multi-objective optimization problems. In the current study, mixed fuel combustion is considered as an option to achieve tradeoff between economic objective (associated with fuel cost) and emission objective (measured in CO 2 emission cost according to fuels and emission allowance price) because a fuel with higher emissions is usually cheaper than one with lower emissions. Combined heat and power (CHP) production is an important high-efficiency technology to promote under the emission trading scheme. In CHP production, the production planning of both commodities must be done in coordination. A long-term planning problem decomposes into thousands of hourly subproblems. In this paper, a bi-objective multi-period linear programming CHP planning model is presented first. Then, an efficient specialized merging algorithm for constructing the exact Pareto frontier (PF) of the problem is presented. The algorithm is theoretically and empirically compared against a modified dichotomic search algorithm. The efficiency and effectiveness of the algorithm is justified

  3. An Entropy-Based Kernel Learning Scheme toward Efficient Data Prediction in Cloud-Assisted Network Environments

    Xiong Luo

    2016-07-01

    Full Text Available With the recent emergence of wireless sensor networks (WSNs in the cloud computing environment, it is now possible to monitor and gather physical information via lots of sensor nodes to meet the requirements of cloud services. Generally, those sensor nodes collect data and send data to sink node where end-users can query all the information and achieve cloud applications. Currently, one of the main disadvantages in the sensor nodes is that they are with limited physical performance relating to less memory for storage and less source of power. Therefore, in order to avoid such limitation, it is necessary to develop an efficient data prediction method in WSN. To serve this purpose, by reducing the redundant data transmission between sensor nodes and sink node while maintaining the required acceptable errors, this article proposes an entropy-based learning scheme for data prediction through the use of kernel least mean square (KLMS algorithm. The proposed scheme called E-KLMS develops a mechanism to maintain the predicted data synchronous at both sides. Specifically, the kernel-based method is able to adjust the coefficients adaptively in accordance with every input, which will achieve a better performance with smaller prediction errors, while employing information entropy to remove these data which may cause relatively large errors. E-KLMS can effectively solve the tradeoff problem between prediction accuracy and computational efforts while greatly simplifying the training structure compared with some other data prediction approaches. What’s more, the kernel-based method and entropy technique could ensure the prediction effect by both improving the accuracy and reducing errors. Experiments with some real data sets have been carried out to validate the efficiency and effectiveness of E-KLMS learning scheme, and the experiment results show advantages of the our method in prediction accuracy and computational time.

  4. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting.

    Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo

    2017-12-03

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  5. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting

    Tsung-Hung Lin

    2017-12-01

    Full Text Available The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA. PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  6. Korea's emission trading scheme and policy design issues to achieve market-efficiency and abatement targets

    Park, Hojeong; Hong, Won Kyung

    2014-01-01

    In 2008, the government of Republic of Korea (Korea) announced the national abatement target aiming at 30% reductions from the Business-as-Usual projections by 2020. Accordingly, the Emission Trading Scheme (ETS) will be implemented from 2015 onwards. As ETS performance substantially depends on the structural design, it is critically important to examine the details of Korean ETS for the achievement of cost effectiveness and concurrent development of an active emission trading market. This paper addresses several policy design issues for this purpose. After providing an overview on the current framework of Korean ETS, we propose ways to achieve flexibility, consistency and market efficiency of the program in consideration of the preexisting policies. Issues in policy design are discussed by focusing on allowance allocation, market stabilization measures and price mechanism in the emission and energy markets in Korea. This paper will serve as a practical guideline for establishing sustainable and market-efficient Korean ETS that can be compatible with the international standards as in the EU ETS. - Highlights: • Emission Trading Scheme (ETS) will be implemented from 2015 in Korea to reduce CO 2 . • ETS performance substantially depends on structural design. • We provide policy overview on the current framework of Korean ETS. • Several policy design issues are discussed for developing policy consistency. • We focus on allowance allocation, allowance reserve and market stabilization measures

  7. Lowest order in inelastic tunneling approximation : efficient scheme for simulation of inelastic electron tunneling data

    Rossen, E.T.R.; Flipse, C.F.J.; Cerda, J.I.

    2013-01-01

    We have developed an efficient and accurate formalism which allows the simulation at the ab initio level of inelastic electron tunneling spectroscopy data under a scanning tunneling microscope setup. It exploits fully the tunneling regime by carrying out the structural optimization and vibrational

  8. A computationally efficient 3D finite-volume scheme for violent liquid–gas sloshing

    Oxtoby, Oliver F

    2015-10-01

    Full Text Available We describe a semi-implicit volume-of-fluid free-surface-modelling methodology for flow problems involving violent free-surface motion. For efficient computation, a hybrid-unstructured edge-based vertex-centred finite volume discretisation...

  9. Energy-Efficient Region Shift Scheme to Support Mobile Sink Group in Wireless Sensor Networks.

    Yim, Yongbin; Kim, Kyong Hoon; Aldwairi, Monther; Kim, Ki-Il

    2017-12-30

    Mobile sink groups play crucial roles to perform their own missions in many wireless sensor network (WSN) applications. In order to support mobility of such sink groups, it is important to design a mechanism for effective discovery of the group in motion. However, earlier studies obtain group region information by periodic query. For that reason, the mechanism leads to significant signaling overhead due to frequent flooding for the query regardless of the group movement. Furthermore, the mechanism worsens the problem by the flooding in the whole expected area. To deal with this problem, we propose a novel mobile sink group support scheme with low communication cost, called Region-Shift-based Mobile Geocasting Protocol (RSMGP). In this study, we utilize the group mobility feature for which members of a group have joint motion patterns. Thus, we could trace group movement by shifting the region as much as partial members move out of the previous region. Furthermore, the region acquisition is only performed at the moment by just deviated members without collaboration of all members. Experimental results validate the improved signaling overhead of our study compared to the previous studies.

  10. Dynamic clustering scheme based on the coordination of management and control in multi-layer and multi-region intelligent optical network

    Niu, Xiaoliang; Yuan, Fen; Huang, Shanguo; Guo, Bingli; Gu, Wanyi

    2011-12-01

    A Dynamic clustering scheme based on coordination of management and control is proposed to reduce network congestion rate and improve the blocking performance of hierarchical routing in Multi-layer and Multi-region intelligent optical network. Its implement relies on mobile agent (MA) technology, which has the advantages of efficiency, flexibility, functional and scalability. The paper's major contribution is to adjust dynamically domain when the performance of working network isn't in ideal status. And the incorporation of centralized NMS and distributed MA control technology migrate computing process to control plane node which releases the burden of NMS and improves process efficiently. Experiments are conducted on Multi-layer and multi-region Simulation Platform for Optical Network (MSPON) to assess the performance of the scheme.

  11. Green-Frag: Energy-efficient frame fragmentation scheme for wireless sensor networks

    Daghistani, Anas

    2013-10-01

    Frame fragmentation techniques aim to achieve higher throughput by reducing retransmissions. Using experiments on a WSN testbed, we show that frame fragmentation also helps to reduce energy consumption. In this paper we propose Green-Frag, a new energy-efficient protocol based on efficient frame fragmentation technique. Green-Frag allows sensor nodes to transmit data with optimal transmit power and frame structure based on environmental conditions. Green-Frag takes into consideration the channel conditions, interference patterns and level, as well as the distance between sender and receiver. The paper discusses various design and implementation considerations for Green-Frag. Using experimental evaluation on a sensor mote testbed, we show that Green-Frag achieves the least energy consumption by choosing the best transmit power according to the channel conditions.

  12. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Jeong, Young-Sik; Lee, Jae Dong; Lee, Jeong-Bae; Jung, Jai-Jin; Park, Jong Hyuk

    2014-01-01

    Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks repre...

  13. 24 CFR 1006.325 - Maintenance, management and efficient operation.

    2010-04-01

    ... § 1006.325 Maintenance, management and efficient operation. (a) Written policies. The DHHL must develop... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Maintenance, management and efficient operation. 1006.325 Section 1006.325 Housing and Urban Development Regulations Relating to Housing...

  14. Development of a technical scheme for the management of chemical dangerous substances in hospitable environments

    Calleja Amador, C.E.

    2002-01-01

    The chemical substances that are used in the hospitals, and their remainders, represent risks for the environment, the health and security of those who work in these establishments, and of the civil population. The deficiency of a norm that establishes the directives for the handling responsible for such products in the hospitals that our country has motivated the elaboration of a technical scheme that serves as it guides for the correct manipulation, storage and safe disposition of chemical substances in the twenty-nine hospitals of the Caja Costarricense del Seguro Social, establishing Procedures of Standard Operation for its management. To development of the guideline proposal it took a sample of hospitals that includes three levels of comple complexity: national, regional and peripheral. Applying a methodology of evaluation of risks two factors of risk of hospitable were determined, the zones and the population but affected by the existence of chemical substances, which allowed to identify some operative deficiencies in the product handling diverse. The qualitative analysis of the results lead to the elaboration of a technical scheme that includes an instrument for the identification of risks, guideline for the management responsible for hospitable chemical substances, a friendly tool computations like complementary source of intelligence and the proposal of a governing group in charge of the monitoring of the fulfillment of these lineament. (Author) [es

  15. Axial shuffling fuel-management schemes for 1.2% SEU in CANDU

    Younis, M.H.; Boczar, P.G.

    1989-11-01

    The use of slightly enriched uranium (SEU) in CANDU (CANada Deuterium Uranium) requires a different fuel-management strategy than that usually employed with natural uranium fuel. Axial shuffling is a fuel-management strategy in which some or all of the fuel bundles are removed from the channel, rearranged, and reinserted into the same channel, along with fresh fuel. An axial shuffling scheme has been devised for 1.2% SEU which results in excellent power profiles, from the perspectives of both good axial flattening and power histories. With the CANFLEX (CANdu FLEXible fuelling) advanced fuel bundle, fuel rating can be reduced to below 40kW/m, with consequent safety benefits

  16. A Classification Scheme for Analyzing Mobile Apps Used to Prevent and Manage Disease in Late Life

    Wang, Aiguo; Lu, Xin; Chen, Hongtu; Li, Changqun; Levkoff, Sue

    2014-01-01

    Background There are several mobile apps that offer tools for disease prevention and management among older adults, and promote health behaviors that could potentially reduce or delay the onset of disease. A classification scheme that categorizes apps could be useful to both older adult app users and app developers. Objective The objective of our study was to build and evaluate the effectiveness of a classification scheme that classifies mobile apps available for older adults in the “Health & Fitness” category of the iTunes App Store. Methods We constructed a classification scheme for mobile apps according to three dimensions: (1) the Precede-Proceed Model (PPM), which classifies mobile apps in terms of predisposing, enabling, and reinforcing factors for behavior change; (2) health care process, specifically prevention versus management of disease; and (3) health conditions, including physical health and mental health. Content analysis was conducted by the research team on health and fitness apps designed specifically for older adults, as well as those applicable to older adults, released during the months of June and August 2011 and August 2012. Face validity was assessed by a different group of individuals, who were not related to the study. A reliability analysis was conducted to confirm the accuracy of the coding scheme of the sample apps in this study. Results After applying sample inclusion and exclusion criteria, a total of 119 apps were included in the study sample, of which 26/119 (21.8%) were released in June 2011, 45/119 (37.8%) in August 2011, and 48/119 (40.3%) in August 2012. Face validity was determined by interviewing 11 people, who agreed that this scheme accurately reflected the nature of this application. The entire study sample was successfully coded, demonstrating satisfactory inter-rater reliability by two independent coders (95.8% initial concordance and 100% concordance after consensus was reached). The apps included in the study sample

  17. Efficient training schemes that improve the forecast quality of a supermodel

    Schevenhoven, Francine; Selten, Frank; Duane, Gregory; Keenlyside, Noel

    2017-04-01

    Weather and climate models have improved steadily over time as witnessed by objective skill scores, although they remain imperfect. Given these imperfect models, predictions might be improved by combining them dynamically into a so-called "supermodel". In contrast to the standard multi-model ensemble approach, the models exchange information during the simulation, which leads to new solutions. In this study we explore different techniques to create such a supermodel. The techniques are applied to global climate models. The results indicate that the techniques are computationally efficient and lead to supermodels with superior forecast quality and climatology compared to the individual models or the standard multi-model ensemble approach.

  18. Energy Efficient Cooperative Spectrum Sensing in Cognitive Radio Networks Using Distributed Dynamic Load Balanced Clustering Scheme

    Muthukkumar R.

    2017-04-01

    Full Text Available Cognitive Radio (CR is a promising and potential technique to enable secondary users (SUs or unlicenced users to exploit the unused spectrum resources effectively possessed by primary users (PUs or licenced users. The proven clustering approach is used to organize nodes in the network into the logical groups to attain energy efficiency, network scalability, and stability for improving the sensing accuracy in CR through cooperative spectrum sensing (CSS. In this paper, a distributed dynamic load balanced clustering (DDLBC algorithm is proposed. In this algorithm, each member in the cluster is to calculate the cooperative gain, residual energy, distance, and sensing cost from the neighboring clusters to perform the optimal decision. Each member in a cluster participates in selecting a cluster head (CH through cooperative gain, and residual energy that minimises network energy consumption and enhances the channel sensing. First, we form the number of clusters using the Markov decision process (MDP model to reduce the energy consumption in a network. In this algorithm, CR users effectively utilize the PUs reporting time slots of unavailability. The simulation results reveal that the clusters convergence, energy efficiency, and accuracy of channel sensing increased considerably by using the proposed algorithm.

  19. Energy Efficient Cooperative Spectrum Sensing in Cognitive Radio Networks Using Distributed Dynamic Load Balanced Clustering Scheme

    Muthukkumar R.

    2016-07-01

    Full Text Available Cognitive Radio (CR is a promising and potential technique to enable secondary users (SUs or unlicenced users to exploit the unused spectrum resources effectively possessed by primary users (PUs or licenced users. The proven clustering approach is used to organize nodes in the network into the logical groups to attain energy efficiency, network scalability, and stability for improving the sensing accuracy in CR through cooperative spectrum sensing (CSS. In this paper, a distributed dynamic load balanced clustering (DDLBC algorithm is proposed. In this algorithm, each member in the cluster is to calculate the cooperative gain, residual energy, distance, and sensing cost from the neighboring clusters to perform the optimal decision. Each member in a cluster participates in selecting a cluster head (CH through cooperative gain, and residual energy that minimises network energy consumption and enhances the channel sensing. First, we form the number of clusters using the Markov decision process (MDP model to reduce the energy consumption in a network. In this algorithm, CR users effectively utilize the PUs reporting time slots of unavailability. The simulation results reveal that the clusters convergence, energy efficiency, and accuracy of channel sensing increased considerably by using the proposed algorithm.

  20. Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments.

    Lee, Jaeseung; Sung, Yunsick; Park, Jong Hyuk

    2016-12-01

    The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments.

  1. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  2. SensorScheme: Supply Chain Management Automation using Wireless Sensor Networks

    Evers, L.; Havinga, Paul J.M.; Kuper, Jan; Lijding, M.E.M.; Meratnia, Nirvana

    2007-01-01

    The supply chain management business can benefit greatly from automation, as recent developments with RFID technology shows. The use of Wireless Sensor Network technology promises to bring the next leap in efficiency and quality of service. However, current WSN system software does not yet provide

  3. Content Management System Implementation Efficiency and Value

    Ivanova, Violeta

    2009-01-01

    Nowadays websites has significant importance and makes strong impact of the company’s business. They are widely used to deliver services and information, manage transactions, and facilitate communications. Websites are company’s business card. Businesses are currently seeking alternative software tools which can help them to improve their performance and online services. There are two appropriate solutions to this problem- Content Management System and HTML editors. Both development tools ...

  4. Efficient thermal management for multiprocessor systems

    Coşkun, Ayşe Kıvılcım

    2009-01-01

    High temperatures and large thermal variations on the die create severe challenges in system reliability, performance, leakage power, and cooling costs. Designing for worst-case thermal conditions is highly costly and time-consuming. Therefore, dynamic thermal management methods are needed to maintain safe temperature levels during execution. Conventional management techniques sacrifice performance to control temperature and only consider the hot spots, neglecting the effects of thermal varia...

  5. An Efficient Audio Coding Scheme for Quantitative and Qualitative Large Scale Acoustic Monitoring Using the Sensor Grid Approach

    Félix Gontier

    2017-11-01

    Full Text Available The spreading of urban areas and the growth of human population worldwide raise societal and environmental concerns. To better address these concerns, the monitoring of the acoustic environment in urban as well as rural or wilderness areas is an important matter. Building on the recent development of low cost hardware acoustic sensors, we propose in this paper to consider a sensor grid approach to tackle this issue. In this kind of approach, the crucial question is the nature of the data that are transmitted from the sensors to the processing and archival servers. To this end, we propose an efficient audio coding scheme based on third octave band spectral representation that allows: (1 the estimation of standard acoustic indicators; and (2 the recognition of acoustic events at state-of-the-art performance rate. The former is useful to provide quantitative information about the acoustic environment, while the latter is useful to gather qualitative information and build perceptually motivated indicators using for example the emergence of a given sound source. The coding scheme is also demonstrated to transmit spectrally encoded data that, reverted to the time domain using state-of-the-art techniques, are not intelligible, thus protecting the privacy of citizens.

  6. An efficient and stable hydrodynamic model with novel source term discretization schemes for overland flow and flood simulations

    Xia, Xilin; Liang, Qiuhua; Ming, Xiaodong; Hou, Jingming

    2017-05-01

    Numerical models solving the full 2-D shallow water equations (SWEs) have been increasingly used to simulate overland flows and better understand the transient flow dynamics of flash floods in a catchment. However, there still exist key challenges that have not yet been resolved for the development of fully dynamic overland flow models, related to (1) the difficulty of maintaining numerical stability and accuracy in the limit of disappearing water depth and (2) inaccurate estimation of velocities and discharges on slopes as a result of strong nonlinearity of friction terms. This paper aims to tackle these key research challenges and present a new numerical scheme for accurately and efficiently modeling large-scale transient overland flows over complex terrains. The proposed scheme features a novel surface reconstruction method (SRM) to correctly compute slope source terms and maintain numerical stability at small water depth, and a new implicit discretization method to handle the highly nonlinear friction terms. The resulting shallow water overland flow model is first validated against analytical and experimental test cases and then applied to simulate a hypothetic rainfall event in the 42 km2 Haltwhistle Burn, UK.

  7. An Efficient Implicit FEM Scheme for Fractional-in-Space Reaction-Diffusion Equations

    Burrage, Kevin

    2012-01-01

    Fractional differential equations are becoming increasingly used as a modelling tool for processes associated with anomalous diffusion or spatial heterogeneity. However, the presence of a fractional differential operator causes memory (time fractional) or nonlocality (space fractional) issues that impose a number of computational constraints. In this paper we develop efficient, scalable techniques for solving fractional-in-space reaction diffusion equations using the finite element method on both structured and unstructured grids via robust techniques for computing the fractional power of a matrix times a vector. Our approach is show-cased by solving the fractional Fisher and fractional Allen-Cahn reaction-diffusion equations in two and three spatial dimensions, and analyzing the speed of the traveling wave and size of the interface in terms of the fractional power of the underlying Laplacian operator. © 2012 Society for Industrial and Applied Mathematics.

  8. Developing a computationally efficient dynamic multilevel hybrid optimization scheme using multifidelity model interactions.

    Hough, Patricia Diane (Sandia National Laboratories, Livermore, CA); Gray, Genetha Anne (Sandia National Laboratories, Livermore, CA); Castro, Joseph Pete Jr. (; .); Giunta, Anthony Andrew

    2006-01-01

    Many engineering application problems use optimization algorithms in conjunction with numerical simulators to search for solutions. The formulation of relevant objective functions and constraints dictate possible optimization algorithms. Often, a gradient based approach is not possible since objective functions and constraints can be nonlinear, nonconvex, non-differentiable, or even discontinuous and the simulations involved can be computationally expensive. Moreover, computational efficiency and accuracy are desirable and also influence the choice of solution method. With the advent and increasing availability of massively parallel computers, computational speed has increased tremendously. Unfortunately, the numerical and model complexities of many problems still demand significant computational resources. Moreover, in optimization, these expenses can be a limiting factor since obtaining solutions often requires the completion of numerous computationally intensive simulations. Therefore, we propose a multifidelity optimization algorithm (MFO) designed to improve the computational efficiency of an optimization method for a wide range of applications. In developing the MFO algorithm, we take advantage of the interactions between multi fidelity models to develop a dynamic and computational time saving optimization algorithm. First, a direct search method is applied to the high fidelity model over a reduced design space. In conjunction with this search, a specialized oracle is employed to map the design space of this high fidelity model to that of a computationally cheaper low fidelity model using space mapping techniques. Then, in the low fidelity space, an optimum is obtained using gradient or non-gradient based optimization, and it is mapped back to the high fidelity space. In this paper, we describe the theory and implementation details of our MFO algorithm. We also demonstrate our MFO method on some example problems and on two applications: earth penetrators and

  9. CCS_WHMS: A Congestion Control Scheme for Wearable Health Management System.

    Kafi, Mohamed Amine; Ben Othman, Jalel; Bagaa, Miloud; Badache, Nadjib

    2015-12-01

    Wearable computing is becoming a more and more attracting field in the last years thanks to the miniaturisation of electronic devices. Wearable healthcare monitoring systems (WHMS) as an important client of wearable computing technology has gained a lot. Indeed, the wearable sensors and their surrounding healthcare applications bring a lot of benefits to patients, elderly people and medical staff, so facilitating their daily life quality. But from a research point of view, there is still work to accomplish in order to overcome the gap between hardware and software parts. In this paper, we target the problem of congestion control when all these healthcare sensed data have to reach the destination in a reliable manner that avoids repetitive transmission which wastes precious energy or leads to loss of important information in emergency cases, too. We propose a congestion control scheme CCS_WHMS that ensures efficient and fair data delivery while used in the body wearable system part or in the multi-hop inter bodies wearable ones to get the destination. As the congestion detection paradigm is very important in the control process, we do experimental tests to compare between state of the art congestion detection methods, using MICAz motes, in order to choose the appropriate one for our scheme.

  10. Alexandria: towards an efficient centralised document management. More efficient business processes

    Couvreur, D.

    2011-01-01

    The capital of SCK-CEN is the knowledge of its staff. There is an enormous amount of information circulating within the research centre. A centralised management for all documents is also critical to efficiently manage, share and unlock the expertise. Since 2009, SCK-CEN has been working on a document management system: Alexandria. A first test draft was completed in 2010.

  11. Design study on the efficiency of the thermal scheme of power unit of thermal power plants in hot climates

    Sedlov, A.; Dorokhov, Y.; Rybakov, B.; Nenashev, A.

    2017-11-01

    At the stage of pre-proposals unit of the thermal power plants for regions with a hot climate requires a design study on the efficiency of possible options for the structure of the thermal circuit and a set of key parameters. In this paper, the thermal circuit of the condensing unit powerfully 350 MW. The main feature of the external conditions of thermal power plants in hot climates is the elevated temperature of cooling water of the turbine condensers. For example, in the Persian Gulf region as the cooling water is sea water. In the hot season of the year weighted average sea water temperature of 30.9 °C and during the cold season to 22.8 °C. From the turbine part of the steam is supplied to the distillation-desalination plant. In the hot season of the year heat scheme with pressure fresh pair of 23.54 MPa, temperature 570/560 °C and feed pump with electric drive (EDP) is characterized by a efficiency net of 0.25% higher than thermal schem with feed turbine pump (TDP). However, the supplied power unit with PED is less by 11.6 MW. Calculations of thermal schemes in all seasons of the year allowed us to determine the difference in the profit margin of units of the TDP and EDP. During the year the unit with the TDP provides the ability to obtain the profit margin by 1.55 million dollars more than the unit EDP. When using on the market subsidized price of electricity (Iran) marginal profit of a unit with TDP more at 7.25 million dollars.

  12. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  13. An Efficient Simulation Scheme of the Outage Probability with Co-Channel Interference

    Rached, Nadhir B.

    2016-03-28

    © 2015 IEEE. The outage probability (OP) of the signal-to-interference-plus-noise ratio (SINR) is an important metric used to evaluate the performance of wireless communication systems operating over fading channels. One major difficulty toward assessing the OP is that, in most of the realistic scenarios, closed-form expressions cannot be derived. This is for instance the case of Log-normal fading environments, in which evaluating the OP of the SINR amounts to computing the probability that a sum of correlated Log-normal variates exceeds a given threshold. Since such a probability is not known to admit a closed-form expression, it has thus far been evaluated by several approximation techniques, the accuracies of which are unfortunately not guaranteed in the interesting region of small outage probabilities. For these regions, simulation techniques based on variance reduction algorithms can represent a good alternative, being well-recognized to be quick and highly accurate for estimating rare event probabilities. This constitutes the major motivation behind our work. More specifically, we propose an efficient importance sampling approach which is based on a covariance matrix scaling technique and illustrate its computational gain over naive Monte Carlo simulations through some selected simulation results.

  14. Increased malaria transmission around irrigation schemes in Ethiopia and the potential of canal water management for malaria vector control

    Kibret, Solomon; Wilson, G Glenn; Tekie, Habte; Petros, Beyene

    2014-01-01

    Background Irrigation schemes have been blamed for the increase in malaria in many parts of sub-Saharan Africa. However, proper water management could help mitigate malaria around irrigation schemes in this region. This study investigates the link between irrigation and malaria in Central Ethiopia. Methods Larval and adult mosquitoes were collected fortnightly between November 2009 and October 2010 from two irrigated and two non-irrigated (control) villages in the Ziway area, Central Ethiopia...

  15. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  16. An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users

    Hong Zhong

    2015-01-01

    Full Text Available In a traditional network, server load balancing is used to satisfy the demand for high data volumes. The technique requires large capital investment while offering poor scalability and flexibility, which difficultly supports highly dynamic workload demands from massive mobile users. To solve these problems, this paper analyses the principle of software-defined networking (SDN and presents a new probabilistic method of load balancing based on variance analysis. The method can be used to dynamically manage traffic flows for supporting massive mobile users in SDN networks. The paper proposes a solution using the OpenFlow virtual switching technology instead of the traditional hardware switching technology. A SDN controller monitors data traffic of each port by means of variance analysis and provides a probability-based selection algorithm to redirect traffic dynamically with the OpenFlow technology. Compared with the existing load balancing methods which were designed to support traditional networks, this solution has lower cost, higher reliability, and greater scalability which satisfy the needs of mobile users.

  17. Modelling tools for managing Induced RiverBank Filtration MAR schemes

    De Filippis, Giovanna; Barbagli, Alessio; Marchina, Chiara; Borsi, Iacopo; Mazzanti, Giorgio; Nardi, Marco; Vienken, Thomas; Bonari, Enrico; Rossetto, Rudy

    2017-04-01

    Induced RiverBank Filtration (IRBF) is a widely used technique in Managed Aquifer Recharge (MAR) schemes, when aquifers are hydraulically connected with surface water bodies, with proven positive effects on quality and quantity of groundwater. IRBF allows abstraction of a large volume of water, avoiding large decrease in groundwater heads. Moreover, thanks to the filtration process through the soil, the concentration of chemical species in surface water can be reduced, thus becoming an excellent resource for the production of drinking water. Within the FP7 MARSOL project (demonstrating Managed Aquifer Recharge as a SOLution to water scarcity and drought; http://www.marsol.eu/), the Sant'Alessio IRBF (Lucca, Italy) was used to demonstrate the feasibility and technical and economic benefits of managing IRBF schemes (Rossetto et al., 2015a). The Sant'Alessio IRBF along the Serchio river allows to abstract an overall amount of about 0.5 m3/s providing drinking water for 300000 people of the coastal Tuscany (mainly to the town of Lucca, Pisa and Livorno). The supplied water is made available by enhancing river bank infiltration into a high yield (10-2 m2/s transmissivity) sandy-gravelly aquifer by rising the river head and using ten vertical wells along the river embankment. A Decision Support System, consisting in connected measurements from an advanced monitoring network and modelling tools was set up to manage the IRBF. The modelling system is based on spatially distributed and physically based coupled ground-/surface-water flow and solute transport models integrated in the FREEWAT platform (developed within the H2020 FREEWAT project - FREE and Open Source Software Tools for WATer Resource Management; Rossetto et al., 2015b), an open source and public domain GIS-integrated modelling environment for the simulation of the hydrological cycle. The platform aims at improving water resource management by simplifying the application of EU water-related Directives and at

  18. Managing Recreation Enterprises Efficiency under Conditions of Informatisation and Globalisation of Economy

    Korogodova Olena O.

    2014-03-01

    Full Text Available The goal of the article is development of recommendations on improvement of the recreation enterprise efficiency management mechanism with consideration of new tendencies of globalisation and informatisation of economy. The article considers main approaches to determination of efficiency of entrepreneurial activity and proposes a classification of types of enterprise efficiency by the following criteria: nature of expenditures and results, environmental impact of the enterprise, duration of effect and localisation. The article marks out the cause-effect relation for each type of enterprise efficiency. It develops a scheme of elements of the mechanism of management of recreation enterprise efficiency and identifies conceptual principles of this mechanism. It offers the “recreation attractiveness” notion, which, unlike existing ones, reflects the essence of demand on enterprise services more accurately and facilitates development of the recreation enterprise recreation attractiveness management mechanism by criteria of recreation potential, prices and quality of enterprise services. Using this criteria as basic, the article builds methods of rating assessment of recreation enterprises. It is necessary to study deeper the methodical instruments for diagnostics of four elements of recreation enterprise functioning: external environment, recreation potential, organisational status and management potential.

  19. WQM: An Aggregation-aware Queue Management Scheme for IEEE 802.11n based Networks

    Showail, Ahmad

    2014-08-17

    Choosing the right buffer size in Wi-Fi networks is challenging due to the dynamic nature of the wireless environment. Over buffering or \\'bufferbloat\\' may produce unacceptable end-to-end delays, while static small buffers may limit the performance gains that can be achieved with various 802.11n enhancements, such as frame aggregation. We propose WQM, a queue management scheme customized for wireless networks. WQM adapts the buffer size based on measured link characteristics and network load. Furthermore, it accounts for aggregate length when deciding about the optimal buffer size. We implement WQM on Linux and evaluate it on a wireless testbed. WQM reduces the end-to-end delay by up to 8x compared to Linux default buffer size, and 2x compared to CoDel, the state-of-the-art bufferbloat solution, while achieving comparable network goodput. Further, WQM improves fairness as it limits the ability of a single flow to saturate the buffer.

  20. An Overview of Demand Side Management Control Schemes for Buildings in Smart Grids

    Kosek, Anna Magdalena; Costanzo, Giuseppe Tommaso; Bindner, Henrik W.

    2013-01-01

    The increasing share of distributed energy resources and renewable energy in power systems results in a highly variable and less controllable energy production. Therefore, in order to ensure stability and to reduce the infrastructure and operation cost of the power grid, flexible and controllable...... of the power sector in mind and thus can differ significantly in their architecture, their integration into the various markets, their integration into distribution network operation and several other aspects. This paper proposes a classification of load control policies for demand side management in smart...... buildings, based on external behavior: direct, indirect, transactional and autonomous control; internal operation: decision support system scope, control strategy, failure handling and architecture. This classification assists in providing an overview of the control schemes as well as different ways...

  1. D-MSR: A Distributed Network Management Scheme for Real-Time Monitoring and Process Control Applications in Wireless Industrial Automation

    Zand, Pouria; Dilo, Arta; Havinga, Paul

    2013-01-01

    Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead. PMID:23807687

  2. D-MSR: a distributed network management scheme for real-time monitoring and process control applications in wireless industrial automation.

    Zand, Pouria; Dilo, Arta; Havinga, Paul

    2013-06-27

    Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead.

  3. Impact of a simultaneous reduction in fishing subsidies and introduction of efficient management of rents

    Merayo, Eugenia; Waldo, Staffan; Nielsen, Max

    2018-01-01

    of the largest fishing nations within the EU. A static bio-economic model is used to analyze the effect of simultaneous elimination of subsidies and introduction of an economically efficient management system for the Northwest Spanish fleet. It is concluded that improvements in management would bring substantial......Subsidies to the fishing sector have long been criticized for fueling over-fishing, and a reduction in subsidies is currently on the agenda in the negotiations within the World Trade Organization (WTO). This article analyzes the role of subsidies and other management measures for Spain, one...... rents to the industry, up to €164 million, irrespective of subsidy level, but also a reduction in fishing effort of almost 60%. Under a management scheme that maximizes economic rents, elimination of subsidies in the fishery would increase social welfare, induced by a decrease in the equilibrium fishing...

  4. An efficient coupled polynomial interpolation scheme to eliminate material-locking in the Euler-Bernoulli piezoelectric beam finite element

    Litesh N. Sulbhewar

    Full Text Available The convergence characteristic of the conventional two-noded Euler-Bernoulli piezoelectric beam finite element depends on the configuration of the beam cross-section. The element shows slower convergence for the asymmetric material distribution in the beam cross-section due to 'material-locking' caused by extension-bending coupling. Hence, the use of conventional Euler-Bernoulli beam finite element to analyze piezoelectric beams which are generally made of the host layer with asymmetrically surface bonded piezoelectric layers/patches, leads to increased computational effort to yield converged results. Here, an efficient coupled polynomial interpolation scheme is proposed to improve the convergence of the Euler-Bernoulli piezoelectric beam finite elements, by eliminating ill-effects of material-locking. The equilibrium equations, derived using a variational formulation, are used to establish relationships between field variables. These relations are used to find a coupled quadratic polynomial for axial displacement, having contributions from an assumed cubic polynomial for transverse displacement and assumed linear polynomials for layerwise electric potentials. A set of coupled shape functions derived using these polynomials efficiently handles extension-bending and electromechanical couplings at the field interpolation level itself in a variationally consistent manner, without increasing the number of nodal degrees of freedom. The comparison of results obtained from numerical simulation of test problems shows that the convergence characteristic of the proposed element is insensitive to the material configuration of the beam cross-section.

  5. A novel efficient coupled polynomial field interpolation scheme for higher order piezoelectric extension mode beam finite elements

    Sulbhewar, Litesh N; Raveendranath, P

    2014-01-01

    An efficient piezoelectric smart beam finite element based on Reddy’s third-order displacement field and layerwise linear potential is presented here. The present formulation is based on the coupled polynomial field interpolation of variables, unlike conventional piezoelectric beam formulations that use independent polynomials. Governing equations derived using a variational formulation are used to establish the relationship between field variables. The resulting expressions are used to formulate coupled shape functions. Starting with an assumed cubic polynomial for transverse displacement (w) and a linear polynomial for electric potential (φ), coupled polynomials for axial displacement (u) and section rotation (θ) are found. This leads to a coupled quadratic polynomial representation for axial displacement (u) and section rotation (θ). The formulation allows accommodation of extension–bending, shear–bending and electromechanical couplings at the interpolation level itself, in a variationally consistent manner. The proposed interpolation scheme is shown to eliminate the locking effects exhibited by conventional independent polynomial field interpolations and improve the convergence characteristics of HSDT based piezoelectric beam elements. Also, the present coupled formulation uses only three mechanical degrees of freedom per node, one less than the conventional formulations. Results from numerical test problems prove the accuracy and efficiency of the present formulation. (paper)

  6. Natural Resource Management Schemes as Entry Points for Integrated Landscape Approaches: Evidence from Ghana and Burkina Faso.

    Foli, Samson; Ros-Tonen, Mirjam A F; Reed, James; Sunderland, Terry

    2017-04-20

    In recognition of the failures of sectoral approaches to overcome global challenges of biodiversity loss, climate change, food insecurity and poverty, scientific discourse on biodiversity conservation and sustainable development is shifting towards integrated landscape governance arrangements. Current landscape initiatives however very much depend on external actors and funding, raising the question of whether, and how, and under what conditions, locally embedded resource management schemes can serve as entry points for the implementation of integrated landscape approaches. This paper assesses the entry point potential for three established natural resource management schemes in West Africa that target landscape degradation with involvement of local communities: the Chantier d'Aménagement Forestier scheme encompassing forest management sites across Burkina Faso and the Modified Taungya System and community wildlife resource management initiatives in Ghana. Based on a review of the current literature, we analyze the extent to which design principles that define a landscape approach apply to these schemes. We found that the CREMA meets most of the desired criteria, but that its scale may be too limited to guarantee effective landscape governance, hence requiring upscaling. Conversely, the other two initiatives are strongly lacking in their design principles on fundamental components regarding integrated approaches, continual learning, and capacity building. Monitoring and evaluation bodies and participatory learning and negotiation platforms could enhance the schemes' alignment with integrated landscape approaches.

  7. Promoting energy efficiency investments with risk management decision tools

    Jackson, Jerry

    2010-01-01

    This paper reviews current capital budgeting practices and their impact on energy efficiency investments. The prevalent use of short payback 'rule-of-thumb' requirements to screen efficiency projects for risk is shown to bias investment choices towards 'sure bet' investments bypassing many profitable efficiency investment options. A risk management investment strategy is presented as an alternative to risk avoidance practices applied with payback thresholds. The financial industry risk management tool Value-at-Risk is described and extended to provide an Energy-Budgets-at-Risk or EBaR risk management analysis to convey more accurate energy efficiency investment risk information. The paper concludes with recommendations to expand the use of Value-at-Risk-type energy efficiency analysis.

  8. The Role of Knowledge Management in Raising the Efficiency of ...

    pc

    2018-03-05

    Mar 5, 2018 ... management implementation and the pilots' performance. There are lag of higher ... efficiency and effectiveness of business processes with an impact on the .... available. Knowledge of an enterprise is a basis for building.

  9. Efficiency of supply chain management. Strategic and operational approach

    Grzegorz Lichocik

    2013-06-01

    Full Text Available Background: One of the most important issues subject to theoretical considerations and empirical studies is the measurement of efficiency of activities in logistics and supply chain management. Simultaneously, efficiency is one of the terms interpreted in an ambiguous and multi-aspect manner, depending on the subject of a study. The multitude of analytical dimensions of this term results in the fact that, apart from economic efficiency being the basic study area, other dimensions perceived as an added value by different groups of supply chain participants become more and more important. Methods: The objective of this paper is to attempt to explain the problem of supply chain management efficiency in the context of general theoretical considerations relating to supply chain management. The authors have also highlighted determinants and practical implications of supply chain management efficiency in strategic and operational contexts. The study employs critical analyses of logistics literature and the free-form interview with top management representatives of a company operating in the TSL sector. Results: We must find a comprehensive approach to supply chain efficiency including all analytical dimensions connected with real goods and services flow. An effective supply chain must be cost-effective (ensuring economic efficiency of a chain, functional (reducing processes, lean, minimising the number of links in the chain to the necessary ones, adapting supply chain participants' internal processes to a common objective based on its efficiency and ensuring high quality of services (customer-oriented logistics systems. Conclusions: Efficiency of supply chains is not only a task for which a logistics department is responsible as it is a strategic decision taken by the management as regards the method of future company's operation. Correctly planned and fulfilled logistics tasks may result in improving performance of a company as well as the whole

  10. Efficient Load Scheduling Method For Power Management

    Vijo M Joy

    2015-08-01

    Full Text Available An efficient load scheduling method to meet varying power supply needs is presented in this paper. At peak load times the power generation system fails due to its instability. Traditionally we use load shedding process. In load shedding process disconnect the unnecessary and extra loads. The proposed method overcomes this problem by scheduling the load based on the requirement. Artificial neural networks are used for this optimal load scheduling process. For generate economic scheduling artificial neural network has been used because generation of power from each source is economically different. In this the total load required is the inputs of this network and the power generation from each source and power losses at the time of transmission are the output of the neural network. Training and programming of the artificial neural networks are done using MATLAB.

  11. Cost efficiency of waste management in Dutch municipalities

    de Groot, Hans; van Heezik, A.; Hollanders, D.; Felsö, F.

    2011-01-01

    This paper analyses the cost efficiency of waste management of Dutch municipalities. For the first time stochastic frontier analysis is applied to Dutch data, employing recent multi-year data (2005-2008). The preliminary findings confirm earlier results on the importance for cost efficiency of

  12. Efficient Management of Short-Lived Data

    Schmidt, Albrecht; Jensen, Christian Søndergaard

    2005-01-01

    Motivated by the increasing prominence of loosely-coupled systems, such as mobile and sensor networks, which are characterised by intermittent connectivity and volatile data, we study the tagging of data with so-called expiration times. More specifically, when data are inserted into a database......, they may be tagged with time values indicating when they expire, i.e., when they are regarded as stale or invalid and thus are no longer considered part of the database. In a number of applications, expiration times are known and can be assigned at insertion time. We present data structures and algorithms...... for online management of data tagged with expiration times. The algorithms are based on fully functional, persistent treaps, which are a combination of binary search trees with respect to a primary attribute and heaps with respect to a secondary attribute. The primary attribute implements primary keys...

  13. ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home.

    Liao, Chun-Feng; Chen, Peng-Yu

    2017-09-21

    A Pervasive-computing-enriched smart home environment, which contains many embedded and tiny intelligent devices and sensors coordinated by service management mechanisms, is capable of anticipating intentions of occupants and providing appropriate services accordingly. Although there are a wealth of research achievements in recent years, the degree of market acceptance is still low. The main reason is that most of the devices and services in such environments depend on particular platform or technology, making it hard to develop an application by composing the devices or services. Meanwhile, the concept of Web of Things (WoT) is becoming popular recently. Based on WoT, the developers can build applications based on popular web tools or technologies. Consequently, the objective of this paper is to propose a set of novel WoT-driven plug-and-play service management schemes for a smart home called Resource-Oriented Service Administration (ROSA). We have implemented an application prototype, and experiments are performed to show the effectiveness of the proposed approach. The results of this research can be a foundation for realizing the vision of "end user programmable smart environments".

  14. ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home

    Chun-Feng Liao

    2017-09-01

    Full Text Available A Pervasive-computing-enriched smart home environment, which contains many embedded and tiny intelligent devices and sensors coordinated by service management mechanisms, is capable of anticipating intentions of occupants and providing appropriate services accordingly. Although there are a wealth of research achievements in recent years, the degree of market acceptance is still low. The main reason is that most of the devices and services in such environments depend on particular platform or technology, making it hard to develop an application by composing the devices or services. Meanwhile, the concept of Web of Things (WoT is becoming popular recently. Based on WoT, the developers can build applications based on popular web tools or technologies. Consequently, the objective of this paper is to propose a set of novel WoT-driven plug-and-play service management schemes for a smart home called Resource-Oriented Service Administration (ROSA. We have implemented an application prototype, and experiments are performed to show the effectiveness of the proposed approach. The results of this research can be a foundation for realizing the vision of “end user programmable smart environments”.

  15. Toward effective strategies for energy efficient network management

    Vreeswijk, Jacob Dirk; van Berkum, Eric C.; van Arem, Bart; van Vliet, H.; Abadi, A.; Bauer e.a., D.

    2010-01-01

    Trade-offs in efficiency, equity and acceptability arise as a central feature in traffic management. Today's urban traffic network management strategies focus on overall system performance and often overlook the interests of the individual road user. In addition, the emphasis is on travel time

  16. Strategic Impact of Knowledge Management on Organisational Efficiency

    Larsen, Michael Holm; Pedersen, Mogens Kühn

    1999-01-01

    Knowledge management is rarely found in a strategy context. Although some companies already have introduced the role of a chief knowledge officer, knowledge management is not treated as a strategic endeavour. Furthermore, contributions from an academic point of view are scarce in the field...... of the strategic issues of knowledge management. This paper contributes with some insight in pointing out the strategic question that knowledge management might provide answers for: The efficiency issue of stategic positioning. Furthermore, the paper emphasises the distinction between symmetric and asymmetric...... incentives in business relations, and on this basis identifies the notion of Distributed Knowledge Management as a means for creating efficiency strategies with symmetric incentives in business relations. In this way a strategic agenda for knowledge management is identified....

  17. Efficient network resource management for multimedia-on-demand services

    Kuo, Chinhwa; Chiu, Jui-Hwa; Wu, Jong-Jyh; Chen, Dxo-Shin

    1998-08-01

    A Multimedia Instruction on Demand (MID) serves the purpose of providing an environment for lecture design, lecture annotation, and lecture review over networks. In order to support real-time multimedia interactive playback for such an application, the underlying networks are required to provide network resource management mechanism to enforce the reservation policy. In our design, the MID server and MID gateway consist of the following mechanisms, namely, resource management agent, admission control agent, packet classifier, and packet scheduler. We make use of the framework of the ReSerVation Protocol to devise and implement a network resource management mechanism, which control end-to-end packet delays and bandwidth allocation for the designed MID system. In the present paper, our contributions are as follows: (1) a network resource management scheme is designed to support real-time multimedia over the Internet and (2) an experimental test bed is established to measure the system performance. The developed scheme is currently being implemented in the Multimedia Information Networking laboratory at Tamkang University.

  18. Nuclear materials management for safety and efficiency

    NONE

    1965-12-15

    The use of nuclear materials in industrial processes presents management with some special problems which are peculiar to the atomic energy industry. If reactor fuel costs are to be kept low, too, each fuel element must yield the maximum economic 'bum-up' before it is withdrawn from service, and this calls for reliable non-destructive methods of measurement of 'burn-up' and appropriate records and fuel-changing schedules. The special hazards of radioactive materials call for special precautions and appropriate systems of handling and storage. A further danger unique to atomic energy is that of criticality - the possibility that an excessive concentration of fissile material may result in a chain reaction. Every part of the processing plant must be surveyed and checked to ensure that there is no build-up of fissile residues; in storage or transit there must be no aggregation of small lots. In the nuclear energy industry, too, the standards of purity required are much higher than in most other large-scale operation, so that stringent quality checks are needed

  19. Efficient Management for Hybrid Memory in Managed Language Runtime

    Wang , Chenxi; Cao , Ting; Zigman , John; Lv , Fang; Zhang , Yunquan; Feng , Xiaobing

    2016-01-01

    Part 1: Memory: Non-Volatile, Solid State Drives, Hybrid Systems; International audience; Hybrid memory, which leverages the benefits of traditional DRAM and emerging memory technologies, is a promising alternative for future main memory design. However popular management policies through memory-access recording and page migration may invoke non-trivial overhead in execution time and hardware space. Nowadays, managed language applications are increasingly dominant in every kind of platform. M...

  20. Efficient Spatial Data Structure for Multiversion Management of Engineering Drawings

    Yasuaki Nakamura

    2004-08-01

    Full Text Available In the engineering database system, multiple versions of a design including engineering drawings should be managed efficiently. The paper proposes an extended spatial data structure for efficient management of multiversion engineering drawings. The R-tree is adapted as a basic data structure. The efficient mechanism to manage the difference between drawings is introduced to the R-tree to eliminate redundant duplications and to reduce the amount of storage required for the data structure. The extended data structures of the R-tree, MVR and MVR* trees, are developed and the performances of these trees are evaluated. A series of simulation tests shows that, compared with the basic R-tree, the amounts of storage required for the MVR and MVR* trees are reduced to 50% and 30%, respectively. The search efficiencies of the R, MVR, and MVR* trees are almost the same.

  1. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    Ming Luo

    2018-01-01

    Full Text Available Nowadays wireless sensor network (WSN is increasingly being used in the Internet of Things (IoT for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC environment to communicate with a sensor node in an identity-based cryptography (IBC environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT.

  2. Geothermal source heat pumps under energy services companies finance scheme to increase energy efficiency and production in stockbreeding facilities

    Borge-Diez, David; Colmenar-Santos, Antonio; Pérez-Molina, Clara; López-Rey, África

    2015-01-01

    In Europe energy services are underutilized in terms of their potential to improve energy efficiency and reduce external energy dependence. Agricultural and stockbreeding sectors have high potential to improve their energy efficiency. This paper presents an energy model for geothermal source heat pumps in stockbreeding facilities and an analysis of an energy services business case. The proposed solution combines both energy cost reduction and productivity increases and improves energy services company financing scheme. CO 2 emissions drop by 89%, reducing carbon footprint and improving added value for the product. For the two different evaluated scenarios, one including winter heating and one including heating and cooling, high IRR (internal return rate) values are obtained. A sensitivity analysis reveals that the IRR ranges from 10.25% to 22.02%, making the investment attractive. To make the research highly extensible, a sensitivity analysis for different locations and climatic conditions is presented, showing a direct relationship between financial parameters and climatic conditions. A Monte Carlo simulation is performed showing that initial fuel cost and initial investment are the most decisive in the financial results. This work proves that energy services based on geothermal energy can be profitable in these sectors and can increase sustainability, reduce CO 2 emissions and improve carbon footprint. - Highlights: • Geothermal heat pumps are studied to promote industrial energy services. • Geothermal energy in farming facilities improves global competitiveness. • Research shows profitability of low enthalpy geothermal energy services. • Climatic conditions sensitivity analysis reveals IRR ranges from 10.25% to 22.02%. • Added market value for the product as carbon footprint reduction, are achieved

  3. The Swiss agri-environment scheme enhances pollinator diversity and plant reproductive succes in nearby intensively managed farmland

    Albrecht, M.; Duelli, P.; Müller, C.; Kleijn, D.; Schmid, B.

    2007-01-01

    1. Agri-environment schemes attempt to counteract the loss of biodiversity and associated ecosystem services such as pollination and natural pest control in agro-ecosystems. However, only a few studies have evaluated whether these attempts are successful. 2. We studied the effects of managing

  4. MANER : Managed Data Dissemination Scheme for LoRa IoT Enabled Wildlife Monitoring System (WMS)

    Ayele, Eyuel Debebe; Meratnia, Nirvana; Havinga, Paul J.M.

    2018-01-01

    In this paper, we introduce dual radio based IoT network architecture for wildlife monitoring system (WMS). This solution will facilitate an IoT devices to be deployed for sustainable wildlife monitoring applications. In addition we present MANER, a managed data dissemination scheme for WMS. In

  5. Efficiency of management of sustainable development – challenges, problems, barriers

    Zięba K.

    2016-06-01

    Full Text Available This paper discusses such issues as the importance of efficiency management of sustainable development. In the authors’ opinion, this matter is currently topical subject due to, among others, on the still high costs of irrational management in the field. Dynamically changing environment forces to search for new solutions for efficiency management of sustainable development, and unfortunately, in many countries it is still a significant problem. For some countries, the efficiency management of sustainable development is difficult. It should be noted that the problem with the inaction of relevant activities of the countries in the field of development of efficiency management of sustainability development will grow, because globalization makes it necessary to generate new solutions emerging to date problems. Facing each country there are so many challenges in the field. However, some countries are aware of the seriousness of the problem and therefore take a number of measures in this regard, often regardless of the amount of costs. This has an impact on their competitiveness. Apparent is also increasing incorporation of new original solutions in the field of sustainable development management.

  6. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

    Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan

    2016-12-01

    Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.

  7. A Microbial Assessment Scheme to measure microbial performance of Food Safety Management Systems.

    Jacxsens, L; Kussaga, J; Luning, P A; Van der Spiegel, M; Devlieghere, F; Uyttendaele, M

    2009-08-31

    A Food Safety Management System (FSMS) implemented in a food processing industry is based on Good Hygienic Practices (GHP), Hazard Analysis Critical Control Point (HACCP) principles and should address both food safety control and assurance activities in order to guarantee food safety. One of the most emerging challenges is to assess the performance of a present FSMS. The objective of this work is to explain the development of a Microbial Assessment Scheme (MAS) as a tool for a systematic analysis of microbial counts in order to assess the current microbial performance of an implemented FSMS. It is assumed that low numbers of microorganisms and small variations in microbial counts indicate an effective FSMS. The MAS is a procedure that defines the identification of critical sampling locations, the selection of microbiological parameters, the assessment of sampling frequency, the selection of sampling method and method of analysis, and finally data processing and interpretation. Based on the MAS assessment, microbial safety level profiles can be derived, indicating which microorganisms and to what extent they contribute to food safety for a specific food processing company. The MAS concept is illustrated with a case study in the pork processing industry, where ready-to-eat meat products are produced (cured, cooked ham and cured, dried bacon).

  8. RETRENCHMENT STRATEGY IN HUMAN RESOURCE MANAGEMENT: THE CASE OF VOLUNTARY SEPARATION SCHEME (VSS

    T. Ramayah

    2004-01-01

    Full Text Available One of the major challenges of business leadership in this millennium is to manage continued improvement in a competitive position. In order to stay competitive, companies are trying to become more "mean and lean". To achieve this, many major corporations have adopted the "downsizing and rightsizing" strategy. Voluntary Separation Scheme (VSS has been a global phenomenon since the 1980's and is common particularly in larger companies. In this study, the reaction to the VSS program involving the employees of a government agency embracing privatisation was studied, specifically the influence of the basic needs and referent power on the choice of acceptance and non-acceptance of VSS. The second objective of this study was to evaluate the success or failure of the VSS from the workers perspective in particular, whether their decision met their needs. The results showed that basic needs had an influence on the acceptance and the non-acceptance of VSS, namely health needs, security needs and self-esteem needs. All the referent powers (subjective norms had an influence, but surprisingly close friends had the strongest influence. Differences were also found between the expectations and the perception of the workers who accepted or rejected the VSS. From the workers' perspective, it appeared that the VSS carried out in this organization was not a success.

  9. Novel scheme for efficient and cost-effective forwarding of packets in optical networks without header modification

    Wessing, Henrik; Fjelde, Tina; Christiansen, Henrik Lehrmann

    2001-01-01

    We present a novel scheme for addressing the outputs in optical packet switches and demonstrate its good scalability. The scheme requires neither header modification nor distribution of routing information to the packet switches, thus reducing optical component count while simplifying network...

  10. Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

    LIU Xuening; YIN Hao; LIN Chuang; DU Changlai

    2009-01-01

    Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.

  11. Towards Efficient Energy Management: Defining HEMS and Smart Grid Objectives

    Rossello Busquet, Ana; Soler, José

    2011-01-01

    in home environments, researches have been designing Home Energy Management Systems (HEMS). Efficiently managing and distributing electricity in the grid will also help to reduce the increase of energy consumption in the future. The power grid is evolving into the Smart Grid, which is being developed...... to distribute and produce electricity more efficiently. This paper presents the high level goals and requirements of HEMS and the Smart Grid. Additionally, it provides an overview on how Information and Communication Technologies (ICT) is involved in the Smart Grid and how they help to achieve the emerging...... functionalities that the Smart Grid can provide....

  12. POSSIBILITIES OF INCREASING EFFICIENCY WITHIN SERIAL PRODUCTION MANAGEMENT

    CODRUŢA DURA

    2010-01-01

    Full Text Available Under the impact of transition to the new post-industrial society, massproduction recently faced the most numerous difficulties. They are caused by turbulences in theexternal environment in which companies operate, manifested in particular by enhancing thedynamism of markets and by deep changes in the structure of consumers’ demands. In thiscontext, specialized literature records the concerns for increasing the efficiency and flexibilityof products, elements involving radical changes of management and manufacturingtechnologies methods. Given these issues, the paper approaches two separate ways to improvethe management of serial production: increasing economic efficiency by optimizing the size ofbatches and flexible production systems by implementing techniques to reduce the change-overtime.

  13. Supply Chain Management for Improved Energy Efficiency: Review and Opportunities

    Beatrice Marchi

    2017-10-01

    Full Text Available Energy efficiency represents a key resource for economic and social development, providing substantial benefits to different stakeholders, ranging from the entities which develop energy efficient measures to everyone in society. In addition to cost savings, multiple benefits can be achieved by supporting a better alignment between energy issues and strategic business priorities: e.g., improved competitiveness, profitability, quality, etc. Thus, energy efficiency can be a strategic advantage, not just a marginal issue, for companies. However, most firms, especially small and medium enterprises (SMEs, face many problems and, in some cases, hostility when trying to effectively implement energy efficiency actions. The most dominant barriers are the access to capital and the lack of awareness (especially in terms of life cycle cost effects. The supply chain viewpoint represents one of the main opportunities for overcoming those barriers and improving energy performance even for weaker companies. Since the current literature on energy efficiency and practical approaches to ensure energy efficiency mainly focus on energy performance on a single-firm basis, this paper aims to provide a systematic review of papers on the integration of energy efficiency in supply chain design and management published in academic journal, thereby defining potential research streams to close the gaps in the literature. A number of literature reviews have been published focusing on specific aspects of sustainable or on green supply chain management; however, to the best of our knowledge, no review has focused on the energy efficiency issue. Firstly, the present paper shows how considering energy consumption in supply chain management can contribute to more energy-efficient processes from a systemic point of view. Then, the review methodology used is defined and the sampled papers are analyzed and categorized based on the different approaches they propose. From these

  14. Improving IC process efficiency with critical materials management

    Hanson, Kathy L.; Andrews, Robert E.

    2003-06-01

    The management of critical materials in a high technology manufacturing facility is crucial to obtaining consistently high production yield. This is especially true in an industry like semiconductors where the success of the product is so dependent on the integrity of the critical production materials. Bar code systems, the traditional management tools, are voluntary, defeatable, and do not continuously monitor materials when in use. The significant costs associated with mis-management of chemicals can be captured with a customized model resulting in highly favorable ROI"s for the NOWTrak RFID chemical management system. This system transmits reliable chemical data about each individual container and generates information that can be used to increase wafer production efficiency and yield. The future of the RFID system will expand beyond the benefits of chemical management and into dynamic IC process management

  15. THE EFFICIENCY OF IMPLEMENTING PRIVATE MANAGEMENT IN STATE COMPANIES

    Mungiu-Pupăzan Mariana Claudia

    2012-09-01

    Full Text Available In 2012, nine state-owned companies are expected to have private management giving up the statemanagement. Therefore, a full debate of this issue is required, taking into consideration the fact that, in ouropinion, this process involves more than just the replacement of a manager with another. The implementationof private management in companies of national strategy, currently in state ownership, is desired to be aprofound and also very complex process, aiming to change organizational culture in depth, both verticallyand horizontally, so as to increase efficiency in these companies.Implementation of private management could be a good opportunity for an efficient development ofthese companies, for an increasing level of competitiveness on the international market, but only in terms ofa leadership team chosen on performance criteria, with a coherent set of objectives and a high independencelevel of decision.There are some opinions from people with experience in managing both private and statecompanies. They believe that the idea of establishing a private management in state companies, is, in themain, good, but it is essential to take into consideration the idea of a team trained to lead the company,instead of one person as a general manager.Another element to be taken into account, so that this idea of private management may have thedesired effect, is to precisely determine companies where private management teams should be installed. Notall companies are suitable for the same private management strategy. This type of leadership is better forcompanies with a real international perspective, such as Tarom, while strategic companies should be ratherreformed, including management privatization, and kept as state strategic areas. However, strict criteria ofstate intervention in decision-making process should be established, a striking question concerning thecircumstances under which such a management team could be successful, given that state firms are

  16. Design and simulations of a spectral efficient optical code division multiple access scheme using alternated energy differentiation and single-user soft-decision demodulation

    A. Garba, Aminata

    2017-01-01

    This paper presents a new approach to optical Code Division Multiple Access (CDMA) network transmission scheme using alternated amplitude sequences and energy differentiation at the transmitters to allow concurrent and secure transmission of several signals. The proposed system uses error control encoding and soft-decision demodulation to reduce the multi-user interference at the receivers. The design of the proposed alternated amplitude sequences, the OCDMA energy modulators and the soft decision, single-user demodulators are also presented. Simulation results show that the proposed scheme allows achieving spectral efficiencies higher than several reported results for optical CDMA and much higher than the Gaussian CDMA capacity limit.

  17. Has airline efficiency affected by the inclusion of aviation into European Union Emission Trading Scheme? Evidences from 22 airlines during 2008–2012

    Li, Ye; Wang, Yan-zhang; Cui, Qiang

    2016-01-01

    We investigate the impacts of including aviation into European Union Emission Trading Scheme on airline efficiency since 2008. Airline efficiency is divided into three stages: Operations Stage, Services Stage and Sales Stage, and Greenhouse Gases Emission is treated as an undesirable output of Services Stage. Two models, Network Slacks-Based Measure with weak disposability and Network Slacks-Based Measure with strong disposability, are established to evaluate the efficiencies of 22 international airlines from 2008 to 2012. The results show that: (1) Most airlines' efficiencies have increased in the period. (2) The average efficiency of European airlines is much higher than that of non-European airlines. (3) The model with weak disposability is more reasonable in distinguishing the airline efficiency while strong disposability is a more reasonable way in treating undesirable outputs. - Highlights: • A new theoretical model of airlines efficiency is built. • Network Slacks-Based Measure models with weak disposability and strong disposability are proposed. • The efficiencies of 22 airlines from 2008 to 2012 are evaluated. • The impacts of including airlines into European Union Emission Trading Scheme are analyzed.

  18. Managing Sustainable Development Conflicts: The Impact of Stakeholders in Small-Scale Hydropower Schemes

    Watkin, Laura Jane; Kemp, Paul S.; Williams, Ian D.; Harwood, Ian A.

    2012-06-01

    The growing importance of the environment and its management has simultaneously emphasized the benefits of hydroelectric power and its environmental costs. In a changing policy climate, giving importance to renewable energy development and environmental protection, conflict potential between stakeholders is considerable. Navigation of conflict determines the scheme constructed, making sustainable hydropower a function of human choice. To meet the needs of practitioners, greater understanding of stakeholder conflict is needed. This paper presents an approach to illustrate the challenges that face small-scale hydropower development as perceived by the stakeholders involved, and how they influence decision-making. Using Gordleton Mill, Hampshire (UK), as an illustrative case, soft systems methodology, a systems modeling approach, was adopted. Through individual interviews, a range of problems were identified and conceptually modeled. Stakeholder bias towards favoring economic appraisal over intangible social and environmental aspects was identified; costs appeared more influential than profit. Conceptual evaluation of the requirements to meet a stakeholder-approved solution suggested a complex linear systems approach, considerably different from the real-life situation. The stakeholders introduced bias to problem definition by transferring self-perceived issues onto the project owner. Application of soft systems methodology caused a shift in project goals away from further investigation towards consideration of project suitability. The challenge of sustainable hydropower is global, with a need to balance environmental, economic, and social concerns. It is clear that in this type of conflict, an individual can significantly influence outcomes; highlighting the need for more structured approaches to deal with stakeholder conflicts in sustainable hydropower development.

  19. Managing sustainable development conflicts: the impact of stakeholders in small-scale hydropower schemes.

    Watkin, Laura Jane; Kemp, Paul S; Williams, Ian D; Harwood, Ian A

    2012-06-01

    The growing importance of the environment and its management has simultaneously emphasized the benefits of hydroelectric power and its environmental costs. In a changing policy climate, giving importance to renewable energy development and environmental protection, conflict potential between stakeholders is considerable. Navigation of conflict determines the scheme constructed, making sustainable hydropower a function of human choice. To meet the needs of practitioners, greater understanding of stakeholder conflict is needed. This paper presents an approach to illustrate the challenges that face small-scale hydropower development as perceived by the stakeholders involved, and how they influence decision-making. Using Gordleton Mill, Hampshire (UK), as an illustrative case, soft systems methodology, a systems modeling approach, was adopted. Through individual interviews, a range of problems were identified and conceptually modeled. Stakeholder bias towards favoring economic appraisal over intangible social and environmental aspects was identified; costs appeared more influential than profit. Conceptual evaluation of the requirements to meet a stakeholder-approved solution suggested a complex linear systems approach, considerably different from the real-life situation. The stakeholders introduced bias to problem definition by transferring self-perceived issues onto the project owner. Application of soft systems methodology caused a shift in project goals away from further investigation towards consideration of project suitability. The challenge of sustainable hydropower is global, with a need to balance environmental, economic, and social concerns. It is clear that in this type of conflict, an individual can significantly influence outcomes; highlighting the need for more structured approaches to deal with stakeholder conflicts in sustainable hydropower development.

  20. EFFICIENCY OF CREDIT PORTFOLIO MANAGEMENT IN CONDITIONS OF ECONOMIC INSTABILITY

    Koshel H.

    2018-01-01

    Full Text Available Introduction. The active development of integration processes causes the necessity of applying high-level approaches to management of the banking system, which is an essential part of the financial sector. Due to the importance of credit operations in the portfolio of banking assets, development of efficient and flexible credit management system is the basis for financial and market stability of banks. Purpose. Analyze the condition of the credit portfolio of banking institutions under the influence of economic processes and make conclusions and recommendations about the effectiveness of managing the bank’s credit portfolio and generalize ways of improving the structure and quality of the bank’s credit portfolio. Results. Over the last six years, the quality of the credit portfolio has become worse because of the bad debts growing and, as a result, decreasing in revenues. The calculated coefficient of management efficiency of a credit portfolio shows the dependence of this indicator on the value of risk and yield. In order to confirm the dependence and determine the degree of influence of these indicators on the efficiency of management of a loan portfolio, an economic-mathematical model was constructed on the example of both individual banks and the banking system as a whole. Detected dependence of factors is quite logical, therefore, the model can be recommended for practical use. Conclusion. Using this method of determining the management efficiency of a credit portfolio will allow the management of the bank to make reasonable decisions. It will allow the possibility of forming a more justified credit portfolio, taking into account not only the profitability, but also the real level of risk of credit operations.

  1. The Methodology of Management for Long Term Energy Efficiency Development

    Zebergs, V.; Kehris, O.; Savickis, J.; Zeltins, N.

    2010-01-01

    The paper has shown that the Member States of the European Union (EU) do what they can in order to accelerate the raising of energy efficiency (EE). In each EU Member State investigations are conducted in the planning and management methods with a view to achieve faster and greater EE gains. In Latvia, which imports almost 70% of the total energy resources consumed, saving of each 'toe' is of great importance. Adaptation of the general policy assessment methodology is being studied for planning and management of the EE process. 12 EE management methods have been analysed and recommendations worked out for the introduction of several most topical methods.(author).

  2. On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers

    Katarzyna Mazur

    2015-01-01

    Full Text Available Security management is one of the most significant issues in nowadays data centers. Selection of appropriate security mechanisms and effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. In this paper, we propose a specialized decision support system with a multilevel, comprehensive analysis scheme. As a result of the extensive use of mathematical methods and statistics, guidelines and indicators returned by the proposed approach facilitate the decision-making process and conserve decision-maker’s time and attention. In the paper we utilized proposed multilevel analysis scheme to manage security-based data flow in the example data center. Determining the most secure, energy-efficient, environmental friendly security mechanisms, we implemented the role-based access control method in Quality of Protection Modeling Language (QoP-ML and evaluated its performance in terms of mentioned factors.

  3. The Efficiency of Managing School Records by Secondary School ...

    This study examined the efficiency of management of school records by secondary school principals in Delta state, Nigeria. As a descriptive survey, the study population comprised all the 602 public secondary school principals in the state. A structured questionnaire was used to gather data which was subsequently ...

  4. Resource values in analyzing fire management programs for economic efficiency

    Irene A. Althaus; Thomas J. Mills

    1982-01-01

    In analyzing fire management programs for their economic efficiency, it is necessary to assign monetary values to the changes in resource outputs caused by, fire. The derivation of resource values is complicated by imperfect or nonexistent commercial market structures. The valuation concept recommended for fire program analyses is willingness-to-pay because it permits...

  5. EFFICIENCY OF APPLICATION OF RFID IN SUPPLY CHAIN MANAGEMENT

    Aleksandra Nowakowska

    2008-01-01

    Development of contemporary logistics has seen tendencies to attach greatimportance to processes of flow of information in supply chain. It is necessary to look for newways of efficient management of this flow, which is possible through development of newtechnologies, including RFID (Radio Frequency Identification).

  6. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks

    Shi, Binbin; Wei, Wei; Wang, Yihuai; Shu, Wanneng

    2016-01-01

    In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS) based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical d...

  7. Improving energy efficiency in buildings under the framework of facility management and leasing financing

    Leutgoeb, Klemens [Austrian Energy Agency (Austria)

    2007-07-01

    Non-residential buildings see a big variety of building management and financing schemes. Two approaches quickly gain shares in the European real estate market: Leasing Financing (LF) and Facility Management (FM). They change the framework for the implementation of energy efficiency measures: LF influences the decision criteria in new construction and refurbishment; FM plays a crucial role during the operation phase.Although LF and FM introduce new parties and thus an additional set of interests, they must not be perceived as obstacles per se: They also offer new ways towards energy efficiency. Pilot activities in Austria demonstrate the successful integration of advanced energy services into the framework of LF and FM: At the end of the contract duration, leasing-financed buildings may be confronted with a need for comprehensive refurbishment. Here, leasing can become an important catalyst in preparing the refurbishment project. Integrating energy efficiency measures to the refurbishment activity and guaranteeing thermal-energetic qualities, provide the lessor with the opportunity to prolong and enlarge a running contract. Furthermore, this service reduces his credit risk, due to reduced running (i.e. energy) cost for the lessee. FM means outsourcing of selected building management functions to an external specialist. The list of requested services can be extended by the identification, implementation, operation and potentially also financing of cost-effective energy saving measures, and by a guarantee on energy cost savings - in other words by integrating elements of EPC-contracts into FM.

  8. India : Note on Public Financial Management and Accountability in Centrally Sponsored Schemes

    World Bank

    2006-01-01

    The budget outlay for Centrally Sponsored Schemes (CSS) for India in 2005-06 is significantly higher as compared to the previous year's level of Rs.395,000 million. This includes increased allocations for rural roads, rural employment, and education and nutritional support for pre-school children. At present there are over 200 such schemes in operation, of which a dozen accounts for more t...

  9. Energy efficiency public lighting management in the cities

    Radulovic, Dusko; Skok, Srdjan; Kirincic, Vedran

    2011-01-01

    Cities all around the world are faced with a rapid increase of urban population, and their crucial sustainable development issue becomes energy management. Moreover, the national energy management sector is slowly passing from government surveillance to the responsibility of local municipalities. The energy efficiency management in cities helps local governments to focus on important energy projects that have strong environmental aspects and financial feasibility. This paper analyzes the public lighting energy management in the Croatian city of Rijeka in order to determine the connection of the energy market liberalization and sustainable development in urban areas. Research results indicate a significant connection between investments in energy management of public lighting and its influence on lower emissions of carbon dioxide (CO 2 ).

  10. Eco-efficiency of solid waste management in Welsh SMEs

    Sarkis, Joseph; Dijkshoorn, Jeroen

    2005-11-01

    This paper provides an efficiency analysis of practices in Solid Waste Management of manufacturing companies in Wales. We apply data envelopment analysis (DEA) to a data set compiled during the National Waste Survey Wales 2003. We explore the relative performance of small and medium sized manufacturing enterprises (SME; 10-250 employees) in Wales. We determine the technical and scale environmental and economic efficiencies of these organizations. Our evaluation focuses on empirical data collected from companies in a wide diversity of manufacturing industries throughout Wales. We find significant differences in industry and size efficiencies. We also find correlations that exist among environmental and economic efficiencies. These variations show that improvements can be made using benchmarks from similar and different size industries. Further pursuit of an investigation of possible reasons for these differences is recommended.

  11. Nuclear transmutation of actinides other than fuel as a radioactive waste management scheme

    Cecille, L.; Hage, W.; Hettinger, H.; Mannone, F.; Mousty, F.; Schmidt, E.; Sola, A.; Huber, B.; Koch, L.

    1977-01-01

    The bulk of fission products in the high-level waste (HLW) decays to innocuous hazard levels within about 600 years. Actinide waste and a few fission products however represent a potential risk up to some hundreds of thousand of years. An alternative to the disposal of the whole HLW in geological formations is its fractionation, a nuclear transmutation of long-lived isotopes in fission reactors and a geological disposal of the other components. This solution would decrease the potential long-term risks of the geological waste disposal and would also accomodate to the demand of public opinion. The results of studies related to this management scheme are outlined with special reference to areas, where additional effort is required for realistic cost/benefit evaluations. Reactor physics calculations demonstrated the feasibility of actinide incineration in thermal and fast reactors. Obtained transmutation rates are sufficiently high to garantee acceptably small actinide inventories in the reactor in the case of self-generated actinide recycling. It appears that fast breeders could be used as transmutation devices without major additional reactor devlopment work. The thermal power rating of actinide fuel elements and the contribution of actinides and of minor amounts of lanthanide impurities to the neutron economy of the reactor has been evaluated. Sensitivity studies indicated that the results are dependent on the reactor operation mode and on the accuracy of the nuclear data. These calculations permitted the identification of isotopes for which cross section masurements and improved theoretical methods are required. The chemical separation of actinides from the HLW with the envisaged decontamination factors is being studied by solvent extraction and precipitation techniques using waste simulates and samples of high activity waste from European reprocessing plants. Up to now, the obtained results do not yet allow a definitive judgement on the feasibility of actinides

  12. Achieving Efficiency and Effectiveness in Purchasing and Supply Management

    Bals, Lydia; Turkulainen, Virpi

    2017-01-01

    of the most prevalent business practices in various areas, many businesses fail to realize the benefits anticipated from their outsourcing initiatives. Research reports that one major reason for these outsourcing challenges lies in the design of the focal organization. In this paper, we take an organization......As a function with a strategic role, Purchasing and Supply Management (PSM) needs to continuously find ways to improve its efficiency and effectiveness. One potential way to specifically addressing efficiency targets is to outsource parts of the purchasing process. While outsourcing remains one...

  13. On the management of life insurance company risk by strategic choice of product mix, investment strategy and surplus appropriation schemes

    Bohnert, Alexander; Gatzert, Nadine; Jørgensen, Peter Løchte

    2015-01-01

    The aim of this paper is to analyze the impact of management’s strategic choice of asset and liability composition in life insurance on shortfall risk and the shareholders’ fair risk charge. In contrast to previous work, we focus on the effectiveness of management decisions regarding the product...... mix and the riskiness of the asset side under different surplus appropriation schemes. We propose a model setting that comprises temporary life annuities and endowment insurance contracts. Our numerical results show that the effectiveness of management decisions in regard to risk reduction strongly...

  14. Axisymmetric alternating direction explicit scheme for efficient coupled simulation of hydro-mechanical interaction in geotechnical engineering—Application to circular footing and deep tunnel in saturated ground

    Simon Heru Prassetyo

    2018-04-01

    Full Text Available Explicit solution techniques have been widely used in geotechnical engineering for simulating the coupled hydro-mechanical (H-M interaction of fluid flow and deformation induced by structures built above and under saturated ground, i.e. circular footing and deep tunnel. However, the technique is only conditionally stable and requires small time steps, portending its inefficiency for simulating large-scale H-M problems. To improve its efficiency, the unconditionally stable alternating direction explicit (ADE scheme could be used to solve the flow problem. The standard ADE scheme, however, is only moderately accurate and is restricted to uniform grids and plane strain flow conditions. This paper aims to remove these drawbacks by developing a novel high-order ADE scheme capable of solving flow problems in non-uniform grids and under axisymmetric conditions. The new scheme is derived by performing a fourth-order finite difference (FD approximation to the spatial derivatives of the axisymmetric fluid–diffusion equation in a non-uniform grid configuration. The implicit Crank-Nicolson technique is then applied to the resulting approximation, and the subsequent equation is split into two alternating direction sweeps, giving rise to a new axisymmetric ADE scheme. The pore pressure solutions from the new scheme are then sequentially coupled with an existing geomechanical simulator in the computer code fast Lagrangian analysis of continua (FLAC. This coupling procedure is called the sequentially-explicit coupling technique based on the fourth-order axisymmetric ADE scheme or SEA-4-AXI. Application of SEA-4-AXI for solving axisymmetric consolidation of a circular footing and of advancing tunnel in deep saturated ground shows that SEA-4-AXI reduces computer runtime up to 42%–50% that of FLAC's basic scheme without numerical instability. In addition, it produces high numerical accuracy of the H-M solutions with average percentage difference of only 0.5%

  15. Brillouin-zone integration schemes: an efficiency study for the phonon frequency moments of the harmonic, solid, one-component plasma

    Albers, R.C.; Gubernatis, J.E.

    1981-01-01

    The efficiency of four different Brillouin-zone integration schemes including the uniform mesh, special point method, special directions method, and Holas method are compared for calculating moments of the harmonic phonon frequencies of the solid one-component plasma. Very accurate values for the moments are also presented. The Holas method for which weights and integration points can easily be generated has roughly the same efficiency as the special directions method, which is much superior to the uniform mesh and special point methods for this problem

  16. BlueDetect: An iBeacon-Enabled Scheme for Accurate and Energy-Efficient Indoor-Outdoor Detection and Seamless Location-Based Service

    Han Zou

    2016-02-01

    Full Text Available The location and contextual status (indoor or outdoor is fundamental and critical information for upper-layer applications, such as activity recognition and location-based services (LBS for individuals. In addition, optimizations of building management systems (BMS, such as the pre-cooling or heating process of the air-conditioning system according to the human traffic entering or exiting a building, can utilize the information, as well. The emerging mobile devices, which are equipped with various sensors, become a feasible and flexible platform to perform indoor-outdoor (IO detection. However, power-hungry sensors, such as GPS and WiFi, should be used with caution due to the constrained battery storage on mobile device. We propose BlueDetect: an accurate, fast response and energy-efficient scheme for IO detection and seamless LBS running on the mobile device based on the emerging low-power iBeacon technology. By leveraging the on-broad Bluetooth module and our proposed algorithms, BlueDetect provides a precise IO detection service that can turn on/off on-board power-hungry sensors smartly and automatically, optimize their performances and reduce the power consumption of mobile devices simultaneously. Moreover, seamless positioning and navigation services can be realized by it, especially in a semi-outdoor environment, which cannot be achieved by GPS or an indoor positioning system (IPS easily. We prototype BlueDetect on Android mobile devices and evaluate its performance comprehensively. The experimental results have validated the superiority of BlueDetect in terms of IO detection accuracy, localization accuracy and energy consumption.

  17. BlueDetect: An iBeacon-Enabled Scheme for Accurate and Energy-Efficient Indoor-Outdoor Detection and Seamless Location-Based Service.

    Zou, Han; Jiang, Hao; Luo, Yiwen; Zhu, Jianjie; Lu, Xiaoxuan; Xie, Lihua

    2016-02-22

    The location and contextual status (indoor or outdoor) is fundamental and critical information for upper-layer applications, such as activity recognition and location-based services (LBS) for individuals. In addition, optimizations of building management systems (BMS), such as the pre-cooling or heating process of the air-conditioning system according to the human traffic entering or exiting a building, can utilize the information, as well. The emerging mobile devices, which are equipped with various sensors, become a feasible and flexible platform to perform indoor-outdoor (IO) detection. However, power-hungry sensors, such as GPS and WiFi, should be used with caution due to the constrained battery storage on mobile device. We propose BlueDetect: an accurate, fast response and energy-efficient scheme for IO detection and seamless LBS running on the mobile device based on the emerging low-power iBeacon technology. By leveraging the on-broad Bluetooth module and our proposed algorithms, BlueDetect provides a precise IO detection service that can turn on/off on-board power-hungry sensors smartly and automatically, optimize their performances and reduce the power consumption of mobile devices simultaneously. Moreover, seamless positioning and navigation services can be realized by it, especially in a semi-outdoor environment, which cannot be achieved by GPS or an indoor positioning system (IPS) easily. We prototype BlueDetect on Android mobile devices and evaluate its performance comprehensively. The experimental results have validated the superiority of BlueDetect in terms of IO detection accuracy, localization accuracy and energy consumption.

  18. Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing.

    Yassin, Ali A

    2014-01-01

    Now, the security of digital images is considered more and more essential and fingerprint plays the main role in the world of image. Furthermore, fingerprint recognition is a scheme of biometric verification that applies pattern recognition techniques depending on image of fingerprint individually. In the cloud environment, an adversary has the ability to intercept information and must be secured from eavesdroppers. Unluckily, encryption and decryption functions are slow and they are often hard. Fingerprint techniques required extra hardware and software; it is masqueraded by artificial gummy fingers (spoof attacks). Additionally, when a large number of users are being verified at the same time, the mechanism will become slow. In this paper, we employed each of the partial encryptions of user's fingerprint and discrete wavelet transform to obtain a new scheme of fingerprint verification. Moreover, our proposed scheme can overcome those problems; it does not require cost, reduces the computational supplies for huge volumes of fingerprint images, and resists well-known attacks. In addition, experimental results illustrate that our proposed scheme has a good performance of user's fingerprint verification.

  19. Long Term Cost Efficiency through Green Management Control Systems

    Vukania Adda, Nancy; Qin, Xiaochen

    2012-01-01

    Title: Long term cost efficiency through green management control systems.Authors: Nancy Vukania &Xiaochen QinSupervisor: Åsa Karin-EngstrandBackground: The worldwide financial crisis of 2008 has reconfigured the economic turf leading to a more uncertain and turbulent playing field – a greater challenge for business strategy and the quest for optimization- The oil price hike of 2008 (Furlong 2010)1 caused its rippling effect to affect various cost categories including energy, labor and lo...

  20. Reconciling privacy and efficient utility management in smart cities

    Rebollo Monedero, David; Bartoli, Andrea; Hernández Serrano, Juan; Forné Muñoz, Jorge; Soriano Ibáñez, Miguel

    2014-01-01

    A key aspect in the design of smart cities is, undoubtedly, a plan for the efficient management of utilities, enabled by technologies such as those entailing smart metering of the residential consumption of electricity, water or gas. While one cannot object to the appealing advantages of smart metering, the privacy risks posed by the submission of frequent, data-rich measurements cannot simply remain overlooked. The objective of this paper is to provide a general perspective on the contrastin...

  1. Role of sediment in the design and management of irrigation canals : Sunsari Morang Irrigation Scheme, Nepal

    Paudel, K.

    2010-01-01

    Sediment transport in irrigation canals The sediment transport aspect is a major factor in irrigation development as it determines to a large extent the sustainability of an irrigation scheme, particularly in case of unlined canals in alluvial soils. Investigations in this respect started since

  2. Reinforcement Learning Based Data Self-Destruction Scheme for Secured Data Management

    Young Ki Kim

    2018-04-01

    Full Text Available As technologies and services that leverage cloud computing have evolved, the number of businesses and individuals who use them are increasing rapidly. In the course of using cloud services, as users store and use data that include personal information, research on privacy protection models to protect sensitive information in the cloud environment is becoming more important. As a solution to this problem, a self-destructing scheme has been proposed that prevents the decryption of encrypted user data after a certain period of time using a Distributed Hash Table (DHT network. However, the existing self-destructing scheme does not mention how to set the number of key shares and the threshold value considering the environment of the dynamic DHT network. This paper proposes a method to set the parameters to generate the key shares needed for the self-destructing scheme considering the availability and security of data. The proposed method defines state, action, and reward of the reinforcement learning model based on the similarity of the graph, and applies the self-destructing scheme process by updating the parameter based on the reinforcement learning model. Through the proposed technique, key sharing parameters can be set in consideration of data availability and security in dynamic DHT network environments.

  3. Evaluating the Management System Approach for Industrial Energy Efficiency Improvements

    Thomas Zobel

    2016-09-01

    Full Text Available Voluntary environmental management systems (EMS based on the international standard ISO 14001 have become widespread globally in recent years. The purpose of this study is to assess the impact of voluntary management systems on energy efficiency in the Swedish manufacturing industry by means of objective industrial energy data derived from mandatory annual environmental reports. The study focuses on changes in energy efficiency over a period of 12 years and includes both ISO 14001-certified companies and non-certified companies. Consideration is given to energy improvement efforts in the companies before the adoption of ISO 14001. The analysis has been carried out using statistical methods for two different industrial energy parameters: electricity and fossil fuel consumption. The results indicate that ISO 14001 adoption and certification has increased energy efficiency regarding the use of fossil fuel. In contrast, no effect of the management systems has been found concerning the use of electricity. The mixed results of this study are only partly in line with the results of previous studies based on perceptions of company representatives.

  4. New energy technologies 4. Energy management and energy efficiency

    Sabonnadiere, J.C.; Caire, R.; Raison, B.; Quenard, D.; Verneau, G.; Zissis, G.

    2007-01-01

    This forth tome of the new energy technologies handbook is devoted to energy management and to the improvement of energy efficiency. The energy management by decentralized generation insertion and network-driven load control, analyzes the insertion and management means of small power generation in distribution networks and the means for load management by the network with the aim of saving energy and limiting peak loads. The second part, devoted to energy efficiency presents in a detailed way the technologies allowing an optimal management of energy in buildings and leading to the implementation of positive energy buildings. A special chapter treats of energy saving using new lighting technologies in the private and public sectors. Content: 1 - decentralized power generation - impacts and solutions: threat or opportunity; deregulation; emerging generation means; impact of decentralized generation on power networks; elements of solution; 2 - mastery of energy demand - loads control by the network: stakes of loads control; choice of loads to be controlled; communication needs; measurements and controls for loads control; model and algorithm needs for loads control. A better energy efficiency: 3 - towards positive energy buildings: key data for Europe; how to convert fossil energy consuming buildings into low-energy consuming and even energy generating buildings; the Minergie brand; the PassivHaus or 'passive house' label; the zero-energy house/zero-energy home (ZEH); the zero-energy building (ZEB); the positive energy house; comparison between the three Minergie/PassivHaus/ZEH types of houses; beyond the positive energy building; 4 - light sources and lighting systems - from technology to energy saving: lighting yesterday and today; light sources and energy conversion; energy saving in the domain of lighting: study of some type-cases; what future for light sources. (J.S.)

  5. Don't make cache too complex: A simple probability-based cache management scheme for SSDs.

    Seungjae Baek

    Full Text Available Solid-state drives (SSDs have recently become a common storage component in computer systems, and they are fueled by continued bit cost reductions achieved with smaller feature sizes and multiple-level cell technologies. However, as the flash memory stores more bits per cell, the performance and reliability of the flash memory degrade substantially. To solve this problem, a fast non-volatile memory (NVM-based cache has been employed within SSDs to reduce the long latency required to write data. Absorbing small writes in a fast NVM cache can also reduce the number of flash memory erase operations. To maximize the benefits of an NVM cache, it is important to increase the NVM cache utilization. In this paper, we propose and study ProCache, a simple NVM cache management scheme, that makes cache-entrance decisions based on random probability testing. Our scheme is motivated by the observation that frequently written hot data will eventually enter the cache with a high probability, and that infrequently accessed cold data will not enter the cache easily. Owing to its simplicity, ProCache is easy to implement at a substantially smaller cost than similar previously studied techniques. We evaluate ProCache and conclude that it achieves comparable performance compared to a more complex reference counter-based cache-management scheme.

  6. MAC layer power management schemes for efficient energy- delay tradeoffs in wireless local area networks

    Sarkar, Mahasweta

    2006-01-01

    In order to minimize power consumption and thereby prolong the system lifetime of battery powered wireless devices, it makes sense for such devices to transit to a very low power "Sleep" state when they are not communicating with their peers. However the main challenge of the sleep mechanism lies in the wireless nodes inability to "wake up" as soon as a packet arrives for it during its sleep state. This leads to an obvious tradeoff between power saving and packet delay. In this dissertation w...

  7. Stochastic congestion management in power markets using efficient scenario approaches

    Esmaili, Masoud; Amjady, Nima; Shayanfar, Heidar Ali

    2010-01-01

    Congestion management in electricity markets is traditionally performed using deterministic values of system parameters assuming a fixed network configuration. In this paper, a stochastic programming framework is proposed for congestion management considering the power system uncertainties comprising outage of generating units and transmission branches. The Forced Outage Rate of equipment is employed in the stochastic programming. Using the Monte Carlo simulation, possible scenarios of power system operating states are generated and a probability is assigned to each scenario. The performance of the ordinary as well as Lattice rank-1 and rank-2 Monte Carlo simulations is evaluated in the proposed congestion management framework. As a tradeoff between computation time and accuracy, scenario reduction based on the standard deviation of accepted scenarios is adopted. The stochastic congestion management solution is obtained by aggregating individual solutions of accepted scenarios. Congestion management using the proposed stochastic framework provides a more realistic solution compared with traditional deterministic solutions. Results of testing the proposed stochastic congestion management on the 24-bus reliability test system indicate the efficiency of the proposed framework.

  8. ABOUT FORMS, EFFICIENCY AND ASSESSMENT OF ENVIRONMENTAL MANAGEMENT

    H. Bachev

    2015-03-01

    Full Text Available We suggest a holistic framework for analyzing, assessment and improvement of environmental management using “agrariansector” as an example. It incorporates an interdisciplinary approach (Economics, Organization, Law, Sociology, Ecology, Technology, Behavioral and Political Sciences and includes: specification of managerial actors, needs and spectrum of governing modes (institutional environment; private, collective, market, public modes at different level of decision-making (individual, farm, eco-system, local, regional, national, transnational, global; specification of critical socio-economic, natural, technological, behavioral etc. factors of managerial choice, and feasible spectrum of managerial forms; defining and assessing comparative and absolute efficiency of eco-management forms and system; improvement of forms of public intervention in eco-management.

  9. The efficiency costs of separating carbon markets under the EU emissions trading scheme: A quantitative assessment for Germany

    Boehringer, Christoph; Hoffmann, Tim; Manrique-de-Lara-Penate, Casiano

    2006-01-01

    From 1 January 2005 onwards the European Union has launched the first large-scale international carbon emissions trading program. As the EU Emissions Trading Scheme (EU-ETS) covers only part of domestic carbon emissions, it implies a segmented environmental regulation scheme: Each EU Member State must specify additional domestic abatement policies for the sectors outside the EU-ETS in order to meet its emissions budget under the EU Burden Sharing Agreement. We highlight the generic problems of segmented carbon regulation in terms of information requirements for international carbon prices and domestic abatement costs of sectors outside the EU-ETS. Based on numerical simulations for Germany, we quantify the excess costs of segmented carbon regulation and conclude that inefficiencies can be much better explained by lobbying of influential EU-ETS sectors than by information problems. (Author)

  10. Scheme for efficient extraction of low-frequency signal beyond the quantum limit by frequency-shift detection.

    Yang, R G; Zhang, J; Zhai, Z H; Zhai, S Q; Liu, K; Gao, J R

    2015-08-10

    Low-frequency (Hz~kHz) squeezing is very important in many schemes of quantum precision measurement. But it is more difficult than that at megahertz-frequency because of the introduction of laser low-frequency technical noise. In this paper, we propose a scheme to obtain a low-frequency signal beyond the quantum limit from the frequency comb in a non-degenerate frequency and degenerate polarization optical parametric amplifier (NOPA) operating below threshold with type I phase matching by frequency-shift detection. Low-frequency squeezing immune to laser technical noise is obtained by a detection system with a local beam of two-frequency intense laser. Furthermore, the low-frequency squeezing can be used for phase measurement in Mach-Zehnder interferometer, and the signal-to-noise ratio (SNR) can be enhanced greatly.

  11. AN EFFICIENT PATIENT INFLOW PREDICTION MODEL FOR HOSPITAL RESOURCE MANAGEMENT

    Kottalanka Srikanth

    2017-07-01

    Full Text Available There has been increasing demand in improving service provisioning in hospital resources management. Hospital industries work with strict budget constraint at the same time assures quality care. To achieve quality care with budget constraint an efficient prediction model is required. Recently there has been various time series based prediction model has been proposed to manage hospital resources such ambulance monitoring, emergency care and so on. These models are not efficient as they do not consider the nature of scenario such climate condition etc. To address this artificial intelligence is adopted. The issues with existing prediction are that the training suffers from local optima error. This induces overhead and affects the accuracy in prediction. To overcome the local minima error, this work presents a patient inflow prediction model by adopting resilient backpropagation neural network. Experiment are conducted to evaluate the performance of proposed model inter of RMSE and MAPE. The outcome shows the proposed model reduces RMSE and MAPE over existing back propagation based artificial neural network. The overall outcomes show the proposed prediction model improves the accuracy of prediction which aid in improving the quality of health care management.

  12. Distributed mixed-integer fuzzy hierarchical programming for municipal solid waste management. Part II: scheme analysis and mechanism revelation.

    Cheng, Guanhui; Huang, Guohe; Dong, Cong; Xu, Ye; Chen, Jiapei; Chen, Xiujuan; Li, Kailong

    2017-03-01

    As presented in the first companion paper, distributed mixed-integer fuzzy hierarchical programming (DMIFHP) was developed for municipal solid waste management (MSWM) under complexities of heterogeneities, hierarchy, discreteness, and interactions. Beijing was selected as a representative case. This paper focuses on presenting the obtained schemes and the revealed mechanisms of the Beijing MSWM system. The optimal MSWM schemes for Beijing under various solid waste treatment policies and their differences are deliberated. The impacts of facility expansion, hierarchy, and spatial heterogeneities and potential extensions of DMIFHP are also discussed. A few of findings are revealed from the results and a series of comparisons and analyses. For instance, DMIFHP is capable of robustly reflecting these complexities in MSWM systems, especially for Beijing. The optimal MSWM schemes are of fragmented patterns due to the dominant role of the proximity principle in allocating solid waste treatment resources, and they are closely related to regulated ratios of landfilling, incineration, and composting. Communities without significant differences among distances to different types of treatment facilities are more sensitive to these ratios than others. The complexities of hierarchy and heterogeneities pose significant impacts on MSWM practices. Spatial dislocation of MSW generation rates and facility capacities caused by unreasonable planning in the past may result in insufficient utilization of treatment capacities under substantial influences of transportation costs. The problems of unreasonable MSWM planning, e.g., severe imbalance among different technologies and complete vacancy of ten facilities, should be gained deliberation of the public and the municipal or local governments in Beijing. These findings are helpful for gaining insights into MSWM systems under these complexities, mitigating key challenges in the planning of these systems, improving the related management

  13. Multi-criteria decision aid approach for the selection of the best compromise management scheme for ELVs: the case of Cyprus.

    Mergias, I; Moustakas, K; Papadopoulos, A; Loizidou, M

    2007-08-25

    Each alternative scheme for treating a vehicle at its end of life has its own consequences from a social, environmental, economic and technical point of view. Furthermore, the criteria used to determine these consequences are often contradictory and not equally important. In the presence of multiple conflicting criteria, an optimal alternative scheme never exists. A multiple-criteria decision aid (MCDA) method to aid the Decision Maker (DM) in selecting the best compromise scheme for the management of End-of-Life Vehicles (ELVs) is presented in this paper. The constitution of a set of alternatives schemes, the selection of a list of relevant criteria to evaluate these alternative schemes and the choice of an appropriate management system are also analyzed in this framework. The proposed procedure relies on the PROMETHEE method which belongs to the well-known family of multiple criteria outranking methods. For this purpose, level, linear and Gaussian functions are used as preference functions.

  14. From demand side management (DSM) to energy efficiency services: A Finnish case study

    Apajalahti, Eeva-Lotta; Lovio, Raimo; Heiskanen, Eva

    2015-01-01

    Energy conservation is expected to contribute significantly to climate change mitigation and energy security. Traditionally, energy companies have had strong role in providing Demand Side Management (DSM) measures. However, after energy market liberalization in Europe, energy companies' DSM activities declined. In response, the EU issued Directive (2006/32/EC) on energy end-use efficiency and energy services (ESD) to motivate energy companies to promote energy efficiency and conservation, closely followed by Directive (2012/27/EU) on energy efficiency (EED), requiring the setting up energy efficiency obligation schemes. Despite strong political and economic motivation, energy companies struggle to develop energy efficiency services in liberalised energy markets due to conflicting institutional demands, which arise from contradicting policy requirements and customer relations. The main challenges in developing new innovative energy efficiency services, evidenced by an in-depth case study, were (1) the unbundling of energy company operations, which makes it difficult to develop services when the contribution of several business units is required and (2) the distrust among energy end-users, which renders the business logic of energy saving contract models self-contradictory. On the basis of the research, avenues out of these dilemmas are suggested. -- Highlights: •Energy companies struggle to become energy service provides •We explore the development of new energy saving business solutions •Dispersed organisational structure leaves energy saving business as isolated function •Strong consumer scepticism towards energy companies as providers of energy saving •More emphasis on the changing company-customer relationship is needed

  15. Opportunities of Optimization in Administrative Structures for Efficient Management

    Venelin Terziev

    2017-12-01

    Full Text Available Current paper presents studies on the administrative structures in order to optimize the activities and the overall management through the example of the Bulgarian Commission for Protection against Discrimination. It aims at establishing duplicate functions in the organization under study. The main tasks in the analysis are related to the display of the basic findings and conclusions for the strongest sides and the fields for improvement regarding the relevance, the effectiveness and the efficiency of the administration of the Commission for Protection against Discrimination in Bulgaria. The following areas are thoroughly and critically analyzed: relevance of the functions and efficiency of the activity. As a result of the study a Strategy for Organizational Development and a Training Plan have been drafted.

  16. The Blood Stocks Management Scheme, a partnership venture between the National Blood Service of England and North Wales and participating hospitals for maximizing blood supply chain management.

    Chapman, J F; Cook, R

    2002-10-01

    The Blood Stocks Management Scheme (BSMS) has been established as a joint venture between the National Blood Service (NBS) in England and North Wales and participating hospitals to monitor the blood supply chain. Stock and wastage data are submitted to a web-based data-management system, facilitating continuous and complete red cell data collection and 'real time' data extraction. The data-management system enables peer review of performance in respect of stock holding levels and red cell wastage. The BSMS has developed an innovative web-based data-management system that enables data collection and benchmarking of practice, which should drive changes in stock management practice, therefore optimizing the use of donated blood.

  17. A model for efficient management of electrical assets

    Alonso Guerreiro, A.

    2008-01-01

    At the same time that energy demand grows faster than the investments in electrical installations, the older capacity is reaching the end of its useful life. The need of running all those capacity without interruptions and an efficient maintenance of its assets, are the two current key points for power generation, transmission and distribution systems. This paper tries to show the reader a model of management which makes possible an effective management of assets with a strict control cost, and which includes those key points, centred at predictive techniques, involving all the departments of the organization and which goes further on considering the maintenance like a simple reparation or substitution of broken down units. Therefore, it becomes precise a model with three basic lines: supply guarantee, quality service and competitively, in order to allow the companies to reach the current demands which characterize the power supply. (Author) 5 refs

  18. Linear triangular optimization technique and pricing scheme in residential energy management systems

    Anees, Amir; Hussain, Iqtadar; AlKhaldi, Ali Hussain; Aslam, Muhammad

    2018-06-01

    This paper presents a new linear optimization algorithm for power scheduling of electric appliances. The proposed system is applied in a smart home community, in which community controller acts as a virtual distribution company for the end consumers. We also present a pricing scheme between community controller and its residential users based on real-time pricing and likely block rates. The results of the proposed optimization algorithm demonstrate that by applying the anticipated technique, not only end users can minimise the consumption cost, but it can also reduce the power peak to an average ratio which will be beneficial for the utilities as well.

  19. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks

    Shi, Binbin; Wei, Wei; Wang, Yihuai; Shu, Wanneng

    2016-01-01

    In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS) based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories. Secondly, the redundancy degree of a node is calculated according to its sensing area being covered by the neighboring sensors. Finally, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network at the same time. The simulation results show that the proposed CPCSS can balance the energy consumption and optimize the coverage performance of the sensor network. PMID:27754405

  20. Home is where the hearth is: grant recipients' views of England's home energy efficiency scheme (Warm Front).

    Gilbertson, Jan; Stevens, Maryjane; Stiell, Bernadette; Thorogood, Nicki

    2006-08-01

    This paper reports the results of research carried out as part of the national health impact evaluation of the Warm Front Scheme, a government initiative aimed at alleviating fuel poverty in England. Semi-structured interviews were carried out in a purposive sample of 49 households which received home energy improvements under the Scheme from five urban areas (Birmingham, Liverpool, Manchester, Newcastle, Southampton). Each household had received installation, replacement or refurbishment of the heating system and, in some cases, also insulation of the cavity wall or loft or both, and draught-proofing measures. Most householders reported improved and more controllable warmth and hot water. Many also reported perceptions of improved physical health and comfort, especially of mental health and emotional well-being and, in several cases, the easing of symptoms of chronic illness. There were reports of improved family relations, an expansion of the domestic space used during cold months, greater use of kitchens and improved nutrition, increased privacy, improved social interaction, and an increase in comfort and atmosphere within the home. Greater warmth and comfort also enhanced emotional security, and recipients were more content and at ease in their homes. However there was little evidence of substantially lower heating bills. These results provide evidence that Warm Front home energy improvements are accompanied by appreciable benefits in terms of use of living space, comfort and quality of life, physical and mental well-being, although there is only limited evidence of change in health behaviour.

  1. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks.

    Shi, Binbin; Wei, Wei; Wang, Yihuai; Shu, Wanneng

    2016-10-14

    In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS) based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories. Secondly, the redundancy degree of a node is calculated according to its sensing area being covered by the neighboring sensors. Finally, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network at the same time. The simulation results show that the proposed CPCSS can balance the energy consumption and optimize the coverage performance of the sensor network.

  2. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks

    Binbin Shi

    2016-10-01

    Full Text Available In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories. Secondly, the redundancy degree of a node is calculated according to its sensing area being covered by the neighboring sensors. Finally, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network at the same time. The simulation results show that the proposed CPCSS can balance the energy consumption and optimize the coverage performance of the sensor network.

  3. An efficient hybrid pseudospectral/finite-difference scheme for solving the TTI pure P-wave equation

    Zhan, Ge

    2013-02-19

    The pure P-wave equation for modelling and migration in tilted transversely isotropic (TTI) media has attracted more and more attention in imaging seismic data with anisotropy. The desirable feature is that it is absolutely free of shear-wave artefacts and the consequent alleviation of numerical instabilities generally suffered by some systems of coupled equations. However, due to several forward-backward Fourier transforms in wavefield updating at each time step, the computational cost is significant, and thereby hampers its prevalence. We propose to use a hybrid pseudospectral (PS) and finite-difference (FD) scheme to solve the pure P-wave equation. In the hybrid solution, most of the cost-consuming wavenumber terms in the equation are replaced by inexpensive FD operators, which in turn accelerates the computation and reduces the computational cost. To demonstrate the benefit in cost saving of the new scheme, 2D and 3D reverse-time migration (RTM) examples using the hybrid solution to the pure P-wave equation are carried out, and respective runtimes are listed and compared. Numerical results show that the hybrid strategy demands less computation time and is faster than using the PS method alone. Furthermore, this new TTI RTM algorithm with the hybrid method is computationally less expensive than that with the FD solution to conventional TTI coupled equations. © 2013 Sinopec Geophysical Research Institute.

  4. An efficient and stable hybrid extended Lagrangian/self-consistent field scheme for solving classical mutual induction

    Albaugh, Alex; Demerdash, Omar; Head-Gordon, Teresa

    2015-01-01

    We have adapted a hybrid extended Lagrangian self-consistent field (EL/SCF) approach, developed for time reversible Born Oppenheimer molecular dynamics for quantum electronic degrees of freedom, to the problem of classical polarization. In this context, the initial guess for the mutual induction calculation is treated by auxiliary induced dipole variables evolved via a time-reversible velocity Verlet scheme. However, we find numerical instability, which is manifested as an accumulation in the auxiliary velocity variables, that in turn results in an unacceptable increase in the number of SCF cycles to meet even loose convergence tolerances for the real induced dipoles over the course of a 1 ns trajectory of the AMOEBA14 water model. By diagnosing the numerical instability as a problem of resonances that corrupt the dynamics, we introduce a simple thermostating scheme, illustrated using Berendsen weak coupling and Nose-Hoover chain thermostats, applied to the auxiliary dipole velocities. We find that the inertial EL/SCF (iEL/SCF) method provides superior energy conservation with less stringent convergence thresholds and a correspondingly small number of SCF cycles, to reproduce all properties of the polarization model in the NVT and NVE ensembles accurately. Our iEL/SCF approach is a clear improvement over standard SCF approaches to classical mutual induction calculations and would be worth investigating for application to ab initio molecular dynamics as well

  5. An efficient hybrid pseudospectral/finite-difference scheme for solving the TTI pure P-wave equation

    Zhan, Ge; Pestana, Reynam C; Stoffa, Paul L

    2013-01-01

    The pure P-wave equation for modelling and migration in tilted transversely isotropic (TTI) media has attracted more and more attention in imaging seismic data with anisotropy. The desirable feature is that it is absolutely free of shear-wave artefacts and the consequent alleviation of numerical instabilities generally suffered by some systems of coupled equations. However, due to several forward–backward Fourier transforms in wavefield updating at each time step, the computational cost is significant, and thereby hampers its prevalence. We propose to use a hybrid pseudospectral (PS) and finite-difference (FD) scheme to solve the pure P-wave equation. In the hybrid solution, most of the cost-consuming wavenumber terms in the equation are replaced by inexpensive FD operators, which in turn accelerates the computation and reduces the computational cost. To demonstrate the benefit in cost saving of the new scheme, 2D and 3D reverse-time migration (RTM) examples using the hybrid solution to the pure P-wave equation are carried out, and respective runtimes are listed and compared. Numerical results show that the hybrid strategy demands less computation time and is faster than using the PS method alone. Furthermore, this new TTI RTM algorithm with the hybrid method is computationally less expensive than that with the FD solution to conventional TTI coupled equations. (paper)

  6. Impression management : developing and illustrating a scheme of analysis for narrative disclosures – a methodological note

    Brennan, Niamh; Guillamon-Saorin, Encarna; Pierce, Aileen

    2009-01-01

    Purpose – This paper develops a holistic measure for analysing impression management and for detecting bias introduced into corporate narratives as a result of impression management. Design/methodology/approach – Prior research on the seven impression management methods in the literature is summarised. Four of the less-researched methods are described in detail, and are illustrated with examples from UK Annual Results’ Press Releases (ARPRs). A method of computing a holistic composite impr...

  7. Autonomous droop scheme with reduced generation cost

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  8. Efficient solar light harvesting CdS/Co{sub 9}S{sub 8} hollow cubes for Z-scheme photocatalytic water splitting

    Qiu, Bocheng; Zhu, Qiaohong; Du, Mengmeng; Fan, Linggang; Xing, Mingyang; Zhang, Jinlong [Key Lab. for Advanced Materials and Inst. of Fine Chemicals, School of Chemistry and Molecular Engineering, East China Univ. of Science and Technology, Shanghai (China)

    2017-03-01

    Hollow structures with an efficient light harvesting and tunable interior component offer great advantages for constructing a Z-scheme system. Controlled design of hollow cobalt sulfide (Co{sub 9}S{sub 8}) cubes embedded with cadmium sulfide quantum dots (QDs) is described, using hollow Co(OH){sub 2} as the template and a one-pot hydrothermal strategy. The hollow CdS/Co{sub 9}S{sub 8} cubes utilize multiple reflections of light in the cubic structure to achieve enhanced photocatalytic activity. Importantly, the photoexcited charge carriers can be effectively separated by the construction of a redox-mediator-free Z-scheme system. The hydrogen evolution rate over hollow CdS/Co{sub 9}S{sub 8} is 134 and 9.1 times higher than that of pure hollow Co{sub 9}S{sub 8} and CdS QDs under simulated solar light irradiation, respectively. Moreover, this is the first report describing construction of a hollow Co{sub 9}S{sub 8} based Z-scheme system for photocatalytic water splitting, which gives full play to the advantages of light-harvesting and charges separation. (copyright 2017 Wiley-VCH Verlag GmbH and Co. KGaA, Weinheim)

  9. Wastewater Management Efficiency and Determinant Factors in the Chinese Industrial Sector from 2004 to 2014

    Hidemichi Fujii

    2017-08-01

    Full Text Available This study analyzes industrial wastewater management efficiency using a Chinese provincial dataset from 2004 to 2014. The weighted Russell directional distance model is used to evaluate the efficiency of management practices. Determinants analysis was conducted based on governmental policy, pollution abatement, and market factors to identify the main drivers of industrial wastewater management efficiency in China. The results indicate that the wastewater management efficiency improved in the eastern and central regions. However, there is a significant efficiency gap between provinces in the western region. Moreover, the main determinants of wastewater management efficiency differ among regions and pollutants.

  10. Wider participation in the EU Eco Management and Audit Scheme; Das Gemeinschaftssystem der EG-Oeko-Audit-Verordnung oeffnet sich

    Mueller, U. [Institut fuer Management und Umwelt, Augsburg (Germany); Blaha, A.

    1998-04-01

    Within the framework of the EU Eco Management and Audit Scheme, which addresses primarily industry, member states can make provisions at the national level to permit trade and service firms as well as public enterprises to participate in the scheme. With the ordinance extending the eco audit ordinance which came into force in February 1998, questions of environmental management and environmental auditing are now also becoming interesting for the non-industrial sector in Germany. Unresolved issues concern, for instance, site delimitation, product ecology, and indirect environmental effects. (orig./AKF) [Deutsch] Im Rahmen des EG-Oeko-Audits, das sich in erster Linie an gewerbliche Unternehmen richtet, koennen die Mitgliedslaender im Rahmen nationaler Regelungen Handels- und Dienstleistungsunternehmen sowie oeffentliche Einrichtungen in das Gemeinschaftssystem einbeziehen. Mit der im Februar 1998 in Kraft getretenen Erweiterungsverordnung zum Umweltauditgesetz werden in Deutschland jetzt auch fuer nichtgewerbliche Bereiche Fragen des Umweltmanagements und des Oeko-Audits interessant. Eine Reihe von Fragen ergibt sich, beispielsweise nach der Standortabgrenzung, nach der Produktoekologie und nach den indirekten Umweltauswirkungen. (orig./AKF)

  11. Management and construction of a major zero discharge water supply and treatment scheme at Mount Piper Power Station, Australia

    Wong, P.; Docker, P.; Gabbrielli, E.; Wade, P. [Pacific Power, Sydney, NSW (Australia)

    1994-09-01

    Excellence in the organisation and management of a large multi-disciplinary design and construct project such as the zero discharge water supply and treatment scheme for Mount Piper coal-fired power station was essential to its successful execution. This paper discusses the management philosophies and strategies of Pacific Power and Transfield-PWT Asia/Pacific that resulted in this project being completed to the satisfaction of the client in the minimum time without delays and cost increases caused by interfaces between the parties. It highlights the advantages of contract packaging and placing the total responsibility for the performance and integration of a complex project system on one organisation. 2 refs., 6 figs.

  12. A distributed scheme to manage the dynamic coexistence of IEEE 802.15.4-based health-monitoring WBANs.

    Deylami, Mohammad N; Jovanov, Emil

    2014-01-01

    The overlap of transmission ranges between wireless networks as a result of mobility is referred to as dynamic coexistence. The interference caused by coexistence may significantly affect the performance of wireless body area networks (WBANs) where reliability is particularly critical for health monitoring applications. In this paper, we analytically study the effects of dynamic coexistence on the operation of IEEE 802.15.4-based health monitoring WBANs. The current IEEE 802.15.4 standard lacks mechanisms for effectively managing the coexistence of mobile WBANs. Considering the specific characteristics and requirements of health monitoring WBANs, we propose the dynamic coexistence management (DCM) mechanism to make IEEE 802.15.4-based WBANs able to detect and mitigate the harmful effects of coexistence. We assess the effectiveness of this scheme using extensive OPNET simulations. Our results indicate that DCM improves the successful transmission rates of dynamically coexisting WBANs by 20%-25% for typical medical monitoring applications.

  13. Comparing Nitrous Oxide Emissions from Three Residential Landscapes under Different Management Schemes Following Natural Rainfall Events

    Cultural lawn management practices that produce aesthetically appealing landscapes may also create environmental conditions that stimulate soil nitrous oxide (N2O) emissions. The purpose of this study is to investigate the effects of lawn management practices on N2O fluxes from ...

  14. Voluntary agreements, implementation and efficiency. European relevance of case study results. Reflections on transferability to voluntary agreement schemes at the European level

    Helby, Peter

    2000-04-01

    As a policy instrument, voluntary agreements often fascinate policy-makers.This is fuelled by a number of assumed advantages, such as the opportunity for co-operation rather than confrontation, speed and flexibility and the cost-effectiveness. Some advantages might even be accentuated at the European level: Co-operation has added advantage at the European level where the culture of consensus decision is strong. Flexibility is extra attractive for policy makers dealing with an economy less homogeneous than the average national economy. Speed is certainly welcomed by policy-makers otherwise faced with the slow-winding European legislative process. Cost-effectiveness is eagerly sought by European policy makers facing tight administrative budgets and staff limits. This report examines lessons from the VAIE case studies that may be useful to policy makers engaged in the development of voluntary approaches at the European level. These case studies are about voluntary agreement schemes for industrial energy efficiency deployed in Denmark, France, Germany, Netherlands, and Sweden. For a summary of these case studies, please refer to the the VAIE final report. More detailed information is available in the VAIE national reports. It needs to be emphasised that the empirical base is very narrow. The 'lessons' presented can only be hypotheses, based on an inductive leap from a very narrow experience. The reader will need to check these hypotheses against her own broader experience and personal judgement. According to the principle of subsidiarity, voluntary agreements should be implemented at the European level only if that would have significant advantage over national action. Action at the European level, rather than the national level, would have these potential advantages: Being more consistent with the development of the single market; Allowing higher demands on energy efficiency without negative effect on competitiveness and employment; Stimulating company

  15. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    Ananthi Jebaseeli Samuelraj

    2015-01-01

    Full Text Available Proxy Mobile IPV6 (PMIPV6 is a network based mobility management protocol which supports node’s mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node’s mobility should be modified to support group nodes’ mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  16. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.

    Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  17. A heuristic for efficient data distribution management in distributed simulation

    Gupta, Pankaj; Guha, Ratan K.

    2005-05-01

    In this paper, we propose an algorithm for reducing the complexity of region matching and efficient multicasting in data distribution management component of High Level Architecture (HLA) Run Time Infrastructure (RTI). The current data distribution management (DDM) techniques rely on computing the intersection between the subscription and update regions. When a subscription region and an update region of different federates overlap, RTI establishes communication between the publisher and the subscriber. It subsequently routes the updates from the publisher to the subscriber. The proposed algorithm computes the update/subscription regions matching for dynamic allocation of multicast group. It provides new multicast routines that exploit the connectivity of federation by communicating updates regarding interactions and routes information only to those federates that require them. The region-matching problem in DDM reduces to clique-covering problem using the connections graph abstraction where the federations represent the vertices and the update/subscribe relations represent the edges. We develop an abstract model based on connection graph for data distribution management. Using this abstract model, we propose a heuristic for solving the region-matching problem of DDM. We also provide complexity analysis of the proposed heuristics.

  18. A hydrological prediction system based on the SVS land-surface scheme: efficient calibration of GEM-Hydro for streamflow simulation over the Lake Ontario basin

    É. Gaborit

    2017-09-01

    Full Text Available This work explores the potential of the distributed GEM-Hydro runoff modeling platform, developed at Environment and Climate Change Canada (ECCC over the last decade. More precisely, the aim is to develop a robust implementation methodology to perform reliable streamflow simulations with a distributed model over large and partly ungauged basins, in an efficient manner. The latest version of GEM-Hydro combines the SVS (Soil, Vegetation and Snow land-surface scheme and the WATROUTE routing scheme. SVS has never been evaluated from a hydrological point of view, which is done here for all major rivers flowing into Lake Ontario. Two established hydrological models are confronted to GEM-Hydro, namely MESH and WATFLOOD, which share the same routing scheme (WATROUTE but rely on different land-surface schemes. All models are calibrated using the same meteorological forcings, objective function, calibration algorithm, and basin delineation. GEM-Hydro is shown to be competitive with MESH and WATFLOOD: the NSE  √  (Nash–Sutcliffe criterion computed on the square root of the flows is for example equal to 0.83 for MESH and GEM-Hydro in validation on the Moira River basin, and to 0.68 for WATFLOOD. A computationally efficient strategy is proposed to calibrate SVS: a simple unit hydrograph is used for routing instead of WATROUTE. Global and local calibration strategies are compared in order to estimate runoff for ungauged portions of the Lake Ontario basin. Overall, streamflow predictions obtained using a global calibration strategy, in which a single parameter set is identified for the whole basin of Lake Ontario, show accuracy comparable to the predictions based on local calibration: the average NSE  √  in validation and over seven subbasins is 0.73 and 0.61, respectively for local and global calibrations. Hence, global calibration provides spatially consistent parameter values, robust performance at gauged locations, and reduces the

  19. A hydrological prediction system based on the SVS land-surface scheme: efficient calibration of GEM-Hydro for streamflow simulation over the Lake Ontario basin

    Gaborit, Étienne; Fortin, Vincent; Xu, Xiaoyong; Seglenieks, Frank; Tolson, Bryan; Fry, Lauren M.; Hunter, Tim; Anctil, François; Gronewold, Andrew D.

    2017-09-01

    This work explores the potential of the distributed GEM-Hydro runoff modeling platform, developed at Environment and Climate Change Canada (ECCC) over the last decade. More precisely, the aim is to develop a robust implementation methodology to perform reliable streamflow simulations with a distributed model over large and partly ungauged basins, in an efficient manner. The latest version of GEM-Hydro combines the SVS (Soil, Vegetation and Snow) land-surface scheme and the WATROUTE routing scheme. SVS has never been evaluated from a hydrological point of view, which is done here for all major rivers flowing into Lake Ontario. Two established hydrological models are confronted to GEM-Hydro, namely MESH and WATFLOOD, which share the same routing scheme (WATROUTE) but rely on different land-surface schemes. All models are calibrated using the same meteorological forcings, objective function, calibration algorithm, and basin delineation. GEM-Hydro is shown to be competitive with MESH and WATFLOOD: the NSE √ (Nash-Sutcliffe criterion computed on the square root of the flows) is for example equal to 0.83 for MESH and GEM-Hydro in validation on the Moira River basin, and to 0.68 for WATFLOOD. A computationally efficient strategy is proposed to calibrate SVS: a simple unit hydrograph is used for routing instead of WATROUTE. Global and local calibration strategies are compared in order to estimate runoff for ungauged portions of the Lake Ontario basin. Overall, streamflow predictions obtained using a global calibration strategy, in which a single parameter set is identified for the whole basin of Lake Ontario, show accuracy comparable to the predictions based on local calibration: the average NSE √ in validation and over seven subbasins is 0.73 and 0.61, respectively for local and global calibrations. Hence, global calibration provides spatially consistent parameter values, robust performance at gauged locations, and reduces the complexity and computation burden of the

  20. The mass-retrofitting of an energy efficient-low carbon zone: Baselining the urban regeneration strategy, vision, masterplan and redevelopment scheme

    Deakin, Mark; Campbell, Fiona; Reid, Alasdair

    2012-01-01

    This paper examines a recent attempt to reduce energy consumption and the associated levels of carbon emissions by way of and through what has been termed: “an active and integrated institutional arrangement”. That is, by the integration of a mass retrofit proposal into an urban regeneration strategy, with the vision, master-plan, programme of renewal and redevelopment scheme which is capable of transforming into an energy efficient, low carbon zone. As a case study on how institutions can plan for low energy efficient redevelopments and the possibility of low carbon zones, the paper highlights the current state of the art on mass retrofits within the residential property sector and draws particular attention to the type of baseline assessments needed to legitimate, not only the strategic value of such arrangements, but their practical worth as measures capable of meeting emission targets set under the 2008 UK Climate Bill.

  1. Energy management for cost reduction in the production. TEEM - Total Energy Efficiency Management; Energiemanagement zur Kostensenkung in der Produktion. TEEM - Total Energy Efficiency Management

    Westkaemper, Engelbert; Verl, Alexander (eds.)

    2009-07-01

    Within the workshop of the Fraunhofer Institute for Manufacturing Engineering and Automation IPA (Stuttgart, Federal Republic of Germany) at 6th October, 2009, in Stuttgart the following lectures were held: (1) Presentation of Fraunhofer Institute for Manufacturing Engineering and Automation IPA (Engelbert Westkaemper); (2) TEEM - Total Energy Efficiency Management - ''With energy management to an energy efficient production'' (Alexander Schloske); (3) DIN EN 16001 Introduction of an energy management system - utilization and advantages for companies (Sylvia Wahren); (4) Analysis of the energy efficiency with power flow - Support and implementation at factory planning and optimization of production (Klaus Erlach); (5) Total Energy Efficiency Management - Approaches at the company Kaercher in injection moulding for example (Axel Leschtar); (6) Modelling the embodied product energy (Shahin Rahimifard); (7) Acquisition of energy data in the production - Technologies and possibilities (Joachim Neher); (8) Active energy management by means of an ''energy control centre'' - Analysis of the real situation and upgrading measures in the production using coating plants as an example (Wolfgang Klein); (9) Visualisation and simulation of energy values in the digital factory (Carmen Constantinescu, Axel Bruns).

  2. The analysis of the external factors influence on the efficiency of the absorption heat pumps inclusion in the scheme of a two-stage line installation of a STP

    Luzhkovoy Dmitriy S.

    2017-01-01

    Full Text Available The article deals with a comparative analysis of the efficiency of a two-stage line installation in a heating turbine before and after the inclusion of absorption heat pumps into its scheme with a decrease in the outside air temperature. The research shows the dependence of the efficiency of the line installation on its heat load while using AHP in its scheme, as well as on the heat conversion factor of the absorption heat pumps.

  3. A Distributed Routing Scheme for Energy Management in Solar Powered Sensor Networks

    Dehwah, Ahmad H.; Shamma, Jeff S.; Claudel, Christian G.

    2017-01-01

    Energy management is critical for solar-powered sensor networks. In this article, we consider data routing policies to optimize the energy in solar powered networks. Motivated by multipurpose sensor networks, the objective is to find the best

  4. Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments

    Saha, Amal; Sanyal, Sugata

    2014-01-01

    After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet. Cloud wallet is an emerging payment method and is gaining momentum very fast. Anticipating that the wallet product managers and security s...

  5. The Efficiency of OLS Estimators of Structural Parameters in a Simple Linear Regression Model in the Calibration of the Averages Scheme

    Kowal Robert

    2016-12-01

    Full Text Available A simple linear regression model is one of the pillars of classic econometrics. Multiple areas of research function within its scope. One of the many fundamental questions in the model concerns proving the efficiency of the most commonly used OLS estimators and examining their properties. In the literature of the subject one can find taking back to this scope and certain solutions in that regard. Methodically, they are borrowed from the multiple regression model or also from a boundary partial model. Not everything, however, is here complete and consistent. In the paper a completely new scheme is proposed, based on the implementation of the Cauchy-Schwarz inequality in the arrangement of the constraint aggregated from calibrated appropriately secondary constraints of unbiasedness which in a result of choice the appropriate calibrator for each variable directly leads to showing this property. A separate range-is a matter of choice of such a calibrator. These deliberations, on account of the volume and kinds of the calibration, were divided into a few parts. In the one the efficiency of OLS estimators is proven in a mixed scheme of the calibration by averages, that is preliminary, and in the most basic frames of the proposed methodology. In these frames the future outlines and general premises constituting the base of more distant generalizations are being created.

  6. Nanofluidic crystal: a facile, high-efficiency and high-power-density scaling up scheme for energy harvesting based on nanofluidic reverse electrodialysis

    Ouyang Wei; Wang Wei; Zhang Haixia; Wu Wengang; Li Zhihong

    2013-01-01

    The great advances in nanotechnology call for advances in miniaturized power sources for micro/nano-scale systems. Nanofluidic channels have received great attention as promising high-power-density substitutes for ion exchange membranes for use in energy harvesting from ambient ionic concentration gradient, namely reverse electrodialysis. This paper proposes the nanofluidic crystal (NFC), of packed nanoparticles in micro-meter-sized confined space, as a facile, high-efficiency and high-power-density scaling-up scheme for energy harvesting by nanofluidic reverse electrodialysis (NRED). Obtained from the self-assembly of nanoparticles in a micropore, the NFC forms an ion-selective network with enormous nanochannels due to electrical double-layer overlap in the nanoparticle interstices. As a proof-of-concept demonstration, a maximum efficiency of 42.3 ± 1.84%, a maximum power density of 2.82 ± 0.22 W m −2 , and a maximum output power of 1.17 ± 0.09 nW/unit (nearly three orders of magnitude of amplification compared to other NREDs) were achieved in our prototype cell, which was prepared within 30 min. The current NFC-based prototype cell can be parallelized and cascaded to achieve the desired output power and open circuit voltage. This NFC-based scaling-up scheme for energy harvesting based on NRED is promising for the building of self-powered micro/nano-scale systems. (paper)

  7. Enhanced machine learning scheme for energy efficient resource allocation in 5G heterogeneous cloud radio access networks

    Alqerm, Ismail; Shihada, Basem

    2018-01-01

    with high quality of service requirements (QoS), while high power macro base stations (BSs) are deployed for coverage maintenance and low QoS users support. However, the inter-tier interference between the macro BS and RRHs and energy efficiency are critical

  8. Participatory innovation process for testing new practices for soil fertility management in Chókwè Irrigation Scheme (Mozambique)

    Sánchez Reparaz, Maite; de Vente, Joris; Famba, Sebastiao; Rougier, Jean-Emmanuel; Ángel Sánchez-Monedero, Miguel; Barberá, Gonzalo G.

    2015-04-01

    Integrated water and nutrient management are key factors to increase productivity and to reduce the yield gap in irrigated systems in Sub-Saharan Africa. These two elements are affected by an ensemble of abiotic, biotic, management and socio-economic factors that need to be taken into account to reduce the yield gap, as well as farmers' perceptions and knowledge. In the framework of the project European Union and African Union cooperative research to increase Food production in irrigated farming systems in Africa (EAU4Food project) we are carrying out a participatory innovation process in Chókwè irrigation scheme (Mozambique) based on stakeholders engagement, to test new practices for soil fertility management that can increase yields reducing costs. Through a method combining interviews with three farmers' associations and other relevant stakeholders and soil sampling from the interviewed farmers' plots with the organization of Communities of Practices, we tried to capture how soil fertility is managed by farmers, the constraints they find as well as their perceptions about soil resources. This information was the basis to design and conduct a participatory innovation process where compost made with rice straw and manure is being tested by a farmers' association. Most important limitations of the method are also evaluated. Our results show that socio-economic characteristics of farmers condition how they manage soil fertility and their perceptions. The difficulties they face to adopt new practices for soil fertility management, mainly related to economic resources limitations, labour availability, knowledge time or farm structure, require a systemic understanding that takes into account abiotic, biotic, management and socio-economic factors and their implication as active stakeholders in all phases of the innovation process.

  9. PNGMDR 2013-2015. Industrial scheme for very-low-level waste management

    2015-08-01

    The objectives of this document are to recall quantitative and qualitative situations of the very-low-level waste management sector, to consolidate production perspectives for producers, to make an inventory of possibilities of extension and optimisation of industrial capacities of the sector, to define priorities for the different envisaged optimisation options, and to describe the organisation for the follow-up of action progress. After a brief presentation of the context, it presents the French very-low-level waste sector which is specific to the French context, outlines the main challenges for the industrial very-low-level waste management sector, indicates current projects of assessment for the sector, reports an analysis of the relevance of the different envisaged volume optimisation ways, briefly presents different scenarios, gives a brief overview of examples of very-low-level waste management in other countries, and finally states some proposals

  10. Increased malaria transmission around irrigation schemes in Ethiopia and the potential of canal water management for malaria vector control.

    Kibret, Solomon; Wilson, G Glenn; Tekie, Habte; Petros, Beyene

    2014-09-13

    Irrigation schemes have been blamed for the increase in malaria in many parts of sub-Saharan Africa. However, proper water management could help mitigate malaria around irrigation schemes in this region. This study investigates the link between irrigation and malaria in Central Ethiopia. Larval and adult mosquitoes were collected fortnightly between November 2009 and October 2010 from two irrigated and two non-irrigated (control) villages in the Ziway area, Central Ethiopia. Daily canal water releases were recorded during the study period and bi-weekly correlation analysis was done to determine relationships between canal water releases and larval/adult vector densities. Blood meal sources (bovine vs human) and malaria sporozoite infection were tested using enzyme-linked immunosorbent assay (ELISA). Monthly malaria data were also collected from central health centre of the study villages. Monthly malaria incidence was over six-fold higher in the irrigated villages than the non-irrigated villages. The number of anopheline breeding habitats was 3.6 times higher in the irrigated villages than the non-irrigated villages and the most common Anopheles mosquito breeding habitats were waterlogged field puddles, leakage pools from irrigation canals and poorly functioning irrigation canals. Larval and adult anopheline densities were seven- and nine-fold higher in the irrigated villages than in the non-irrigated villages, respectively, during the study period. Anopheles arabiensis was the predominant species in the study area. Plasmodium falciparum sporozoite rates of An. arabiensis and Anopheles pharoensis were significantly higher in the irrigated villages than the non-irrigated villages. The annual entomological inoculation rate (EIR) calculated for the irrigated and non-irrigated villages were 34.8 and 0.25 P. falciparum infective bites per person per year, respectively. A strong positive correlation was found between bi-weekly anopheline larval density and canal water

  11. EFFICIENCY INDICATORS INFORMATION MANAGEMENT IN INTEGRATED SECURITY SYSTEMS

    N. S. Rodionova

    2014-01-01

    Full Text Available Summary. Introduction of information technology to improve the efficiency of security activity leads to the need to consider a number of negative factors associated with in consequence of the use of these technologies as a key element of modern security systems. One of the most notable factor is the exposure to information processes in protection systems security threats. This largely relates to integrated security systems (ISS is the system of protection with the highest level of informatization security functions. Significant damage to protected objects that they could potentially incur as a result of abnormal operation ISS, puts a very actual problem of assessing factors that reduce the efficiency of the ISS to justify the ways and methods to improve it. Because of the nature of threats and blocking distortion of information in the ISS of interest are: the volume undistorted ISF working environment, as a characteristic of data integrity; time access to information as a feature of its availability. This in turn leads to the need to use these parameters as the performance characteristics of information processes in the ISS - the completeness and timeliness of information processing. The article proposes performance indicators of information processes in integrated security systems in terms of optimal control procedures to protect information from unauthorized access. Set the considered parameters allows to conduct comprehensive security analysis of integrated security systems, and to provide recommendations to improve the management of information security procedures in them.

  12. Efficiency increase of complex production and transport systems management

    Kornilov S.

    2017-01-01

    Full Text Available This article deals with the problem of the reduced efficiency of management in complex production - transport systems due to the lack of co-ordination in the operation of industrial enterprises and transport carrying out their maintenance. The existing transport service schedules for auxiliary departments do not take into account possible changes in operating conditions, the probability of malfunctions and the amount of reserves, which leads to an increase in general production costs. To solve this problem, we propose to use the interval regulation of production and transport processes in all departments of the complex production and transport systems. Also, such regulation involves the determination of traffic service priority. This will allow passing on from the regulated control of production and transport processes to the situational one, adapted to specific conditions, and reducing losses from untimely transport servicing, which will lead to a stores reduction and efficiency increase of the enterprise circulating facilities use. Testing the effectiveness of interval regulation was performed on the system and dynamics simulation model of liquid iron transportation in the oxygen converter shop of the metallurgical enterprise. It was established that the use of interval regulation processes in iron production and its transportation will allow decreasing non-productive downtime by 21% and the amount of the liquid iron in anticipation of recasting in the oxygen converter shop – by 33%. Economical effect of reducing the liquid iron downtime during transportation to the oxygen converter shop will be about 30 million rubles per year.

  13. Comparing the Institutionalisation of Performance management Schemes for Hospitals in Denmark, Germany and England

    Vrangbæk, Karsten; Appleby, John; Klenk, Tanja

    2016-01-01

    Performance management (PM) has been developed to a central part of health care reforms. However, ideas of performance are traditionally contested in the health care sector and split up between a professional and a bureaucratic understanding of effective service delivery. With the rise of New...... Public Management, an additional layer of PM instruments has been put on the already existing structures. As a result, different PM regimes can be distinguished, which vary in the way they define performance, blame underperformance and design accountability instruments to ensure appropriate behaviour...

  14. The Anatomy of Pension Fraud in Nigeria: Its Motives, the Management and Future of the Nigerian Pension Scheme

    Amaka E. Agbata

    2017-12-01

    Full Text Available The study determined how the administration of the Pension Scheme could be perked up in Nigeria through effective management that would reduce fraudulent practices apparent in the scheme. By following the precept of library research via the survey design, a 5-point Likert Scale questionnaire was designed to educe primary information about pension matters from a sample of 435 knowledgeable respondents. The collected data were presented and analyzed. Three hypotheses were formulated and tested based on Multiple Regression Analysis models with the aid of Minitab version 17. The findings show that, despite the provisions of the Act (the Pension Reform Act - PRA, intents for committing Pension Fraud have not reduced to a significant extent. Also, the accumulated assets of pension funds have not been adequately diversified into profitable investment alternatives. Therefore, we recommend that, among other things, amendments should concertedly be made to the PRA to at least discourage acts of pension frauds by instituting severe punitive measures for culprits, while simultaneously inculcating moral ethics among public servants in Nigeria.

  15. Management of Universal Basic Education Scheme (U.B.E.) for Qualitative Education in Nigeria

    Omotayo, Dare Michael; Ihebereme, Chioma; Maduewesi, Sir B. U.

    2008-01-01

    Since independence, Nigeria has been searching diligently for a viable educational system capable of enhancing the socio-economic and political values inherent in the country. This paper discusses concepts such as management, qualitative education and Universal Basic Education. In addition to the above, the paper also examines the National…

  16. A Microbial Assessment Scheme to measure microbial performance of Food Safety Management Systems

    Jacxsens, L.; Kussaga, J.; Luning, P.A.; Spiegel, van der M.; Devlieghere, F.; Uyttendaele, M.

    2009-01-01

    A Food Safety Management System (FSMS) implemented in a food processing industry is based on Good Hygienic Practices (GHP), Hazard Analysis Critical Control Point (HACCP) principles and should address both food safety control and assurance activities in order to guarantee food safety. One of the

  17. Hydrogeological modelling of the Atlantis aquifer for management support to the Atlantis water supply scheme

    Jovanovic, Nebo

    2017-01-01

    Full Text Available model MODFLOW for groundwater flow and contaminant transport was used in support of the management of the AWSS. The aims were: (i) to calibrate the MODFLOW model for the MAR site at Atlantis; (ii) to run realistic scenarios that cannot be replicated...

  18. Living in cold homes after heating improvements: Evidence from Warm-Front, England's Home Energy Efficiency Scheme

    Critchley, Roger; Gilbertson, Jan; Grimsley, Michael; Green, Geoff

    2007-01-01

    Objective: To investigate explanatory factors for persistent cold temperatures in homes which have received heating improvements. Design: Analysis of data from a national survey of dwellings and households (in England occupied by low-income residents) that had received heating improvements or repairs under the Warm Front Scheme. Methods: Over the winters of 2001-02 and 2002-03, householders recorded living room and main bedroom temperatures in a diary. Entries were examined for 888 households, which had received high level heating interventions. Two hundred and twenty-two households were identified as occupying cold homes, with mean bedroom temperature below 16 deg. C or mean living room temperatures below 18 deg. C. Binary logistic regression was used to model dwelling and household features and then occupants' behaviour and attitudes in the 'cold homes' sub-set compared with the remainder of the high intervention group. Seventy-nine supplementary, structured telephone interviews explored reasons given for lower temperatures. Using graphical and tabular methods, householders preferring cooler homes were distinguished from those who felt constrained in some way. Results: Cold homes predominate in pre-1930 properties where the householder remains dissatisfied with the heating system despite major improvements funded by Warm Front. Residents of cold homes are less likely to have long-standing illness or disability, but more likely to experience anxiety or depression. A small sample of telephone interviews reveals those preferring lower temperatures for health or other reasons, report less anxiety and depression than those with limited control over their home environment. Their 'thermal resistance' to higher temperatures challenges orthodox definitions of comfort and fuel poverty

  19. Innovative Technologies for Efficient Pharmacotherapeutic Management in Space

    Putcha, Lakshmi; Daniels, Vernie

    2014-01-01

    Current and future Space exploration missions and extended human presence in space aboard the ISS will expose crew to risks that differ both quantitatively and qualitatively from those encountered before by space travelers and will impose an unknown risk of safety and crew health. The technology development challenges for optimizing therapeutics in space must include the development of pharmaceuticals with extended stability, optimal efficacy and bioavailability with minimal toxicity and side effects. Innovative technology development goals may include sustained/chronic delivery preventive health care products and vaccines, low-cost high-efficiency noninvasive, non-oral dosage forms with radio-protective formulation matrices and dispensing technologies coupled with self-reliant tracking technologies for quality assurance and quality control assessment. These revolutionary advances in pharmaceutical technology will assure human presence in space and healthy living on Earth. Additionally, the Joint Commission on Accreditation of Healthcare Organizations advocates the use of health information technologies to effectively execute all aspects of medication management (prescribing, dispensing, and administration). The advent of personalized medicine and highly streamlined treatment regimens stimulated interest in new technologies for medication management. Intelligent monitoring devices enhance medication accountability compliance, enable effective drug use, and offer appropriate storage and security conditions for dangerous drug and controlled substance medications in remote sites where traditional pharmacies are unavailable. These features are ideal for Exploration Medical Capabilities. This presentation will highlight current novel commercial off-the-shelf (COTS) intelligent medication management devices for the unique dispensing, therapeutic drug monitoring, medication tracking, and drug delivery demands of exploration space medical operations.

  20. Reviewing the economic efficiency of disaster risk management

    Mechler, Reinhard

    2013-04-01

    There is a lot of rhetoric suggesting that disaster risk management (DRM) pays, yet surprisingly little in the way of hard facts. Cost-benefit analysis (CBA) is one major tool that can provide quantitative information about the prioritization of disaster risk management (DRM) (and climate adaptation) based on economic principles. Yet, on a global scale, there has been surprisingly little robust evidence on the economic efficiency and benefits of risk management measures. This review shows that for the limited evidence reported the economic case for DRM across a range of hazards is strong and that the benefits of investing in DRM outweigh the costs of doing so, on average, by about four times the cost in terms of avoided and reduced losses. Most studies using a CBA approach focus on structural DRM and most information has been made available on physical flood prevention. There have been some limited studies on preparedness and risk financing. The global evidence base is limited and estimates appear not very solid, and overall, in line with the conclusion of the recent IPCC SREX report, there is limited evidence and medium agreement across the literature. Some of the factors behind the limited robustness are inherent to CBA more widely: these challenges comprise the inability to price intangibles, evaluating strategies rather than single projects, difficulties in assessing softer rather than infrastructure-related options, choices regarding a proper discount rate, lack of accounting for the distribution of benefits and costs and difficulties with assessing nonmarket values such as those related to health, the environment, or public goods. Although techniques exist to address some of these challenges, they are not very likely to easily go away. Other challenges associated specifically with DRM, such as the need and difficulty to undertake risk -based analysis can be overcome, and there have been manuals and reports providing a way forward. In an age of austerity, cost

  1. An efficient explicit numerical scheme for diffusion-type equations with a highly inhomogeneous and highly anisotropic diffusion tensor

    Larroche, O.

    2007-01-01

    A locally split-step explicit (LSSE) algorithm was developed for efficiently solving a multi-dimensional advection-diffusion type equation involving a highly inhomogeneous and highly anisotropic diffusion tensor, which makes the problem very ill-conditioned for standard implicit methods involving the iterative solution of large linear systems. The need for such an optimized algorithm arises, in particular, in the frame of thermonuclear fusion applications, for the purpose of simulating fast charged-particle slowing-down with an ion Fokker-Planck code. The LSSE algorithm is presented in this paper along with the results of a model slowing-down problem to which it has been applied

  2. The buffer management scheme for the new Triumf VAX-based data acquisition and analysis system

    Ludgate, G.A.; Haley, B.; Lee, L.

    1987-01-01

    The new TRIUMF VAX-based DAAS requires data to be exchanged between acquisition, monitoring and analysis processes executing on a VAX. Data records are passed via a set of buffers contained in a region of memory shared by all processes. The responsibility for buffer management is distributed among the processes and synchronized access to the region is achieved by using the VAX self-relative queue instructions and common event flags

  3. Liquidity management efficiency of Indian Steel Companies (a Case Study)

    Dr. Amalendu Bhunia; Islam Uddin Khan

    2011-01-01

    Liquidity management is of crucial importance in financial management decision. The optimalof liquidity management is could be achieve by company that manage the trade-off between profitability and liquidity management. The paper analyses the association between the liquidity management and profitability of 230 Indian private sector steel companies obtained from CMIE database. Liquidity management indicators and profitability indicator over the period from 2002 to 2010 are modeled as a linear...

  4. Hybrid control scheme for distributed energy resource management in a market context

    Han, Xue; Bindner, Henrik W.; Mehmedalic, Jasmin

    2015-01-01

    In modernizing the electricity grid, distributed energy resources (DERs) can play an important role in accommodating intermittent energy sources, assisting system operation and the transition to a smart grid. Proper aggregation and coordination of the available DER units is required to provide...... flexibility to meet regular demand from the distribution system operator (DSO). By considering both their physical constraints and the economical system operation, this paper proposes a realtime hybrid management system for DER units in a market environment, which considers both the request from the DSO...

  5. Synchronous Ethernet- Considerations and Implementation of the Packet Network Management Scheme

    Gundale, A. S.; Aradhye, Ashwini

    2010-11-01

    Packet technologies were designed to work in asynchronous mode, where the oscillators in the equipment are free running. Although this allows the underlying infrastructure to operate, many applications exist that require frequency synchronization. Also, the ability to distribute synchronization from center to edge of network declines as infrastructure evolves toward a packet-based architecture. Synchronous Ethernet (SyncE) is a key development of the evolution of Ethernet into a carrier grade technology suitable for the WAN environment where frequency synchronization is required. The time of the day distribution in synchronized network at the physical layer enables many useful propositions in packet handling policies and other network management aspects.

  6. Energy efficiency from business management perspective; Prosessi-integraatin energiatehokkuuden liikejohtaminen - PI-ENERGIALIITO

    Ahtila, P.; Tuomaala, M. (Helsinki Univ. of Technology, Center for Energy Technology, Espoo (Finland)); Malmi, T.; Virtanen, T. (Helsinki School of Economics, Helsinki (Finland))

    2008-07-01

    The purpose of the research is to enhance the ways to manage energy efficiency as part of business management. The work includes a study of the differences between technical energy efficiency metrics and a company's business management metrics. The work also includes a study of the differences between energy efficiency management at a unit process scale and energy efficiency management at a total site scale. In addition, the ways to evaluate energy efficiency investments are studied. The research tries to propose ways to support existing practices in order to promote energy efficiency investment activity. The research is supported by case studies where a change in process energy efficiency is carried out. The case studies are evaluated from two perspectives: from engineering perspective and from business management perspective. (orig.)

  7. Distance Education, Efficiency and Scientific Management: Some Doubts. ESTR Occasional Paper Number 12.

    Campion, Mick

    The theme of the 1983 Australian and South Pacific External Studies Association concerned developing efficient teaching-learning systems and efficient management systems. Such an emphasis on efficiency was symptomatic in the United States' educational arena to a commitment to the practices of scientific management. The central role accorded to…

  8. A Distributed Routing Scheme for Energy Management in Solar Powered Sensor Networks

    Dehwah, Ahmad H.

    2017-10-11

    Energy management is critical for solar-powered sensor networks. In this article, we consider data routing policies to optimize the energy in solar powered networks. Motivated by multipurpose sensor networks, the objective is to find the best network policy that maximizes the minimal energy among nodes in a sensor network, over a finite time horizon, given uncertain energy input forecasts. First, we derive the optimal policy in certain special cases using forward dynamic programming. We then introduce a greedy policy that is distributed and exhibits significantly lower complexity. When computationally feasible, we compare the performance of the optimal policy with the greedy policy. We also demonstrate the performance and computational complexity of the greedy policy over randomly simulated networks, and show that it yields results that are almost identical to the optimal policy, for greatly reduced worst-case computational costs and memory requirements. Finally, we demonstrate the implementation of the greedy policy on an experimental sensor network.

  9. Position statement on efficiency of technologies for diabetes management.

    Martín-Vaquero, Pilar; Martínez-Brocca, María Asunción; García-López, José Manuel

    2014-12-01

    Di@bet.es study results are impressive, showing that diabetes affects 13.8% of the Spanish population. Not only the statistical facts are alarming, but the increasing incidence of this disease is a major problem, as pandemic proportions of type 2 diabetes are expected. Thus, the study of diabetes represents a challenge not only for health services, but also for the Ministries of Health and Finance. Technology has become an essential tool in the quality are of patients with diabetes, as it helps in the healthcare processes to obtain an optimum metabolic balance and prevent possible complications. Insulin pumps, continuous glucose monitoring nd self-monitoring blood glucose have all proved their efficiency, and telemedicine it is making good progress. The indirect costs of diabetes in Spain are much higher than the directones, showing the importance of inverting the paradox. The optimization of resources depends not only on the ability of the physicians, but also the administration, to implant and sustain technological innovations in our system, and with that make it effective in terms of benefits. Cost-effectiveness and cost-utility analysis are needed to prioritize and allow health management services to make the correct choices for approaching this prevalent chronic disease.

  10. Economic efficiency of environmental management system operation in industrial companies

    Dukmasova, N.; Ershova, I.; Plastinina, I.; Boyarinov, A.

    2017-06-01

    The article examines the issue of the efficiency of the environmental management system (EMS) implementation in the Russian machine-building companies. The analysis showed that Russia clearly lags behind other developed and developing countries in terms of the number of ISO 14001 certified companies. According to the authors, the main cause of weak system implementation activity is attributed to the lack of interest in ISO 14001 certification on the Russian market. Five-year primary (field) research aimed at the analysis of the environmental priorities of the civilians suggests that the image component of the economic benefits ensures the increase in economic and financial performance of the company due to the increase in customers’ loyalty to the products of the EMS adopter. To quantify economic benefits obtained from EMS implementation, a methodological approach with regard to the image component and the decrease in semi-fixed costs due to the increase in the production scale has been developed. This approach has been tested in a machine-building electrical equipment manufacturer in Ekaterinburg. This approach applied to data processing yields the conclusion that EMS gives a good additional competitive advantage to its adopters.

  11. Managing the indoor environment and energy efficiency in historical buildings

    Huovila, P., Email: pekka.huovila@vtt.fi

    2012-06-15

    In Italy there are a lot of historical buildings that are relevant in cultural, architectural and artistic terms. Such heritage needs a constant process of renovation to keep the buildings secure, safe and efficient and to make them suitabled for host offices, museums, events and art exhibitions. Unfortunately, most of these renovation activities consider only either the security issues or outward appearance or the indoor conditions or the installations; all actions are independently designed and implemented, and an integrated approach is missing. Italian public bodies strongly need support and guidelines to write optimal tenders for building refurbishments. In this paper, we present a methodology for assessing the state of building and defining tender requirements. The methodology is based on the definition of performance indicators, related to security against human threats, thermal and hygrometric quality, living indoor conditions, air quality, lighting conditions, resilience and management of emergencies in case of natural disasters, accessibility, etc. A very important aspect that the methodology considers is compliance with regulations. Also some economical aspects will be considered. The methodology is implemented in a decision- support software tool that presents the different indicators in relation to each other, evaluating performance indices. These indices could be used to simulate different solutions and help choose the best one. Particular attention is paid to how the results are shown to end users. (orig.)

  12. Supporting public involvement in research design and grant development: a case study of a public involvement award scheme managed by a National Institute for Health Research (NIHR) Research Design Service (RDS).

    Boote, Jonathan D; Twiddy, Maureen; Baird, Wendy; Birks, Yvonne; Clarke, Clare; Beever, Daniel

    2015-10-01

    It is good practice for the public to be involved in developing health research. Resources should be available for researchers to fund the involvement of the public in the development of their grants. To describe a funding award scheme to support public involvement in grant development, managed by an NIHR Research Design Service (RDS). Case examples of how the award contributed to successful grant applications and findings from a recent evaluation of the scheme are presented. A case study of resource provision to support public involvement activities in one region of England. University and NHS-based researchers, and members of the public. Between 2009 and 2012, the RDS approved 45 public involvement funding awards (totalling nearly £19,000). These awards contributed to 27 submitted applications at the time of writing, of which 11 were successful (totalling over £7.5 million). The evaluation revealed difficulties encountered by some researchers when involving the public in grant development, which led to suggestions about how the scheme could be improved. This award scheme represents an efficient method of providing researchers with resources to involve the public in grant development and would appear to represent good value for money. © 2013 John Wiley & Sons Ltd.

  13. Economic efficiency and risk character of fire management programs, Northern Rocky Mountains

    Thomas J. Mills; Frederick W. Bratten

    1988-01-01

    Economic efficiency and risk have long been considered during the selection of fire management programs and the design of fire management polices. The risk considerations was largely subjective, however, and efficiency has only recently been calculated for selected portions of the fire management program. The highly stochastic behavior of the fire system and the high...

  14. Achieving higher efficiency of production through knowledge management via social capital management

    Jana Plchová

    2015-09-01

    Full Text Available The article shows a new approach – how to reach higher efficiency in the production from knowledge management via managing social capital through measurement, motivation and stimulation. The test in a real company on the Toyota system implementation is de-scribed. The active involvement of people is an important part of the Toyota system success. This is obvious in Japan but creates a big problem in Europe. These problems were tested in order to answer the following questions: 1. Is it possible to measure the social system level before the application of the system?, 2. Is it possible to evaluate the necessary level of the social system for successful implementation in advance?, 3. Is it possible to cultivate the social system to the desired level? We try to answer all of these questions adopting the Kopčaj Spiral Management approach. The practical results on an existing company are presented together with managerial recommendations.

  15. Challenges of medicines management in the public and private sector under Ghana's National Health Insurance Scheme - A qualitative study.

    Ashigbie, Paul G; Azameti, Devine; Wirtz, Veronika J

    2016-01-01

    Ghana established its National Health Insurance Scheme (NHIS) in 2003 with the goal of ensuring more equitable financing of health care to improve access to health services. This qualitative study examines the challenges and consequences of medicines management policies and practices under the NHIS as perceived by public and private service providers. This study was conducted in health facilities in the Eastern, Greater Accra and Volta regions of Ghana between July and August 2014. We interviewed 26 Key Informants (KIs) from a purposively selected sample of public and private sector providers (government and mission hospitals, private hospitals and private standalone pharmacies), pharmaceutical suppliers and NHIS district offices. Data was collected using semi-structured interview guides which covered facility accreditation, reimbursement practices, medicines selection, purchasing and pricing of medicines, and utilization of medicines. Codes for data analysis were developed based on the study questions and also in response to themes that emerged from the transcripts and notes. Most KIs agreed that the introduction of the NHIS has increased access to and utilization of medicines by removing cost barriers for patients; however, some pointed out the increased utilization could also be corollary to moral hazard. Common concerns across all facilities were the delays in receiving NHIS reimbursements, and low reimbursement rates for medicines which result in providers asking patients to pay supplementary fees. KIs reported important differences between private and public sectors including weak separation of prescribing and dispensing and limited use of drugs and therapeutic committees in the private sector, the disproportionate effects of unfavorable reimbursement prices for medicines, and inadequate participation of the private sector providers (especially pharmacies and licensed chemical sellers) in the NHIS. Health providers generally perceive the NHIS to have had a

  16. Public Internal Performance Contracting - Managing and financing energy-efficiency measures in public administrations

    Irrek, Wolfgang; Thomas, Stefan; Attali, Sophie; Benke, Georg; Borg, Nils; Figorski, Arkadiusz; Filipowicz, Mariusz; Labanca, Nicola; Pindar, Andrew; Ochoa, Amalia

    2005-01-01

    Public Internal Performance Contracting (PICO) is a type of in-house 'third-party' financing or energy performance contracting scheme. In theory, once triggered, PICO provides a 'perpetual motion' finance mechanism for public authorities by which energy efficiency savings fund new investments in an upward virtuous cycle. One unit of the public authority, e.g. the technical department, delivers the financial and technical energy efficiency service to another unit of the same public administration. Remuneration takes place through cross payments between these units, according savings made in energy costs. The initial investments require 'seed funds' to kick start the process, after which the cross payments provide sufficient means to fund further measures. How can the PICO mechanism be initiated in times of tight public budgets? What difficulties are faced during the implementation process and how can these be overcome? What kind of energy-efficiency measures is PICO best suited to? And what role can national and European policy play to facilitate implementation? These are the key questions that the EU-funded PICOLight project aimed to tackle. This was done through testing and disseminating the PICO schemes, first used in Germany, in six European countries, developing these further and making the necessary adaptations. PICO schemes were piloted in seven public administrations with the technical focus on energy-efficient lighting retrofits. The experiences gathered in these pilot projects should help to introduce PICO schemes on a larger scale in public administrations in Europe. The paper presents the preliminary results from these pilot projects

  17. Project proposal: integrated farming scheme incorporating management of water hyacinth - Water hyacinth as a pig feed

    Singh, D.N.

    1981-01-01

    One of the objectives of pig research undertaken by the Research Section of the Ministry of Agriculture and Fisheries (Fiji), is to evaluate local feed sources in an attempt to reduce importation of pig feeds. Protein is the major limiting nutrient in most local feed sources. Fish and meat meals are incorporated in pig feeds by many farmers but the cost of these are very high. Chemical analysis of water hyacinth taken from Rewa River showed that leaves contain 22% crude protein and stems 8%. This was determined on a dry weight basis. Therefore, water hyacinth could be a good source of protein for pigs. Utilization of water hyacinth was considered in the First Review; meeting on Management of Water Hyacinth conducted by Commonwealth Regional (Asia/Pacific) Rural Technology Programme. Water hyacinth as an animal feed was discussed in that review. It points out that the following has to be taken into account in considering the use of water hyacinth as an animal feed. The objective of the study is to investigate the use of water hyacinth as a feed for pigs in an integrated farming system involving a piggery, biogas digester and a pond and: compare pig preference for water hyacinth when fed fresh or dry compare the performance of pigs when fed water hyacinth only and in combination with a normal diet and cost/benefit analysis

  18. Monitoring the Efficiency of Budget Management of Trade Enterprises in Ukraine

    Frolova Larysa V

    2016-08-01

    Full Text Available The article justifies the actuality of carrying out the monitoring of budget management efficiency at trade enterprises in Ukraine. It has been found that the efficiency of each trade enterprise management system, in particular the efficiency of budget management system, is determined by several factors, among which there considered the enterprise business profile, the competitive situation in the market and the standard of living of the population. The efficiency of budget management and, as a result, the efficiency of trade enterprises’ activity is reflected in the results of the effectiveness of the main indicators of the financial budgets of enterprises. Therefore, using the method of fuzzy sets, there carried out an integral evaluation of the efficiency of budget management based on the efficiency of financial budgets: the budget revenues and expenditures, cash flow budget and budgeted balance sheet. The study is carried out for Ukraine as a whole, and its most developed regions.

  19. Mathematical modelling as basis for efficient enterprise management

    Kalmykova Svetlana

    2017-01-01

    Full Text Available The choice of the most effective HR- management style at the enterprise is based on modeling various socio-economic situations. The article describes the formalization of the managing processes aimed at the interaction between the allocated management subsystems. The mathematical modelling tools are used to determine the time spent on recruiting personnel for key positions in the management hierarchy selection.

  20. Transformations of Nitrogen from Secondary Treated Wastewater when Infiltrated in Managed Aquifer Recharge Schemes

    Silver, Matthew; Wefer-Roehl, Annette; Kübeck, Christine; Schüth, Christoph

    2016-04-01

    The EU FP7 project MARSOL seeks to address water scarcity challenges in arid regions, where managed aquifer recharge (MAR) is an upcoming technology to recharge depleted aquifers using alternative water sources. Within this framework, we conduct column experiments to investigate transformations of nitrogen species when secondary treated wastewater (STWW) is infiltrated through two natural soils being considered for managed aquifer recharge. The soils vary considerably in organic matter content, with total organic matter determined by loss on ignition of 6.8 and 2.9 percent by mass for Soil 1 and Soil 2, respectively. Ammonium (NH4+) concentrations as high as 8.6 mg/L have been measured in pore water samples from Soil #1, indicating that ammonium could be a contaminant of concern in MAR applications using STWW, with consideration of the EU limit of 0.5 mg/L for NH4+. The two forms of nitrogen with the highest concentrations in the secondary treated wastewater are nitrate (NO3-) and dissolved organic nitrogen (DON). In water samples taken from the soil columns, a mass balance of measured ions shows a deficit of nitrogen in ionic form in the upper to middle depths of the soil, suggesting the presence of unmeasured species. These are likely nitrous oxide or dinitrogen gas, which would signify that denitrification is occurring. Measurements of N2O from water samples will verify its presence and spatial variation. The ammonium concentrations increase slowly in the upper parts of the soil but then increase more sharply at greater depth, after NO3- is depleted, suggesting that DON is the source of the produced NH4+. The production of NH4+ is presumed to be facilitated microbiologically. It is hypothesized that at higher organic carbon to total nitrogen (C:N) ratios, more NH4+ will be formed. To test this, in the experiments with Soil #2, three different inflow waters are used, listed in order of decreasing C:N ratio: STWW, STWW with NO3- added to a concentration of 80 mg

  1. Designing water demand management schemes using a socio-technical modelling approach.

    Baki, Sotiria; Rozos, Evangelos; Makropoulos, Christos

    2018-05-01

    Although it is now widely acknowledged that urban water systems (UWSs) are complex socio-technical systems and that a shift towards a socio-technical approach is critical in achieving sustainable urban water management, still, more often than not, UWSs are designed using a segmented modelling approach. As such, either the analysis focuses on the description of the purely technical sub-system, without explicitly taking into account the system's dynamic socio-economic processes, or a more interdisciplinary approach is followed, but delivered through relatively coarse models, which often fail to provide a thorough representation of the urban water cycle and hence cannot deliver accurate estimations of the hydrosystem's responses. In this work we propose an integrated modelling approach for the study of the complete socio-technical UWS that also takes into account socio-economic and climatic variability. We have developed an integrated model, which is used to investigate the diffusion of household water conservation technologies and its effects on the UWS, under different socio-economic and climatic scenarios. The integrated model is formed by coupling a System Dynamics model that simulates the water technology adoption process, and the Urban Water Optioneering Tool (UWOT) for the detailed simulation of the urban water cycle. The model and approach are tested and demonstrated in an urban redevelopment area in Athens, Greece under different socio-economic scenarios and policy interventions. It is suggested that the proposed approach can establish quantifiable links between socio-economic change and UWS responses and therefore assist decision makers in designing more effective and resilient long-term strategies for water conservation. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Domestic energy management methodology for optimizing efficiency in Smart Grids

    Molderink, Albert; Bakker, Vincent; Bosman, M.G.C.; Hurink, Johann L.; Smit, Gerardus Johannes Maria

    2009-01-01

    Increasing energy prices and the greenhouse effect lead to more awareness of energy efficiency of electricity supply. During the last years, a lot of domestic technologies have been developed to improve this efficiency. These technologies on their own already improve the efficiency, but more can be

  3. Energy efficiency drivers in Europe. Regulations and other instruments open new horizons for energy management in buildings

    Obara, H.

    2010-01-01

    Curbing climate change and global warming will be one of the major challenges of the 21. Century.The very survival of our society could be at stake. Greenhouse gases including CO 2 have been identified as the culprits and the vast majority of industrialized countries have agreed to cut emissions drastically over coming decades. Buildings account for nearly 40% of the energy used in most countries and are responsible for a similar level of global CO 2 emissions. Energy efficiency in buildings is therefore one of the keys to reducing green-house emissions. The main driving force to achieve the ambitious goals that have been set for the reduction of greenhouse gases will come from energy efficiency regulations, building codes, standards, labels, certifications, obligations and incentives, all of which have been multiplying steadily over recent decades. International institutions are rolling out energy efficiency directives and standards that set minimum requirements for buildings.They are gradually being taken into account in national regulations and building codes. Today, most energy efficiency regulations concern building design. They hardly touch on Energy Management aspects that can generate major operational gains with relatively low investments and quick payback. Beyond regulations that focus on minimum requirements, environmental performance labels use building rating criteria that can take energy efficiency much further.They offer a practical way of assigning value to energy efficiency and in this way represent powerful market drivers. Moreover, the important benefits of Energy Management can be easily integrated in the rating criteria of these far-reaching schemes. Indeed, through effective building measurement, monitoring and control systems, Energy Management is one of the keys to rapidly reducing carbon emissions and achieving climate change targets. (author)

  4. Efficient phosphorus management practices in the Everglades Agricultural Area

    Bhadha, J. H.; Lang, T. A.; Daroub, S. H.; Alvarez, O.; Tootoonchi, M.; Capasso, J.

    2016-12-01

    In the 450,000 acres of the Everglades Agricultural Area (EAA) of South Florida, farming practices have long been mindful of phosphorus (P) management as it relates to sufficiency and efficiency of P utilization. Over two decades of P best management practices have resulted in 3001 metric-ton of P load reduction from the EAA to downstream ecosystems. During the summer, more than 50,000 acres of fallow sugarcane land is available for rice production. The net value of growing flooded rice in the EAA as a rotational crop with sugarcane far exceeds its monetary return. Soil conservation, improvement in tilth and P load reduction are only some of the benefits. With no P fertilizer applied, a two-year field trial on flooded rice showed improved outflow P concentrations by up to 40% as a result of particulate setting and plant P uptake. Harvested whole grain rice can effectively remove a significant amount of P from a rice field per growing season. In parts of the EAA where soils are sandy, the application of using locally derived organic amendments as potential P fertilizer has gained interest over the past few years. The use of local agricultural and urban organic residues as amendments in sandy soils of South Florida provide options to enhance soil properties and improve sugarcane yields, while reducing waste and harmful effects of agricultural production on the environment. A lysimeter study conducted to determine the effect of mill ash and three types of biochar (rice hulls, yard waste, horse bedding) on sugarcane yields, soil properties, and drainage water quality in sandy soils showed that mill ash and rice hull biochar increased soil TP, Mehlich 3-P (M3-P), and cation exchange capacity (CEC) compared to the control. TP and M3-P content remained constant after 9 months, CEC showed a significant increase over time with rich hull biochar addition. Future projects include the utilization of aquatic vegetation, such as chara and southern naiad as bio-filters in farm

  5. Cost analysis of alternate management schemes in early stage testicular seminoma

    Sharda, Navneet N.; Kinsella, Timothy J.; Ritter, Mark A.

    1995-01-01

    Purpose: Optimal management of early stage testicular seminoma remains uncertain. Standard therapy includes inguinal orchidectomy followed by irradiation of the pelvic and para-aortic nodes. Due to the excellent survival rates (<4% seminoma specific mortality as per the Princess Margaret, Institute Goustave-Roussy experience), the option of observation following orchidectomy has been proposed, with no diminution in absolute survival noted since salvage chemotherapy is effective in the treatment of early systemic relapse. However, the intensity of follow-up required if observation is chosen will likely add an increased medical cost burden which needs to be balanced against the cost of standard treatment using radiation therapy. We have therefore performed a cost comparison between these two management strategies in order to define any differences. Methods and Materials: All costs reported are adjusted to 1994 dollars and analysis is begun immediately post-orchidectomy. The cost of observation was calculated assuming a 15% relapse rate (10%-20%) over seven years of follow-up. The follow-up schedule was assumed identical to that commonly reported in the literature (Princess Margaret, Institute Gustave-Roussy, Royal Marsden), consisting of periodic CXR, CT abd/pelvis, tumor markers and examinations. Chemotherapy costs associated with treatment of recurrences were generated from the inpatient hospital charges and physician billing of five patients who received three cycles of a standard United States regimen consisting of bleomycin, etoposide and cis-platinum in 1994. On average, four days of hospitalization were required. Radiological costs were also calculated from the actual patient billing records in 1994 and incremented at a rate of 3%/year over the length of proposed follow-up. Costs of irradiation and subsequent standard follow-up were similarly generated from the hospital charges and physician billing of five patients treated postoperatively. A 4% recurrence

  6. Risk-based assessment of the cost-efficiency and the effectivity of renewable energy support schemes: Certificate markets versus feed-in tariffs

    Fagiani, Riccardo; Barquín, Julián; Hakvoort, Rudi

    2013-01-01

    The introduction of renewable energy sources in the electricity generation mix has the potential to reduce power sector's emissions and countries' dependence on imported oil. Climate change concerns and highly volatile oil prices have attracted governments' interest and support to sustain investments in renewable energy capacity, and different support policies have been implemented in many countries around the world. This paper analyzes the effects of investors' risk aversion on the performance of support schemes. The analysis compares two policy options, a feed-in tariff mechanism with a certificate market system. Results show that while a tariff mechanism could obtain better results than a certificate market, its performance is strictly dependent on regulator choices. A certificate market instead, permits to obtain the desired level of renewable energy market share with good cost-efficiency as long as investors' risk aversion is moderate. Moreover, discounting future cash flows with higher social discount rates further benefits a certificate system making it preferable to feed-in tariffs. - Highlights: ► Paper analyzes the performance of feed-in tariffs and certificate markets. ► Model simulates the evolution of a power system considering investors' risk aversion. ► Tariffs could obtain better efficiency but also low effectiveness or over-investment. ► Barriers to entrance could result in higher certificates prices. ► Certificate performances benefit from higher social discount rates

  7. Place Branding as Efficient Management Tool for Local Government

    Rodica PETREA

    2013-12-01

    Full Text Available The economic liberalism, globalization and more recently the economic crisis are general phenomena leading to changes of territorial management practices. Within these practices, place marketing and branding are of crucial importance in promoting an image of the city and bringing some added value to a place. Although an emerging challenging problem for local authorities, few scholars are currently addressing the subject, in terms of delivering a branding modus operandi for the practitioners, be they local authorities or private agencies. The present paper conducts an in-depth analysis of the most recent writings showing how product marketing techniques apply to place marketing, with an emphasis on city branding, presenting the manner in which the place branding process was improved in two of the most representative cities of Transylvania: Sibiu and Cluj-Napoca. The paper’s main objective is to highlight the role of territorial marketing which can become, through one of its components, namely place branding, an important trigger for the local communities development by the means of strategic planning. In this respect, the present work displays an overview of some of the most illustrative theoretical models regarding city branding, an insight on the Romanian city branding process within the two aforementioned cities and, finally, some brief recommendations regarding the place and the role of branding process for local authorities. The paper assumes that although place branding is an efficient tool for promoting a territory’s identity (already proven in several European cities, Romania is at the beginning of this process. The few significant achievements (the ones from Sibiu and Cluj-Napoca being the most notable still cannot make the most of their urban identities and values, neither at national, nor at international level. Last but not least, this kind of papers might raise some awareness among local stakeholders on the importance of these

  8. A New Tool for Effective and Efficient Project Management

    Willett, Jesse A [Washington State Univ., Pullman, WA (United States)

    2011-12-01

    Organizations routinely handle thousands of projects per year, and it is difficult to manage all these projects concurrently. Too often, projects do not get the attention they need when they need it. Management inattention can lead to late projects or projects with less than desirable content and/or deliverables. This paper discusses the application of Visual Project Management (VPM) as a method to track and manage projects. The VPM approach proved to be a powerful management tool without the overhead and restrictions of traditional management methods.

  9. The role of knowledge management in raising the efficiency of pilots ...

    The role of knowledge management in raising the efficiency of pilots' performance in the ... Journal of Fundamental and Applied Sciences ... the actual knowledge management implementation in the aviation industry as well as determining the ...

  10. Transaction costs of farmers’ participation in forest management: Policy implications of payments for environmental services schemes in Vietnam

    Areeya Manasboonphempool

    2015-11-01

    Full Text Available Recent research on payments for environmental services (PES has observed that high transaction costs (TCs are incurred through the implementation of PES schemes and farmer participation. TCs incurred by households are considered to be an obstacle to the participation in and efficiency of PES policies. This study aims to understand transactions related to previous forest plantation programmes and to estimate the actual TCs incurred by farmers who participated in these programmes in a mountainous area of northwestern Vietnam. In addition, this study examines determinants of households’ TCs to test the hypothesis of whether the amount of TCs varies according to household characteristics. Results show that average TCs are not likely to be a constraint for participation since they are about 200,000 VND (USD 10 per household per contract, which is equivalent to one person’s average earnings for about two days of labour. However, TCs amount to more than one-third of the programmes’ benefits, which is relatively high compared to PES programmes in developed countries. This implies that rather than aiming to reduce TCs, an appropriate agenda for policy improvement is to balance the level of TCs with PES programme benefits to enhance the overall attractiveness of afforestation programmes for smallholder farmers. Regression analysis reveals that education, gender and perception towards PES programmes have significant effects on the magnitude of TCs. The analyses also points out the importance of local conditions on the level of TCs, with some unexpected results.

  11. A hybrid pi control scheme for airship hovering

    Ashraf, Z.; Choudhry, M.A.; Hanif, A.

    2012-01-01

    Airship provides us many attractive applications in aerospace industry including transportation of heavy payloads, tourism, emergency management, communication, hover and vision based applications. Hovering control of airship has many utilizations in different engineering fields. However, it is a difficult problem to sustain the hover condition maintaining controllability. So far, different solutions have been proposed in literature but most of them are difficult in analysis and implementation. In this paper, we have presented a simple and efficient scheme to design a multi input multi output hybrid PI control scheme for airship. It can maintain stability of the plant by rejecting disturbance inputs to ensure robustness. A control scheme based on feedback theory is proposed that uses principles of optimality with integral action for hovering applications. Simulations are carried out in MTALAB for examining the proposed control scheme for hovering in different wind conditions. Comparison of the technique with an existing scheme is performed, describing the effectiveness of control scheme. (author)

  12. Control strategy for power management, efficiency-optimization and operating-safety of a 5-kW solid oxide fuel cell system

    Zhang, Lin; Jiang, Jianhua; Cheng, Huan; Deng, Zhonghua; Li, Xi

    2015-01-01

    Highlights: • Efficiency optimization associated with simultaneous power and thermal management. • Fast load tracing, fuel starvation, high efficiency and operating safety are considered. • Open loop pre-conditioning current strategy is proposed for load step-up transients. • Feedback control scheme is proposed for load step-up transients. - Abstract: The slow power tracking, operating safety, especially the fuel exhaustion, and high efficiency considerations are the key issues for integrated solid oxide fuel cell (SOFC) systems during power step up transients, resulting in the relatively poor dynamic capabilities and make the transient load following very challenging and must be enhanced. To this end, this paper first focus on addressing the efficiency optimization associated with simultaneous power and thermal management of a 5-kW SOFC system. Particularly, a traverse optimization process including cubic convolution interpolation algorithm are proposed to obtain optimal operating points (OOPs) with the maximum efficiency. Then this paper investigate the current implications on system step-up transient performance, then a two stage pre-conditioning current strategy and a feedback power reference control scheme is proposed for load step-up transients to balance fast load following and fuel starvation, after that safe thermal transient is validated. Simulation results show the efficacy of the control design by demonstrating the fast load following ability while maintaining the safe operation, thus safe; efficient and fast load transition can be achieved

  13. An Efficient, Semi-implicit Pressure-based Scheme Employing a High-resolution Finitie Element Method for Simulating Transient and Steady, Inviscid and Viscous, Compressible Flows on Unstructured Grids

    Richard C. Martineau; Ray A. Berry

    2003-04-01

    equation in the PCICE-FEM scheme is provided with sufficient internal energy information to avoid iteration. The ability of the PCICE-FEM scheme to accurately and efficiently simulate a wide variety of inviscid and viscous compressible flows is demonstrated here.

  14. Construction of a knowledge classification scheme for sharing and usage of knowledge

    Yoo, Jae Bok; Oh, Jeong Hoon; Lee, Ji Ho; Ko, Young Chul

    2003-12-01

    To efficiently share knowledge among our members on the basis of knowledge management system, first of all, we need to systematically design the knowledge classification scheme that we can classify these knowledge well. The objective of this project is to construct the most suitable knowledge classification scheme that all of us can share them in Korea Atomic Energy Research Institute(KAERI). To construct the knowledge classification scheme all over the our organization, we established a few principles to design it and examined related many classification schemes. And we carried out 3 steps to complete the best desirable KAERI's knowledge classification scheme, that is, 1) the step to design a draft of the knowledge classification scheme, 2) the step to revise a draft of the knowledge classification scheme, 3) the step to verify the revised scheme and to decide its scheme. The scheme completed as a results of this project is consisted of total 218 items, that is, sections of 8 items, classes of 43 items and sub-classes of 167 items. We expect that the knowledge classification scheme designed as the results of this project can be played an important role as the frame to share knowledge among our members when we introduce knowledge management system in our organization. In addition, we expect that methods to design its scheme as well as this scheme itself can be applied when design a knowledge classification scheme at the other R and D institutes and enterprises

  15. Radio resource management scheme and outage analysis for network-assisted multi-hop D2D communications

    Leila Melki; Sameh Najeh; Hichem Besbes

    2016-01-01

    In a cellular network it's very difficult to make spectrum resource more efficiently. Device-to-Device (D2D) technology enables new service opportunities, and provides high throughput and reliable communication while reducing the base station load. For better total performance, short-range D2D links and cellular links share the same radio resource and the management of interference becomes a crucial task. Here we argue that single-hop D2D technology can be used to further improve cellular net...

  16. Saving, efficiency and management of electric sector demand

    Sanchez de Tembleque, L. J.

    2007-01-01

    Spanish economic model of development is based on energy consumption, and its main source is imported fossil fuels, which have some environmental and scarcity consequences in the mid term, among others. These problems could be reduced in two ways: economic activity reduction or energy efficiency improvement. In the presence of these possibilities, It may be desirable to bet for saving and energy efficiency, to maintain the economic development. This assignment analyzes the main available regulatory and social mechanisms to promote saving and energy efficiency in the power sector, like systems to internalize social costs in the electricity price, efficiency standards, and encourage the new saving culture. (Author) 15 refs

  17. The scheme optimization and management innovation for the first containment integrated in-service test of nuclear power plant

    Wang Haiwei; Yang Gang

    2014-01-01

    The containment integrated test is a large-scale, high risk and very difficult test in pressurized water reactor nuclear power plants. By simulating peak pressure inside the containment in DESIGN-BASIS accident conditions, measuring the total leakage rate of the containment with the peak pressure, and implementing the structure inspection test on several pressure levels, the containment's performance can be verified. Containment integrated test is an important witness point supervised by NNSA. The test results crucially decide the reactor to be started or not. The containment integrated test in 301 overhaul is the first in-service test of Unit 3. By the experience of the same 6 former tests in Qinshan Second Nuclear Power Plant and the feedback from other plants, the test scheme get more scientific and the organization management more standardized. This article discusses the containment integrated test in 301 overhaul and summarizes the experience to provide some references for the following containment integrated tests in the future. (authors)

  18. Towards a standard licensing scheme for the access and use of satellite earth observation data for disaster management

    Clark, Nathan E.

    2017-10-01

    This paper explores from the view of the data recipient and user the complexities of creating a common licensing scheme for the access and use of satellite earth observation (EO) data in international disaster management (DM) activities. EO data contributions in major disaster events often involve numerous data providers with separate licensing mechanisms for controlling the access, uses, and distribution of data by the end users. A lack of standardization among the terminology, wording, and conditions within these licenses creates a complex legal environment for users, and often prevents them from using, sharing and combining datasets in an effective and timely manner. It also creates uncertainty among data providers as to the types of licensing controls that should be applied in disaster scenarios. This paper builds from an ongoing comparative analysis of the common and conflicting conditions among data licenses that must be addressed in order to facilitate easier access and use of EO data within the DM sector and offers recommendations towards the alignment of the structural and technical aspects of licenses among data providers.

  19. A Computer Clone of Human Expert for Mobility Management Scheme (E-MMS): Step toward Green Transportation

    Resdiansyah; O. K Rahmat, R. A.; Ismail, A.

    2018-03-01

    Green transportation refers to a sustainable transport that gives the least impact in terms of social and environmental but at the same time is able to supply energy sources globally that includes non-motorized transport strategies deployment to promote healthy lifestyles, also known as Mobility Management Scheme (MMS). As construction of road infrastructure cannot help solve the problem of congestion, past research has shown that MMS is an effective measure to mitigate congestion and to achieve green transportation. MMS consists of different strategies and policies that subdivided into categories according to how they are able to influence travel behaviour. Appropriate selection of mobility strategies will ensure its effectiveness in mitigating congestion problems. Nevertheless, determining appropriate strategies requires human expert and depends on a number of success factors. This research has successfully developed a computer clone system based on human expert, called E-MMS. The process of knowledge acquisition for MMS strategies and the next following process to selection of strategy has been encode in a knowledge-based system using a shell expert system. The newly developed computer cloning system was successfully verified, validated and evaluated (VV&E) by comparing the result output with the real transportation expert recommendation in which the findings suggested Introduction

  20. Efficient Power Scheduling in Smart Homes Using Hybrid Grey Wolf Differential Evolution Optimization Technique with Real Time and Critical Peak Pricing Schemes

    Muqaddas Naz

    2018-02-01

    Full Text Available With the emergence of automated environments, energy demand by consumers is increasing rapidly. More than 80% of total electricity is being consumed in the residential sector. This brings a challenging task of maintaining the balance between demand and generation of electric power. In order to meet such challenges, a traditional grid is renovated by integrating two-way communication between the consumer and generation unit. To reduce electricity cost and peak load demand, demand side management (DSM is modeled as an optimization problem, and the solution is obtained by applying meta-heuristic techniques with different pricing schemes. In this paper, an optimization technique, the hybrid gray wolf differential evolution (HGWDE, is proposed by merging enhanced differential evolution (EDE and gray wolf optimization (GWO scheme using real-time pricing (RTP and critical peak pricing (CPP. Load shifting is performed from on-peak hours to off-peak hours depending on the electricity cost defined by the utility. However, there is a trade-off between user comfort and cost. To validate the performance of the proposed algorithm, simulations have been carried out in MATLAB. Results illustrate that using RTP, the peak to average ratio (PAR is reduced to 53.02%, 29.02% and 26.55%, while the electricity bill is reduced to 12.81%, 12.012% and 12.95%, respectively, for the 15-, 30- and 60-min operational time interval (OTI. On the other hand, the PAR and electricity bill are reduced to 47.27%, 22.91%, 22% and 13.04%, 12%, 11.11% using the CPP tariff.