WorldWideScience

Sample records for one-way fsi scheme

  1. On the sub-model errors of a generalized one-way coupling scheme for linking models at different scales

    Science.gov (United States)

    Zeng, Jicai; Zha, Yuanyuan; Zhang, Yonggen; Shi, Liangsheng; Zhu, Yan; Yang, Jinzhong

    2017-11-01

    Multi-scale modeling of the localized groundwater flow problems in a large-scale aquifer has been extensively investigated under the context of cost-benefit controversy. An alternative is to couple the parent and child models with different spatial and temporal scales, which may result in non-trivial sub-model errors in the local areas of interest. Basically, such errors in the child models originate from the deficiency in the coupling methods, as well as from the inadequacy in the spatial and temporal discretizations of the parent and child models. In this study, we investigate the sub-model errors within a generalized one-way coupling scheme given its numerical stability and efficiency, which enables more flexibility in choosing sub-models. To couple the models at different scales, the head solution at parent scale is delivered downward onto the child boundary nodes by means of the spatial and temporal head interpolation approaches. The efficiency of the coupling model is improved either by refining the grid or time step size in the parent and child models, or by carefully locating the sub-model boundary nodes. The temporal truncation errors in the sub-models can be significantly reduced by the adaptive local time-stepping scheme. The generalized one-way coupling scheme is promising to handle the multi-scale groundwater flow problems with complex stresses and heterogeneity.

  2. Faithful One-way Trip Deterministic Secure Quantum Communication Scheme Against Collective Rotating Noise Based on Order Rearrangement of Photon Pairs

    Science.gov (United States)

    Yuan, Hao; Zhang, Qin; Hong, Liang; Yin, Wen-jie; Xu, Dong

    2014-08-01

    We present a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel. Four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In this scheme, the information carriers transmite over the quantum channel only one time, which can effectively reduce the influence of other noise existing in quantum channel. The information receiver need only perform two single-photon collective measurements to decode the secret messages, which can make the present scheme more convenient in practical application. It will be showed that our scheme has a relatively high information capacity and intrisic efficiency. Foremostly, the decoy photon pair checking technique and the order rearrangement of photon pairs technique guarantee that the present scheme is unconditionally secure.

  3. One-way shared memory

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2018-01-01

    Standard multicore processors use the shared main memory via the on-chip caches for communication between cores. However, this form of communication has two limitations: (1) it is hardly time-predictable and therefore not a good solution for real-time systems and (2) this single shared memory...... is a bottleneck in the system. This paper presents a communication architecture for time-predictable multicore systems where core-local memories are distributed on the chip. A network-on-chip constantly copies data from a sender core-local memory to a receiver core-local memory. As this copying is performed...... in one direction we call this architecture a one-way shared memory. With the use of time-division multiplexing for the memory accesses and the network-on-chip routers we achieve a time-predictable solution where the communication latency and bandwidth can be bounded. An example architecture for a 3...

  4. Fermionic One-Way Quantum Computation

    International Nuclear Information System (INIS)

    Cao Xin; Shang Yun

    2014-01-01

    Fermions, as another major class of quantum particles, could be taken as carriers for quantum information processing beyond spins or bosons. In this work, we consider the fermionic generalization of the one-way quantum computation model and find that one-way quantum computation can also be simulated with fermions. In detail, using the n → 2n encoding scheme from a spin system to a fermion system, we introduce the fermionic cluster state, then the universal computing power with a fermionic cluster state is demonstrated explicitly. Furthermore, we show that the fermionic cluster state can be created only by measurements on at most four modes with |+〉 f (fermionic Bell state) being free

  5. One-Way Fluid-Structure Interaction Simulation of an Offshore Wind Turbine

    Directory of Open Access Journals (Sweden)

    Zhi-Kui Wang

    2014-07-01

    Full Text Available The Fluid-Structure Interaction (FSI has gained great interest of scholars recently, meanwhile, extensive studies have been conducted by the virtue of numerical methods which have been implemented on wind turbine models. The blades of a wind turbine have been gained a deep insight into the FSI analyses, however, few studies have been conducted on the tower and nacelle, which are key components of the wind turbine, using this method. We performed the one-way FSI analysis on a 2-MW offshore wind turbine, using the Finite Volume Method (FVM with ANSYS CFX solver and the RNG k-ε turbulence model, to achieve a comprehensive cognition of it. The grid convergence was studied and verified in this study, and the torque value is chosen to determine the optimal case. The superior case, which was chosen to conduct the FSI analysis, with a relative error is only 2.15%, thus, the accuracy of results is credible.

  6. Residual stresses analysis of friction stir welding using one-way FSI simulation

    International Nuclear Information System (INIS)

    Kang, Sung Wook; Jang, Beom Seon; Song, Ha Cheol

    2015-01-01

    When certain mechanisms, such as plastic deformations and temperature gradients, occur and are released in a structure, stresses remain because of the shape of the structure and external constraints. These stresses are referred to as residual stresses. The base material locally expands during heating in the welding process. When the welding is completed and cooled to room temperature, the residual stresses are left at nearly the yield strength level. In the case of friction stir welding, the maximum temperature is 80% to 90% of the melting point of the materials. Thus, the residual stresses in the welding process are smaller than those in other fusion welding processes; these stresses have not been considered previously. However, friction stir welding residual stresses are sometimes measured at approximately 70% or above. These residual stresses significantly affect fatigue behavior and lifetime. The present study investigates the residual stress distributions in various welding conditions and shapes of friction stir welding. In addition, the asymmetric feature is considered in temperature and residual stress distribution. Heat transfer analysis is conducted using the commercial computational fluid dynamics program Fluent, and results are used in the finite element structural analysis with the ANSYS Multiphysics software. The calculated residual stresses are compared with experimental values using the X-ray diffraction method.

  7. Development of strongly coupled FSI technology involving thin walled structures

    CSIR Research Space (South Africa)

    Suliman, Ridhwaan

    2011-01-01

    Full Text Available A strongly coupled finite volume-finite element fluid-structure interaction (FSI) scheme is developed. Both an edge-based finite volume and Galerkin finite element scheme are implemented and evaluated for modelling the mechanics of solids...

  8. One-way entangled-photon autocompensating quantum cryptography

    Science.gov (United States)

    Walton, Zachary D.; Abouraddy, Ayman F.; Sergienko, Alexander V.; Saleh, Bahaa E.; Teich, Malvin C.

    2003-06-01

    A quantum cryptography implementation is presented that uses entanglement to combine one-way operation with an autocompensating feature that has hitherto only been available in implementations that require the signal to make a round trip between the users. Using the concept of advanced waves, it is shown that this proposed implementation is related to the round-trip implementation in the same way that Ekert’s two-particle scheme is related to the original one-particle scheme of Bennett and Brassard. The practical advantages and disadvantages of the proposed implementation are discussed in the context of existing schemes.

  9. One-way entangled-photon autocompensating quantum cryptography

    International Nuclear Information System (INIS)

    Walton, Zachary D.; Abouraddy, Ayman F.; Sergienko, Alexander V.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2003-01-01

    A quantum cryptography implementation is presented that uses entanglement to combine one-way operation with an autocompensating feature that has hitherto only been available in implementations that require the signal to make a round trip between the users. Using the concept of advanced waves, it is shown that this proposed implementation is related to the round-trip implementation in the same way that Ekert's two-particle scheme is related to the original one-particle scheme of Bennett and Brassard. The practical advantages and disadvantages of the proposed implementation are discussed in the context of existing schemes

  10. A fault-tolerant one-way quantum computer

    International Nuclear Information System (INIS)

    Raussendorf, R.; Harrington, J.; Goyal, K.

    2006-01-01

    We describe a fault-tolerant one-way quantum computer on cluster states in three dimensions. The presented scheme uses methods of topological error correction resulting from a link between cluster states and surface codes. The error threshold is 1.4% for local depolarizing error and 0.11% for each source in an error model with preparation-, gate-, storage-, and measurement errors

  11. One way quantum repeaters with quantum Reed-Solomon codes

    OpenAIRE

    Muralidharan, Sreraman; Zou, Chang-Ling; Li, Linshu; Jiang, Liang

    2018-01-01

    We show that quantum Reed-Solomon codes constructed from classical Reed-Solomon codes can approach the capacity on the quantum erasure channel of $d$-level systems for large dimension $d$. We study the performance of one-way quantum repeaters with these codes and obtain a significant improvement in key generation rate compared to previously investigated encoding schemes with quantum parity codes and quantum polynomial codes. We also compare the three generation of quantum repeaters using quan...

  12. One-way EPR steering and genuine multipartite EPR steering

    Science.gov (United States)

    He, Qiongyi; Reid, Margaret D.

    2012-11-01

    We propose criteria and experimental strategies to realise the Einstein-Podolsky-Rosen (EPR) steering nonlocality. One-way steering can be obtained where there is asymmetry of thermal noise on each system. We also present EPR steering inequalities that act as signatures and suggest how to optimise EPR correlations in specific schemes so that the genuine multipartite EPR steering nonlocality (EPR paradox) can also possibly be realised. The results presented here also apply to the spatially separated macroscopic atomic ensembles.

  13. Efficient Constructions for One-way Hash Chains

    National Research Council Canada - National Science Library

    Hu, Yih-Chun; Jakobsson, Markus; Perrig, Adrian

    2003-01-01

    .... Our first construction, the Sandwich-chain, provides a smaller bandwidth overhead for one-way chain values, and enables efficient verification of one-way chain values if the trusted one-way chain value is far away...

  14. DTK C/Fortran Interface Development for NEAMS FSI Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Slattery, Stuart R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Lebrun-Grandie, Damien T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-09-19

    This report documents the development of DataTransferKit (DTK) C and Fortran interfaces for fluid-structure-interaction (FSI) simulations in NEAMS. In these simulations, the codes Nek5000 and Diablo are being coupled within the SHARP framework to study flow-induced vibration (FIV) in reactor steam generators. We will review the current Nek5000/Diablo coupling algorithm in SHARP and the current state of the solution transfer scheme used in this implementation. We will then present existing DTK algorithms which may be used instead to provide an improvement in both flexibility and scalability of the current SHARP implementation. We will show how these can be used within the current FSI scheme using a new set of interfaces to the algorithms developed by this work. These new interfaces currently expose the mesh-free solution transfer algorithms in DTK, a C++ library, and are written in C and Fortran to enable coupling of both Nek5000 and Diablo in their native Fortran language. They have been compiled and tested on Cooley, the test-bed machine for Mira at ALCF.

  15. Efficient one-way quantum computations for quantum error correction

    International Nuclear Information System (INIS)

    Huang Wei; Wei Zhaohui

    2009-01-01

    We show how to explicitly construct an O(nd) size and constant quantum depth circuit which encodes any given n-qubit stabilizer code with d generators. Our construction is derived using the graphic description for stabilizer codes and the one-way quantum computation model. Our result demonstrates how to use cluster states as scalable resources for many multi-qubit entangled states and how to use the one-way quantum computation model to improve the design of quantum algorithms.

  16. Robust and scalable optical one-way quantum computation

    International Nuclear Information System (INIS)

    Wang Hefeng; Yang Chuiping; Nori, Franco

    2010-01-01

    We propose an efficient approach for deterministically generating scalable cluster states with photons. This approach involves unitary transformations performed on atoms coupled to optical cavities. Its operation cost scales linearly with the number of qubits in the cluster state, and photon qubits are encoded such that single-qubit operations can be easily implemented by using linear optics. Robust optical one-way quantum computation can be performed since cluster states can be stored in atoms and then transferred to photons that can be easily operated and measured. Therefore, this proposal could help in performing robust large-scale optical one-way quantum computation.

  17. Efficient quantum circuits for one-way quantum computing.

    Science.gov (United States)

    Tanamoto, Tetsufumi; Liu, Yu-Xi; Hu, Xuedong; Nori, Franco

    2009-03-13

    While Ising-type interactions are ideal for implementing controlled phase flip gates in one-way quantum computing, natural interactions between solid-state qubits are most often described by either the XY or the Heisenberg models. We show an efficient way of generating cluster states directly using either the imaginary SWAP (iSWAP) gate for the XY model, or the sqrt[SWAP] gate for the Heisenberg model. Our approach thus makes one-way quantum computing more feasible for solid-state devices.

  18. Water hammer (with FSI): exact solution : parallelization and application

    NARCIS (Netherlands)

    Loh, K.; Tijsseling, A.S.

    2014-01-01

    The 1D fully coupled Fluid-Structure Interaction (FSI) model can adequately describe the water hammer effect on the fluid, and the structural behaviour of the pipe. This paper attempts to increase the capability of using an exact solution of the 1D FSI problem applied to a straight pipe with a

  19. One-way quantum computing in superconducting circuits

    Science.gov (United States)

    Albarrán-Arriagada, F.; Alvarado Barrios, G.; Sanz, M.; Romero, G.; Lamata, L.; Retamal, J. C.; Solano, E.

    2018-03-01

    We propose a method for the implementation of one-way quantum computing in superconducting circuits. Measurement-based quantum computing is a universal quantum computation paradigm in which an initial cluster state provides the quantum resource, while the iteration of sequential measurements and local rotations encodes the quantum algorithm. Up to now, technical constraints have limited a scalable approach to this quantum computing alternative. The initial cluster state can be generated with available controlled-phase gates, while the quantum algorithm makes use of high-fidelity readout and coherent feedforward. With current technology, we estimate that quantum algorithms with above 20 qubits may be implemented in the path toward quantum supremacy. Moreover, we propose an alternative initial state with properties of maximal persistence and maximal connectedness, reducing the required resources of one-way quantum computing protocols.

  20. One-way Ponderomotive Barrier in a Uniform Magnetic Field

    International Nuclear Information System (INIS)

    Dodin, I.Y.; Fisch, N.J.

    2005-01-01

    The possibility of an asymmetric ponderomotive barrier in a nonuniform dc magnetic field by high-frequency radiation near the cyclotron resonance for selected plasma species was contemplated in Physics of Plasmas 11 (November 2004) 5046-5064. Here we show that a similar one-way barrier, which reflects particles incident from one side while transmitting those incident from the opposite side, can be produced also in a uniform magnetic field, entirely due to inhomogeneity of high-frequency drive

  1. Modified one-way coupled map lattices as communication cryptosystems

    International Nuclear Information System (INIS)

    Zhao Mingchao; Li Kezan; Fu Xinchu

    2009-01-01

    In this paper, we modify the original communication cryptosystem based on OCML (one-way coupled map lattices), and present a modified OCML communication cryptosystem. The modified OCML communication cryptosystem is shown to have some additional advantages compared to the original one, e.g., it has a larger parameter space, and is more capable of anti-error analysis. And, we apply this modified OCML communication cryptosystem for multiplex OCML communication.

  2. Fundamentals of universality in one-way quantum computation

    International Nuclear Information System (INIS)

    Nest, M van den; Duer, W; Miyake, A; Briegel, H J

    2007-01-01

    In this paper, we build a framework allowing for a systematic investigation of the fundamental issue: 'Which quantum states serve as universal resources for measurement-based (one-way) quantum computation?' We start our study by re-examining what is exactly meant by 'universality' in quantum computation, and what the implications are for universal one-way quantum computation. Given the framework of a measurement-based quantum computer, where quantum information is processed by local operations only, we find that the most general universal one-way quantum computer is one which is capable of accepting arbitrary classical inputs and producing arbitrary quantum outputs-we refer to this property as CQ-universality. We then show that a systematic study of CQ-universality in one-way quantum computation is possible by identifying entanglement features that are required to be present in every universal resource. In particular, we find that a large class of entanglement measures must reach its supremum on every universal resource. These insights are used to identify several families of states as being not universal, such as one-dimensional (1D) cluster states, Greenberger-Horne-Zeilinger (GHZ) states, W states, and ground states of non-critical 1D spin systems. Our criteria are strengthened by considering the efficiency of a quantum computation, and we find that entanglement measures must obey a certain scaling law with the system size for all efficient universal resources. This again leads to examples of non-universal resources, such as, e.g. ground states of critical 1D spin systems. On the other hand, we provide several examples of efficient universal resources, namely graph states corresponding to hexagonal, triangular and Kagome lattices. Finally, we consider the more general notion of encoded CQ-universality, where quantum outputs are allowed to be produced in an encoded form. Again we provide entanglement-based criteria for encoded universality. Moreover, we present a

  3. One-way spatial integration of hyperbolic equations

    Science.gov (United States)

    Towne, Aaron; Colonius, Tim

    2015-11-01

    In this paper, we develop and demonstrate a method for constructing well-posed one-way approximations of linear hyperbolic systems. We use a semi-discrete approach that allows the method to be applied to a wider class of problems than existing methods based on analytical factorization of idealized dispersion relations. After establishing the existence of an exact one-way equation for systems whose coefficients do not vary along the axis of integration, efficient approximations of the one-way operator are constructed by generalizing techniques previously used to create nonreflecting boundary conditions. When physically justified, the method can be applied to systems with slowly varying coefficients in the direction of integration. To demonstrate the accuracy and computational efficiency of the approach, the method is applied to model problems in acoustics and fluid dynamics via the linearized Euler equations; in particular we consider the scattering of sound waves from a vortex and the evolution of hydrodynamic wavepackets in a spatially evolving jet. The latter problem shows the potential of the method to offer a systematic, convergent alternative to ad hoc regularizations such as the parabolized stability equations.

  4. A one-way text messaging intervention for obesity.

    Science.gov (United States)

    Ahn, Ahleum; Choi, Jaekyung

    2016-04-01

    Worldwide, there has been a startling increase in the number of people who are obese or overweight. Obesity increases the risk of cardiovascular disease and overall mortality. Mobile phone messaging is an important means of human communication globally. Because the mobile phone can be used anywhere at any time, mobile phone messaging has the potential to manage obesity. We investigated the effectiveness of a one-way text messaging intervention for obesity. Participants' body mass index and waist circumference were measured at the beginning of the programme and again after 12 weeks. The text message group received text messages about exercise, dietary intake, and general information about obesity three times a week, while the control group did not receive any text messages from the study. Of the 80 participants, 25 subjects in the text message group and 29 participants in the control group completed the study. After adjusting for baseline body mass index, the body mass index was significantly lower in the text message group than in the control group (27.9 vs. 28.3; p = 0.02). After adjusting for the baseline waist circumference, the difference of waist circumference between the text message group and control group was not significant (93.4 vs. 94.6; p = 0.13). The one-way text messaging intervention was a simple and effective way to manage obesity. The one-way text messaging intervention may be a useful method for lifestyle modification in obese subjects. © The Author(s) 2015.

  5. Study on stress characteristics of Francis hydraulic turbine runner based on two-way FSI

    International Nuclear Information System (INIS)

    Zhu, W R; Xiao, R F; Yang, W; Wang, F J; Liu, J

    2012-01-01

    In recent years, cracking phenomenon occurs in many large-sized turbines both nationally and internationally, which has threatened the stable operation of hydraulic turbines. Consequently, Stress characteristics calculation and analysis of a Francis hydraulic turbine runner by application of fluid-structure interaction (FSI) technology become significantly important. In order to introduce two-way coupling technology to hydraulic machinery, two-way FSI technology is applied in this article to calculate and analyze stress characteristics. Through coordinate system transformation, the continuity equations and Navier-Stokes equations in the Cartesian coordinates system are firstly transformed to ALE coordinates system. The fluid field control equations are then constructed and discrete equations can be obtained by using flow-condition-based interpolation (FBIC-C). The structure static mechanics equations used are established in rotation coordinate system, and modeled with the finite method. Two-way coupling is computed by using iteration method. The fluid equations and structure equations are iterated until coupling coefficients converge. According to structure result, the maximum stress, displacement as well as its location can be found. As a result, the most easily wear position can be discovered which provides valuable basis for optimized design and stable operation of Francis hydraulic turbines. After comparing the results with that of one-way coupling, it is discovered that displacements is the key factors which affects the results of one-way and two-way coupling.

  6. Tag-KEM from Set Partial Domain One-Way Permutations

    Science.gov (United States)

    Abe, Masayuki; Cui, Yang; Imai, Hideki; Kurosawa, Kaoru

    Recently a framework called Tag-KEM/DEM was introduced to construct efficient hybrid encryption schemes. Although it is known that generic encode-then-encrypt construction of chosen ciphertext secure public-key encryption also applies to secure Tag-KEM construction and some known encoding method like OAEP can be used for this purpose, it is worth pursuing more efficient encoding method dedicated for Tag-KEM construction. This paper proposes an encoding method that yields efficient Tag-KEM schemes when combined with set partial one-way permutations such as RSA and Rabin's encryption scheme. To our knowledge, this leads to the most practical hybrid encryption scheme of this type. We also present an efficient Tag-KEM which is CCA-secure under general factoring assumption rather than Blum factoring assumption.

  7. Experimental all-optical one-way quantum computing

    International Nuclear Information System (INIS)

    Prevedel, R.

    2009-01-01

    In recent years, the relatively new field of quantum information processing (QIP) has attracted the attention of many scientists around the world due to its promise of increased computational speed, absolute secure communication and the potential to simulate complex quantum mechanical systems. The very essence of this new quantum information technology are two concepts at the very heart of quantum mechanics, namely superposition and entanglement. The present Thesis contains the results of four different experiments that were all aimed at the demonstration of an entirely new model for quantum computing with linear optics, the 'one-way' quantum computer. For this purpose a multi-photon entangled state of four photons has been generated via the process of spontaneous parametric down-conversion and by using an interferometric setup. This entangled state acts as a resource that allowed for novel demonstrations of quantum algorithms and relevant experimental techniques. By exploiting the advances developed in both theory and experiment, in this Thesis we report the implementation of fast, active feed-forward that allowed, for the first time, the realization of deterministic linear optics quantum computing at an unprecedented speed. Further we were able to demonstrate the Deutsch algorithm on our one-way quantum computer, an important quantum algorithm that is capable of distinguishing whether a function is constant or balanced. Classically one needs to query the algorithm at least 2N/2 + 1 times for an N-bit binary input string, however, in the quantum regime, this can be done with one evaluation of the algorithm, independent of the size of the input. In another experiment we succeeded in playing an instance of a quantum game - the so-called Prisoner's dilemma - on our one-way quantum computer. Playing such a game is essentially the execution of a quantum algorithm made up of a distinct set of one- and two-qubit gates. This allows the individual players to increase their

  8. Acoustic topological insulator and robust one-way sound transport

    Science.gov (United States)

    He, Cheng; Ni, Xu; Ge, Hao; Sun, Xiao-Chen; Chen, Yan-Bin; Lu, Ming-Hui; Liu, Xiao-Ping; Chen, Yan-Feng

    2016-12-01

    Topological design of materials enables topological symmetries and facilitates unique backscattering-immune wave transport. In airborne acoustics, however, the intrinsic longitudinal nature of sound polarization makes the use of the conventional spin-orbital interaction mechanism impossible for achieving band inversion. The topological gauge flux is then typically introduced with a moving background in theoretical models. Its practical implementation is a serious challenge, though, due to inherent dynamic instabilities and noise. Here we realize the inversion of acoustic energy bands at a double Dirac cone and provide an experimental demonstration of an acoustic topological insulator. By manipulating the hopping interaction of neighbouring ’atoms’ in this new topological material, we successfully demonstrate the acoustic quantum spin Hall effect, characterized by robust pseudospin-dependent one-way edge sound transport. Our results are promising for the exploration of new routes for experimentally studying topological phenomena and related applications, for example, sound-noise reduction.

  9. Application of one-way ANOVA in completely randomized experiments

    Science.gov (United States)

    Wahid, Zaharah; Izwan Latiff, Ahmad; Ahmad, Kartini

    2017-12-01

    This paper describes an application of a statistical technique one-way ANOVA in completely randomized experiments with three replicates. This technique was employed to a single factor with four levels and multiple observations at each level. The aim of this study is to investigate the relationship between chemical oxygen demand index and location on-sites. Two different approaches are employed for the analyses; critical value and p-value. It also presents key assumptions of the technique to be satisfied by the data in order to obtain valid results. Pairwise comparisons by Turkey method are also considered and discussed to determine where the significant differences among the means is after the ANOVA has been performed. The results revealed that there are statistically significant relationship exist between the chemical oxygen demand index and the location on-sites.

  10. A geometry-adaptive IB-LBM for FSI problems at moderate and high Reynolds numbers

    Science.gov (United States)

    Tian, Fangbao; Xu, Lincheng; Young, John; Lai, Joseph C. S.

    2017-11-01

    An FSI framework combining the LBM and an improved IBM is introduced for FSI problems at moderate and high Reynolds numbers. In this framework, the fluid dynamics is obtained by the LBM. The FSI boundary conditions are handled by an improved IBM based on the feedback scheme where the feedback coefficient is mathematically derived and explicitly approximated. The Lagrangian force is divided into two parts: one is caused by the mismatching of the flow velocity and the boundary velocity at previous time step, and the other is caused by the boundary acceleration. Such treatment significantly enhances the numerical stability. A geometry-adaptive refinement is applied to provide fine resolution around the immersed geometries. The overlapping grids between two adjacent refinements consist of two layers. The movement of fluid-structure interfaces only causes adding or removing grids at the boundaries of refinements. Finally, the classic Smagorinsky large eddy simulation model is incorporated into the framework to model turbulent flows at relatively high Reynolds numbers. Several validation cases are conducted to verify the accuracy and fidelity of the present solver over a range of Reynolds numbers. Mr L. Xu acknowledges the support of the University International Postgraduate Award by University of New South Wales. Dr. F.-B. Tian is the recipient of an Australian Research Council Discovery Early Career Researcher Award (Project Number DE160101098).

  11. Delay or anticipatory synchronization in one-way coupled systems ...

    Indian Academy of Sciences (India)

    1Department of Physics, Indian Institute of Science Education and Research, Pune 411 ... Synchronization; variable time delay; time delay systems; secure communication. .... scheme can be defined as y(t − τ2) = x(t − τ1) or y(t) = x(t − τ1 + τ2).

  12. Acoustic one-way mode conversion and transmission by sonic crystal waveguides

    Science.gov (United States)

    Ouyang, Shiliang; He, Hailong; He, Zhaojian; Deng, Ke; Zhao, Heping

    2016-09-01

    We proposed a scheme to achieve one-way acoustic propagation and even-odd mode switching in two mutually perpendicular sonic crystal waveguides connected by a resonant cavity. The even mode in the entrance waveguide is able to switch to the odd mode in the exit waveguide through a symmetry match between the cavity resonant modes and the waveguide modes. Conversely, the odd mode in the exit waveguide is unable to be converted into the even mode in the entrance waveguide as incident waves and eigenmodes are mismatched in their symmetries at the waveguide exit. This one-way mechanism can be applied to design an acoustic diode for acoustic integration devices and can be used as a convertor of the acoustic waveguide modes.

  13. Observation of one-way Einstein-Podolsky-Rosen steering

    Science.gov (United States)

    Händchen, Vitus; Eberle, Tobias; Steinlechner, Sebastian; Samblowski, Aiko; Franz, Torsten; Werner, Reinhard F.; Schnabel, Roman

    2012-09-01

    The distinctive non-classical features of quantum physics were first discussed in the seminal paper by A. Einstein, B. Podolsky and N. Rosen (EPR) in 1935. In his immediate response, E. Schrödinger introduced the notion of entanglement, now seen as the essential resource in quantum information as well as in quantum metrology. Furthermore, he showed that at the core of the EPR argument is a phenomenon that he called steering. In contrast to entanglement and violations of Bell's inequalities, steering implies a direction between the parties involved. Recent theoretical works have precisely defined this property, but the question arose as to whether there are bipartite states showing steering only in one direction. Here, we present an experimental realization of two entangled Gaussian modes of light that in fact shows the steering effect in one direction but not in the other. The generated one-way steering gives a new insight into quantum physics and may open a new field of applications in quantum information.

  14. Mathematical investigation of one-way transform matrix options

    International Nuclear Information System (INIS)

    Cooper, James Arlin

    2006-01-01

    One-way transforms have been used in weapon systems processors since the mid- to late-1970s in order to help recognize insertion of correct pre-arm information while maintaining abnormal-environment safety. Level-One, Level-Two, and Level-Three transforms have been designed. The Level-One and Level-Two transforms have been implemented in weapon systems, and both of these transforms are equivalent to matrix multiplication applied to the inserted information. The Level-Two transform, utilizing a 6 x 6 matrix, provided the basis for the ''System 2'' interface definition for Unique-Signal digital communication between aircraft and attached weapons. The investigation described in this report was carried out to find out if there were other size matrices that would be equivalent to the 6 x 6 Level-Two matrix. One reason for the investigation was to find out whether or not other dimensions were possible, and if so, to derive implementation options. Another important reason was to more fully explore the potential for inadvertent inversion. The results were that additional implementation methods were discovered, but no inversion weaknesses were revealed

  15. The Laguerre finite difference one-way equation solver

    Science.gov (United States)

    Terekhov, Andrew V.

    2017-05-01

    This paper presents a new finite difference algorithm for solving the 2D one-way wave equation with a preliminary approximation of a pseudo-differential operator by a system of partial differential equations. As opposed to the existing approaches, the integral Laguerre transform instead of Fourier transform is used. After carrying out the approximation of spatial variables it is possible to obtain systems of linear algebraic equations with better computing properties and to reduce computer costs for their solution. High accuracy of calculations is attained at the expense of employing finite difference approximations of higher accuracy order that are based on the dispersion-relationship-preserving method and the Richardson extrapolation in the downward continuation direction. The numerical experiments have verified that as compared to the spectral difference method based on Fourier transform, the new algorithm allows one to calculate wave fields with a higher degree of accuracy and a lower level of numerical noise and artifacts including those for non-smooth velocity models. In the context of solving the geophysical problem the post-stack migration for velocity models of the types Syncline and Sigsbee2A has been carried out. It is shown that the images obtained contain lesser noise and are considerably better focused as compared to those obtained by the known Fourier Finite Difference and Phase-Shift Plus Interpolation methods. There is an opinion that purely finite difference approaches do not allow carrying out the seismic migration procedure with sufficient accuracy, however the results obtained disprove this statement. For the supercomputer implementation it is proposed to use the parallel dichotomy algorithm when solving systems of linear algebraic equations with block-tridiagonal matrices.

  16. One-way quantum repeaters with quantum Reed-Solomon codes

    Science.gov (United States)

    Muralidharan, Sreraman; Zou, Chang-Ling; Li, Linshu; Jiang, Liang

    2018-05-01

    We show that quantum Reed-Solomon codes constructed from classical Reed-Solomon codes can approach the capacity on the quantum erasure channel of d -level systems for large dimension d . We study the performance of one-way quantum repeaters with these codes and obtain a significant improvement in key generation rate compared to previously investigated encoding schemes with quantum parity codes and quantum polynomial codes. We also compare the three generations of quantum repeaters using quantum Reed-Solomon codes and identify parameter regimes where each generation performs the best.

  17. One way to save the number of BPM buttons in the arcs that is not recommended

    International Nuclear Information System (INIS)

    Chao, A.; Kheifets, S.

    1983-12-01

    It has been suggested as a possibility by the beam dynamic task force that the SLC arcs be provided a beam position monitor at every gap between magnets. In this scenario of orbit correction scheme, the BPM's are used alternately for the horizontal and the vertical orbit measurements. One way to construct these BPM's is therefore in the x and y planes. One problem of this construction, as pointed out by Pellegrin and Rees, is that synchrotron radiation will hit the buttons of the x-BPM's. It was suggested then that the x-BPM's should use four buttons, orthogonal, but rotated 45 0 from the x and y planes. This construction requires 4 buttons instead of 2, meaning an increase of cost. As an attempt to reduce the number of buttons needed for arc orbit correction, we have studied a variation of the orbit correction scheme. In this scheme, orbits are not corrected in the x and y coordinates but in the coordinates that are tilted by 45 0 relative to x and y. Let these coordinates be called u and v. The result of the study is that this scheme is not recommended

  18. Relay Selection and Resource Allocation in One-Way and Two-Way Cognitive Relay Networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-05-08

    In this work, the problem of relay selection and resource power allocation in one- way and two-way cognitive relay networks using half duplex channels with different relaying protocols is investigated. Optimization problems for both single and multiple relay selection that maximize the sum rate of the secondary network without degrading the quality of service of the primary network by respecting a tolerated interference threshold were formulated. Single relay selection and optimal power allocation for two-way relaying cognitive radio networks using decode-and-forward and amplify-and-forward protocols were studied. Dual decomposition and subgradient methods were used to find the optimal power allocation. The transmission process to exchange two different messages between two transceivers for two-way relaying technique takes place in two time slots. In the first slot, the transceivers transmit their signals simultaneously to the relay. Then, during the second slot the relay broadcasts its signal to the terminals. Moreover, improvement of both spectral and energy efficiency can be achieved compared with the one-way relaying technique. As an extension, a multiple relay selection for both one-way and two-way relaying under cognitive radio scenario using amplify-and-forward were discussed. A strong optimization tool based on genetic and iterative algorithms was employed to solve the 
formulated optimization problems for both single and multiple relay selection, where discrete relay power levels were considered. Simulation results show that the practical and low-complexity heuristic approaches achieve almost the same performance of the optimal relay selection schemes either with discrete or continuous power distributions while providing a considerable saving in terms of computational complexity.

  19. Motion simulation of hydraulic driven safety rod using FSI method

    International Nuclear Information System (INIS)

    Jung, Jaeho; Kim, Sanghaun; Yoo, Yeonsik; Cho, Yeonggarp; Kim, Jong In

    2013-01-01

    Hydraulic driven safety rod which is one of them is being developed by Division for Reactor Mechanical Engineering, KAERI. In this paper the motion of this rod is simulated by fluid structure interaction (FSI) method before manufacturing for design verification and pump sizing. A newly designed hydraulic driven safety rod which is one of reactivity control mechanism is simulated using FSI method for design verification and pump sizing. The simulation is done in CFD domain with UDF. The pressure drop is changed slightly by flow rates. It means that the pressure drop is mainly determined by weight of moving part. The simulated velocity of piston is linearly proportional to flow rates so the pump can be sized easily according to the rising and drop time requirement of the safety rod using the simulation results

  20. Joint Preprocesser-Based Detectors for One-Way and Two-Way Cooperative Communication Networks

    KAUST Repository

    Abuzaid, Abdulrahman I.

    2014-05-01

    Efficient receiver designs for cooperative communication networks are becoming increasingly important. In previous work, cooperative networks communicated with the use of L relays. As the receiver is constrained, channel shortening and reduced-rank techniques were employed to design the preprocessing matrix that reduces the length of the received vector from L to U. In the first part of the work, a receiver structure is proposed which combines our proposed threshold selection criteria with the joint iterative optimization (JIO) algorithm that is based on the mean square error (MSE). Our receiver assists in determining the optimal U. Furthermore, this receiver provides the freedom to choose U for each frame depending on the tolerable difference allowed for MSE. Our study and simulation results show that by choosing an appropriate threshold, it is possible to gain in terms of complexity savings while having no or minimal effect on the BER performance of the system. Furthermore, the effect of channel estimation on the performance of the cooperative system is investigated. In the second part of the work, a joint preprocessor-based detector for cooperative communication networks is proposed for one-way and two-way relaying. This joint preprocessor-based detector operates on the principles of minimizing the symbol error rate (SER) instead of minimizing MSE. For a realistic assessment, pilot symbols are used to estimate the channel. From our simulations, it can be observed that our proposed detector achieves the same SER performance as that of the maximum likelihood (ML) detector with all participating relays. Additionally, our detector outperforms selection combining (SC), channel shortening (CS) scheme and reduced-rank techniques when using the same U. Finally, our proposed scheme has the lowest computational complexity.

  1. File-Based One-Way BISON Coupling Through VERA: User's Manual

    Energy Technology Data Exchange (ETDEWEB)

    Stimpson, Shane G. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-02-28

    Activities to incorporate fuel performance capabilities into the Virtual Environment for Reactor Applications (VERA) are receiving increasing attention [1–6]. The multiphysics emphasis is expanding as the neutronics (MPACT) and thermal-hydraulics (CTF) packages are becoming more mature. Capturing the finer details of fuel phenomena (swelling, densification, relocation, gap closure, etc.) is the natural next step in the VERA development process since these phenomena are currently not directly taken into account. While several codes could be used to accomplish this, the BISON fuel performance code [8,9] being developed by the Idaho National Laboratory (INL) is the focus of ongoing work in the Consortium for Advanced Simulation of Light Water Reactors (CASL). Built on INL’s MOOSE framework [10], BISON uses the finite element method for geometric representation and a Jacobian-free Newton-Krylov (JFNK) scheme to solve systems of partial differential equations for various fuel characteristic relationships. There are several modes of operation in BISON, but, this work uses a 2D azimuthally symmetric (R-Z) smeared-pellet model. This manual is intended to cover (1) the procedure pertaining to the standalone BISON one-way coupling from VERA and (2) the procedure to generate BISON fuel temperature tables that VERA can use.

  2. Experimental demonstration of deterministic one-way quantum computing on a NMR quantum computer

    OpenAIRE

    Ju, Chenyong; Zhu, Jing; Peng, Xinhua; Chong, Bo; Zhou, Xianyi; Du, Jiangfeng

    2008-01-01

    One-way quantum computing is an important and novel approach to quantum computation. By exploiting the existing particle-particle interactions, we report the first experimental realization of the complete process of deterministic one-way quantum Deutsch-Josza algorithm in NMR, including graph state preparation, single-qubit measurements and feed-forward corrections. The findings in our experiment may shed light on the future scalable one-way quantum computation.

  3. One-Way Functions and Composition of Conjugacy and Discrete Logarithm Problems in the Small Cancellation Groups

    Directory of Open Access Journals (Sweden)

    N. V. Bezverkhniy

    2015-01-01

    Full Text Available The paper considers the possibility for building a one-way function in the small cancellation group. Thus, it uses the algorithm to solve the problem for a cyclic subgroup, also known as a discrete logarithm problem, and the algorithm to solve the word problem in this class of groups.Research is conducted using geometric methods of combinatorial group theory (the method of diagrams in groups.In public channel exchange of information are used one-way functions, direct calculation of which should be much less complicated than the calculation of the inverse function. The paper considers the combination of two problems: discrete logarithms and conjugacy. This leads to the problem of conjugate membership for a cyclic subgroup. The work proposes an algorithm based on this problem, which can be used as a basis in investigation of the appropriate one-way function for its fitness to build a public key distribution scheme.The study used doughnut charts of word conjugacy, and for one special class of such charts has been proven a property of the layer-based periodicity. The presence of such properties is obviously leads to a solution of the power conjugacy of words in the considered class of groups. Unfortunately, this study failed to show any periodicity of a doughnut chart, but for one of two possible classes this periodicity has been proven.The building process of one-way function considered in the paper was studied in terms of possibility to calculate both direct and inverse mappings. The computational complexity was not considered. Thus, the following two tasks were yet unresolved: determining the quality of one-way function in the above protocol of the public key distribution and completing the study of the periodicity of doughnut charts of word conjugacy, leading to a positive solution of the power conjugacy of words in the class groups under consideration.

  4. One-way optical transmission in silicon photonic crystal heterojunction with circular and square scatterers

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Dan, E-mail: liudanhu725@126.com [School of Physics and Mechanical & Electrical Engineering, Hubei University of Education, Wuhan, 430205 (China); Hu, Sen [School of Physics and Mechanical & Electrical Engineering, Hubei University of Education, Wuhan, 430205 (China); Gao, Yihua [Wuhan National Laboratory for Optoelectronics (WNLO), School of Physics, Huazhong University of Science and Technology (HUST), Wuhan, 430074 (China)

    2017-07-12

    A 2D orthogonal square-lattice photonic crystal (PC) heterojunction consisting of circular and square air holes in silicon is presented. Band structures are calculated using the plane wave expansion method, and the transmission properties are investigated by the finite-different time-domain simulations. Thanks to the higher diffraction orders excited when the circular and square holes are interlaced along the interface, one-way transmission phenomena can exist within wide frequency regions. The higher order diffraction is further enhanced through two different interface optimization designs proposed by modifying the PC structure of the hetero-interface. An orthogonal PC heterojunction for wide-band and efficient one-way transmission is constructed, and the maximum transmissivity is up to 78%. - Highlights: • Photonic crystal heterojunction with circular and square scatterers is first studied. • One-way transmission efficiency is closely related to the hetero-interface. • Wide-band and efficient one-way transmission is realized.

  5. Relay Selection and Resource Allocation in One-Way and Two-Way Cognitive Relay Networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-01-01

    In this work, the problem of relay selection and resource power allocation in one- way and two-way cognitive relay networks using half duplex channels with different relaying protocols is investigated. Optimization problems for both single

  6. Detection technology research on the one-way clutch of automatic brake adjuster

    Science.gov (United States)

    Jiang, Wensong; Luo, Zai; Lu, Yi

    2013-10-01

    In this article, we provide a new testing method to evaluate the acceptable quality of the one-way clutch of automatic brake adjuster. To analysis the suitable adjusting brake moment which keeps the automatic brake adjuster out of failure, we build a mechanical model of one-way clutch according to the structure and the working principle of one-way clutch. The ranges of adjusting brake moment both clockwise and anti-clockwise can be calculated through the mechanical model of one-way clutch. Its critical moment, as well, are picked up as the ideal values of adjusting brake moment to evaluate the acceptable quality of one-way clutch of automatic brake adjuster. we calculate the ideal values of critical moment depending on the different structure of one-way clutch based on its mechanical model before the adjusting brake moment test begin. In addition, an experimental apparatus, which the uncertainty of measurement is ±0.1Nm, is specially designed to test the adjusting brake moment both clockwise and anti-clockwise. Than we can judge the acceptable quality of one-way clutch of automatic brake adjuster by comparing the test results and the ideal values instead of the EXP. In fact, the evaluation standard of adjusting brake moment applied on the project are still using the EXP provided by manufacturer currently in China, but it would be unavailable when the material of one-way clutch changed. Five kinds of automatic brake adjusters are used in the verification experiment to verify the accuracy of the test method. The experimental results show that the experimental values of adjusting brake moment both clockwise and anti-clockwise are within the ranges of theoretical results. The testing method provided by this article vividly meet the requirements of manufacturer's standard.

  7. Demonstration of Multisetting One-Way Einstein-Podolsky-Rosen Steering in Two-Qubit Systems

    Science.gov (United States)

    Xiao, Ya; Ye, Xiang-Jun; Sun, Kai; Xu, Jin-Shi; Li, Chuan-Feng; Guo, Guang-Can

    2017-04-01

    Einstein-Podolsky-Rosen (EPR) steering describes the ability of one party to remotely affect another's state through local measurements. One of the most distinguishable properties of EPR steering is its asymmetric aspect. Steering can work in one direction but fail in the opposite direction. This type of one-way steering, which is different from the symmetry concepts of entanglement and Bell nonlocality, has garnered much interest. However, an experimental demonstration of genuine one-way EPR steering in the simplest scenario, i.e., one that employs two-qubit systems, is still lacking. In this Letter, we experimentally demonstrate one-way EPR steering with multimeasurement settings for a class of two-qubit states, which are still one-way steerable even with infinite settings. The steerability is quantified by the steering radius, which represents a necessary and sufficient steering criterion. The demonstrated one-way steering in the simplest bipartite quantum system is of fundamental interest and may provide potential applications in one-way quantum information tasks.

  8. Performance Analysis of a Forecasting Relocation Model for One-Way Carsharing

    Directory of Open Access Journals (Sweden)

    Ganjar Alfian

    2017-06-01

    Full Text Available A carsharing service can be seen as a transport alternative between private and public transport that enables a group of people to share vehicles based at certain stations. The advanced carsharing service, one-way carsharing, enables customers to return the car to another station. However, one-way implementation generates an imbalanced distribution of cars in each station. Thus, this paper proposes forecasting relocation to solve car distribution imbalances for one-way carsharing services. A discrete event simulation model was developed to help evaluate the proposed model performance. A real case dataset was used to find the best simulation result. The results provide a clear insight into the impact of forecasting relocation on high system utilization and the reservation acceptance ratio compared to traditional relocation methods.

  9. One-Way Deficit and Quantum Phase Transitions in XX Model

    Science.gov (United States)

    Wang, Yao-Kun; Zhang, Yu-Ran

    2018-02-01

    Quantum correlations including entanglement and quantum discord have drawn much attention in characterizing quantum phase transitions. Quantum deficit originates in questions regarding work extraction from quantum systems coupled to a heat bath (Oppenheim et al. Phys. Rev. Lett. 89, 180402, 2002). It links quantum thermodynamics with quantum correlations and provides a new standpoint for understanding quantum non-locality. In this paper, we evaluate the one-way deficit of two adjacent spins in the bulk for the XX model. In the thermodynamic limit, the XX model undergoes a first order transition from fully polarized to a critical phase with quasi-long-range order with decrease of quantum parameter. We find that the one-way deficit becomes nonzero after the critical point. Therefore, the one-way deficit characterizes the quantum phase transition in the XX model.

  10. Experimental realization of a quantum game on a one-way quantum computer

    International Nuclear Information System (INIS)

    Prevedel, Robert; Stefanov, Andre; Walther, Philip; Zeilinger, Anton

    2007-01-01

    We report the first demonstration of a quantum game on an all-optical one-way quantum computer. Following a recent theoretical proposal we implement a quantum version of Prisoner's Dilemma, where the quantum circuit is realized by a four-qubit box-cluster configuration and the player's local strategies by measurements performed on the physical qubits of the cluster. This demonstration underlines the strength and versatility of the one-way model and we expect that this will trigger further interest in designing quantum protocols and algorithms to be tested in state-of-the-art cluster resources

  11. Study of the one-way speed of light anisotropy with particle beams

    Energy Technology Data Exchange (ETDEWEB)

    Wojtsekhowski, Bogdan B. [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States)

    2017-04-01

    Concepts of high precision studies of the one-way speed of light anisotropy are discussed. The high energy particle beam allows measurement of a one-way speed of light anisotropy (SOLA) via analysis of the beam momentum variation with sidereal phase without the use of synchronized clocks. High precision beam position monitors could provide accurate monitoring of the beam orbit and determination of the particle beam momentum with relative accuracy on the level of 10^-10, which corresponds to a limit on SOLA of 10^-18 with existing storage rings. A few additional versions of the experiment are also presented.

  12. Comparative analysis of the performance of One-Way and Two-Way urban road networks

    Science.gov (United States)

    Gheorghe, Carmen

    2017-10-01

    The fact that the number of vehicles is increasing year after year represents a challenge in road traffic management because it is necessary to adjust the road traffic, in order to prevent any incidents, using mostly the same road infrastructure. At this moment one-way road network provides efficient traffic flow for vehicles but it is not ideal for pedestrians. Therefore, a proper solution must be found and applied when and where it is necessary. Replacing one-way road network with two-way road network may be a viable solution especially if in the area is high pedestrian traffic. The paper aims to highlight the influence of both, one-way and two-way urban road networks through an experimental research which was performed by using traffic data collected in the field. Each of the two scenarios analyzed were based on the same traffic data, the same geometrical conditions of the road (lane width, total road segment width, road slopes, total length of the road network) and also the same signaling conditions (signalised intersection or roundabout). The analysis which involves two-way scenario reveals changes in the performance parameters like delay average, stops average, delay stop average and vehicle speed average. Based on the values obtained, it was possible to perform a comparative analysis between the real, one-way, scenario and the theoretical, two-way, scenario.

  13. Security analysis of a one-way hash function based on spatiotemporal chaos

    International Nuclear Information System (INIS)

    Wang Shi-Hong; Shan Peng-Yang

    2011-01-01

    The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefore, the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions. (general)

  14. One-way functions based on the discrete logarithm problem in the groups meeting conditions C(3-T (6

    Directory of Open Access Journals (Sweden)

    N. V. Bezverkhniy

    2014-01-01

    Full Text Available In this work we are consider a possibility to create schemes of open key distribution in the groups meeting conditions C(3-T(6. Our constructions use the following algorithms.1. The algorithm that solves the membership problem for cyclic subgroups, also known as the discrete logarithm problem.2. The algorithm that solves the word problem in this class of groups.Our approach is based on the geometric methods of combinatorial group theory (the method of diagrams in groups.In a cryptographic scheme based on the open key distribution one-way functions are used, i.e. functions direct calculation of which must be much easier than that of the inverse one. Our task was to construct a one-way function using groups with small cancelation conditions C(3-T(6 and to compare the calculation complexity of this function with the calculation complexity of its inverse.P.W. Shor has shown in the paper that there exists a polynomial algorithm that can be implemented in a quantum computer to solve the discrete logarithm problem in the groups of units of finite fields and the rings of congruences mod n. This stimulated a series of investigations trying to find alternative complicated mathematical problems that can be used for construction of new asymmetric cryptosystems. For example, open key distribution systems based on the conjugacy problem in matrix groups and the braid groups were proposed.In the other papers the constructions used the discrete logarithm problem in the groups of inner automorphisms of semi-direct products of SL(2,Z and Zp and GL(2,Zp and Zp. groups. The paper of E. Sakalauskas, P. Tvarijonas, A. Raulinaitis proposed a scheme that uses a composition of two problems of group theory, namely the conjugacy problem and the discrete logarithm problem.Our results show that the scheme that we propose is of polynomial complexity. Therefore its security is not sufficient for further applications in communications. However the security can be improved

  15. A stable partitioned FSI algorithm for incompressible flow and deforming beams

    Energy Technology Data Exchange (ETDEWEB)

    Li, L., E-mail: lil19@rpi.edu [Department of Mathematical Sciences, Rensselaer Polytechnic Institute, Troy, NY 12180 (United States); Henshaw, W.D., E-mail: henshw@rpi.edu [Department of Mathematical Sciences, Rensselaer Polytechnic Institute, Troy, NY 12180 (United States); Banks, J.W., E-mail: banksj3@rpi.edu [Department of Mathematical Sciences, Rensselaer Polytechnic Institute, Troy, NY 12180 (United States); Schwendeman, D.W., E-mail: schwed@rpi.edu [Department of Mathematical Sciences, Rensselaer Polytechnic Institute, Troy, NY 12180 (United States); Main, A., E-mail: amain8511@gmail.com [Department of Civil and Environmental Engineering, Duke University, Durham, NC 27708 (United States)

    2016-05-01

    An added-mass partitioned (AMP) algorithm is described for solving fluid–structure interaction (FSI) problems coupling incompressible flows with thin elastic structures undergoing finite deformations. The new AMP scheme is fully second-order accurate and stable, without sub-time-step iterations, even for very light structures when added-mass effects are strong. The fluid, governed by the incompressible Navier–Stokes equations, is solved in velocity-pressure form using a fractional-step method; large deformations are treated with a mixed Eulerian-Lagrangian approach on deforming composite grids. The motion of the thin structure is governed by a generalized Euler–Bernoulli beam model, and these equations are solved in a Lagrangian frame using two approaches, one based on finite differences and the other on finite elements. The key AMP interface condition is a generalized Robin (mixed) condition on the fluid pressure. This condition, which is derived at a continuous level, has no adjustable parameters and is applied at the discrete level to couple the partitioned domain solvers. Special treatment of the AMP condition is required to couple the finite-element beam solver with the finite-difference-based fluid solver, and two coupling approaches are described. A normal-mode stability analysis is performed for a linearized model problem involving a beam separating two fluid domains, and it is shown that the AMP scheme is stable independent of the ratio of the mass of the fluid to that of the structure. A traditional partitioned (TP) scheme using a Dirichlet–Neumann coupling for the same model problem is shown to be unconditionally unstable if the added mass of the fluid is too large. A series of benchmark problems of increasing complexity are considered to illustrate the behavior of the AMP algorithm, and to compare the behavior with that of the TP scheme. The results of all these benchmark problems verify the stability and accuracy of the AMP scheme. Results for

  16. A stable partitioned FSI algorithm for incompressible flow and deforming beams

    International Nuclear Information System (INIS)

    Li, L.; Henshaw, W.D.; Banks, J.W.; Schwendeman, D.W.; Main, A.

    2016-01-01

    An added-mass partitioned (AMP) algorithm is described for solving fluid–structure interaction (FSI) problems coupling incompressible flows with thin elastic structures undergoing finite deformations. The new AMP scheme is fully second-order accurate and stable, without sub-time-step iterations, even for very light structures when added-mass effects are strong. The fluid, governed by the incompressible Navier–Stokes equations, is solved in velocity-pressure form using a fractional-step method; large deformations are treated with a mixed Eulerian-Lagrangian approach on deforming composite grids. The motion of the thin structure is governed by a generalized Euler–Bernoulli beam model, and these equations are solved in a Lagrangian frame using two approaches, one based on finite differences and the other on finite elements. The key AMP interface condition is a generalized Robin (mixed) condition on the fluid pressure. This condition, which is derived at a continuous level, has no adjustable parameters and is applied at the discrete level to couple the partitioned domain solvers. Special treatment of the AMP condition is required to couple the finite-element beam solver with the finite-difference-based fluid solver, and two coupling approaches are described. A normal-mode stability analysis is performed for a linearized model problem involving a beam separating two fluid domains, and it is shown that the AMP scheme is stable independent of the ratio of the mass of the fluid to that of the structure. A traditional partitioned (TP) scheme using a Dirichlet–Neumann coupling for the same model problem is shown to be unconditionally unstable if the added mass of the fluid is too large. A series of benchmark problems of increasing complexity are considered to illustrate the behavior of the AMP algorithm, and to compare the behavior with that of the TP scheme. The results of all these benchmark problems verify the stability and accuracy of the AMP scheme. Results for

  17. Constructing a one-way hash function based on the unified chaotic system

    International Nuclear Information System (INIS)

    Long Min; Peng Fei; Chen Guanrong

    2008-01-01

    A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way hash function algorithm is constructed with three round operations and an initial vector on an input message. In each round operation, the parameters are processed by three different chaotic systems generated from the unified chaotic system. Feed-forwards are used at the end of each round operation and at the end of each element of the message processing. Meanwhile, in each round operation, parameter-exchanging operations are implemented. Then, the hash value of length 160 bits is obtained from the last six parameters. Simulation and analysis both demonstrate that the algorithm has great flexibility, satisfactory hash performance, weak collision property, and high security. (general)

  18. [Extracorporeal ventriculoatrial shunt with the use of one-way ball valve].

    Science.gov (United States)

    Kubo, Shigeki; Takimoto, Hiroshi; Hosoi, Kazuki; Toyota, Shingo; Takakura, Shuji; Hayashi, Yasuhiro; Ueno, Masato; Morisako, Toshitaka; Karasawa, Jun; Ninaga, Hideo; Yoshimine, Toshiki

    2002-04-01

    We developed a simple system of an "extracorporeal" ventriculoatrial (VA) shunt using a one-way ball valve (Acty valve II, Kaneka Medix) to release the patient from postoperative constraint during the ventricular drainage. The system is constructed in such a way that the ventricular drainage tube is connected to the central venous catheter via a one-way valve. The CSF is regulated by using the valve and is diverted into the systemic circulation as in the conventional ventriculoatrial shunt. After 2 or 3 weeks of CSF diversion through the extracorporeal VA shunt, a ventriculoperitoneal shunt is placed if hydrocephalus is apparent by temporary occlusion of the system. We applied this system to 4 patients with hydrocephalus, and we found it useful and free from adverse effects. The patient was freed from physical constraint involved in conventional ventricular drainage and an effective program of early rehabilitation was able to be started.

  19. Semi-device-independent security of one-way quantum key distribution

    International Nuclear Information System (INIS)

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being ''device-independent.'' Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are noncharacterized, but the dimensionality of the quantum systems used in the protocol is assumed to be bounded. Our security proof relies on the analogies between one-way QKD, dimension witnesses, and random-access codes.

  20. On the experimental determination of the one-way speed of light

    International Nuclear Information System (INIS)

    Perez, Israel

    2011-01-01

    In this paper the question of the isotropy of the one-way speed of light is addressed from an experimental perspective. In particular, we analyse two experimental methods commonly used in its determination. The analysis is aimed at clarifying the view that the one-way speed of light cannot be determined by techniques in which physical entities close paths. The procedure employed here will provide epistemological tools so that physicists understand that a direct measurement of the speed not only of light but of any physical entity is by no means trivial. Our results shed light on the physics behind the experiments which may be of interest for both physicists with an elemental knowledge in special relativity and philosophers of science.

  1. On the experimental determination of the one-way speed of light

    Energy Technology Data Exchange (ETDEWEB)

    Perez, Israel, E-mail: cooguion@yahoo.com, E-mail: iperez@cicese.mx [Department of Applied Physics, Optics Division, CICESE, Carretera Ensena da-Tijuana 3918, Zona Playitas, CP 22860, Ensenada, Baja California (Mexico)

    2011-07-15

    In this paper the question of the isotropy of the one-way speed of light is addressed from an experimental perspective. In particular, we analyse two experimental methods commonly used in its determination. The analysis is aimed at clarifying the view that the one-way speed of light cannot be determined by techniques in which physical entities close paths. The procedure employed here will provide epistemological tools so that physicists understand that a direct measurement of the speed not only of light but of any physical entity is by no means trivial. Our results shed light on the physics behind the experiments which may be of interest for both physicists with an elemental knowledge in special relativity and philosophers of science.

  2. True amplitude wave equation migration arising from true amplitude one-way wave equations

    Science.gov (United States)

    Zhang, Yu; Zhang, Guanquan; Bleistein, Norman

    2003-10-01

    One-way wave operators are powerful tools for use in forward modelling and inversion. Their implementation, however, involves introduction of the square root of an operator as a pseudo-differential operator. Furthermore, a simple factoring of the wave operator produces one-way wave equations that yield the same travel times as the full wave equation, but do not yield accurate amplitudes except for homogeneous media and for almost all points in heterogeneous media. Here, we present augmented one-way wave equations. We show that these equations yield solutions for which the leading order asymptotic amplitude as well as the travel time satisfy the same differential equations as the corresponding functions for the full wave equation. Exact representations of the square-root operator appearing in these differential equations are elusive, except in cases in which the heterogeneity of the medium is independent of the transverse spatial variables. Here, we address the fully heterogeneous case. Singling out depth as the preferred direction of propagation, we introduce a representation of the square-root operator as an integral in which a rational function of the transverse Laplacian appears in the integrand. This allows us to carry out explicit asymptotic analysis of the resulting one-way wave equations. To do this, we introduce an auxiliary function that satisfies a lower dimensional wave equation in transverse spatial variables only. We prove that ray theory for these one-way wave equations leads to one-way eikonal equations and the correct leading order transport equation for the full wave equation. We then introduce appropriate boundary conditions at z = 0 to generate waves at depth whose quotient leads to a reflector map and an estimate of the ray theoretical reflection coefficient on the reflector. Thus, these true amplitude one-way wave equations lead to a 'true amplitude wave equation migration' (WEM) method. In fact, we prove that applying the WEM imaging condition

  3. Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming

    Directory of Open Access Journals (Sweden)

    Lin Xiao

    2017-01-01

    Full Text Available An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes. Specifically, we classify the intermediate relay as an eavesdropper into two modes: active eavesdropper and nonactive eavesdropper, depending on whether it has sufficient energy of its own to transmit the message or not. Under a simplified three-node fading wiretap channel setup, the transmit power allocation and power splitting ratio are jointly optimized to minimize the outage probability in the delay-sensitive case and to maximize the average rate in the delay-insensitive case, subject to the average and peak total power constraints. Applying the dual-decomposition method, the optimization problem can be efficiently solved in the delay-sensitive scenario. Moreover, an iterative algorithm is proposed to derive the solution to maximize the average rate in the delay-insensitive scenario. Numerical results demonstrate the performance of system outage probability in the two modes versus different rates and how efficiently the secrecy rate is improved compared with traditional schemes.

  4. The Family Socialization Interview-Revised (FSI-R): a Comprehensive Assessment of Parental Disciplinary Behaviors.

    Science.gov (United States)

    O'Dor, Sarah L; Grasso, Damion J; Forbes, Danielle; Bates, John E; McCarthy, Kimberly J; Wakschlag, Lauren S; Briggs-Gowan, Margaret J

    2017-04-01

    Elucidating the complex mechanisms by which harsh parenting increases risk of child psychopathology is key to targeted prevention. This requires nuanced methods that capture the varied perceptions and experiences of diverse families. The Family Socialization Interview-Revised (FSI-R), adapted from an interview developed by Dodge et al. (Child Development, 65, 649-665, 1994), is a comprehensive, semi-structured interview for characterizing methods of parental discipline used with young children. The FSI-R coding system systematically rates parenting style, usual discipline techniques, and most intense physical and psychological discipline based on rater judgment across two eras: (1) birth to the previous year, and (2) the previous year to present. The current study examined the psychometric properties of the FSI-R in a diverse, high-risk community sample of 386 mothers and their children, ages 3 to 6 years. Interrater reliability was good to excellent for codes capturing physically and psychologically harsh parenting, and restrictive/punitive parenting styles. Findings supported the FSI-R's convergent and incremental validity. Importantly, the FSI-R demonstrated incremental utility, explaining unique variance in children's externalizing and internalizing symptoms beyond that explained by traditional surveys and observed parenting. The FSI-R appeared particularly promising for capturing risk associated with young children's depressive symptoms, as these were generally not significantly associated with other measures of harsh parenting. Overall, findings support the added value of the FSI-R within a multi-method assessment of disciplinary practices across early child development. Future implications for prevention are discussed.

  5. The Family Socialization Interview—Revised (FSI-R): a Comprehensive Assessment of Parental Disciplinary Behaviors

    Science.gov (United States)

    O’Dor, Sarah L.; Grasso, Damion J.; Forbes, Danielle; Bates, John E.; McCarthy, Kimberly J.; Wakschlag, Lauren S.

    2017-01-01

    Elucidating the complex mechanisms by which harsh parenting increases risk of child psychopathology is key to targeted prevention. This requires nuanced methods that capture the varied perceptions and experiences of diverse families. The Family Socialization Interview—Revised (FSI-R), adapted from an interview developed by Dodge et al. (Child Development, 65,649–665,1994), is a comprehensive, semi-structured interview for characterizing methods of parental discipline used with young children. The FSI-R coding system systematically rates parenting style, usual discipline techniques, and most intense physical and psychological discipline based on rater judgment across two eras: (1) birth to the previous year, and (2) the previous year to present. The current study examined the psychometric properties of the FSI-R in a diverse, high-risk community sample of 386 mothers and their children, ages 3 to 6 years. Interrater reliability was good to excellent for codes capturing physically and psychologically harsh parenting, and restrictive/punitive parenting styles. Findings supported the FSI-R’s convergent and incremental validity. Importantly, the FSI-R demonstrated incremental utility, explaining unique variance in children’s externalizing and internalizing symptoms beyond that explained by traditional surveys and observed parenting. The FSI-R appeared particularly promising for capturing risk associated with young children’s depressive symptoms, as these were generally not significantly associated with other measures of harsh parenting. Overall, findings support the added value of the FSI-R within a multi-method assessment of disciplinary practices across early child development. Future implications for prevention are discussed. PMID:27718104

  6. Measurement of one-way velocity of light and light-year

    Science.gov (United States)

    Chen, Shao-Guang

    For space science and astronomy the fundamentality of one-way velocity of light (OWVL) is selfevident. The measurement of OWVL (distance / interval) and the clock synchronization with light-signal transfer make a logical circulation. This means that OWVL could not be directly measured but only come indirectly from astronomical method (Romer's Io eclipse and Bradley's sidereal aberration). Furthermore, the light-year by definitional OWVL and the trigonometry distance with AU are also un-measurable. In this report two methods of clock synchronization to solve this problem were proposed: The arriving-time difference of longitudinal-transverse wave (Ts - Tp) or ordinary-extraordinary light (Te - To) is measured by single clock at one end of a dual-speed transmission-line, the signal transmission-delay (from sending-end time Tx to receiving-end time Tp or To) calculated with wave-speed ratio is: (Tp -Tx) = (Ts -Tp) / ((Vp / Vs) - 1) or: (To -Tx) = (Te - To) / ((Vo / Ve ) - 1), where (Vp / Vs) = (E / k) 1/2 is Yang's / shear elastic-modulus ratio obtained by comparing two strains at same stress, (Vo / Ve) = (ne / no) is extraordinary/ordinary light refractive-index ratio obtained by comparing two deflection-angles. Then, two clocks at transmission-line two ends can be synchronized directly to measure the one-way velocity of light and light-year, which work as one earthquakestation with single clock measures first-shake-time and the distance to epicenter. The readings Na and Nb of two counters Ca and Cb with distance L are transferred into a computer C by two leads with transmission-delay Tac and Tbc respectively. The computer progressing subtraction operation exports steady value: (Nb - Na) = f (Ta - Tb ) + f (Tac - Tbc ), where f is the frequency of light-wave always passing Ca and Cb, Ta and Tb are the count-start time of Ca and Cb respectively. From the transmission-delay possess the spatial translational and rotational invariability, the computer exports steady value

  7. One-way hash function based on hyper-chaotic cellular neural network

    International Nuclear Information System (INIS)

    Yang Qunting; Gao Tiegang

    2008-01-01

    The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge–Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corresponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability. (general)

  8. Semi-device-independent security of one-way quantum key distribution

    OpenAIRE

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being 'device-independent'. Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are non-characterized, but t...

  9. Seismic Imaging, One-Way Wave Equations, Pseudodifferential Operators, Path Integrals, and all that Jazz

    Science.gov (United States)

    Artoun, Ojenie; David-Rus, Diana; Emmett, Matthew; Fishman, Lou; Fital, Sandra; Hogan, Chad; Lim, Jisun; Lushi, Enkeleida; Marinov, Vesselin

    2006-05-01

    In this report we summarize an extension of Fourier analysis for the solution of the wave equation with a non-constant coefficient corresponding to an inhomogeneous medium. The underlying physics of the problem is exploited to link pseudodifferential operators and phase space path integrals to obtain a marching algorithm that incorporates the backward scattering into the evolution of the wave. This allows us to successfully apply single-sweep, one-way marching methods in inherently two-way environments, which was not achieved before through other methods for this problem.

  10. Behavior of one-way reinforced concrete slabs subjected to fire

    Directory of Open Access Journals (Sweden)

    Said M. Allam

    2013-12-01

    Full Text Available A finite difference analysis was performed to investigate the behavior of one-way reinforced concrete slabs exposed to fire. The objective of the study was to investigate the fire resistance and the fire risk after extinguishing the fire. Firstly, the fire resistance was obtained using the ISO834 standard fire without cooling phase. Secondly, the ISO834 parametric fire with cooling phase was applied to study the effect of cooling time. Accordingly, the critical time for cooling was identified and the corresponding failure time was calculated. Moreover, the maximum risk time which is the time between the fire extinguishing and the collapse of slab was obtained. Sixteen one-way reinforced concrete slabs were considered to study the effect of important parameters namely: the concrete cover thickness; the plaster; and the live load ratio. Equations for heat transfer through the slab thickness were used in the fire resistance calculations. Studying the cooling time revealed that the slabs are still prone to collapse although they were cooled before their fire resistance. Moreover, increasing the concrete cover thickness and the presence of plaster led to an increase in the maximum risk time. However, the variation in the live load ratio has almost no effect on such time.

  11. Experimental realization of a one-way quantum computer algorithm solving Simon's problem.

    Science.gov (United States)

    Tame, M S; Bell, B A; Di Franco, C; Wadsworth, W J; Rarity, J G

    2014-11-14

    We report an experimental demonstration of a one-way implementation of a quantum algorithm solving Simon's problem-a black-box period-finding problem that has an exponential gap between the classical and quantum runtime. Using an all-optical setup and modifying the bases of single-qubit measurements on a five-qubit cluster state, key representative functions of the logical two-qubit version's black box can be queried and solved. To the best of our knowledge, this work represents the first experimental realization of the quantum algorithm solving Simon's problem. The experimental results are in excellent agreement with the theoretical model, demonstrating the successful performance of the algorithm. With a view to scaling up to larger numbers of qubits, we analyze the resource requirements for an n-qubit version. This work helps highlight how one-way quantum computing provides a practical route to experimentally investigating the quantum-classical gap in the query complexity model.

  12. One-way spatial integration of Navier-Stokes equations: stability of wall-bounded flows

    Science.gov (United States)

    Rigas, Georgios; Colonius, Tim; Towne, Aaron; Beyar, Michael

    2016-11-01

    For three-dimensional flows, questions of stability, receptivity, secondary flows, and coherent structures require the solution of large partial-derivative eigenvalue problems. Reduced-order approximations are thus required for engineering prediction since these problems are often computationally intractable or prohibitively expensive. For spatially slowly evolving flows, such as jets and boundary layers, a regularization of the equations of motion sometimes permits a fast spatial marching procedure that results in a huge reduction in computational cost. Recently, a novel one-way spatial marching algorithm has been developed by Towne & Colonius. The new method overcomes the principle flaw observed in Parabolized Stability Equations (PSE), namely the ad hoc regularization that removes upstream propagating modes. The one-way method correctly parabolizes the flow equations based on estimating, in a computationally efficient way, the local spectrum in each cross-stream plane and an efficient spectral filter eliminates modes with upstream group velocity. Results from the application of the method to wall-bounded flows will be presented and compared with predictions from the full linearized compressible Navier-Stokes equations and PSE.

  13. FVCOM one-way and two-way nesting using ESMF: Development and validation

    Science.gov (United States)

    Qi, Jianhua; Chen, Changsheng; Beardsley, Robert C.

    2018-04-01

    Built on the Earth System Modeling Framework (ESMF), the one-way and two-way nesting methods were implemented into the unstructured-grid Finite-Volume Community Ocean Model (FVCOM). These methods help utilize the unstructured-grid multi-domain nesting of FVCOM with an aim at resolving the multi-scale physical and ecosystem processes. A detail of procedures on implementing FVCOM into ESMF was described. The experiments were made to validate and evaluate the performance of the nested-grid FVCOM system. The first was made for a wave-current interaction case with a two-domain nesting with an emphasis on qualifying a critical need of nesting to resolve a high-resolution feature near the coast and harbor with little loss in computational efficiency. The second was conducted for the pseudo river plume cases to examine the differences in the model-simulated salinity between one-way and two-way nesting approaches and evaluate the performance of mass conservative two-way nesting method. The third was carried out for the river plume case in the realistic geometric domain in Mass Bay, supporting the importance for having the two-way nesting for coastal-estuarine integrated modeling. The nesting method described in this paper has been used in the Northeast Coastal Ocean Forecast System (NECOFS)-a global-regional-coastal nesting FVCOM system that has been placed into the end-to-end forecast and hindcast operations since 2007.

  14. One Way Forward to Beat the Newtonian Habit with a Complexity Perspective on Organisational Change

    Directory of Open Access Journals (Sweden)

    Josie McLean

    2013-10-01

    Full Text Available We face a global crisis of un-sustainability—we need to change trajectory, but have so far displayed a collective inability to do so. This article suggests that one reason for this is our entrenched approach to change, which has inappropriately applied mechanistic Newtonian assumptions to “living” systems. Applying what has been learned about the behaviour of complex adaptive systems, we develop a pragmatic model for students of sustainability, who want to facilitate profound organizational and community change towards sustainability on the ground. Our model, “one way forward”, does not purport to be the only way but one possibility, grounded in a different understanding of the nature and dynamic of change as seen through the lens of complexity. In this way, it challenges more conventional change management practices. One way forward is a model facilitating evolutionary change in a social ecology—one possible expression of a “culture of community self-design” as expressed by Banathy. Its theoretical foundations and its practical application (it is designed for practice both have their source in a systemic view and in the principles that reflect the paradigm of complexity. Four central components of this new model—envisioning, core messages (values, indicators of progress, and experimentation—are explored in more detail.

  15. One-way mode transmission in one-dimensional phononic crystal plates

    Science.gov (United States)

    Zhu, Xuefeng; Zou, Xinye; Liang, Bin; Cheng, Jianchun

    2010-12-01

    We investigate theoretically the band structures of one-dimensional phononic crystal (PC) plates with both antisymmetric and symmetric structures, and show how unidirectional transmission behavior can be obtained for either antisymmetric waves (A modes) or symmetric waves (S modes) by exploiting mode conversion and selection in the linear plate systems. The theoretical approach is illustrated for one PC plate example where unidirectional transmission behavior is obtained in certain frequency bands. Employing harmonic frequency analysis, we numerically demonstrate the one-way mode transmission for the PC plate with finite superlattice by calculating the steady-state displacement fields under A modes source (or S modes source) in forward and backward direction, respectively. The results show that the incident waves from A modes source (or S modes source) are transformed into S modes waves (or A modes waves) after passing through the superlattice in the forward direction and the Lamb wave rejections in the backward direction are striking with a power extinction ratio of more than 1000. The present structure can be easily extended to two-dimensional PC plate and efficiently encourage practical studies of experimental realization which is believed to have much significance for one-way Lamb wave mode transmission.

  16. Exact Markov chain and approximate diffusion solution for haploid genetic drift with one-way mutation.

    Science.gov (United States)

    Hössjer, Ola; Tyvand, Peder A; Miloh, Touvia

    2016-02-01

    The classical Kimura solution of the diffusion equation is investigated for a haploid random mating (Wright-Fisher) model, with one-way mutations and initial-value specified by the founder population. The validity of the transient diffusion solution is checked by exact Markov chain computations, using a Jordan decomposition of the transition matrix. The conclusion is that the one-way diffusion model mostly works well, although the rate of convergence depends on the initial allele frequency and the mutation rate. The diffusion approximation is poor for mutation rates so low that the non-fixation boundary is regular. When this happens we perturb the diffusion solution around the non-fixation boundary and obtain a more accurate approximation that takes quasi-fixation of the mutant allele into account. The main application is to quantify how fast a specific genetic variant of the infinite alleles model is lost. We also discuss extensions of the quasi-fixation approach to other models with small mutation rates. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. One-way ticket” Romanian Migration at the beginning of the 20th century

    Directory of Open Access Journals (Sweden)

    Silvia Bocancea

    2011-12-01

    Full Text Available Unlike the new age of migration that we are experiencing now, the social mobility specific to the end of the 19th century and the beginning of the 20th century may be defined by the expression “one way ticket”; the immigrant, usually a man, used to leave his country of origin and settle for good in his host-country (he did not look for his happiness from state to state, as it happens now. The Romanian migration of that time was directed mainly towards the New World (particularly to the USA, and less to Canada. This paper is an attempt to sketch the image of Romanian emigration by taking into account the peculiarities determined by: emigration causes, geographical predominance, social composition, occupational options in the host-country, and the structure of Romanian immigrant communities.

  18. An experiment to measure the one-way velocity of propagation of electromagnetic radiation

    Science.gov (United States)

    Kolen, P.; Torr, D. G.

    1982-01-01

    An experiment involving commercially available instrumentation to measure the velocity of the earth with respect to absolute space is described. The experiment involves the measurement of the one-way propagation velocity of electromagnetic radiation down a high-quality coaxial cable. It is demonstrated that the experiment is both physically meaningful and exceedingly simple in concept and in implementation. It is shown that with currently available commercial equipment one might expect to detect a threshold value for the component of velocity of the earth's motion with respect to absolute space in the equatorial plane of approximately 10 km/s, which greatly exceeds the velocity resolution required to detect the motion of the solar system with respect to the center of the galaxy.

  19. One-way hash function construction based on the spatiotemporal chaotic system

    International Nuclear Information System (INIS)

    Luo Yu-Ling; Du Ming-Hui

    2012-01-01

    Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the hash compression function in parallel. The hash compression is constructed based on the spatiotemporal chaos. In each message block, the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function. The final hash value is generated by further compressing the mixed result of all the hash compression values. Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key, good statistical properties, and strong collision resistance. (general)

  20. One-way Hash function construction based on the chaotic map with changeable-parameter

    International Nuclear Information System (INIS)

    Xiao Di; Liao Xiaofeng; Deng Shaojiang

    2005-01-01

    An algorithm for one-way Hash function construction based on the chaotic map with changeable-parameter is proposed in this paper. A piecewise linear chaotic map with changeable-parameter P is chosen, and cipher block chaining mode (CBC) is introduced to ensure that the parameter P in each iteration is dynamically decided by the last-time iteration value and the corresponding message bit in different positions. The final Hash value is obtained by means of the linear transform on the iteration sequence. Theoretical analysis and computer simulation indicate that our algorithm can satisfy all the performance requirements of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce

  1. Pseudospin Dependent One-Way Transmission in Graphene-Based Topological Plasmonic Crystals

    Science.gov (United States)

    Qiu, Pingping; Qiu, Weibin; Ren, Junbo; Lin, Zhili; Wang, Zeyu; Wang, Jia-Xian; Kan, Qiang; Pan, Jiao-Qing

    2018-04-01

    Originating from the investigation of condensed matter states, the concept of quantum Hall effect and quantum spin Hall effect (QSHE) has recently been expanded to other field of physics and engineering, e.g., photonics and phononics, giving rise to strikingly unconventional edge modes immune to scattering. Here, we present the plasmonic analog of QSHE in graphene plasmonic crystal (GPC) in mid-infrared frequencies. The band inversion occurs when deforming the honeycomb lattice GPCs, which further leads to the topological band gaps and pseudospin features of the edge states. By overlapping the band gaps with different topologies, we numerically simulated the pseudospin-dependent one-way propagation of edge states. The designed GPC may find potential applications in the fields of topological plasmonics and trigger the exploration of the technique of the pseudospin multiplexing in high-density nanophotonic integrated circuits.

  2. One-Way Nested Large-Eddy Simulation over the Askervein Hill

    Directory of Open Access Journals (Sweden)

    James D. Doyle

    2009-07-01

    Full Text Available Large-eddy simulation (LES models have been used extensively to study atmospheric boundary layer turbulence over flat surfaces; however, LES applications over topography are less common. We evaluate the ability of an existing model – COAMPS®-LES – to simulate flow over terrain using data from the Askervein Hill Project. A new approach is suggested for the treatment of the lateral boundaries using one-way grid nesting. LES wind profile and speed-up are compared with observations at various locations around the hill. The COAMPS-LES model performs generally well. This case could serve as a useful benchmark for evaluating LES models for applications over topography.

  3. One-way Hash function construction based on the chaotic map with changeable-parameter

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Di [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China) and College of Mechanical Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xiaodi_cqu@hotmail.com; Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xfliao@cqu.edu.cn; Deng Shaojiang [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)

    2005-04-01

    An algorithm for one-way Hash function construction based on the chaotic map with changeable-parameter is proposed in this paper. A piecewise linear chaotic map with changeable-parameter P is chosen, and cipher block chaining mode (CBC) is introduced to ensure that the parameter P in each iteration is dynamically decided by the last-time iteration value and the corresponding message bit in different positions. The final Hash value is obtained by means of the linear transform on the iteration sequence. Theoretical analysis and computer simulation indicate that our algorithm can satisfy all the performance requirements of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce.

  4. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  5. Evaluating the far-field sound of a turbulent jet with one-way Navier-Stokes equations

    Science.gov (United States)

    Pickering, Ethan; Rigas, Georgios; Towne, Aaron; Colonius, Tim

    2017-11-01

    The one-way Navier-Stokes (OWNS) method has shown promising ability to predict both near field coherent structures (i.e. wave packets) and far field acoustics of turbulent jets while remaining computationally efficient through implementation of a spatial marching scheme. Considering the speed and relative accuracy of OWNS, a predictive model for various jet configurations may be conceived and applied for noise control. However, there still remain discrepancies between OWNS and large eddy simulation (LES) databases which may be linked to the previous neglect of nonlinear forcing. Therefore, to better predict wave packets and far field acoustics, this study investigates the effect of nonlinear forcing terms derived from high-fidelity LES databases. The results of the nonlinear forcings are evaluated for several azimuthal modes and frequencies, as well as compared to LES derived acoustics using spectral proper orthogonal decomposition (SPOD). This research was supported by the Department of Defense (DoD) through the Office of Naval Research (Grant No. N00014-16-1-2445) and the National Defense Science & Engineering Graduate Fellowship (NDSEG) Program.

  6. Non-reciprocity and topology in optics: one-way road for light via surface magnon polariton.

    Science.gov (United States)

    Ochiai, Tetsuyuki

    2015-02-01

    We show how non-reciprocity and topology are used to construct an optical one-way waveguide in the Voigt geometry. First, we present a traditional approach of the one-way waveguide of light using surface polaritons under a static magnetic field. Second, we explain a recent discovery of a topological approach using photonic crystals with the magneto-optical coupling. Third, we present a combination of the two approaches, toward a broadband one-way waveguide in the microwave range.

  7. Topologically protected one-way edge mode in networks of acoustic resonators with circulating air flow

    International Nuclear Information System (INIS)

    Ni, Xu; He, Cheng; Sun, Xiao-Chen; Liu, Xiao-ping; Lu, Ming-Hui; Chen, Yan-Feng; Feng, Liang

    2015-01-01

    Recent explorations of topology in physical systems have led to a new paradigm of condensed matters characterized by topologically protected states and phase transition, for example, topologically protected photonic crystals enabled by magneto-optical effects. However, in other wave systems such as acoustics, topological states cannot be simply reproduced due to the absence of similar magnetics-related sound–matter interactions in naturally available materials. Here, we propose an acoustic topological structure by creating an effective gauge magnetic field for sound using circularly flowing air in the designed acoustic ring resonators. The created gauge magnetic field breaks the time-reversal symmetry, and therefore topological properties can be designed to be nontrivial with non-zero Chern numbers and thus to enable a topological sonic crystal, in which the topologically protected acoustic edge-state transport is observed, featuring robust one-way propagation characteristics against a variety of topological defects and impurities. Our results open a new venue to non-magnetic topological structures and promise a unique approach to effective manipulation of acoustic interfacial transport at will. (paper)

  8. Spin- and valley-polarized one-way Klein tunneling in photonic topological insulators.

    Science.gov (United States)

    Ni, Xiang; Purtseladze, David; Smirnova, Daria A; Slobozhanyuk, Alexey; Alù, Andrea; Khanikaev, Alexander B

    2018-05-01

    Recent advances in condensed matter physics have shown that the spin degree of freedom of electrons can be efficiently exploited in the emergent field of spintronics, offering unique opportunities for efficient data transfer, computing, and storage ( 1 - 3 ). These concepts have been inspiring analogous approaches in photonics, where the manipulation of an artificially engineered pseudospin degree of freedom can be enabled by synthetic gauge fields acting on light ( 4 - 6 ). The ability to control these degrees of freedom significantly expands the landscape of available optical responses, which may revolutionize optical computing and the basic means of controlling light in photonic devices across the entire electromagnetic spectrum. We demonstrate a new class of photonic systems, described by effective Hamiltonians in which competing synthetic gauge fields, engineered in pseudospin, chirality/sublattice, and valley subspaces, result in bandgap opening at one of the valleys, whereas the other valley exhibits Dirac-like conical dispersion. We show that this effective response has marked implications on photon transport, among which are as follows: (i) a robust pseudospin- and valley-polarized one-way Klein tunneling and (ii) topological edge states that coexist within the Dirac continuum for opposite valley and pseudospin polarizations. These phenomena offer new ways to control light in photonics, in particular, for on-chip optical isolation, filtering, and wave-division multiplexing by selective action on their pseudospin and valley degrees of freedom.

  9. One-way membrane trafficking of SOS in receptor-triggered Ras activation.

    Science.gov (United States)

    Christensen, Sune M; Tu, Hsiung-Lin; Jun, Jesse E; Alvarez, Steven; Triplet, Meredith G; Iwig, Jeffrey S; Yadav, Kamlesh K; Bar-Sagi, Dafna; Roose, Jeroen P; Groves, Jay T

    2016-09-01

    SOS is a key activator of the small GTPase Ras. In cells, SOS-Ras signaling is thought to be initiated predominantly by membrane recruitment of SOS via the adaptor Grb2 and balanced by rapidly reversible Grb2-SOS binding kinetics. However, SOS has multiple protein and lipid interactions that provide linkage to the membrane. In reconstituted-membrane experiments, these Grb2-independent interactions were sufficient to retain human SOS on the membrane for many minutes, during which a single SOS molecule could processively activate thousands of Ras molecules. These observations raised questions concerning how receptors maintain control of SOS in cells and how membrane-recruited SOS is ultimately released. We addressed these questions in quantitative assays of reconstituted SOS-deficient chicken B-cell signaling systems combined with single-molecule measurements in supported membranes. These studies revealed an essentially one-way trafficking process in which membrane-recruited SOS remains trapped on the membrane and continuously activates Ras until being actively removed via endocytosis.

  10. Spin- and valley-polarized one-way Klein tunneling in photonic topological insulators

    Science.gov (United States)

    Slobozhanyuk, Alexey

    2018-01-01

    Recent advances in condensed matter physics have shown that the spin degree of freedom of electrons can be efficiently exploited in the emergent field of spintronics, offering unique opportunities for efficient data transfer, computing, and storage (1–3). These concepts have been inspiring analogous approaches in photonics, where the manipulation of an artificially engineered pseudospin degree of freedom can be enabled by synthetic gauge fields acting on light (4–6). The ability to control these degrees of freedom significantly expands the landscape of available optical responses, which may revolutionize optical computing and the basic means of controlling light in photonic devices across the entire electromagnetic spectrum. We demonstrate a new class of photonic systems, described by effective Hamiltonians in which competing synthetic gauge fields, engineered in pseudospin, chirality/sublattice, and valley subspaces, result in bandgap opening at one of the valleys, whereas the other valley exhibits Dirac-like conical dispersion. We show that this effective response has marked implications on photon transport, among which are as follows: (i) a robust pseudospin- and valley-polarized one-way Klein tunneling and (ii) topological edge states that coexist within the Dirac continuum for opposite valley and pseudospin polarizations. These phenomena offer new ways to control light in photonics, in particular, for on-chip optical isolation, filtering, and wave-division multiplexing by selective action on their pseudospin and valley degrees of freedom. PMID:29756032

  11. Quasi-Newton methods for implicit black-box FSI coupling

    CSIR Research Space (South Africa)

    Bogaers, Alfred EJ

    2014-09-01

    Full Text Available In this paper we introduce a new multi-vector update quasi-Newton (MVQN) method for implicit coupling of partitioned, transient FSI solvers. The new quasi-Newton method facilitates the use of 'black-box' field solvers and under certain circumstances...

  12. Effect of non-normality on test statistics for one-way independent groups designs.

    Science.gov (United States)

    Cribbie, Robert A; Fiksenbaum, Lisa; Keselman, H J; Wilcox, Rand R

    2012-02-01

    The data obtained from one-way independent groups designs is typically non-normal in form and rarely equally variable across treatment populations (i.e., population variances are heterogeneous). Consequently, the classical test statistic that is used to assess statistical significance (i.e., the analysis of variance F test) typically provides invalid results (e.g., too many Type I errors, reduced power). For this reason, there has been considerable interest in finding a test statistic that is appropriate under conditions of non-normality and variance heterogeneity. Previously recommended procedures for analysing such data include the James test, the Welch test applied either to the usual least squares estimators of central tendency and variability, or the Welch test with robust estimators (i.e., trimmed means and Winsorized variances). A new statistic proposed by Krishnamoorthy, Lu, and Mathew, intended to deal with heterogeneous variances, though not non-normality, uses a parametric bootstrap procedure. In their investigation of the parametric bootstrap test, the authors examined its operating characteristics under limited conditions and did not compare it to the Welch test based on robust estimators. Thus, we investigated how the parametric bootstrap procedure and a modified parametric bootstrap procedure based on trimmed means perform relative to previously recommended procedures when data are non-normal and heterogeneous. The results indicated that the tests based on trimmed means offer the best Type I error control and power when variances are unequal and at least some of the distribution shapes are non-normal. © 2011 The British Psychological Society.

  13. One-way-coupling simulation of cavitation accompanied by high-speed droplet impact

    Energy Technology Data Exchange (ETDEWEB)

    Kondo, Tomoki; Ando, Keita, E-mail: kando@mech.keio.ac.jp [Department of Mechanical Engineering, Keio University, 3-14-1 Hiyoshi, Kohoku-ku, Yokohama 223-8522 (Japan)

    2016-03-15

    Erosion due to high-speed droplet impact is a crucial issue in industrial applications. The erosion is caused by the water-hammer loading on material surfaces and possibly by the reloading from collapsing cavitation bubbles that appear within the droplet. Here, we simulate the dynamics of cavitation bubbles accompanied by high-speed droplet impact against a deformable wall in order to see whether the bubble collapse is violent enough to give rise to cavitation erosion on the wall. The evolution of pressure waves in a single water (or gelatin) droplet to collide with a deformable wall at speed up to 110 m/s is inferred from simulations of multicomponent Euler flow where phase changes are not permitted. Then, we examine the dynamics of cavitation bubbles nucleated from micron/submicron-sized gas bubble nuclei that are supposed to exist inside the droplet. For simplicity, we perform Rayleigh–Plesset-type calculations in a one-way-coupling manner, namely, the bubble dynamics are determined according to the pressure variation obtained from the Euler flow simulation. In the simulation, the preexisting bubble nuclei whose size is either micron or submicron show large growth to submillimeters because tension inside the droplet is obtained through interaction of the pressure waves and the droplet interface; this supports the possibility of having cavitation due to the droplet impact. It is also found, in particular, for the case of cavitation arising from very small nuclei such as nanobubbles, that radiated pressure from the cavitation bubble collapse can overwhelm the water-hammer pressure directly created by the impact. Hence, cavitation may need to be accounted for when it comes to discussing erosion in the droplet impact problem.

  14. Investigation of effective thermal conductivity for pebble beds by one-way coupled CFD-DEM method for CFETR WCCB

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Lei [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); University of Science and Technology of China, Hefei, Anhui 230027 (China); Chen, Youhua [University of Science and Technology of China, Hefei, Anhui 230027 (China); Huang, Kai [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); Liu, Songlin, E-mail: slliu@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); University of Science and Technology of China, Hefei, Anhui 230027 (China)

    2016-05-15

    Highlights: • A CFD-DEM coupled numerical model is built based on the prototypical blanket pebble bed. • The numerical model can be applied to simulate heat transfer of a pebble bed and estimate effective thermal conductivity. • The numerical model agrees well with the theoretical SZB model. • Effective thermal conductivity of pebble beds for WCCB is estimated by the current model. - Abstract: The mono-sized beryllium pebble bed and the multi-sized Li{sub 2}TiO{sub 3}/Be{sub 12}Ti mixed pebble bed are the main schemes for the Water-cooled ceramic breeder blanket (WCCB) of China Fusion Engineering Test Reactor (CFETR). And the effective thermal conductivity (k{sub eff}) of the pebble beds is important to characterize the thermal performance of WCCB. In this study, a one-way coupled CFD-DEM method was employed to simulate heat transfer and estimate k{sub eff}. The geometric topology of a prototypical blanket pebble bed was produced by the discrete element method (DEM). Based on the geometric topology, the temperature distribution and the k{sub eff} were obtained by the computational fluid dynamics (CFD) analysis. The current numerical model presented a good performance to calculate k{sub eff} of the beryllium pebble bed, and according to the modeling of the Li{sub 2}TiO{sub 3}/Be{sub 12}Ti mixed pebble bed, k{sub eff} was estimated with values ranged between 2.0 and 4.0 W/(m∙K).

  15. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Kern, Oliver

    2009-05-25

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  16. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    International Nuclear Information System (INIS)

    Kern, Oliver

    2009-01-01

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  17. Optimal design of impeller for centrifugal compressor under the influence of one-way fluid-structure interaction

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Hyun Soo; Kim, Youn Jae [Sungkyunkwan University, Suwon (Korea, Republic of)

    2016-09-15

    In this study, a method for optimal design of impeller for centrifugal compressor under the influence of Fluid-structure interaction (FSI) and Response surface method (RSM) was studied. Numerical simulation was conducted using ANSYS Multi-physics with various configurations of impeller geometry. Each of the design parameters was divided into 3 levels. Total 45 design points were planned by Central composite design (CCD) method, which is one of the Design of experiment (DOE) techniques. Response surfaces generated based on the DOE results were used to find the optimal shape of impeller for high aerodynamic performance. The whole process of optimization was conducted using ANSYS Design xplorer (DX). Through the optimization, structural safety and aerodynamic performance of centrifugal compressor were improved.

  18. Optimal design of impeller for centrifugal compressor under the influence of one-way fluid-structure interaction

    International Nuclear Information System (INIS)

    Kang, Hyun Soo; Kim, Youn Jae

    2016-01-01

    In this study, a method for optimal design of impeller for centrifugal compressor under the influence of Fluid-structure interaction (FSI) and Response surface method (RSM) was studied. Numerical simulation was conducted using ANSYS Multi-physics with various configurations of impeller geometry. Each of the design parameters was divided into 3 levels. Total 45 design points were planned by Central composite design (CCD) method, which is one of the Design of experiment (DOE) techniques. Response surfaces generated based on the DOE results were used to find the optimal shape of impeller for high aerodynamic performance. The whole process of optimization was conducted using ANSYS Design xplorer (DX). Through the optimization, structural safety and aerodynamic performance of centrifugal compressor were improved

  19. Fish ladder of Lajeado Dam: migrations on one-way routes?

    Directory of Open Access Journals (Sweden)

    Angelo Antônio Agostinho

    half of the reservoir; those found in water flowing through the spillways, turbines or fish ladder of Lajeado Dam belonged essentially to non-migratory clupeids that spawn in the inner part of the reservoir. In addition, results showed that in a reservoir with no fish-passage mechanism, migrants select habitats that still maintain riverine characteristics, in the upper parts of the impounded area. The downward movements are negligible compared to those upward, in the experiments conducted in the fish ladder. It is concluded, therefore, that the Lajeado fish ladder, and possibly those at other dams, is essentially a one-way route that promotes upstream movements of migrants, without the necessary return of adults or their offspring. Thus, the low permeability of the connections provided by these management tools can drastically increase the level of environmental impact that they were actually intended to reduce.

  20. Non-reciprocity and topology in optics: one-way road for light via surface magnon polariton

    Science.gov (United States)

    Ochiai, Tetsuyuki

    2015-01-01

    We show how non-reciprocity and topology are used to construct an optical one-way waveguide in the Voigt geometry. First, we present a traditional approach of the one-way waveguide of light using surface polaritons under a static magnetic field. Second, we explain a recent discovery of a topological approach using photonic crystals with the magneto-optical coupling. Third, we present a combination of the two approaches, toward a broadband one-way waveguide in the microwave range. PMID:27877739

  1. Can the one-way speed of light be used for detection of violations of the relativity principle?

    International Nuclear Information System (INIS)

    Spavieri, Gianfranco; Quintero, Jesús; Unnikrishnan, C.S.; Gillies, George T.; Cavalleri, Giancarlo; Tonni, Ernesto; Bosi, Leonardo

    2012-01-01

    Experimental attempts at measurement of the one-way speed of light are considered within the framework of relativistic theories. We show that if the effect of clock transport is taken into account, the observations from this class of experiment do not actually lead to either measurement of the one-way speed of light or determination of the absolute velocity of the preferred frame (even if, for non-entrained ether theories, such a frame were to exist). -- Highlights: ► We consider preferred frame theories that agree with experiments that support SR. ► Measurements of the one-way speed of light is discussed. ► The effect of clock transport is taken into account. ► These experiments do not lead to measurement of the one-way speed of light. ► The absolute velocity of the preferred frame cannot be detected.

  2. Deterministic one-way simulation of two-way, real-time cellular automata and its related problems

    Energy Technology Data Exchange (ETDEWEB)

    Umeo, H; Morita, K; Sugata, K

    1982-06-13

    The authors show that for any deterministic two-way, real-time cellular automaton, m, there exists a deterministic one-way cellular automation which can simulate m in twice real-time. Moreover the authors present a new type of deterministic one-way cellular automata, called circular cellular automata, which are computationally equivalent to deterministic two-way cellular automata. 7 references.

  3. Performance Comparison of Reservation Based and Instant Access One-Way Car Sharing Service through Discrete Event Simulation

    Directory of Open Access Journals (Sweden)

    Ganjar Alfian

    2015-09-01

    Full Text Available A car sharing service has been highlighted as a new urban transport alternative for an environmentally friendly economy. As the demand for the service from customers increases, car sharing operators need to introduce a new service such as a one-way option that will allow customers to return the car to different stations. Due to the complexity of the one-way system, it needs to be managed and optimized for real cases. This paper focuses on developing a simulation model in order to help operators evaluate the performance of the one-way service. In addition, this research demonstrates a strategy for an open one-way service that can increase revenue and customer satisfaction. A real case dataset is used for investigation to find the best result from the simulation. The result showed that the total number of cars, number of one-way reservations and station size have an impact on one-way performance. Thus, company profit and customer satisfaction can be maximized by optimizing these factors.

  4. FSI-based Overflow Assessment of the Seismically-Isolated SFP with Fuel Racks

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Gil Y.; Park, Hyun T.; Chang, Soo-Hyuk [Korea Maintenance Co., Seoul (Korea, Republic of); Lee, Sang-Hoon [KEPCO E-C, Yongin (Korea, Republic of)

    2014-10-15

    To date, effectiveness of the seismic isolation systems for reducing seismic force effectively has been well demonstrated. In this context, practical application of the technology in nuclear engineering fields has become an important issue more and more. This is because fluid motion can be rather amplified due to the increased relative displacement between the base and superstructures by a long-period shift. Therefore, overflow assessment and prediction of the seismically-isolated SFP have to be conducted in design phase. For performing sloshing-induced overflow of the seismically-isolated SFP, a fluid-structure interaction(FSI) approach making a two-way coupling process between structural and fluid solvers is herein employed. In this study, fuel racks inside the SFP are included in FSI modeling to investigate effect of fuel-cell assemblies on SFP overflow. Accordingly, three different assembly sets of fuel cells are assumed to be inserted in fuel racks. In addition, floor acceleration time-histories produced from three different amplitudes of peak ground acceleration (PGA) are applied to the SFP base to investigate load effect on liquid overflow. An approach for the liquid overflow assessment of the seismically-isolated nuclear SFP with fuel storage racks based on FSI analysis was addressed. From the results of the identified cases, the following conclusions are drawn: (i) FSI technique can be effectively used to assess the seismically-isolated SFP overflow, (ii) In a conservative way, the isolated SFP without fuel racks can be used to assess its sloshing-induced overflow under earthquake since effect of fuel-cell assemblies on the SFP overflow is not significant, (iii) for given same conditions (e.g., constant design free surface, same fuel-cell assembly) except seismic loading, the higher PGA is, the more liquid overflow increases.

  5. The Family Socialization Interview—Revised (FSI-R): a Comprehensive Assessment of Parental Disciplinary Behaviors

    OpenAIRE

    O’Dor, Sarah L.; Grasso, Damion J.; Forbes, Danielle; Bates, John E.; McCarthy, Kimberly J.; Wakschlag, Lauren S.; Briggs-Gowan, Margaret J.

    2017-01-01

    Elucidating the complex mechanisms by which harsh parenting increases risk of child psychopathology is key to targeted prevention. This requires nuanced methods that capture the varied perceptions and experiences of diverse families. The Family Socialization Interview—Revised (FSI-R), adapted from an interview developed by Dodge et al. (Child Development, 65,649–665,1994), is a comprehensive, semi-structured interview for characterizing methods of parental discipline used with young children....

  6. Heteroscedastic Tests Statistics for One-Way Analysis of Variance: The Trimmed Means and Hall's Transformation Conjunction

    Science.gov (United States)

    Luh, Wei-Ming; Guo, Jiin-Huarng

    2005-01-01

    To deal with nonnormal and heterogeneous data for the one-way fixed effect analysis of variance model, the authors adopted a trimmed means method in conjunction with Hall's invertible transformation into a heteroscedastic test statistic (Alexander-Govern test or Welch test). The results of simulation experiments showed that the proposed technique…

  7. Moments Based Framework for Performance Analysis of One-Way/Two-Way CSI-Assisted AF Relaying

    KAUST Repository

    Xia, Minghua

    2012-09-01

    When analyzing system performance of conventional one-way relaying or advanced two-way relaying, these two techniques are always dealt with separately and, thus, their performance cannot be compared efficiently. Moreover, for ease of mathematical tractability, channels considered in such studies are generally assumed to be subject to Rayleigh fading or to be Nakagami-$m$ channels with integer fading parameters, which is impractical in typical urban environments. In this paper, we propose a unified moments-based framework for general performance analysis of channel-state-information (CSI) assisted amplify-and-forward (AF) relaying systems. The framework is applicable to both one-way and two-way relaying over arbitrary Nakagami-$m$ fading channels, and it includes previously reported results as special cases. Specifically, the mathematical framework is firstly developed under the umbrella of the weighted harmonic mean of two Gamma-distributed variables in conjunction with the theory of Pad\\\\\\'e approximants. Then, general expressions for the received signal-to-noise ratios of the users in one-way/two-way relaying systems and the corresponding moments, moment generation function, and cumulative density function are established. Subsequently, the mathematical framework is applied to analyze, compare, and gain insights into system performance of one-way and two-way relaying techniques, in terms of outage probability, average symbol error probability, and achievable data rate. All analytical results are corroborated by simulation results as well as previously reported results whenever available, and they are shown to be efficient tools to evaluate and compare system performance of one-way and two-way relaying.

  8. One-way quantum computation via manipulation of polarization and momentum qubits in two-photon cluster states

    International Nuclear Information System (INIS)

    Vallone, G; Pomarico, E; De Martini, F; Mataloni, P

    2008-01-01

    Four-qubit cluster states of two photons entangled in polarization and linear momentum have been used to realize a complete set of single qubit rotations and the C-NOT gate for equatorial qubits with high values of fidelity. By the computational equivalence of the two degrees of freedom our result demonstrate the suitability of two photon cluster states for rapid and efficient one-way quantum computing

  9. Performance of a reduced-order FSI model for flow-induced vocal fold vibration

    Science.gov (United States)

    Luo, Haoxiang; Chang, Siyuan; Chen, Ye; Rousseau, Bernard; PhonoSim Team

    2017-11-01

    Vocal fold vibration during speech production involves a three-dimensional unsteady glottal jet flow and three-dimensional nonlinear tissue mechanics. A full 3D fluid-structure interaction (FSI) model is computationally expensive even though it provides most accurate information about the system. On the other hand, an efficient reduced-order FSI model is useful for fast simulation and analysis of the vocal fold dynamics, which can be applied in procedures such as optimization and parameter estimation. In this work, we study performance of a reduced-order model as compared with the corresponding full 3D model in terms of its accuracy in predicting the vibration frequency and deformation mode. In the reduced-order model, we use a 1D flow model coupled with a 3D tissue model that is the same as in the full 3D model. Two different hyperelastic tissue behaviors are assumed. In addition, the vocal fold thickness and subglottal pressure are varied for systematic comparison. The result shows that the reduced-order model provides consistent predictions as the full 3D model across different tissue material assumptions and subglottal pressures. However, the vocal fold thickness has most effect on the model accuracy, especially when the vocal fold is thin.

  10. Accuracy & Computational Considerations for Wide--Angle One--way Seismic Propagators and Multiple Scattering by Invariant Embedding

    Science.gov (United States)

    Thomson, C. J.

    2004-12-01

    Pseudodifferential operators (PSDOs) yield in principle exact one--way seismic wave equations, which are attractive both conceptually and for their promise of computational efficiency. The one--way operators can be extended to include multiple--scattering effects, again in principle exactly. In practice approximations must be made and, as an example, the variable--wavespeed Helmholtz equation for scalar waves in two space dimensions is here factorized to give the one--way wave equation. This simple case permits clear identification of a sequence of physically reasonable approximations to be used when the mathematically exact PSDO one--way equation is implemented on a computer. As intuition suggests, these approximations hinge on the medium gradients in the direction transverse to the main propagation direction. A key point is that narrow--angle approximations are to be avoided in the interests of accuracy. Another key consideration stems from the fact that the so--called ``standard--ordering'' PSDO indicates how lateral interpolation of the velocity structure can significantly reduce computational costs associated with the Fourier or plane--wave synthesis lying at the heart of the calculations. The decision on whether a slow or a fast Fourier transform code should be used rests upon how many lateral model parameters are truly distinct. A third important point is that the PSDO theory shows what approximations are necessary in order to generate an exponential one--way propagator for the laterally varying case, representing the intuitive extension of classical integral--transform solutions for a laterally homogeneous medium. This exponential propagator suggests the use of larger discrete step sizes, and it can also be used to approach phase--screen like approximations (though the latter are not the main interest here). Numerical comparisons with finite--difference solutions will be presented in order to assess the approximations being made and to gain an understanding

  11. Structural Behavior of Fibrous Reinforced Concrete Hollow Core One-Way Slabs Strengthening by C.F.R.P

    Directory of Open Access Journals (Sweden)

    وصيف مجيد

    2016-02-01

    Full Text Available A reinforced concrete hollow core one-way slab is one of the types of slabs used widely around the world in residential and industrial buildings to take advantage of them Economic and thermal insulation as well as to reduce the self-weight of the construction. The aim of the present study is to examine the structural behavior of the reinforced concrete hollow core one-way slabs reduce failure using the normal concrete and fibrous concrete and then strengthened using carbon fiber(CFRPThis study include molding of ( 6 specimens differ in terms of the voids volume (Vv , volumetric percentage of steel fibers (ا, and then strengthened by using fibers of carbon , with the aim of rehabilitation by fibers, carbon polymer (CFRP is to find out how efficient element structural when treated after the occurrence of the failure and the validity of its use in the event of a failure has occurred entirely or partly in the roof, and re- examined using the same method and conditions that were examined ceilings is affected through it, knowing that these ceilings have been addressed and strengthened in the same way , the results of the tests of the models that have been rehabilitated using carbon fiber (CFRP, compared with the same models before strengthening and examined reduce failure, increased very high susceptibility endurance extreme , with the increase ranging from (51.6% to (96.2%, as has been observed decrease in deflection value of models after strengthening by (CFRP.It is concluded through this study the possibility of using its concrete hollow core one-way slab as a roofing system for buildings also proved the highly efficient for this slab after rehabilitation using carbon fiber (CFRP.

  12. structural behavior of fibrous reinforced concrete hollowcore one-way slabs strengthening by C.F.R.P

    Directory of Open Access Journals (Sweden)

    wassif khudair majeed

    2016-02-01

    Full Text Available Abstract A reinforced concrete hollow core one-way slab is one of the types of slabs used widely around the world in residential and industrial buildings to take advantage of them Economic and thermal insulation as well as to reduce the self weight of the construction . The aim of the present study is to examine the structural behavior of the reinforced concrete hollow core one-way slabs  reduce failure using the normal concrete and fibrous concrete and then strengthened using carbon fiber(CFRP This study include molding of ( 6 specimens differ in terms of the voids volume (Vv , volumetric percentage of steel fibers ( , and then strengthened by using fibers of carbon , with the aim of rehabilitation by fibers, carbon polymer (CFRP is to find out how efficient element structural when treated after the occurrence of the failure and the validity of its use in the event of a failure has occurred entirely or partly in the roof, and re- examined using the same method and conditions that were examined ceilings is affected through it, knowing that these ceilings have been addressed and strengthened in the same way , the results of the tests of the models that have been rehabilitated using carbon fiber (CFRP, compared with the same models before strengthening and examined reduce failure, increased very high susceptibility endurance extreme , with the increase ranging from (51.6% to ( 96.2% , as has been observed decrease in deflection value of models after strengthening by (CFRP. It is concluded through this study the possibility of using its concrete hollow core one-way slab as a roofing system for buildings also proved the highly efficient for this slab after rehabilitation using carbon fiber (CFRP .

  13. Resource cost results for one-way entanglement distillation and state merging of compound and arbitrarily varying quantum sources

    International Nuclear Information System (INIS)

    Boche, H.; Janßen, G.

    2014-01-01

    We consider one-way quantum state merging and entanglement distillation under compound and arbitrarily varying source models. Regarding quantum compound sources, where the source is memoryless, but the source state an unknown member of a certain set of density matrices, we continue investigations begun in the work of Bjelaković et al. [“Universal quantum state merging,” J. Math. Phys. 54, 032204 (2013)] and determine the classical as well as entanglement cost of state merging. We further investigate quantum state merging and entanglement distillation protocols for arbitrarily varying quantum sources (AVQS). In the AVQS model, the source state is assumed to vary in an arbitrary manner for each source output due to environmental fluctuations or adversarial manipulation. We determine the one-way entanglement distillation capacity for AVQS, where we invoke the famous robustification and elimination techniques introduced by Ahlswede. Regarding quantum state merging for AVQS we show by example that the robustification and elimination based approach generally leads to suboptimal entanglement as well as classical communication rates

  14. Self-biased broadband magnet-free linear isolator based on one-way space-time coherency

    Science.gov (United States)

    Taravati, Sajjad

    2017-12-01

    This paper introduces a self-biased broadband magnet-free and linear isolator based on one-way space-time coherency. The incident wave and the space-time-modulated medium share the same temporal frequency and are hence temporally coherent. However, thanks to the unidirectionally of the space-time modulation, the space-time-modulated medium and the incident wave are spatially coherent only in the forward direction and not in the opposite direction. As a consequence, the energy of the medium strongly couples to the propagating wave in the forward direction, while it conflicts with the propagating wave in the opposite direction, yielding strong isolation. We first derive a closed-form solution for the wave scattering from a spatiotemporally coherent medium and then show that a perfectly coherent space-time-modulated medium provides a moderate isolation level which is also subject to one-way transmission gain. To overcome this issue, we next investigate the effect of space-coherency imperfection between the medium and the wave, while they are still perfectly temporally coherent. Leveraging the spatial-coherency imperfection, the medium exhibits a quasiarbitrary and strong nonreciprocal transmission. Finally, we present the experimental demonstration of the self-biased version of the proposed broadband isolator, exhibiting more than 122 % fractional operation bandwidth.

  15. Three dimensional, numerical analysis of an elasto hydrodynamic lubrication using fluid structure interaction (FSI) approach

    Science.gov (United States)

    Hanoca, P.; Ramakrishna, H. V.

    2018-03-01

    This work is related to develop a methodology to model and simulate the TEHD using the sequential application of CFD and CSD. The FSI analyses are carried out using ANSYS Workbench. In this analysis steady state, 3D Navier-Stoke equations along with energy equation are solved. Liquid properties are introduced where the viscosity and density are the function of pressure and temperature. The cavitation phenomenon is adopted in the analysis. Numerical analysis has been carried at different speeds and surfaces temperatures. During the analysis, it was found that as speed increases, hydrodynamic pressures will also increases. The pressure profile obtained from the Roelands equation is more sensitive to the temperature as compared to the Barus equation. The stress distributions specify the significant positions in the bearing structure. The developed method is capable of giving latest approaching into the physics of elasto hydrodynamic lubrication.

  16. Validation of a numerical FSI simulation of an aortic BMHV by in vitro PIV experiments.

    Science.gov (United States)

    Annerel, S; Claessens, T; Degroote, J; Segers, P; Vierendeels, J

    2014-08-01

    In this paper, a validation of a recently developed fluid-structure interaction (FSI) coupling algorithm to simulate numerically the dynamics of an aortic bileaflet mechanical heart valve (BMHV) is performed. This validation is done by comparing the numerical simulation results with in vitro experiments. For the in vitro experiments, the leaflet kinematics and flow fields are obtained via the particle image velocimetry (PIV) technique. Subsequently, the same case is numerically simulated by the coupling algorithm and the resulting leaflet kinematics and flow fields are obtained. Finally, the results are compared, revealing great similarity in leaflet motion and flow fields between the numerical simulation and the experimental test. Therefore, it is concluded that the developed algorithm is able to capture very accurately all the major leaflet kinematics and dynamics and can be used to study and optimize the design of BMHVs. Copyright © 2014 IPEM. Published by Elsevier Ltd. All rights reserved.

  17. ZrFsy1, a high-affinity fructose/H+ symporter from fructophilic yeast Zygosaccharomyces rouxii.

    Directory of Open Access Journals (Sweden)

    Maria José Leandro

    Full Text Available Zygosaccharomyces rouxii is a fructophilic yeast than can grow at very high sugar concentrations. We have identified an ORF encoding a putative fructose/H(+ symporter in the Z. rouxii CBS 732 genome database. Heterologous expression of this ORF in a S. cerevisiae strain lacking its own hexose transporters (hxt-null and subsequent kinetic characterization of its sugar transport activity showed it is a high-affinity low-capacity fructose/H(+ symporter, with Km 0.45 ± 0.07 mM and Vmax 0.57 ± 0.02 mmol h(-1 (gdw(-1. We named it ZrFsy1. This protein also weakly transports xylitol and sorbose, but not glucose or other hexoses. The expression of ZrFSY1 in Z. rouxii is higher when the cells are cultivated at extremely low fructose concentrations (<0.2% and on non-fermentable carbon sources such as mannitol and xylitol, where the cells have a prolonged lag phase, longer duplication times and change their microscopic morphology. A clear phenotype was determined for the first time for the deletion of a fructose/H(+ symporter in the genome where it occurs naturally. The effect of the deletion of ZrFSY1 in Z. rouxii cells is only evident when the cells are cultivated at very low fructose concentrations, when the ZrFsy1 fructose symporter is the main active fructose transporter system.

  18. Fluid-Induced Vibration Analysis for Reactor Internals Using Computational FSI Method

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Jong Sung; Yi, Kun Woo; Sung, Ki Kwang; Im, In Young; Choi, Taek Sang [KEPCO E and C, Daejeon (Korea, Republic of)

    2013-10-15

    This paper introduces a fluid-induced vibration analysis method which calculates the response of the RVI to both deterministic and random loads at once and utilizes more realistic pressure distribution using the computational Fluid Structure Interaction (FSI) method. As addressed above, the FIV analysis for the RVI was carried out using the computational FSI method. This method calculates the response to deterministic and random turbulence loads at once. This method is also a simple and integrative method to get structural dynamic responses of reactor internals to various flow-induced loads. Because the analysis of this paper omitted the bypass flow region and Inner Barrel Assembly (IBA) due to the limitation of computer resources, it is necessary to find an effective way to consider all regions in the RV for the FIV analysis in the future. Reactor coolant flow makes Reactor Vessel Internals (RVI) vibrate and may affect the structural integrity of them. U. S. NRC Regulatory Guide 1.20 requires the Comprehensive Vibration Assessment Program (CVAP) to verify the structural integrity of the RVI for Fluid-Induced Vibration (FIV). The hydraulic forces on the RVI of OPR1000 and APR1400 were computed from the hydraulic formulas and the CVAP measurements in Palo Verde Unit 1 and Yonggwang Unit 4 for the structural vibration analyses. In this method, the hydraulic forces were divided into deterministic and random turbulence loads and were used for the excitation forces of the separate structural analyses. These forces are applied to the finite element model and the responses to them were combined into the resultant stresses.

  19. A Hybrid One-Way ANOVA Approach for the Robust and Efficient Estimation of Differential Gene Expression with Multiple Patterns.

    Directory of Open Access Journals (Sweden)

    Mohammad Manir Hossain Mollah

    Full Text Available Identifying genes that are differentially expressed (DE between two or more conditions with multiple patterns of expression is one of the primary objectives of gene expression data analysis. Several statistical approaches, including one-way analysis of variance (ANOVA, are used to identify DE genes. However, most of these methods provide misleading results for two or more conditions with multiple patterns of expression in the presence of outlying genes. In this paper, an attempt is made to develop a hybrid one-way ANOVA approach that unifies the robustness and efficiency of estimation using the minimum β-divergence method to overcome some problems that arise in the existing robust methods for both small- and large-sample cases with multiple patterns of expression.The proposed method relies on a β-weight function, which produces values between 0 and 1. The β-weight function with β = 0.2 is used as a measure of outlier detection. It assigns smaller weights (≥ 0 to outlying expressions and larger weights (≤ 1 to typical expressions. The distribution of the β-weights is used to calculate the cut-off point, which is compared to the observed β-weight of an expression to determine whether that gene expression is an outlier. This weight function plays a key role in unifying the robustness and efficiency of estimation in one-way ANOVA.Analyses of simulated gene expression profiles revealed that all eight methods (ANOVA, SAM, LIMMA, EBarrays, eLNN, KW, robust BetaEB and proposed perform almost identically for m = 2 conditions in the absence of outliers. However, the robust BetaEB method and the proposed method exhibited considerably better performance than the other six methods in the presence of outliers. In this case, the BetaEB method exhibited slightly better performance than the proposed method for the small-sample cases, but the the proposed method exhibited much better performance than the BetaEB method for both the small- and large

  20. Collimated-hole structures as efficient differential pumping barrier, one-way valve and tool for aligning Penning traps

    International Nuclear Information System (INIS)

    Kluge, H.-Jürgen; Block, Michael; Herfurth, Frank

    2011-01-01

    A collimated-hole structure consists of a very large number of parallel channels which have each a very small diameter and are closely packed together. Such devices, installed in vacuum systems allow one to separate regions of very different gas pressures. A collimated-hole structure has high transmission for a directed ion beam with low emittance but a very low conductance for rest gas atoms or molecules exhibiting random walk. Therefore it is proposed to use such a structure as one-way valve and/or efficient differential pumping barrier in set-ups using Penning traps. Furthermore, these devices might be very useful to align the axis of a Penning trap with the direction of the magnetic field lines which is essential to avoid systematic uncertainties in high-accuracy mass spectroscopy.

  1. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

    Science.gov (United States)

    Scarani, Valerio; Renner, Renato

    2008-05-23

    We derive a bound for the security of quantum key distribution with finite resources under one-way postprocessing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols such as Bennett-Brassard 1984 and six-states protocol. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N approximately 10(5) signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates.

  2. Analyses of different configurations for a multiple rod Nd:YAG system with a one-way travelling probe beam

    International Nuclear Information System (INIS)

    Wang, You; Kan, Hirofumi; Ogawa, Takayo; Wada, Satoshi

    2011-01-01

    In this paper, the birefringence in an LD-side-pumped solid-state laser (LSPSSL) system is studied by using a quasi plane-wave probe beam. The effects on birefringence compensation have been investigated for different coupling systems arranged between two tandem-set rods. Both the aperture obstruction and the thermally induced lens effect have been taken into consideration in the theoretical explanation. It is shown that most birefringence can be successfully removed by using a suitable lens system as well as a quartz 90° rotator. In construction of a real resonator, such performances as the birefringence compensation, the extraction efficiency, and the high-order-mode control must be carefully balanced at the same time. Although the conclusions are based on analyses of a one-way travelling wave, the methodology introduced in this paper is thought to be useful for a stationary-wave design of the laser oscillator

  3. Vagus nerve stimulation ameliorated deficits in one-way active avoidance learning and stimulated hippocampal neurogenesis in bulbectomized rats.

    Science.gov (United States)

    Gebhardt, Nils; Bär, Karl-Jürgen; Boettger, Michael K; Grecksch, Gisela; Keilhoff, Gerburg; Reichart, Rupert; Becker, Axel

    2013-01-01

    Vagus nerve stimulation (VNS) has been introduced as a therapeutic option for treatment-resistant depression. The neural and chemical mechanisms responsible for the effects of VNS are largely unclear. Bilateral removal of the olfactory bulbs (OBX) is a validated animal model in depression research. We studied the effects of vagus nerve stimulation (VNS) on disturbed one-way active avoidance learning and neurogenesis in the hippocampal dentate gyrus of rats. After a stimulation period of 3 weeks, OBX rats acquired the learning task as controls. In addition, the OBX-related decrease of neuronal differentiated BrdU positive cells in the dentate gyrus was prevented by VNS. This suggests that chronic VNS and changes in hippocampal neurogenesis induced by VNS may also account for the amelioration of behavioral deficits in OBX rats. To the best of our knowledge, this is the first report on the restorative effects of VNS on behavioral function in an animal model of depression that can be compared with the effects of antidepressants. Copyright © 2013 Elsevier Inc. All rights reserved.

  4. A Novel Through Capacity Model for One-way Channel Based on Characteristics of the Vessel Traffic Flow

    Directory of Open Access Journals (Sweden)

    Yuanyuan Nie

    2017-09-01

    Full Text Available Vessel traffic flow is a key parameter for channel-through capacity and is of great significance to vessel traffic management, channel and port design and navigational risk evaluation. Based on the study of parameters of characteristics of vessel traffic flow related to channel-through capacity, this paper puts forward a brand-new mathematical model for one-way channel-through capacity in which parameters of channel length, vessel arrival rate and velocity difference in different vessels are involved and a theoretical calculating mechanism for the channel-through capacity is provided. In order to verify availability and reliability of the model, extensive simulation studies have been carried out and based on the historical AIS data, an analytical case study on the Xiazhimen Channel validating the proposed model is presented. Both simulation studies and the case study show that the proposed model is valid and all relative parameters can be readjusted and optimized to further improve the channel-through capacity. Thus, all studies demonstrate that the model is valuable for channel design and vessel management.

  5. No-go theorem for one-way quantum computing on naturally occurring two-level systems

    International Nuclear Information System (INIS)

    Chen Jianxin; Chen Xie; Duan Runyao; Ji Zhengfeng; Zeng Bei

    2011-01-01

    The ground states of some many-body quantum systems can serve as resource states for the one-way quantum computing model, achieving the full power of quantum computation. Such resource states are found, for example, in spin-(5/2) and spin-(3/2) systems. It is, of course, desirable to have a natural resource state in a spin-(1/2), that is, qubit system. Here, we give a negative answer to this question for frustration-free systems with two-body interactions. In fact, it is shown to be impossible for any genuinely entangled qubit state to be a nondegenerate ground state of any two-body frustration-free Hamiltonian. What is more, we also prove that every spin-(1/2) frustration-free Hamiltonian with two-body interaction always has a ground state that is a product of single- or two-qubit states. In other words, there cannot be any interesting entanglement features in the ground state of such a qubit Hamiltonian.

  6. Assessing Fan Flutter Stability in Presence of Inlet Distortion Using One-Way and Two-Way Coupled Methods

    Science.gov (United States)

    Herrick, Gregory P.

    2014-01-01

    Concerns regarding noise, propulsive efficiency, and fuel burn are inspiring aircraft designs wherein the propulsive turbomachines are partially (or fully) embedded within the airframe; such designs present serious concerns with regard to aerodynamic and aeromechanic performance of the compression system in response to inlet distortion. Previously, a preliminary design of a forward-swept high-speed fan exhibited flutter concerns in clean-inlet flows, and the present author then studied this fan further in the presence of off-design distorted in-flows. Continuing this research, a three-dimensional, unsteady, Navier-Stokes computational fluid dynamics code is again applied to analyze and corroborate fan performance with clean inlet flow and now with a simplified, sinusoidal distortion of total pressure at the aerodynamic interface plane. This code, already validated in its application to assess aerodynamic damping of vibrating blades at various flow conditions using a one-way coupled energy-exchange approach, is modified to include a two-way coupled timemarching aeroelastic simulation capability. The two coupling methods are compared in their evaluation of flutter stability in the presence of distorted in-flows.

  7. A comparative study on the effectiveness of one-way printed communication versus videophone interactive interviews on health promotion.

    Science.gov (United States)

    Homma, Satoki; Imamura, Haruhiko; Nakamura, Toru; Fujimura, Kaori; Ito, Yoshihiro; Maeda, Yuji; Kaneko, Ikuyo

    2016-01-01

    We performed a comparative study of a health education programme that was delivered either through one-way communication with printed media, or through interactive videophone interviews. We aimed to ascertain which mode of counselling, when used in combination with telemonitoring, is more effective at lifestyle modification intended to improve health status. Participants, who were residents of Kurihara city in Miyagi prefecture, Japan, were randomized into two groups: one group received individualized monthly documented reports (n = 33; 22 females; average age: 67.2 years), and the other received interactive videophone communication (n = 35; 22 females; average age: 65.1 years) for three months. Telemonitoring was conducted on both groups, using a pedometer, weighing scale and a sphygmomanometer. Pre- and post-intervention, anthropometric measurements and blood tests were performed; the participants also completed self-administered questionnaires. The two groups showed similar degrees of health status improvement and satisfaction levels. However, the participants in the videophone group were more aware of improvements in their lifestyles than were the participants in the document group. The individualized printed communication programme was less time-consuming compared to videophone communication. Further studies are needed to formulate a balanced protocol for a counselling-cum-telemonitoring programme that provides optimal health improvement and cost performance with the available human resources. © The Author(s) 2015.

  8. Two-way against one-way nesting for climate downscaling in Europe and the Mediterranean region using LMDZ4

    Science.gov (United States)

    Li, Shan; Li, Laurent; Le Treut, Hervé

    2016-04-01

    In the 21st century, the estimated surface temperature warming projected by General Circulation Models (GCMs) is between 0.3 and 4.8 °C, depending on the scenario considered. GCMs exhibit a good representation of climate on a global scale, but they are not able to reproduce regional climate processes with the same level of accuracy. Society and policymakers need model projections to define climate change adaptation and mitigation policies on a global, regional and local scale. Climate downscaling is mostly conducted with a regional model nested into the outputs of a global model. This one-way nesting approach is generally used in the climate community without feedbacks from Regional Climate Models (RCMs) to GCMs. This lack of interaction between the two models may affect regional modes of variability, in particular those with a boundary conflict. The objective of this study is to evaluate a two-way nesting configuration that makes an interactive coupling between the RCM and the GCM, an approach against the traditional configuration of one-way nesting system. An additional aim of this work is to examine if the two-way nesting system can improve the RCM performance. The atmospheric component of the IPSL integrated climate model (LMDZ) is configured at both regional (LMDZ-regional) and global (LMDZ-global) scales. The two models have the same configuration for the dynamical framework and the physical forcings. The climatology values of sea surface temperature (SST) are prescribed for the two models. The stretched-grid of LMDZ-global is applied to a region defined by Europe, the Mediterranean, North Africa and Western North Atlantic. To ensure a good statistical significance of results, all simulations last at least 80 years. The nesting process of models is performed by a relaxation procedure of a time scale of 90 minutes. In the case of two-way nesting, the exchange between the two models is every two hours. The relaxation procedure induces a boundary conflict

  9. [The relationship between Ridit analysis and rank sum test for one-way ordinal contingency table in medical research].

    Science.gov (United States)

    Wang, Ling; Xia, Jie-lai; Yu, Li-li; Li, Chan-juan; Wang, Su-zhen

    2008-06-01

    To explore several numerical methods of ordinal variable in one-way ordinal contingency table and their interrelationship, and to compare corresponding statistical analysis methods such as Ridit analysis and rank sum test. Formula deduction was based on five simplified grading approaches including rank_r(i), ridit_r(i), ridit_r(ci), ridit_r(mi), and table scores. Practical data set was verified by SAS8.2 in clinical practice (to test the effect of Shiwei solution in treatment for chronic tracheitis). Because of the linear relationship of rank_r(i) = N ridit_r(i) + 1/2 = N ridit_r(ci) = (N + 1) ridit_r(mi), the exact chi2 values in Ridit analysis based on ridit_r(i), ridit_r(ci), and ridit_r(mi), were completely the same, and they were equivalent to the Kruskal-Wallis H test. Traditional Ridit analysis was based on ridit_r(i), and its corresponding chi2 value calculated with an approximate variance (1/12) was conservative. The exact chi2 test of Ridit analysis should be used when comparing multiple groups in the clinical researches because of its special merits such as distribution of mean ridit value on (0,1) and clear graph expression. The exact chi2 test of Ridit analysis can be output directly by proc freq of SAS8.2 with ridit and modridit option (SCORES =). The exact chi2 test of Ridit analysis is equivalent to the Kruskal-Wallis H test, and should be used when comparing multiple groups in the clinical researches.

  10. Challenging the One-Way Paradigm for More Effective Science Communication: A Critical Review of Two Public Campaigns Addressing Contentious Environmental Issues

    Science.gov (United States)

    McEntee, Marie; Mortimer, Claire

    2013-01-01

    This article examines two large-scale public communication campaigns to explore the appropriateness and effectiveness of using one-way communication in contentious environmental issues. The findings show while one-way communication can be successfully employed in contentious issues, it is not appropriate for all contexts and may contribute to…

  11. Development of seismic analysis method considered FSI effect on a neutron reflector for APWR reactor internals

    Energy Technology Data Exchange (ETDEWEB)

    Hideyuki, Morika; Tomomichi, Nakamura [Mitsubishi Heavy Industries Ltd., Takasago R and D Center, Hyogo (Japan); Toshio, Ichikawa; Kazuo, Hirota; Hiroyuki, Murakiso [Mitsubishi Heavy Industries Ltd., Kobe Shipyard and Machinery Works, Hyogo, Kobe (Japan); Minoru, Murota [Japan Atomic Power Co., Tokyo (Japan)

    2004-07-01

    A Neutron Reflector (NR) is a new structure designed for improving the structure reliability of Advanced Pressurized Water Reactors (APWR,). The NR is placed in a narrow gap between the NR and a Core Barrel (CB). In the case of a structure surrounded by liquid in a narrow gap, the added fluid mass and the damping increases compared with in the air. This effect is famous for Fluid-Structure Interaction effect (FSI effect) in the narrow gap and it depends on the vibration displacement of the structure. A new method to estimate the added fluid damping for this case has been introduced by some of the authors in 2001, which is based on a narrow passage flow theory (Morita et al., 2001). Following this theory, a vibration test was performed to assess the appropriateness of the analysis method employed to measure the response of the NR during an earthquake (Nakamura et al., 2002). In this paper, results of a model test are shown comparing the data with the calculated ones based on the new analysis method that is combined the above method with the ANSYS computer code. As a result, a new seismic analysis method using the above theory was developed. The analytical results are in good agreement with the test results. (authors)

  12. LES with acoustics and FSI for deforming plates in gas flow

    Energy Technology Data Exchange (ETDEWEB)

    Nilsson, Per, E-mail: pnilsson@tuv-nord.com [European Spallation Source, Lund (Sweden); Lillberg, Eric [Westinghouse, Vaesteras (Sweden); Wikstroem, Niklas [FS Dynamics, Stockholm (Sweden)

    2012-12-15

    This concerns Flow Induced Vibrations (FIV) in nuclear reactors and numerical analysis of such. Special attention is paid to structural excitation by sound generated remotely and turbulent flow around the structure. One hypothesis was that these phenomena can interact, so that the structure accumulates more energy from the flow if it also excited by sound from another source. In the studies, Fluid-Structure Interaction (FSI) is simulated with Large Eddy Simulations (LESs). It is shown possible to simulate excitation due to both acoustic and turbulence loads using the reported methods, at least qualitatively. The excitation levels are even of the right order of magnitude in some parts. However, there are some shortcomings in the modeling. The most important is perhaps the lack of non-reflecting boundary conditions. Another problem is the strong numerical damping in combination with demanding numerics for the selected solid solution methodology. Three cases are simulated, two for validation and one applied about steam dryers. For the applied case, it is concluded unlikely that excitation by the acoustic and turbulence loads can interact. The main reason is that the flow is controlled more by static geometrical factors, such as solid rotation sharp edges, than small deformations due to vibrations.

  13. Modeling of digestive processes in the stomach as a Fluid-Structure Interaction (FSI) phenomenon

    Science.gov (United States)

    Acharya, Shashank; Kou, Wenjun; Kahrilas, Peter J.; Pandolfino, John E.; Patankar, Neelesh A.

    2017-11-01

    The process of digestion in the gastro-intestinal (GI) tract is a complex mechanical and chemical process. Digestion in the stomach involves substantial mixing and breakup of food into smaller particles by muscular activity. In this work, we have developed a fully resolved model of the stomach (along with the esophagus) and its various muscle groups that deform the wall to agitate the contents inside. We use the Immersed Boundary finite-element method to model this FSI problem. From the resulting simulations, the mixing intensity is analyzed as a function of muscle deformation. As muscle deformation is controlled by changing the intensity of the neural signal, the material properties of the stomach wall will have a significant effect on the resultant kinematics. Thus, the model is then used to identify the source of common GI tract motility pathologies by replicating irregular motions as a consequence of varying the mechanical properties of the wall and the related activation signal patterns. This approach gives us an in-silico framework that can be used to study the effect of tissue properties & muscle activity on the mechanical response of the stomach wall. This work is supported by NIH Grant 5R01DK079902-09.

  14. Assessment of shear stress related parameters in the carotid bifurcation using mouse-specific FSI simulations.

    Science.gov (United States)

    De Wilde, David; Trachet, Bram; Debusschere, Nic; Iannaccone, Francesco; Swillens, Abigail; Degroote, Joris; Vierendeels, Jan; De Meyer, Guido R Y; Segers, Patrick

    2016-07-26

    The ApoE(-)(/)(-) mouse is a common small animal model to study atherosclerosis, an inflammatory disease of the large and medium sized arteries such as the carotid artery. It is generally accepted that the wall shear stress, induced by the blood flow, plays a key role in the onset of this disease. Wall shear stress, however, is difficult to derive from direct in vivo measurements, particularly in mice. In this study, we integrated in vivo imaging (micro-Computed Tomography-µCT and ultrasound) and fluid-structure interaction (FSI) modeling for the mouse-specific assessment of carotid hemodynamics and wall shear stress. Results were provided for 8 carotid bifurcations of 4 ApoE(-)(/)(-) mice. We demonstrated that accounting for the carotid elasticity leads to more realistic flow waveforms over the complete domain of the model due to volume buffering capacity in systole. The 8 simulated cases showed fairly consistent spatial distribution maps of time-averaged wall shear stress (TAWSS) and relative residence time (RRT). Zones with reduced TAWSS and elevated RRT, potential indicators of atherosclerosis-prone regions, were located mainly at the outer sinus of the external carotid artery. In contrast to human carotid hemodynamics, no flow recirculation could be observed in the carotid bifurcation region. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. One-way propagation of bulk states and robust edge states in photonic crystals with broken inversion and time-reversal symmetries

    Science.gov (United States)

    Lu, Jin-Cheng; Chen, Xiao-Dong; Deng, Wei-Min; Chen, Min; Dong, Jian-Wen

    2018-07-01

    The valley is a flexible degree of freedom for light manipulation in photonic systems. In this work, we introduce the valley concept in magnetic photonic crystals with broken inversion symmetry. One-way propagation of bulk states is demonstrated by exploiting the pseudo-gap where bulk states only exist at one single valley. In addition, the transition between Hall and valley-Hall nontrivial topological phases is also studied in terms of the competition between the broken inversion and time-reversal symmetries. At the photonic boundary between two topologically distinct photonic crystals, we illustrate the one-way propagation of edge states and demonstrate their robustness against defects.

  16. AP1000 Shield Building Dynamic Response for Different Water Levels of PCCWST Subjected to Seismic Loading considering FSI

    Directory of Open Access Journals (Sweden)

    Daogang Lu

    2015-01-01

    Full Text Available Huge water storage tank on the top of many buildings may affect the safety of the structure caused by fluid-structure interaction (FSI under the earthquake. AP1000 passive containment cooling system water storage tank (PCCWST placed at the top of shield building is a key component to ensure the safety of nuclear facilities. Under seismic loading, water will impact the wall of PCCWST, which may pose a threat to the integrity of the shield building. In the present study, an FE model of AP1000 shield building is built for the modal and transient seismic analysis considering the FSI. Six different water levels in PCCWST were discussed by comparing the modal frequency, seismic acceleration response, and von Mises stress distribution. The results show the maximum von Mises stress emerges at the joint of shield building roof and water around the air inlet. However, the maximum von Mises stress is below the yield strength of reinforced concrete. The results may provide a reference for design of the AP1000 and CAP1400 in the future.

  17. Pyrrolidinium FSI and TFSI-Based Polymerized Ionic Liquids as Electrolytes for High-Temperature Lithium-Ion Batteries

    Directory of Open Access Journals (Sweden)

    Manfred Kerner

    2018-02-01

    Full Text Available Promising electrochemical and dynamical properties, as well as high thermal stability, have been the driving forces behind application of ionic liquids (ILs and polymerized ionic liquids (PILs as electrolytes for high-temperature lithium-ion batteries (HT-LIBs. Here, several ternary lithium-salt/IL/PIL electrolytes (PILel have been investigated for synergies of having both FSI and TFSI anions present, primarily in terms of physico-chemical properties, for unique application in HT-LIBs operating at 80 °C. All of the electrolytes tested have low Tg and are thermally stable ≥100 °C, and with TFSI as the exclusive anion the electrolytes (set A have higher thermal stabilities ≥125 °C. Ionic conductivities are in the range of 1 mS/cm at 100 °C and slightly higher for set A PILel, which, however, have lower oxidation stabilities than set B PILel with both FSI and TFSI anions present: 3.4–3.7 V vs. 4.2 V. The evolution of the interfacial resistance increases for all PILel during the first 40 h, but are much lower for set B PILel and generally decrease with increasing Li-salt content. The higher interfacial resistances only influence the cycling performance at high C-rates (1 C, where set B PILel with high Li-salt content performs better, while the discharge capacities at the 0.1 C rate are comparable. Long-term cycling at 0.5 C, however, shows stable discharge capacities for 100 cycles, with the exception of the set B PILel with high Li-salt content. Altogether, the presence of both FSI and TFSI anions in the PILel results in lower ionic conductivities and decreased thermal stabilities, but also higher oxidation stabilities and reduced interfacial resistances and, in total, result in an improved rate capability, but compromised long-term capacity retention. Overall, these electrolytes open for novel designs of HT-LIBs.

  18. 3D MRI-based anisotropic FSI models with cyclic bending for human coronary atherosclerotic plaque mechanical analysis.

    Science.gov (United States)

    Tang, Dalin; Yang, Chun; Kobayashi, Shunichi; Zheng, Jie; Woodard, Pamela K; Teng, Zhongzhao; Billiar, Kristen; Bach, Richard; Ku, David N

    2009-06-01

    Heart attack and stroke are often caused by atherosclerotic plaque rupture, which happens without warning most of the time. Magnetic resonance imaging (MRI)-based atherosclerotic plaque models with fluid-structure interactions (FSIs) have been introduced to perform flow and stress/strain analysis and identify possible mechanical and morphological indices for accurate plaque vulnerability assessment. For coronary arteries, cyclic bending associated with heart motion and anisotropy of the vessel walls may have significant influence on flow and stress/strain distributions in the plaque. FSI models with cyclic bending and anisotropic vessel properties for coronary plaques are lacking in the current literature. In this paper, cyclic bending and anisotropic vessel properties were added to 3D FSI coronary plaque models so that the models would be more realistic for more accurate computational flow and stress/strain predictions. Six computational models using one ex vivo MRI human coronary plaque specimen data were constructed to assess the effects of cyclic bending, anisotropic vessel properties, pulsating pressure, plaque structure, and axial stretch on plaque stress/strain distributions. Our results indicate that cyclic bending and anisotropic properties may cause 50-800% increase in maximum principal stress (Stress-P1) values at selected locations. The stress increase varies with location and is higher when bending is coupled with axial stretch, nonsmooth plaque structure, and resonant pressure conditions (zero phase angle shift). Effects of cyclic bending on flow behaviors are more modest (9.8% decrease in maximum velocity, 2.5% decrease in flow rate, 15% increase in maximum flow shear stress). Inclusion of cyclic bending, anisotropic vessel material properties, accurate plaque structure, and axial stretch in computational FSI models should lead to a considerable improvement of accuracy of computational stress/strain predictions for coronary plaque vulnerability

  19. Theory of wave propagation in magnetized near-zero-epsilon metamaterials: evidence for one-way photonic states and magnetically switched transparency and opacity.

    Science.gov (United States)

    Davoyan, Arthur R; Engheta, Nader

    2013-12-20

    We study propagation of transverse-magnetic electromagnetic waves in the bulk and at the surface of a magnetized epsilon-near-zero (ENZ) medium in a Voigt configuration. We reveal that in a certain range of material parameters novel regimes of wave propagation emerge; we show that the transparency of the medium can be altered with the magnetization leading either to magnetically induced Hall opacity or Hall transparency of the ENZ. In our theoretical study, we demonstrate that surface waves at the interface between either a transparent or an opaque Hall medium and a homogeneous medium may, under certain conditions, be predominantly one way. Moreover, we predict that one-way photonic surface states may exist at the interface of an opaque Hall ENZ and a regular metal, giving rise to the possibility for backscattering immune wave propagation and isolation.

  20. fs-i "2004" : linnamängud värvidega ja ilma / Maija Burima ; inglise keelest tlk. Silver Rattasepp

    Index Scriptorium Estoniae

    Burima, Maija

    2007-01-01

    Artiklis analüüsitakse fs-i luulekogu "2004" venekeelse tõlke põhjal. Artikli aluseks on ingliskeelne ettekanne Underi ja Tuglase Kirjanduskeskuse seminaril "Turn of the Century, Turns in Literature II : Estonian and Latvian Literature in the European Context at the Turn of the 20th/21st Centuries" Viinistus 22.-23. mail 2007

  1. LiFSI vs. LiPF6 electrolytes in contact with lithiated graphite: Comparing thermal stabilities and identification of specific SEI-reinforcing additives

    International Nuclear Information System (INIS)

    Eshetu, Gebrekidan Gebresilassie; Grugeon, Sylvie; Gachot, Grégory; Mathiron, David; Armand, Michel; Laruelle, Stephane

    2013-01-01

    Lithium bis(fluorosulfonyl) imide (LiFSI) is regarded as an alternative to the classical LiPF 6 salt in today's LiFePO 4 /graphite-based Li-ion batteries electrolyte owing to its slightly higher conductivity and lower fluorine content. In an attempt to better evaluate the safety issues, here we report the comparative study of the LiFSI and LiPF 6 based electrolyte/lithiated graphite interface thermal behavior. DSC measurements with LiFSI-based electrolyte reveal a sharp exotherm with large heat release though at higher onset and peak temperatures compared to LiPF 6 -based electrolyte. With the help of GC/MS, 19 F NMR and ESI-HRMS analyses, we assume that this highly energetic peak around 200 °C, which is dependant upon the lithium content, is mainly related to electrochemical reduction of FSI − anion. In a strategy to limit the probability and damage of thermal runaway event, electrolyte additives such as vinylene carbonate (VC), fluoro ethylene carbonate (FEC), di-isocyanato hexane (DIH) and toluene di-isocyanate (TDI) have been investigated and shown to significantly lower the energy associated with the exothermic phenomenon

  2. The Roland De Witte Experiment, R. T. Cahill, and the One-Way Speed of Light (Letters to Progress in Physics

    Directory of Open Access Journals (Sweden)

    Catania J.

    2016-01-01

    Full Text Available In “The Roland De Witte 1991 Experiment (to the Memory of Roland De Witte” (Progr. Phys , 2006, v. 2(3, 60–65, R.T. Cahill gives us a briefing on his view that interferometer measurements and one-way RF coaxial cable propagation-time measure- ments amount to a detection of the anisotropy in the speed of light. However, while I obtain first order propagation delays in calculations for on e-way transit which would show geometric modulation by Earth’s rotation, I do not agree with Cahill’s simplistic equation that relates the modulation solely to the projection of the absolute velocity vector v on the coaxial cable, called v P by Cahill (ibid., p. 61–62. The reader should be warned that Cahill’s equation for ∆ t (ibid., p.63 is crude compared with a full Special Relativistic derivation.

  3. Cooperative effect of random and time-periodic coupling strength on synchronization transitions in one-way coupled neural system: mean field approach.

    Science.gov (United States)

    Jiancheng, Shi; Min, Luo; Chusheng, Huang

    2017-08-01

    The cooperative effect of random coupling strength and time-periodic coupling strengh on synchronization transitions in one-way coupled neural system has been investigated by mean field approach. Results show that cooperative coupling strength (CCS) plays an active role for the enhancement of synchronization transitions. There exist an optimal frequency of CCS which makes the system display the best CCS-induced synchronization transitions, a critical frequency of CCS which can not further affect the CCS-induced synchronization transitions, and a critical amplitude of CCS which can not occur the CCS-induced synchronization transitions. Meanwhile, noise intensity plays a negative role for the CCS-induced synchronization transitions. Furthermore, it is found that the novel CCS amplitude-induced synchronization transitions and CCS frequency-induced synchronization transitions are found.

  4. Three-dimensional one-way bubble tracking method for the prediction of developing bubble-slug flows in a vertical pipe. 1st report, models and demonstration

    International Nuclear Information System (INIS)

    Tamai, Hidesada; Tomiyama, Akio

    2004-01-01

    A three-dimensional one-way bubble tracking method is one of the most promising numerical methods for the prediction of a developing bubble flow in a vertical pipe, provided that several constitutive models are prepared. In this study, a bubble shape, an equation of bubble motion, a liquid velocity profile, a pressure field, turbulent fluctuation and bubble coalescence are modeled based on available knowledge on bubble dynamics. Bubble shapes are classified into four types in terms of bubble equivalent diameter. A wake velocity model is introduced to simulate approaching process among bubbles due to wake entrainment. Bubble coalescence is treated as a stochastic phenomenon with the aid of coalescence probabilities that depend on the sizes of two interacting bubbles. The proposed method can predict time-spatial evolution of flow pattern in a developing bubble-slug flow. (author)

  5. Adaptation of methodology to select structural alternatives of one-way slab in residential building to the guidelines of the European Committee for Standardization (CEN/TC 350)

    Energy Technology Data Exchange (ETDEWEB)

    Fraile-Garcia, Esteban, E-mail: esteban.fraile@unirioja.es [University of La Rioja, Department of Mechanical Engineering (Spain); Ferreiro-Cabello, Javier, E-mail: javier.ferreiro@unirioja.es [University of La Rioja, Department of Mechanical Engineering (Spain); Qualiberica S.L. (Spain); Martinez-Camara, Eduardo, E-mail: eduardo.martinezc@unirioja.es [University of La Rioja, Department of Mechanical Engineering (Spain); Jimenez-Macias, Emilio, E-mail: emilio.jimenez@unirioja.es [University of La Rioja, Department of Electrical Engineering (Spain)

    2015-11-15

    The European Committee for Standardization (CEN) through its Technical Committee CEN/TC-350 is developing a series of standards for assessing the building sustainability, at both product and building levels. The practical application of the selection (decision making) of structural alternatives made by one-way slabs leads to an intermediate level between the product and the building. Thus the present study addresses this problem of decision making, following the CEN guidelines and incorporating relevant aspects of architectural design into residential construction. A life cycle assessment (LCA) is developed in order to obtain valid information for the decision making process (the LCA was developed applying CML methodology although Ecoindicator99 was used in order to facilitate the comparison of the values); this information (the carbon footprint values) is contrasted with other databases and with the information from the Environmental Product Declaration (EPD) of one of the lightening materials (expanded polystyrene), in order to validate the results. Solutions of different column disposition and geometries are evaluated in the three pillars of sustainable construction on residential construction: social, economic and environmental. The quantitative analysis of the variables used in this study enables and facilitates an objective comparison in the design stage by a responsible technician; the application of the proposed methodology reduces the possible solutions to be evaluated by the expert to 12.22% of the options in the case of low values of the column index and to 26.67% for the highest values. - Highlights: • Methodology for selection of structural alternatives in buildings with one-way slabs • Adapted to CEN guidelines (CEN/TC-350) for assessing the building sustainability • LCA is developed in order to obtain valid information for the decision making process. • Results validated comparing carbon footprint, databases and Env. Product Declarations

  6. Estimating the Mean Circulation and Water Exchange of the Gulf of Suez-Red Sea via a Validated One-Way Atmospheric-Hydrodynamic Coupled Model

    Science.gov (United States)

    Eladawy, Ahmed; Shaltout, Mohamed; Sousa, Magda Catarina; Dias, João Miguel; Nadaoka, Kazuo

    2018-05-01

    The Gulf of Suez, Northern Islands protected area, and Hurghada zone are experiencing mega developments in all sectors including tourism, industry, and logistics. The need for moderately accurate near-shore hydrodynamic models is increasing to support the sustainable development of this oceanic area. This can be accomplished by following a nesting approach including the downscaling of global atmospheric and oceanic models into local models using higher resolution datasets. This work aims to present the development of a one-way coupling between atmospheric and hydrodynamic models for the Gulf of Suez (GOS) to understand the local oceanic characteristics and processes. The Regional Climate Model system (RegCM4) is used to simulate moderate resolution atmospheric features and its results are used to force a local dedicated application of Delft3D model. The results indicate that the predicted water level, water temperature, and evaporation accurately follow in situ measurements, remotely sensed data, and re-analysis data. The results suggest that the annual sea surface temperature is averaged at 23 °C, while the annual average of evaporation rates equals 8.02 mm/day. The study suggests that the water level displays a marked seasonal and spatial variation. Moreover, the water balance in the Gulf of Suez was controlled by the difference between inflows and outflows through the Straits of Gubal and by the net precipitation. In addition, the water balance indicated a net loss of approximately 3.9 × 10-3 m of water during 2013. Moreover, the exchange through the Straits of Gubal showed a two-way exchange with a net inflow of 0.0007 Sv, where the outflow dominated in the surface layer along the western coast and the inflow dominated in the lower layers along the middle of the Straits. To conclude, the one-way coupling modeling technique proved to be a reliable tool for studying local features of the GOS region.

  7. Numerical simulations with a FSI-calibrated actuator disk model of wind turbines operating in stratified ABLs

    Science.gov (United States)

    Gohari, S. M. Iman; Sarkar, Sutanu; Korobenko, Artem; Bazilevs, Yuri

    2017-11-01

    Numerical simulations of wind turbines operating under different regimes of stability are performed using LES. A reduced model, based on the generalized actuator disk model (ADM), is implemented to represent the wind turbines within the ABL. Data from the fluid-solid interaction (FSI) simulations of wind turbines have been used to calibrate and validate the reduced model. The computational cost of this method to include wind turbines is affordable and incurs an overhead as low as 1.45%. Using this reduced model, we study the coupling of unsteady turbulent flow with the wind turbine under different ABL conditions: (i) A neutral ABL with zero heat-flux and inversion layer at 350m, in which the incoming wind has the maximum mean shear between the heights of upper-tip and lower-tip; (2) A shallow ABL with surface cooling rate of -1 K/hr wherein the low level jet occurs at the wind turbine hub height. We will discuss how the differences in the unsteady flow between the two ABL regimes impact the wind turbine performance.

  8. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  9. A test of the one-way isotropy of the speed of light from the T2L2 space experiment

    Science.gov (United States)

    Belli, A.; Exertier, P.; Samain, E.

    2017-12-01

    The Time Transfer by Laser Link (T2L2) space experiment that is currently flying on-board Jason-2 (1335 km of altitude) provides an opportunity to make a test of the isotropy of the speed of light using one-way propagation on a non-laboratory scale. Following the general framework given by te{Mansouri1977}, which permits violations of Einstein special relativity, we study the problem of deducing the isotropy of the speed between two clocks as the orientation path varies relative to an inertial reference frame. The short term stability of the T2L2 ground-to-space time transfer has been established at 5-6 ps at 60 seconds between a hydrogen maser and the on-board oscillator on use for the Jason-2 satellite. Nevertheless, during the satellite pass above a laser ranging station (of around 1000 seconds), the stability of the space oscillator is decreasing in τ^{3/2} that clearly impacts the expected performance of the present test. We thus give insights into certain modelling issues and processes, including time transfer problems which have a bearing on the global error budget. Our goal is to achieve an accuracy of {δc}/{c} ≈ 2-3.10^{-9} locally with a scope for improvement by cumulating numerous passes over the same laser ranging station.

  10. Les aboutissements de la circulation à sens unique dans le discours médical [The Outcomes of one-way circulation in medical discourse

    Directory of Open Access Journals (Sweden)

    Mª Dolores Vivero García

    2010-12-01

    Full Text Available Ce travail concerne le discours médical sur la dépression. L'analyse de la mise en scène de la circulation des connaissancesdans notre corpus montre que ce discours se fonde sur une doxa scientifique construite comme le lieu d'une circulation. Il prend également appui sur une représentation de la maladie supposéepartagée par les destinataires (les médecins généralistes, si bien que l'énonciation se rattache implicitement à un discours doxique relatif à un certain modèle de la dépression.We analyse medical discourse about depressive disorder. Analyse of representation of knowledge circulation shows that this discourse is based on Doxa as a one-way circulation. It is based in the social representation of depressive disorder supposedly shared by interlocutors, that is to say the general practitioners. The enunciation appears as implicitly connected to discourse of one model of depressive disorder.

  11. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  12. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  13. One-way coupling of an integrated assessment model and a water resources model: evaluation and implications of future changes over the US Midwest

    Science.gov (United States)

    Voisin, N.; Liu, L.; Hejazi, M.; Tesfa, T.; Li, H.; Huang, M.; Liu, Y.; Leung, L. R.

    2013-11-01

    An integrated model is being developed to advance our understanding of the interactions between human activities, terrestrial system and water cycle, and to evaluate how system interactions will be affected by a changing climate at the regional scale. As a first step towards that goal, a global integrated assessment model, which includes a water-demand model driven by socioeconomics at regional and global scales, is coupled in a one-way fashion with a land surface hydrology-routing-water resources management model. To reconcile the scale differences between the models, a spatial and temporal disaggregation approach is developed to downscale the annual regional water demand simulations into a daily time step and subbasin representation. The model demonstrates reasonable ability to represent the historical flow regulation and water supply over the US Midwest (Missouri, Upper Mississippi, and Ohio river basins). Implications for future flow regulation, water supply, and supply deficit are investigated using climate change projections with the B1 and A2 emission scenarios, which affect both natural flow and water demand. Although natural flow is projected to increase under climate change in both the B1 and A2 scenarios, there is larger uncertainty in the changes of the regulated flow. Over the Ohio and Upper Mississippi river basins, changes in flow regulation are driven by the change in natural flow due to the limited storage capacity. However, both changes in flow and demand have effects on the Missouri River Basin summer regulated flow. Changes in demand are driven by socioeconomic factors, energy and food demands, global markets and prices with rainfed crop demand handled directly by the land surface modeling component. Even though most of the changes in supply deficit (unmet demand) and the actual supply (met demand) are driven primarily by the change in natural flow over the entire region, the integrated framework shows that supply deficit over the Missouri River

  14. Sticky or Slippery Wetting: Network Formation Conditions Can Provide a One-Way Street for Water Flow on Platinum-cured Silicone.

    Science.gov (United States)

    Wang, Chenyu; Nair, Sithara S; Veeravalli, Sharon; Moseh, Patricia; Wynne, Kenneth J

    2016-06-08

    -temperature end (slippery surface) but became pinned at the low-temperature end (sticky surface) and did not move when the slide was rotated 180°. The surface was therefore a "one-way street" for water droplet flow. Theory provides fundamental understanding for slippery/sticky behavior for gradient S-PDMS and Pt-PDMS coatings. A model for network formation is based on hydrosilylation at high temperature and condensation curing of Si-OH from autoxidation of Si-H at low temperatures. In summary, network formation conditions strongly affect receding contact angles and water adhesion for Sylgard 184 and the filler-free mimic Pt-PDMS. These findings suggest careful control of curing conditions is important to silicones used in microfluidic devices or as biomedical materials. Network-forming conditions also impact bulk mechanical properties for Sylgard 184, but the range that can be obtained has not been critically examined for specific applications.

  15. Beauty is in the eye of the beholder: proteins can recognize binding sites of homologous proteins in more than one way.

    Directory of Open Access Journals (Sweden)

    Juliette Martin

    2010-06-01

    Full Text Available Understanding the mechanisms of protein-protein interaction is a fundamental problem with many practical applications. The fact that different proteins can bind similar partners suggests that convergently evolved binding interfaces are reused in different complexes. A set of protein complexes composed of non-homologous domains interacting with homologous partners at equivalent binding sites was collected in 2006, offering an opportunity to investigate this point. We considered 433 pairs of protein-protein complexes from the ABAC database (AB and AC binary protein complexes sharing a homologous partner A and analyzed the extent of physico-chemical similarity at the atomic and residue level at the protein-protein interface. Homologous partners of the complexes were superimposed using Multiprot, and similar atoms at the interface were quantified using a five class grouping scheme and a distance cut-off. We found that the number of interfacial atoms with similar properties is systematically lower in the non-homologous proteins than in the homologous ones. We assessed the significance of the similarity by bootstrapping the atomic properties at the interfaces. We found that the similarity of binding sites is very significant between homologous proteins, as expected, but generally insignificant between the non-homologous proteins that bind to homologous partners. Furthermore, evolutionarily conserved residues are not colocalized within the binding sites of non-homologous proteins. We could only identify a limited number of cases of structural mimicry at the interface, suggesting that this property is less generic than previously thought. Our results support the hypothesis that different proteins can interact with similar partners using alternate strategies, but do not support convergent evolution.

  16. Error function attack of chaos synchronization based encryption schemes.

    Science.gov (United States)

    Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu

    2004-03-01

    Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor. Copyright 2004 American Institute of Physics.

  17. Deducing trapdoor primitives in public key encryption schemes

    Science.gov (United States)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  18. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  19. Towards evidence-based emergency medicine: best BETs from the Manchester Royal Infirmary. BET 3: In a penetrating chest wound is a three-sided dressing or a one-way chest seal better at preventing respiratory complications?

    Science.gov (United States)

    Walthall, Kirsten

    2012-04-01

    A short-cut review was carried out to establish whether the traditional three-sided dressing is better than a one-way chest seal at preventing the respiratory complications from penetrating chest trauma. Only one animal study, two guidelines and two case reports provided published evidence relevant to the question. The author, date and country of publication, patient group studied, study type, relevant outcomes, results and study weaknesses of these papers are tabulated. The clinical bottom line is that there is very little evidence, but that the one-way seals may have practical advantages, particularly in the out-of-hospital setting.

  20. ONE WAY ANOVA RANDOMIZED COMPLETE BLOCKS

    African Journals Online (AJOL)

    ******

    2012-04-24

    Apr 24, 2012 ... Key words: Grey mullet, growth, foreign DNA, genetically modified. INTRODUCTION ... ration, food quality and preservation (Shears et al., 1991;. Chen et al. ... fish eggs (Khoo et al., 1992) and 4) direct injection of foreign DNA ...

  1. Cogeneration: One way to use biomass efficiently

    International Nuclear Information System (INIS)

    Gustavsson, L.; Johansson, B.

    1993-01-01

    Cogeneration in district heating systems is the most energy-efficient way to convert biomass into heat and electricity with current or nearly commercial technologies. Methanol produced from biomass and used in vehicles instead of petrol or diesel could reduce carbon dioxide emissions nearly as much per unit of biomass as if the biomass were used to replace natural gas for cogeneration, but at some higher cost per unit of carbon dioxide reduction. The most energy-efficient way to use biomass for cogeneration appears to be combined cycle technology, and the world's first demonstration plant is now being built. Potentially, this technology can be used for electricity production in Swedish district heating systems to provide nearly 20% of current Swedish electricity production, while simultaneously reducing carbon dioxide emissions from the district heating systems by some 55%. The heat costs from cogeneration with biomass are higher than the heat costs from fossil fuel plants at current fuel prices. Biomass can only compete with fossil fuel if other advantages, for example a lower environmental impact are considered. (au) (35 refs.)

  2. One way for a virtual nuclear instrumentation

    International Nuclear Information System (INIS)

    Mesa Perez, Guillermo; Arteche, Raul

    1999-01-01

    This article discusses how to write a dynamical laudable VxDs for the Microsoft Windows 95 operating system using the VTOOLSD library, VxDs for Windows 95 may be written in C or C++, loading such VxDs using the Win32 application programming interface (API)

  3. Coherent one-way quantum key distribution

    Science.gov (United States)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  4. One Way to Holland’

    DEFF Research Database (Denmark)

    Marselis, Randi; Schütze, Laura Maria

    2013-01-01

    museums, but is also relevant to ongoing collection practices. An important theme in relation to source communities is ownership and repatriation of cultural objects. Furthermore, working with source communities implies a two-way information process through which groups are given access to memory...

  5. An FSI Simulation of the Metal Panel Deflection in a Shock Tube Using Illinois Rocstar Simulation Suite

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jung Hun; Sa, Jeong Hwan; Kim, Han Gi; Cho, Keum Won [Korea Institute of Science and Technology Information, Daejeon (Korea, Republic of)

    2017-05-15

    As the recent development of computing architecture and application software technology, real world simulation, which is the ultimate destination of computer simulation, is emerging as a practical issue in several research sectors. In this paper, metal plate motion in a square shock tube for small time interval was calculated using a supercomputing-based fluid-structure-combustion multi-physics simulation tool called Illinois Rocstar, developed in a US national R and D program at the University of Illinois. Afterwards, the simulation results were compared with those from experiments. The coupled solvers for unsteady compressible fluid dynamics and for structural analysis were based on the finite volume structured grid system and the large deformation linear elastic model, respectively. In addition, a strong correlation between calculation and experiment was shown, probably because of the predictor corrector time-integration scheme framework. In the future, additional validation studies and code improvements for higher accuracy will be conducted to obtain a reliable open-source software research tool.

  6. AN/FSY-3 Space Fence System – Sensor Site One/Operations Center Integration Status and Sensor Site Two Planned Capability

    Science.gov (United States)

    Fonder, G. P.; Hack, P. J.; Hughes, M. R.

    This paper covers two topics related to Space Fence System development: Sensor Site One / Operations Center construction and integration status including risk reduction integration and test efforts at the Moorestown, NJ Integrated Test Bed (ITB); and the planned capability of Sensor Site Two. The AN/FSY-3 Space Fence System is a ground-based system of S-band radars integrated with an Operations Center designed to greatly enhance the Air Force Space Surveillance network. The radar architecture is based on Digital Beam-forming. This capability permits tremendous user-defined flexibility to customize volume surveillance and track sectors instantaneously without impacting routine surveillance functions. Space Fence provides unprecedented sensitivity, coverage and tracking accuracy, and contributes to key mission threads with the ability to detect, track and catalog small objects in LEO, MEO and GEO. The system is net-centric and will seamlessly integrate into the existing Space Surveillance Network, providing services to external users—such as JSpOC—and coordinating handoffs to other SSN sites. Sensor Site One construction on the Kwajalein Atoll is in progress and nearing completion. The Operations Center in Huntsville, Alabama has been configured and will be integrated with Sensor Site One in the coming months. System hardware, firmware, and software is undergoing integration testing at the Mooretown, NJ ITB and will be deployed at Sensor Site One and the Operations Center. The preliminary design for Sensor Site Two is complete and will provide critical coverage, timeliness, and operational flexibility to the overall system.

  7. Solid-state one-way photoisomerisation of Z,E,Z-1,6-(4,4'-diphenyl)hexa-1,3,5-triene dicarboxylate examined using higher-order derivative spectra and powder XRD patterns.

    Science.gov (United States)

    Sonoda, Yoriko; Goto, Midori; Ichimura, Kunihiro

    2018-03-14

    Higher order derivative spectra were applied at first to one-way ZEZ-to-EEE photoisomerisation of dimethyl ester (ZEZ-DPH1) of the titled compound in a methylcyclohexane solution. Many common crossing points emerged in UV-induced derivative-spectral changes to reveal the direct ZEZ-to-EEE photoisomerisation without the transient formation of an intermediate to suggest the bicycle-pedal mechanism. The solid-state photoisomerisation was subsequently monitored by tracing changes in the fourth-order derivatives of absorption spectra of a thin crystalline layer of ZEZ-DPH1 prepared by the drop-casting method, because the distortion of absorption spectra due to light scattering is cancelled. It was suggested that the solid-state photochemical event consists of three steps: fast ZEZ-to-EEE photoisomerisation, a subsequent slow ZEZ-to-EEE photoisomerisation and very slow disappearance of the EEE-isomer. Studies on powder XRD were also carried out for a drop-cast solid layer of ZEZ-DPH1 to disclose the coexistence of a crystal form other than the original one, and the former exhibited faster ZEZ-to-EEE photoisomerisation when compared with the original crystal form. The results revealed by XRD analysis are in line with those obtained by higher-order derivative spectra, confirming the solid-state one-way photoisomerisation to take place through the bicycle-pedal process.

  8. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  9. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  10. Collation of chewing efficiency and dentures with diverse occlusal schemes

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Peddinti

    2017-01-01

    Full Text Available Background: Rehabilitation of an edentulous patient nurtures satisfaction and this lies in the chewing ability provided by the prosthesis. Aim: To evaluate and compare the masticatory efficiencies of complete dentures with different occlusal schemes. Materials and Methods: Fourteen completely edentulous patients from the age group of 50-70 years were selected according to the inclusion criteria followed in this study. The dentures were made with three different occlusal schemes, i.e., anatomic occlusion without balancing, anatomic occlusion with balancing, and lingualized occlusion and stored in water till the date of denture insertion. Post-insertion instructions were given to the patients at the time of delivery of the dentures. Patients were recalled after seven days and then masticatory efficiency was performed. The test was performed using boiled peanuts and Sieve system. Statistical Analysis: One-way analysis of variance (ANOVA test and unpaired t-test were carried out. Results: The obtained masticatory efficiency values with anatomic occlusion without balancing, anatomic occlusion with balancing, and lingualized occlusion LO were analyzed using one-way ANOVA test and unpaired “t” test. The tests showed that lingualized scheme had highest masticatory efficiency. Conclusion: Within the scope of this study, it can be concluded that the masticatory efficiency will be generally higher in patients provided with complete dentures fabricated using the lingualized occlusal scheme.

  11. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  12. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  13. Analyses of resource reservation schemes for optical burst switching networks

    Science.gov (United States)

    Solanska, Michaela; Scholtz, Lubomir; Ladanyi, Libor; Mullerova, Jarmila

    2017-12-01

    With growing demands of Internet Protocol services for transmission capacity and speed, the Optical Burst Switching presents the solution for future high-speed optical networks. Optical Burst Switching is a technology for transmitting large amounts of data bursts through a transparent optical switching network. To successfully transmit bursts over OBS network and reach the destination node, resource reservation schemes have to be implemented to allocate resources and configure optical switches for that burst at each node. The one-way resource reservation schemes and the performance evaluation of reservation schemes are presented. The OBS network model is performed using OMNeT++ simulation environment. During the reservation of network resources, the optical cross-connect based on semiconductor optical amplifier is used as the core node. Optical switches based on semiconductor optical amplifiers are a promising technology for high-speed optical communication networks.

  14. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  15. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  16. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  17. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  18. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  19. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  20. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  1. An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication

    International Nuclear Information System (INIS)

    Wen-Jie, Liu; Han-Wu, Chen; Zhi-Qiang, Li; Zhi-Hao, Liu; Wen-Bo, Hu; Ting-Huai, Ma

    2009-01-01

    A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer. (general)

  2. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  3. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  4. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  5. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  6. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  7. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  8. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  9. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  10. Alternative reprocessing schemes evaluation

    International Nuclear Information System (INIS)

    1979-02-01

    This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented

  11. Introduction to association schemes

    NARCIS (Netherlands)

    Seidel, J.J.

    1991-01-01

    The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs

  12. Reaction schemes of immunoanalysis

    International Nuclear Information System (INIS)

    Delaage, M.; Barbet, J.

    1991-01-01

    The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr

  13. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  14. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  15. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  16. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  17. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  18. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  19. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  20. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  1. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  2. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    International Nuclear Information System (INIS)

    Zheng, Jinbin

    2014-01-01

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software

  3. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Jinbin, E-mail: jbzheng518@163.com [School of Mathematics and Computer Science, Long Yan University, Longyan 364012 (China)

    2014-10-06

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.

  4. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  5. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  6. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  7. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  8. Shared governance: one way to engage employed physicians.

    Science.gov (United States)

    Sanford, Kathleen D

    2012-09-01

    To work better with employed physicians, finance leaders should: Understand classic management theories on what motivates employees. Learn from shared governance models with nurses at Magnet hospitals. Apply best practices in management to all employees, not just physicians.

  9. One-Way Quantum Authenticated Secure Communication Using Rotation Operation

    International Nuclear Information System (INIS)

    Tsai Chia-Wei; Wei Toung-Shang; Hwang Tzonelih

    2011-01-01

    This study proposes a theoretical quantum authenticated secure communication (QASC) protocol using Einstein-Podolsky-Rosen (EPR) entangle state, which enables a sender to send a secure as well as authenticated message to a receiver within only one step quantum transmission without having the classical channels and the certification authority. (general)

  10. Guns and Fear: A One-Way Street?

    Science.gov (United States)

    Hauser, Will; Kleck, Gary

    2013-01-01

    Surveys show that more than one half of gun owners report owning their firearm for self-protection. Although research has examined the effect of fear of crime on gun ownership, the issue of reciprocity and temporal order has been largely ignored. Furthermore, the effect of firearm acquisition and relinquishment on fear has not been evaluated…

  11. Ants can learn to forage on one-way trails.

    Directory of Open Access Journals (Sweden)

    Pedro Leite Ribeiro

    Full Text Available The trails formed by many ant species between nest and food source are two-way roads on which outgoing and returning workers meet and touch each other all along. The way to get back home, after grasping a food load, is to take the same route on which they have arrived from the nest. In many species such trails are chemically marked by pheromones providing orientation cues for the ants to find their way. Other species rely on their vision and use landmarks as cues. We have developed a method to stop foraging ants from shuttling on two-way trails. The only way to forage is to take two separate roads, as they cannot go back on their steps after arriving at the food or at the nest. The condition qualifies as a problem because all their orientation cues -- chemical, visual or any other -- are disrupted, as all of them cannot but lead the ants back to the route on which they arrived. We have found that workers of the leaf-cutting ant Atta sexdens rubropilosa can solve the problem. They could not only find the alternative way, but also used the unidirectional traffic system to forage effectively. We suggest that their ability is an evolutionary consequence of the need to deal with environmental irregularities that cannot be negotiated by means of excessively stereotyped behavior, and that it is but an example of a widespread phenomenon. We also suggest that our method can be adapted to other species, invertebrate and vertebrate, in the study of orientation, memory, perception, learning and communication.

  12. One Way or Return? The Journey from Practitioner to Researcher

    Science.gov (United States)

    Buoro, Ivano

    2015-01-01

    The journey from VET practitioner to academic researcher is not an easy one, especially for VET teachers whose educational research training in action and ethnographic research have been inculcated through years of practice. This paper discusses the highlights of the journey from practitioner to practitioner researcher including a discussion of…

  13. Controlled-source seismic interferometry with one way wave fields

    Science.gov (United States)

    van der Neut, J.; Wapenaar, K.; Thorbecke, J. W.

    2008-12-01

    In Seismic Interferometry we generally cross-correlate registrations at two receiver locations and sum over an array of sources to retrieve a Green's function as if one of the receiver locations hosts a (virtual) source and the other receiver location hosts an actual receiver. One application of this concept is to redatum an area of surface sources to a downhole receiver location, without requiring information about the medium between the sources and receivers, thus providing an effective tool for imaging below complex overburden, which is also known as the Virtual Source method. We demonstrate how elastic wavefield decomposition can be effectively combined with controlled-source Seismic Interferometry to generate virtual sources in a downhole receiver array that radiate only down- or upgoing P- or S-waves with receivers sensing only down- or upgoing P- or S- waves. For this purpose we derive exact Green's matrix representations from a reciprocity theorem for decomposed wavefields. Required is the deployment of multi-component sources at the surface and multi- component receivers in a horizontal borehole. The theory is supported with a synthetic elastic model, where redatumed traces are compared with those of a directly modeled reflection response, generated by placing active sources at the virtual source locations and applying elastic wavefield decomposition on both source and receiver side.

  14. One Hundred and One Ways to Infinity: Part 2.

    Science.gov (United States)

    Gardiner, A.

    1980-01-01

    Part 2 considers the limit of a sequence and extends this to include ideas such as continuity, derivative, and integral. The discussion concludes with an example of a finite or "counted completely" set, the Fermat primes. (MK)

  15. More than One Way: Stories of UDL and Inclusive Classrooms

    Science.gov (United States)

    Lowrey, K. Alisa; Hollingshead, Aleksandra; Howery, Kathy; Bishop, John B.

    2017-01-01

    Voices of practitioners are often missing in research studies. This project focused on examining general education teachers' stories as they relate to implementation of Universal Design for Learning (UDL) framework and inclusion of students with moderate to severe intellectual disability. Seven general education teachers from Canada and the United…

  16. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  17. Children's schemes for anticipating the validity of nets for solids

    Science.gov (United States)

    Wright, Vince; Smith, Ken

    2017-09-01

    There is growing acknowledgement of the importance of spatial abilities to student achievement across a broad range of domains and disciplines. Nets are one way to connect three-dimensional shapes and their two-dimensional representations and are a common focus of geometry curricula. Thirty-four students at year 6 (upper primary school) were interviewed on two occasions about their anticipation of whether or not given nets for the cube- and square-based pyramid would fold to form the target solid. Vergnaud's ( Journal of Mathematical Behavior, 17(2), 167-181, 1998, Human Development, 52, 83-94, 2009) four characteristics of schemes were used as a theoretical lens to analyse the data. Successful schemes depended on the interaction of operational invariants, such as strategic choice of the base, rules for action, particularly rotation of shapes, and anticipations of composites of polygons in the net forming arrangements of faces in the solid. Inferences were rare. These data suggest that students need teacher support to make inferences, in order to create transferable schemes.

  18. A hybrid scheme for absorbing edge reflections in numerical modeling of wave propagation

    KAUST Repository

    Liu, Yang; Sen, Mrinal K.

    2010-01-01

    We propose an efficient scheme to absorb reflections from the model boundaries in numerical solutions of wave equations. This scheme divides the computational domain into boundary, transition, and inner areas. The wavefields within the inner and boundary areas are computed by the wave equation and the one-way wave equation, respectively. The wavefields within the transition area are determined by a weighted combination of the wavefields computed by the wave equation and the one-way wave equation to obtain a smooth variation from the inner area to the boundary via the transition zone. The results from our finite-difference numerical modeling tests of the 2D acoustic wave equation show that the absorption enforced by this scheme gradually increases with increasing width of the transition area. We obtain equally good performance using pseudospectral and finite-element modeling with the same scheme. Our numerical experiments demonstrate that use of 10 grid points for absorbing edge reflections attains nearly perfect absorption. © 2010 Society of Exploration Geophysicists.

  19. A hybrid scheme for absorbing edge reflections in numerical modeling of wave propagation

    KAUST Repository

    Liu, Yang

    2010-03-01

    We propose an efficient scheme to absorb reflections from the model boundaries in numerical solutions of wave equations. This scheme divides the computational domain into boundary, transition, and inner areas. The wavefields within the inner and boundary areas are computed by the wave equation and the one-way wave equation, respectively. The wavefields within the transition area are determined by a weighted combination of the wavefields computed by the wave equation and the one-way wave equation to obtain a smooth variation from the inner area to the boundary via the transition zone. The results from our finite-difference numerical modeling tests of the 2D acoustic wave equation show that the absorption enforced by this scheme gradually increases with increasing width of the transition area. We obtain equally good performance using pseudospectral and finite-element modeling with the same scheme. Our numerical experiments demonstrate that use of 10 grid points for absorbing edge reflections attains nearly perfect absorption. © 2010 Society of Exploration Geophysicists.

  20. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  1. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  2. Novel Schemes for Measurement-Based Quantum Computation

    International Nuclear Information System (INIS)

    Gross, D.; Eisert, J.

    2007-01-01

    We establish a framework which allows one to construct novel schemes for measurement-based quantum computation. The technique develops tools from many-body physics--based on finitely correlated or projected entangled pair states--to go beyond the cluster-state based one-way computer. We identify resource states radically different from the cluster state, in that they exhibit nonvanishing correlations, can be prepared using nonmaximally entangling gates, or have very different local entanglement properties. In the computational models, randomness is compensated in a different manner. It is shown that there exist resource states which are locally arbitrarily close to a pure state. We comment on the possibility of tailoring computational models to specific physical systems

  3. Novel schemes for measurement-based quantum computation.

    Science.gov (United States)

    Gross, D; Eisert, J

    2007-06-01

    We establish a framework which allows one to construct novel schemes for measurement-based quantum computation. The technique develops tools from many-body physics-based on finitely correlated or projected entangled pair states-to go beyond the cluster-state based one-way computer. We identify resource states radically different from the cluster state, in that they exhibit nonvanishing correlations, can be prepared using nonmaximally entangling gates, or have very different local entanglement properties. In the computational models, randomness is compensated in a different manner. It is shown that there exist resource states which are locally arbitrarily close to a pure state. We comment on the possibility of tailoring computational models to specific physical systems.

  4. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  5. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  6. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  7. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  8. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  9. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  10. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  11. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  12. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  13. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  14. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  15. Signal multiplexing scheme for LINAC

    International Nuclear Information System (INIS)

    Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra

    2004-01-01

    For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)

  16. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  17. On 165Ho level scheme

    International Nuclear Information System (INIS)

    Ardisson, Claire; Ardisson, Gerard.

    1976-01-01

    A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr

  18. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping

    2014-01-01

    the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost

  19. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  20. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  1. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  2. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    , Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...

  3. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  4. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  5. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...

  6. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  7. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  8. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  9. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  10. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  11. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  12. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  13. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  14. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  15. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  16. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  17. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  18. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  19. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  20. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  1. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  2. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  3. Outcome-based health equity across different social health insurance schemes for the elderly in China.

    Science.gov (United States)

    Liu, Xiaoting; Wong, Hung; Liu, Kai

    2016-01-14

    Against the achievement of nearly universal coverage for social health insurance for the elderly in China, a problem of inequity among different insurance schemes on health outcomes is still a big challenge for the health care system. Whether various health insurance schemes have divergent effects on health outcome is still a puzzle. Empirical evidence will be investigated in this study. This study employs a nationally representative survey database, the National Survey of the Aged Population in Urban/Rural China, to compare the changes of health outcomes among the elderly before and after the reform. A one-way ANOVA is utilized to detect disparities in health care expenditures and health status among different health insurance schemes. Multiple Linear Regression is applied later to examine the further effects of different insurance plans on health outcomes while controlling for other social determinants. The one-way ANOVA result illustrates that although the gaps in insurance reimbursements between the Urban Employee Basic Medical Insurance (UEBMI) and the other schemes, the New Rural Cooperative Medical Scheme (NCMS) and Urban Residents Basic Medical Insurance (URBMI) decreased, out-of-pocket spending accounts for a larger proportion of total health care expenditures, and the disparities among different insurances enlarged. Results of the Multiple Linear Regression suggest that UEBMI participants have better self-reported health status, physical functions and psychological wellbeing than URBMI and NCMS participants, and those uninsured. URBMI participants report better self-reported health than NCMS ones and uninsured people, while having worse psychological wellbeing compared with their NCMS counterparts. This research contributes to a transformation in health insurance studies from an emphasis on the opportunity-oriented health equity measured by coverage and healthcare accessibility to concern with outcome-based equity composed of health expenditure and health

  4. Fragment separator momentum compression schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  5. Fragment separator momentum compression schemes

    International Nuclear Information System (INIS)

    Bandura, Laura; Erdelyi, Bela; Hausmann, Marc; Kubo, Toshiyuki; Nolen, Jerry; Portillo, Mauricio; Sherrill, Bradley M.

    2011-01-01

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  6. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...

  7. Scheme of thinking quantum systems

    International Nuclear Information System (INIS)

    Yukalov, V I; Sornette, D

    2009-01-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field

  8. Yellow light for green scheme

    International Nuclear Information System (INIS)

    Morch, Stein

    2004-01-01

    The article asserts that there could be an investment boom for wind, hydro and bio power in a common Norwegian-Swedish market scheme for green certificates. The Swedish authorities are ready, and the Norwegian government is preparing a report to the Norwegian Parliament. What are the ambitions of Norway, and will hydro power be included? A green certificate market common to more countries have never before been established and requires the solution of many challenging problems. In Sweden, certificate support is expected to promote primarily bioenergy, wind power and small-scale hydro power. In Norway there is an evident potential for wind power, and more hydro power can be developed if desired

  9. Pomeranchuk conjecture and symmetry schemes

    Energy Technology Data Exchange (ETDEWEB)

    Galindo, A.; Morales, A.; Ruegg, H. [Junta de Energia Nuclear, Madrid (Spain); European Organization for Nuclear Research, Geneva (Switzerland); University of Geneva, Geneva (Switzerland)

    1963-01-15

    Pomeranchuk has conjectured that the cross-sections for charge-exchange processes vanish asymptotically as the energy tends to infinity. (By ''charge'' it is meant any internal quantum number, like electric charge, hypercharge, .. . ). It has been stated by several people that this conjecture implies equalities among the total cross-sections whenever any symmetry scheme is invoked for the strong interactions. But to our knowledge no explicit general proof of this statement has been given so far. We want to give this proof for any compact Lie group. We also prove, under certain assumptions, that the equality of the total cross-sections implies that s{sup -l} times the charge-exchange forward scattering absorptive amplitudes tend to zero as s -> ∞.

  10. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  11. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  12. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  13. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  14. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  15. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  16. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  17. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  18. Community healthcare financing scheme: findings among residents ...

    African Journals Online (AJOL)

    ... none were active participants as 2(0.6%) were indifferent. There was a statistically significant relationship, Fischers <0.0001 between sex and the scheme's knowledge. Conclusion: Knowledge of the scheme was poor among majority of the respondents and none were active participants. Bribery and corruption was the ...

  19. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme...

  20. A generalized scheme for designing multistable continuous ...

    Indian Academy of Sciences (India)

    In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two mdimensional dynamical systems, multistable ...

  1. Consolidation of the health insurance scheme

    CERN Document Server

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  2. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  3. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  4. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...

  5. Birkhoffian Symplectic Scheme for a Quantum System

    International Nuclear Information System (INIS)

    Su Hongling

    2010-01-01

    In this paper, a classical system of ordinary differential equations is built to describe a kind of n-dimensional quantum systems. The absorption spectrum and the density of the states for the system are defined from the points of quantum view and classical view. From the Birkhoffian form of the equations, a Birkhoffian symplectic scheme is derived for solving n-dimensional equations by using the generating function method. Besides the Birkhoffian structure-preserving, the new scheme is proven to preserve the discrete local energy conservation law of the system with zero vector f. Some numerical experiments for a 3-dimensional example show that the new scheme can simulate the general Birkhoffian system better than the implicit midpoint scheme, which is well known to be symplectic scheme for Hamiltonian system. (general)

  6. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  7. A Spatiotemporal-Chaos-Based Cryptosystem Taking Advantage of Both Synchronous and Self-Synchronizing Schemes

    Science.gov (United States)

    Lü, Hua-Ping; Wang, Shi-Hong; Li, Xiao-Wen; Tang, Guo-Ning; Kuang, Jin-Yu; Ye, Wei-Ping; Hu, Gang

    2004-06-01

    Two-dimensional one-way coupled map lattices are used for cryptography where multiple space units produce chaotic outputs in parallel. One of the outputs plays the role of driving for synchronization of the decryption system while the others perform the function of information encoding. With this separation of functions the receiver can establish a self-checking and self-correction mechanism, and enjoys the advantages of both synchronous and self-synchronizing schemes. A comparison between the present system with the system of advanced encryption standard (AES) is presented in the aspect of channel noise influence. Numerical investigations show that our system is much stronger than AES against channel noise perturbations, and thus can be better used for secure communications with large channel noise.

  8. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  9. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  10. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  11. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  12. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  13. Multidimensional flux-limited advection schemes

    International Nuclear Information System (INIS)

    Thuburn, J.

    1996-01-01

    A general method for building multidimensional shape preserving advection schemes using flux limiters is presented. The method works for advected passive scalars in either compressible or incompressible flow and on arbitrary grids. With a minor modification it can be applied to the equation for fluid density. Schemes using the simplest form of the flux limiter can cause distortion of the advected profile, particularly sideways spreading, depending on the orientation of the flow relative to the grid. This is partly because the simple limiter is too restrictive. However, some straightforward refinements lead to a shape-preserving scheme that gives satisfactory results, with negligible grid-flow angle-dependent distortion

  14. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  15. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  16. The new WAGR data acquisition scheme

    International Nuclear Information System (INIS)

    Ellis, W.E.; Leng, J.H.; Smith, I.C.; Smith, M.R.

    1976-06-01

    The existing WAGR data acquisition equipment was inadequate to meet the requirements introduced by the installation of two additional experimental loops and was in any case due for replacement. A completely new scheme was planned and implemented based on mini-computers, which while preserving all the useful features of the old scheme provided additional flexibility and improved data display. Both the initial objectives of the design and the final implementation are discussed without introducing detailed descriptions of hardware or the programming techniques employed. Although the scheme solves a specific problem the general principles are more widely applicable and could readily be adapted to other data checking and display problems. (author)

  17. Kinematic reversal schemes for the geomagnetic dipole.

    Science.gov (United States)

    Levy, E. H.

    1972-01-01

    Fluctuations in the distribution of cyclonic convective cells, in the earth's core, can reverse the sign of the geomagnetic field. Two kinematic reversal schemes are discussed. In the first scheme, a field maintained by cyclones concentrated at low latitude is reversed by a burst of cyclones at high latitude. Conversely, in the second scheme, a field maintained predominantly by cyclones in high latitudes is reversed by a fluctuation consisting of a burst of cyclonic convection at low latitude. The precise fluid motions which produce the geomagnetic field are not known. However, it appears that, whatever the details are, a fluctuation in the distribution of cyclonic cells over latitude can cause a geomagnetic reversal.

  18. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    ) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...

  19. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  20. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  1. A quantitative study on factors influencing enrolment of dairy farmers in a community health insurance scheme.

    Science.gov (United States)

    Greef, Tineke de Groot-de; Monareng, Lydia V; Roos, Janetta H

    2016-12-09

    Access to affordable and effective health care is a challenge in low- and middle- income countries. Out-of-pocket expenditure for health care is a major cause of impoverishment. One way to facilitate access and overcome catastrophic expenditure is through a health insurance mechanism, whereby risks are shared and financial inputs pooled by way of contributions. This study examined factors that influenced the enrolment status of dairy farmers in Western Kenya to a community health insurance (CHI) scheme. Quantitative, cross-sectional research was used to describe factors influencing the enrolment in the CHI scheme. Quota and convenience sampling was used, recruiting a sample of 135 farmers who supply milk to a dairy cooperation. Data were collected using a structured interview schedule and analysed using Stata SE, Data Analysis and Statistical Software, Version 12. Factors influencing non-enrolment were identified as affordability (40%; n = 47), unfamiliarity with the management of the scheme (37%; n = 44) and a lack of understanding about the scheme (41%; n = 48). An exploratory factor analysis was used to reduce the variables to two factors: information provision and understanding community health insurance (CHI). Logistic regression identified factors associated with enrolment in the Tanykina Community Healthcare Plan (TCHP). Supplies of less than six litres of milk per day (OR: 0.22; 95% CI: 0.06-0.84) and information provision (OR: 8.77; 95% CI: 2.25-34.16) were significantly associated with enrolment in the TCHP. Nearly 30% (29.6%; n = 40) of the respondents remarked that TCHP is expensive and 17% (n = 23) asked for more education on CHI and TCHP in an open-ended question. Recommendations related to marketing strategies, financial approach, information provision and further research were outlined to be made to the management of the TCHP as well as to those involved in public health.

  2. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  3. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...

  4. Betatron tune correction schemes in nuclotron

    International Nuclear Information System (INIS)

    Shchepunov, V.A.

    1992-01-01

    Algorithms of the betatron tune corrections in Nuclotron with sextupolar and octupolar magnets are considered. Second order effects caused by chromaticity correctors are taken into account and sextupolar compensation schemes are proposed to suppress them. 6 refs.; 1 tab

  5. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  6. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  7. Nigeria's first national social protection scheme | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-06-14

    Jun 14, 2017 ... Women and children at an IDP Camp in DRC ... The cash transfer was provided through the Nigerian Ekiti State Social Security Scheme, ... national policy conference to discuss the findings with media and policy stakeholders.

  8. Verifiable Secret Redistribution for Threshold Sharing Schemes

    National Research Council Canada - National Science Library

    Wong, Theodore M; Wang, Chenxi; Wing, Jeannette M

    2002-01-01

    .... Our protocol guards against dynamic adversaries. We observe that existing protocols either cannot be readily extended to allow redistribution between different threshold schemes, or have vulnerabilities that allow faulty old shareholders...

  9. Boson expansion theory in the seniority scheme

    International Nuclear Information System (INIS)

    Tamura, T.; Li, C.; Pedrocchi, V.G.

    1985-01-01

    A boson expansion formalism in the seniority scheme is presented and its relation with number-conserving quasiparticle calculations is elucidated. Accuracy and convergence are demonstrated numerically. A comparative discussion with other related approaches is given

  10. Designing optimal sampling schemes for field visits

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2008-10-01

    Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...

  11. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption

  12. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    of Acronyms and Abbreviations AE authenticated encryption AWS Amazon Web Services CIO Chief Information Officer DISA Defense Information Systems Agency...the number of possible challenges, H be a cryptographic hash function, AE be an authenticated encryption scheme, f be a keyed pseudo-random function...key kenc R←− Kenc for symmetric encryption scheme Enc, and a random HMAC key kmac R←− Kmac. The secret key is sk = 〈kenc, kmac〉 and public key is pk

  13. A Classification Scheme for Production System Processes

    DEFF Research Database (Denmark)

    Sørensen, Daniel Grud Hellerup; Brunø, Thomas Ditlev; Nielsen, Kjeld

    2018-01-01

    Manufacturing companies often have difficulties developing production platforms, partly due to the complexity of many production systems and difficulty determining which processes constitute a platform. Understanding production processes is an important step to identifying candidate processes...... for a production platform based on existing production systems. Reviewing a number of existing classifications and taxonomies, a consolidated classification scheme for processes in production of discrete products has been outlined. The classification scheme helps ensure consistency during mapping of existing...

  14. A scheme for the hadron spectrum

    International Nuclear Information System (INIS)

    Hoyer, P.

    1978-03-01

    A theoretically self-consistent dual scheme is proposed for the hadron spectrum, which follows naturally from basic requirements and phenomenology. All resonance properties and couplings are calculable in terms of a limited number of input parameters. A first application to ππ→ππ explains the linear trajectory and small daughter couplings. The Zweig rule and the decoupling of baryonium from mesons are expected to be consequences of the scheme. (Auth.)

  15. A Practical Voter-Verifiable Election Scheme.

    OpenAIRE

    Chaum, D; Ryan, PYA; Schneider, SA

    2005-01-01

    We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the vot...

  16. Sellafield site (including Drigg) emergency scheme manual

    International Nuclear Information System (INIS)

    1987-02-01

    This Emergency Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. This manual covers the general principles of the total emergency scheme and those detailed procedures which are not specific to any single department. (U.K.)

  17. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  18. An Optimization Scheme for ProdMod

    International Nuclear Information System (INIS)

    Gregory, M.V.

    1999-01-01

    A general purpose dynamic optimization scheme has been devised in conjunction with the ProdMod simulator. The optimization scheme is suitable for the Savannah River Site (SRS) High Level Waste (HLW) complex operations, and able to handle different types of optimizations such as linear, nonlinear, etc. The optimization is performed in the stand-alone FORTRAN based optimization deliver, while the optimizer is interfaced with the ProdMod simulator for flow of information between the two

  19. Employee-referral schemes and discrimination law

    OpenAIRE

    Connolly, M.

    2015-01-01

    Employee-referral schemes (‘introduce a friend’) are in common usage in recruitment. They carry a potential to discriminate by perpetuating an already unbalanced workforce (say, by gender and ethnicity). With this, or course, comes the risk of litigation and bad publicity as well as any inherent inefficiencies associated with discrimination. This article is threefold. First, it examines the present state of the law. Second, it is based on a survey of employers who use these schemes. Third, it...

  20. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  1. Navigators’ Behavior in Traffic Separation Schemes

    Directory of Open Access Journals (Sweden)

    Zbigniew Pietrzykowski

    2015-03-01

    Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.

  2. Effect of Occlusal Scheme on the Pressure Distribution of Complete Denture Supporting Tissues: An In Vitro Study.

    Science.gov (United States)

    Madalli, Poornima; Murali, C R; Subhas, Sambit; Garg, Surbhi; Shahi, Prinka; Parasher, Pragati

    2015-01-01

    The complete denture teeth arrangement that gives maximum denture stability, comfort, esthetics, and function have been studied since several years. Many occlusal schemes have been advised in which the lingualized occlusion, balanced occlusion, and monoplane occlusion are advocated most popularly. The purpose of this study was to compare the pressure values on the supporting tissue using three diff erent posterior occlusal schemes: Balanced occlusion, lingualized occlusion, and monoplane occlusion in simulated dentures. The simulators used in this study, composed of the maxillary, and mandibular clear heat cure acrylic resin edentulous models. Pressures on the supporting structure under the complete denture were measured using eight strain gauges placed on the model surface on the buccal and lingual slopes of the ridges on the molar and pre-molar region. Pressure on the supporting structure was measured and signals from the sensors were amplifi ed and recorded by the multi-channel electronic strain indicator. The mean pressure which was obtained at each measurement point was compared by one-way ANOVA test. Overall monoplane occlusion had lesser pressure values compared to completely balanced and lingualized occlusal scheme. Lingualized occlusal scheme was found to transfer stresses from working side to non-working side to stabilize the mandibular denture.

  3. A Classification Scheme for Literary Characters

    Directory of Open Access Journals (Sweden)

    Matthew Berry

    2017-10-01

    Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.

  4. Canonical, stable, general mapping using context schemes.

    Science.gov (United States)

    Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict

    2015-11-15

    Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  5. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  6. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  7. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  8. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  9. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  10. A fast resonance interference treatment scheme with subgroup method

    International Nuclear Information System (INIS)

    Cao, L.; He, Q.; Wu, H.; Zu, T.; Shen, W.

    2015-01-01

    A fast Resonance Interference Factor (RIF) scheme is proposed to treat the resonance interference effects between different resonance nuclides. This scheme utilizes the conventional subgroup method to evaluate the self-shielded cross sections of the dominant resonance nuclide in the heterogeneous system and the hyper-fine energy group method to represent the resonance interference effects in a simplified homogeneous model. In this paper, the newly implemented scheme is compared to the background iteration scheme, the Resonance Nuclide Group (RNG) scheme and the conventional RIF scheme. The numerical results show that the errors of the effective self-shielded cross sections are significantly reduced by the fast RIF scheme compared with the background iteration scheme and the RNG scheme. Besides, the fast RIF scheme consumes less computation time than the conventional RIF schemes. The speed-up ratio is ~4.5 for MOX pin cell problems. (author)

  11. How update schemes influence crowd simulations

    International Nuclear Information System (INIS)

    Seitz, Michael J; Köster, Gerta

    2014-01-01

    Time discretization is a key modeling aspect of dynamic computer simulations. In current pedestrian motion models based on discrete events, e.g. cellular automata and the Optimal Steps Model, fixed-order sequential updates and shuffle updates are prevalent. We propose to use event-driven updates that process events in the order they occur, and thus better match natural movement. In addition, we present a parallel update with collision detection and resolution for situations where computational speed is crucial. Two simulation studies serve to demonstrate the practical impact of the choice of update scheme. Not only do density-speed relations differ, but there is a statistically significant effect on evacuation times. Fixed-order sequential and random shuffle updates with a short update period come close to event-driven updates. The parallel update scheme overestimates evacuation times. All schemes can be employed for arbitrary simulation models with discrete events, such as car traffic or animal behavior. (paper)

  12. Asynchronous discrete event schemes for PDEs

    Science.gov (United States)

    Stone, D.; Geiger, S.; Lord, G. J.

    2017-08-01

    A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations is introduced, based on the principle of allowing quanta of mass to pass through faces of a (regular, structured) Cartesian finite volume grid. The timescales of these events are linked to the flux on the face. The resulting schemes are self-adaptive, and local in both time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate reference solutions where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased, and we outline a framework for analysis.

  13. An adaptive Cartesian control scheme for manipulators

    Science.gov (United States)

    Seraji, H.

    1987-01-01

    A adaptive control scheme for direct control of manipulator end-effectors to achieve trajectory tracking in Cartesian space is developed. The control structure is obtained from linear multivariable theory and is composed of simple feedforward and feedback controllers and an auxiliary input. The direct adaptation laws are derived from model reference adaptive control theory and are not based on parameter estimation of the robot model. The utilization of feedforward control and the inclusion of auxiliary input are novel features of the present scheme and result in improved dynamic performance over existing adaptive control schemes. The adaptive controller does not require the complex mathematical model of the robot dynamics or any knowledge of the robot parameters or the payload, and is computationally fast for online implementation with high sampling rates.

  14. A Traffic Restriction Scheme for Enhancing Carpooling

    Directory of Open Access Journals (Sweden)

    Dong Ding

    2017-01-01

    Full Text Available For the purpose of alleviating traffic congestion, this paper proposes a scheme to encourage travelers to carpool by traffic restriction. By a variational inequity we describe travelers’ mode (solo driving and carpooling and route choice under user equilibrium principle in the context of fixed demand and detect the performance of a simple network with various restriction links, restriction proportions, and carpooling costs. Then the optimal traffic restriction scheme aiming at minimal total travel cost is designed through a bilevel program and applied to a Sioux Fall network example with genetic algorithm. According to various requirements, optimal restriction regions and proportions for restricted automobiles are captured. From the results it is found that traffic restriction scheme is possible to enhance carpooling and alleviate congestion. However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.

  15. Quantum Watermarking Scheme Based on INEQR

    Science.gov (United States)

    Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou

    2018-04-01

    Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.

  16. Improvement of One Quantum Encryption Scheme

    Science.gov (United States)

    Cao, Zhengjun; Liu, Lihua

    2012-01-01

    Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.

  17. A universal encoding scheme for MIMO transmission using a single active element for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama; Papadias, C.B.; Kalis, A.

    2009-01-01

    A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO sys...

  18. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  19. Carbon trading: Current schemes and future developments

    International Nuclear Information System (INIS)

    Perdan, Slobodan; Azapagic, Adisa

    2011-01-01

    This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: → The paper provides an extensive overview of mandatory emissions trading schemes around the world. → Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. → The expansion requires considerable technical fixes and harmonisation of different trading systems. → Clear policy signals, political support and a stable economic environment are needed for the expansion. → A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.

  20. Pressure correction schemes for compressible flows

    International Nuclear Information System (INIS)

    Kheriji, W.

    2011-01-01

    This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)

  1. EPU correction scheme study at the CLS

    Energy Technology Data Exchange (ETDEWEB)

    Bertwistle, Drew, E-mail: drew.bertwistle@lightsource.ca; Baribeau, C.; Dallin, L.; Chen, S.; Vogt, J.; Wurtz, W. [Canadian Light Source Inc. 44 Innovation Boulevard, Saskatoon, SK S7N 2V3 (Canada)

    2016-07-27

    The Canadian Light Source (CLS) Quantum Materials Spectroscopy Center (QMSC) beamline will employ a novel double period (55 mm, 180 mm) elliptically polarizing undulator (EPU) to produce photons of arbitrary polarization in the soft X-ray regime. The long period and high field of the 180 mm period EPU will have a strong dynamic focusing effect on the storage ring electron beam. We have considered two partial correction schemes, a 4 m long planar array of BESSY-II style current strips, and soft iron L-shims. In this paper we briefly consider the implementation of these correction schemes.

  2. Verification of an objective analysis scheme

    International Nuclear Information System (INIS)

    Cats, G.J.; Haan, B.J. de; Hafkenscheid, L.M.

    1987-01-01

    An intermittent data assimilation scheme has been used to produce wind and precipitation fields during the 10 days after the explosion at the Chernobyl nuclear power plant on 25 April 1986. The wind fields are analyses, the precipitation fields have been generated by the forecast model part of the scheme. The precipitation fields are of fair quality. The quality of the wind fields has been monitored by the ensuing trajectories. These were found to describe the arrival times of radioactive air in good agreement with most observational data, taken all over Europe. The wind analyses are therefore considered to be reliable. 25 refs.; 13 figs

  3. Optimal powering schemes for legged robotics

    Science.gov (United States)

    Muench, Paul; Bednarz, David; Czerniak, Gregory P.; Cheok, Ka C.

    2010-04-01

    Legged Robots have tremendous mobility, but they can also be very inefficient. These inefficiencies can be due to suboptimal control schemes, among other things. If your goal is to get from point A to point B in the least amount of time, your control scheme will be different from if your goal is to get there using the least amount of energy. In this paper, we seek a balance between these extremes by looking at both efficiency and speed. We model a walking robot as a rimless wheel, and, using Pontryagin's Maximum Principle (PMP), we find an "on-off" control for the model, and describe the switching curve between these control extremes.

  4. System Protection Schemes in Eastern Denmark

    DEFF Research Database (Denmark)

    Rasmussen, Joana

    outages in the southern part of the 132-kV system introduce further stress in the power system, eventually leading to a voltage collapse. The local System Protection Scheme against voltage collapse is designed as a response-based scheme, which is dependent on local indication of reactive and active power...... effective measures, because they are associated with large reactive power losses in the transmission system. Ordered reduction of wind generation is considered an effective measure to maintain voltage stability in the system. Reactive power in the system is released due to tripping of a significant amount...... system. In that way, the power system capability could be extended beyond normal limits....

  5. Group Buying Schemes : A Sustainable Business Model?

    OpenAIRE

    Köpp, Sebastian; Mukhachou, Aliaksei; Schwaninger, Markus

    2013-01-01

    Die Autoren gehen der Frage nach, ob "Group Buying Schemes" wie beispielsweise von den Unternehmen Groupon und Dein Deal angeboten, ein nachhaltiges Geschäftsmodell sind. Anhand der Fallstudie Groupon wird mit einem System Dynamics Modell festgestellt, dass das Geschäftsmodell geändert werden muss, wenn die Unternehmung auf Dauer lebensfähig sein soll. The authors examine if group buying schemes are a sustainable business model. By means of the Groupon case study and using a System Dynami...

  6. New Imaging Operation Scheme at VLTI

    Science.gov (United States)

    Haubois, Xavier

    2018-04-01

    After PIONIER and GRAVITY, MATISSE will soon complete the set of 4 telescope beam combiners at VLTI. Together with recent developments in the image reconstruction algorithms, the VLTI aims to develop its operation scheme to allow optimized and adaptive UV plane coverage. The combination of spectro-imaging instruments, optimized operation framework and image reconstruction algorithms should lead to an increase of the reliability and quantity of the interferometric images. In this contribution, I will present the status of this new scheme as well as possible synergies with other instruments.

  7. Hilbert schemes of points and Heisenberg algebras

    International Nuclear Information System (INIS)

    Ellingsrud, G.; Goettsche, L.

    2000-01-01

    Let X [n] be the Hilbert scheme of n points on a smooth projective surface X over the complex numbers. In these lectures we describe the action of the Heisenberg algebra on the direct sum of the cohomologies of all the X [n] , which has been constructed by Nakajima. In the second half of the lectures we study the relation of the Heisenberg algebra action and the ring structures of the cohomologies of the X [n] , following recent work of Lehn. In particular we study the Chern and Segre classes of tautological vector bundles on the Hilbert schemes X [n] . (author)

  8. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  9. Optimal sampling schemes applied in geology

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2010-05-01

    Full Text Available Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology UP 2010 2 / 47 Outline 1 Introduction to hyperspectral remote... sensing 2 Objective of Study 1 3 Study Area 4 Data used 5 Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology...

  10. Quadratically convergent MCSCF scheme using Fock operators

    International Nuclear Information System (INIS)

    Das, G.

    1981-01-01

    A quadratically convergent formulation of the MCSCF method using Fock operators is presented. Among its advantages the present formulation is quadratically convergent unlike the earlier ones based on Fock operators. In contrast to other quadratically convergent schemes as well as the one based on generalized Brillouin's theorem, this method leads easily to a hybrid scheme where the weakly coupled orbitals (such as the core) are handled purely by Fock equations, while the rest of the orbitals are treated by a quadratically convergent approach with a truncated virtual space obtained by the use of the corresponding Fock equations

  11. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  12. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  13. Analysis of Program Obfuscation Schemes with Variable Encoding Technique

    Science.gov (United States)

    Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi

    Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.

  14. Investigation of schemes for incorporating generator Q limits in the ...

    Indian Academy of Sciences (India)

    Handling generator Q limits is one such important feature needed in any practical load flow method. This paper presents a comprehensive investigation of two classes of schemes intended to handle this aspect i.e. the bus type switching scheme and the sensitivity scheme. We propose two new sensitivity based schemes ...

  15. Sources of funding for community schemes

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-11-01

    There is an increasing level of interest amongst community groups in the UK to become involved in the development of renewable energy schemes. Often however these community groups have only limited funds of their own, so any additional funds that can be identified to help fund their renewable energy scheme can be very useful. There are a range of funding sources available that provide grants or loans for which community groups are eligible to apply. Few of these funding sources are targeted towards renewable energy specifically, nevertheless the funds may be applicable to renewable energy schemes under appropriate circumstances. To date, however, few of these funds have been accessed by community groups for renewable energy initiatives. One of the reasons for this low take-up of funds on offer could be that the funding sources may be difficult and time-consuming to identify, especially where the energy component of the fund is not readily apparent. This directory draws together details about many of the principal funding sources available in the UK that may consider providing funds to community groups wanting to develop a renewable energy scheme. (author)

  16. The QKD network: model and routing scheme

    Science.gov (United States)

    Yang, Chao; Zhang, Hongqi; Su, Jinhai

    2017-11-01

    Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.

  17. SYNTHESIS OF VISCOELASTIC MATERIAL MODELS (SCHEMES

    Directory of Open Access Journals (Sweden)

    V. Bogomolov

    2014-10-01

    Full Text Available The principles of structural viscoelastic schemes construction for materials with linear viscoelastic properties in accordance with the given experimental data on creep tests are analyzed. It is shown that there can be only four types of materials with linear visco-elastic properties.

  18. BPHZL-subtraction scheme and axial gauges

    Energy Technology Data Exchange (ETDEWEB)

    Kreuzer, M.; Rebhan, A.; Schweda, M.; Piguet, O.

    1986-03-27

    The application of the BPHZL subtraction scheme to Yang-Mills theories in axial gauges is presented. In the auxillary mass formulation we show the validity of the convergence theorems for subtracted momentum space integrals, and we give the integral formulae necessary for one-loop calculations. (orig.).

  19. The data cyclotron query processing scheme

    NARCIS (Netherlands)

    R.A. Goncalves (Romulo); M.L. Kersten (Martin)

    2010-01-01

    htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot

  20. THE DEVELOPMENT OF FREE PRIMARY EDUCATION SCHEME ...

    African Journals Online (AJOL)

    user

    Education scheme in Western Region and marked a radical departure from the hitherto ... academic symposia, lectures, debates, reputable journals and standard .... Enrolment in Primary Schools in the Western Region by Sex, 1953 – 1960. Year Boys .... “Possibly no single decision of the decade prior to independence had.

  1. High Order Semi-Lagrangian Advection Scheme

    Science.gov (United States)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  2. An HFB scheme in natural orbitals

    International Nuclear Information System (INIS)

    Reinhard, P.G.; Rutz, K.; Maruhn, J.A.

    1997-01-01

    We present a formulation of the Hartree-Fock-Bogoliubov (HFB) equations which solves the problem directly in the basis of natural orbitals. This provides a very efficient scheme which is particularly suited for large scale calculations on coordinate-space grids. (orig.)

  3. A classification scheme for LWR fuel assemblies

    Energy Technology Data Exchange (ETDEWEB)

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.

  4. The EU Greenhouse Gas Emissions Trading Scheme

    NARCIS (Netherlands)

    Woerdman, Edwin; Woerdman, Edwin; Roggenkamp, Martha; Holwerda, Marijn

    2015-01-01

    This chapter explains how greenhouse gas emissions trading works, provides the essentials of the Directive on the European Union Emissions Trading Scheme (EU ETS) and summarizes the main implementation problems of the EU ETS. In addition, a law and economics approach is used to discuss the dilemmas

  5. Study of 228Ac decay scheme

    International Nuclear Information System (INIS)

    Pinto, H.V.

    1976-02-01

    Calibration in energy and efficiency of the system used. Obtainement of singles gamma ray spectra of low and high energy. Reduction of the data obtained in the spectrometer by means of computer: localization and determination of the areas of the peaks, also the analysis of the shape of the peaks for identification of doublets. Checking of the decay scheme [pt

  6. Parallel knock-out schemes in networks

    NARCIS (Netherlands)

    Broersma, H.J.; Fomin, F.V.; Woeginger, G.J.

    2004-01-01

    We consider parallel knock-out schemes, a procedure on graphs introduced by Lampert and Slater in 1997 in which each vertex eliminates exactly one of its neighbors in each round. We are considering cases in which after a finite number of rounds, where the minimimum number is called the parallel

  7. Nonclassical lightstates in optical communication schemes

    International Nuclear Information System (INIS)

    Mattle, K. U.

    1997-11-01

    The present thesis is a result in theoretical and experimental work on quant information and quant communication. The first part describes a new high intense source for polarization entangled photon pairs. The high quality of the source is clearly demonstrated by violating a Bell-inequality in less than 5 minutes with 100 standard deviations. This new source is a genius tool for new experiments in the field of fundamental physics as well as applied physics. The next chapter shows an experimental implementation of an optical dense quantum coding scheme. The combination of Bell-state generation and analysis of this entangled states leads to a new nonclassical communication scheme, where the channel capacity is enhanced. A single two state photon can be used for coding and decoding 1.58 bit instead of 1 bit for classical two state systems. The following chapter discusses two photon interference effects for two independent light sources. In an experiment two independent fluorescence pulses show this kind of interference effects. The fifth chapter describes 3-photon interference effects. This nonclassical interference effect is the elementary process for the quantum teleportation scheme. In this scheme an unknown particle state is transmitted from A to B without sending the particle itself. (author)

  8. The complete flux scheme in cylindrical coordinates

    NARCIS (Netherlands)

    Anthonissen, M.J.H.; Thije Boonkkamp, ten J.H.M.

    2014-01-01

    We consider the complete ¿ux (CF) scheme, a ¿nite volume method (FVM) presented in [1]. CF is based on an integral representation for the ¿uxes, found by solving a local boundary value problem that includes the source term. It performs well (second order accuracy) for both diffusion and advection

  9. Traffic calming schemes : opportunities and implementation strategies.

    NARCIS (Netherlands)

    Schagen, I.N.L.G. van (ed.)

    2003-01-01

    Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and

  10. Harmonic generation with multiple wiggler schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bonifacio, R.; De Salvo, L.; Pierini, P. [Universita degli Studi, Milano (Italy)

    1995-02-01

    In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.

  11. Zero leakage quantization scheme for biometric verification

    NARCIS (Netherlands)

    Groot, de J.A.; Linnartz, J.P.M.G.

    2011-01-01

    Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new verification scheme, which protects the secrets of the enrolled users. We will show that zero leakage is achieved if

  12. A classification scheme for LWR fuel assemblies

    International Nuclear Information System (INIS)

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs

  13. Asynchronous schemes for CFD at extreme scales

    Science.gov (United States)

    Konduri, Aditya; Donzis, Diego

    2013-11-01

    Recent advances in computing hardware and software have made simulations an indispensable research tool in understanding fluid flow phenomena in complex conditions at great detail. Due to the nonlinear nature of the governing NS equations, simulations of high Re turbulent flows are computationally very expensive and demand for extreme levels of parallelism. Current large simulations are being done on hundreds of thousands of processing elements (PEs). Benchmarks from these simulations show that communication between PEs take a substantial amount of time, overwhelming the compute time, resulting in substantial waste in compute cycles as PEs remain idle. We investigate a novel approach based on widely used finite-difference schemes in which computations are carried out asynchronously, i.e. synchronization of data among PEs is not enforced and computations proceed regardless of the status of messages. This drastically reduces PE idle time and results in much larger computation rates. We show that while these schemes remain stable, their accuracy is significantly affected. We present new schemes that maintain accuracy under asynchronous conditions and provide a viable path towards exascale computing. Performance of these schemes will be shown for simple models like Burgers' equation.

  14. Generalization of binary tensor product schemes depends upon four parameters

    International Nuclear Information System (INIS)

    Bashir, R.; Bari, M.; Mustafa, G.

    2018-01-01

    This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)

  15. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  16. A novel secret image sharing scheme based on chaotic system

    Science.gov (United States)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  17. Simple Numerical Schemes for the Korteweg-deVries Equation

    International Nuclear Information System (INIS)

    McKinstrie, C. J.; Kozlov, M.V.

    2000-01-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves

  18. Simple Numerical Schemes for the Korteweg-deVries Equation

    Energy Technology Data Exchange (ETDEWEB)

    C. J. McKinstrie; M. V. Kozlov

    2000-12-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves.

  19. Electricity storage using a thermal storage scheme

    Energy Technology Data Exchange (ETDEWEB)

    White, Alexander, E-mail: ajw36@cam.ac.uk [Hopkinson Laboratory, Cambridge University Engineering Department, Trumpington Street, Cambridge. CB2 1PZ (United Kingdom)

    2015-01-22

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on “sensible heat” storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  20. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  1. New advection schemes for free surface flows

    International Nuclear Information System (INIS)

    Pavan, Sara

    2016-01-01

    The purpose of this thesis is to build higher order and less diffusive schemes for pollutant transport in shallow water flows or 3D free surface flows. We want robust schemes which respect the main mathematical properties of the advection equation with relatively low numerical diffusion and apply them to environmental industrial applications. Two techniques are tested in this work: a classical finite volume method and a residual distribution technique combined with a finite element method. For both methods we propose a decoupled approach since it is the most advantageous in terms of accuracy and CPU time. Concerning the first technique, a vertex-centred finite volume method is used to solve the augmented shallow water system where the numerical flux is computed through an Harten-Lax-Van Leer-Contact Riemann solver. Starting from this solution, a decoupled approach is formulated and is preferred since it allows to compute with a larger time step the advection of a tracer. This idea was inspired by Audusse, E. and Bristeau, M.O. [13]. The Monotonic Upwind Scheme for Conservation Law, combined with the decoupled approach, is then used for the second order extension in space. The wetting and drying problem is also analysed and a possible solution is presented. In the second case, the shallow water system is entirely solved using the finite element technique and the residual distribution method is applied to the solution of the tracer equation, focusing on the case of time-dependent problems. However, for consistency reasons the resolution of the continuity equation must be considered in the numerical discretization of the tracer. In order to get second order schemes for unsteady cases a predictor-corrector scheme is used in this work. A first order but less diffusive version of the predictor-corrector scheme is also introduced. Moreover, we also present a new locally semi-implicit version of the residual distribution method which, in addition to good properties in

  2. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  3. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  4. A hybrid Lagrangian Voronoi-SPH scheme

    Science.gov (United States)

    Fernandez-Gutierrez, D.; Souto-Iglesias, A.; Zohdi, T. I.

    2017-11-01

    A hybrid Lagrangian Voronoi-SPH scheme, with an explicit weakly compressible formulation for both the Voronoi and SPH sub-domains, has been developed. The SPH discretization is substituted by Voronoi elements close to solid boundaries, where SPH consistency and boundary conditions implementation become problematic. A buffer zone to couple the dynamics of both sub-domains is used. This zone is formed by a set of particles where fields are interpolated taking into account SPH particles and Voronoi elements. A particle may move in or out of the buffer zone depending on its proximity to a solid boundary. The accuracy of the coupled scheme is discussed by means of a set of well-known verification benchmarks.

  5. Exclusion from the Health Insurance Scheme

    CERN Multimedia

    2003-01-01

    A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635

  6. A numerical relativity scheme for cosmological simulations

    Science.gov (United States)

    Daverio, David; Dirian, Yves; Mitsou, Ermis

    2017-12-01

    Cosmological simulations involving the fully covariant gravitational dynamics may prove relevant in understanding relativistic/non-linear features and, therefore, in taking better advantage of the upcoming large scale structure survey data. We propose a new 3  +  1 integration scheme for general relativity in the case where the matter sector contains a minimally-coupled perfect fluid field. The original feature is that we completely eliminate the fluid components through the constraint equations, thus remaining with a set of unconstrained evolution equations for the rest of the fields. This procedure does not constrain the lapse function and shift vector, so it holds in arbitrary gauge and also works for arbitrary equation of state. An important advantage of this scheme is that it allows one to define and pass an adaptation of the robustness test to the cosmological context, at least in the case of pressureless perfect fluid matter, which is the relevant one for late-time cosmology.

  7. A new chaotic secure communication scheme

    International Nuclear Information System (INIS)

    Hua Changchun; Yang Bo; Ouyang Gaoxiang; Guan Xinping

    2005-01-01

    A new chaotic secure communication scheme is constructed. Unified chaotic system is used to encrypt the emitted signal. Different from the existing chaotic secure communication methods, the useful information is embodied in the parameter of chaotic systems in this Letter. The receiver is designed which can succeed in recovering the former signal. Finally computer simulations are done to verify the proposed methods, and the results show that the obtained theoretic results are feasible and efficient

  8. On Some Incompatible Properties of Voting Schemes

    OpenAIRE

    Chevallier-Mames , Benoît; Fouque , Pierre-Alain; Pointcheval , David; Stern , Julien; Traoré , Jacques

    2010-01-01

    In this paper, we study the problem of simultaneously achieving several security properties, for voting schemes, without non-standard assumptions. More specifically, we focus on the universal veriability of the computation of the tally, on the unconditional privacy/anonymity of the votes, and on the receipt-freeness properties, for the most classical election processes. Under usual assumptions and efficiency requirements, we show that a voting system that wants to publish the final list of th...

  9. Conservative Semidiscrete Difference Schemes for Timoshenko Systems

    OpenAIRE

    Júnior, D. S. Almeida

    2014-01-01

    We present a parameterized family of finite-difference schemes to analyze the energy properties for linearly elastic constant-coefficient Timoshenko systems considering shear deformation and rotatory inertia. We derive numerical energies showing the positivity, and the energy conservation property and we show how to avoid a numerical anomaly known as locking phenomenon on shear force. Our method of proof relies on discrete multiplier techniques.

  10. Droop Scheme With Consideration of Operating Costs

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede

    2014-01-01

    considered even though they are different for different types of DGs. This letter thus proposes an alternative droop scheme, which can better distinguish the different operating characteristics and objectives of the DGs grouped together in a weighted droop expression. The power sharing arrived in the steady...... state will meet the intended objectives, as demonstrated in the experiment with a defined objective of minimizing the total microgrid operating cost....

  11. A Scheme of Controlled Quantum State Swapping

    International Nuclear Information System (INIS)

    Zha Xinwei; Zou Zhichun; Qi Jianxia; Song Haiyang

    2012-01-01

    A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state, i.e., Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an entangled state of particle b to Alice via the control of the supervisor Charlie. The operations used in this swapping process including C-not operation and a series of single-qubit measurements performed by Alice, Bob, and Charlie.

  12. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  13. The Emergent Universe scheme and tunneling

    Energy Technology Data Exchange (ETDEWEB)

    Labraña, Pedro [Departamento de Física, Universidad del Bío-Bío, Avenida Collao 1202, Casilla 5-C, Concepción, Chile and Departament d' Estructura i Constituents de la Matèria and Institut de Ciències del Cosmos, Universitat (Spain)

    2014-07-23

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.

  14. Evolutionary Algorithm for Optimal Vaccination Scheme

    International Nuclear Information System (INIS)

    Parousis-Orthodoxou, K J; Vlachos, D S

    2014-01-01

    The following work uses the dynamic capabilities of an evolutionary algorithm in order to obtain an optimal immunization strategy in a user specified network. The produced algorithm uses a basic genetic algorithm with crossover and mutation techniques, in order to locate certain nodes in the inputted network. These nodes will be immunized in an SIR epidemic spreading process, and the performance of each immunization scheme, will be evaluated by the level of containment that provides for the spreading of the disease

  15. INFORMATION FROM THE CERN HEALTH INSURANCE SCHEME

    CERN Document Server

    Tel : 7-3635

    2002-01-01

    Please note that, from 1 July 2002, the tariff agreement between CERN and the Hôpital de la Tour will no longer be in force. As a result the members of the CERN Health Insurance Scheme will no longer obtain a 5% discount for quick payment of bills. More information on the termination of the agreement and the implications for our Health Insurance Scheme will be provided in the next issue of the CHIS Bull', due for publication in the first half of July. It will be sent to your home address, so, if you have moved recently, please check that your divisional secretariat has your current address. Tel.: 73635 The Organization's Health Insurance Scheme (CHIS) has launched its own Web pages, located on the Website of the Social & Statutory Conditions Group of HR Division (HR-SOC). The address is short and easy-to-remember www.cern.ch/chis The pages currently available concentrate on providing basic information. Over the coming months it is planned to fill out the details and introduce new topics. Please give us ...

  16. Doppler Shift Compensation Schemes in VANETs

    Directory of Open Access Journals (Sweden)

    F. Nyongesa

    2015-01-01

    Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.

  17. Boudot's Range-Bounded Commitment Scheme Revisited

    Science.gov (United States)

    Cao, Zhengjun; Liu, Lihua

    Checking whether a committed integer lies in a specific interval has many cryptographic applications. In Eurocrypt'98, Chan et al. proposed an instantiation (CFT Proof). Based on CFT, Boudot presented a popular range-bounded commitment scheme in Eurocrypt'2000. Both CFT Proof and Boudot Proof are based on the encryption E(x, r)=g^xh^r mod n, where n is an RSA modulus whose factorization is unknown by the prover. They did not use a single base as usual. Thus an increase in cost occurs. In this paper, we show that it suffices to adopt a single base. The cost of the modified Boudot Proof is about half of that of the original scheme. Moreover, the key restriction in the original scheme, i.e., both the discrete logarithm of g in base h and the discrete logarithm of h in base g are unknown by the prover, which is a potential menace to the Boudot Proof, is definitely removed.

  18. An evaluation scheme for nanotechnology policies

    International Nuclear Information System (INIS)

    Soltani, Ali M.; Tabatabaeian, Seyed H.; Hanafizadeh, Payam; Bamdad Soofi, Jahanyar

    2011-01-01

    Dozens of countries are executing national nanotechnology plans. No rigorous evaluation scheme for these plans exists, although stakeholders—especially policy makers, top-level agencies and councils, as well as the society at large—are eager to learn the outcome of these policies. In this article, we recommend an evaluation scheme for national nanotechnology policies that would be used to review the whole or any component part of a national nanotechnology plan. In this scheme, a component at any level of aggregation is evaluated. The component may be part of the plan’s overarching policy goal, which for most countries is to create wealth and improve the quality of life of their nation with nanotechnology. Alternatively, the component may be a programme or an activity related to a programme. The evaluation could be executed at different times in the policy’s life cycle, i.e., before the policy is formulated, during its execution or after its completion. The three criteria for policy evaluation are appropriateness, efficiency and effectiveness. The evaluator should select the appropriate qualitative or quantitative methods to evaluate the various components of national nanotechnology plans.

  19. Parallel S/sub n/ iteration schemes

    International Nuclear Information System (INIS)

    Wienke, B.R.; Hiromoto, R.E.

    1986-01-01

    The iterative, multigroup, discrete ordinates (S/sub n/) technique for solving the linear transport equation enjoys widespread usage and appeal. Serial iteration schemes and numerical algorithms developed over the years provide a timely framework for parallel extension. On the Denelcor HEP, the authors investigate three parallel iteration schemes for solving the one-dimensional S/sub n/ transport equation. The multigroup representation and serial iteration methods are also reviewed. This analysis represents a first attempt to extend serial S/sub n/ algorithms to parallel environments and provides good baseline estimates on ease of parallel implementation, relative algorithm efficiency, comparative speedup, and some future directions. The authors examine ordered and chaotic versions of these strategies, with and without concurrent rebalance and diffusion acceleration. Two strategies efficiently support high degrees of parallelization and appear to be robust parallel iteration techniques. The third strategy is a weaker parallel algorithm. Chaotic iteration, difficult to simulate on serial machines, holds promise and converges faster than ordered versions of the schemes. Actual parallel speedup and efficiency are high and payoff appears substantial

  20. Optimization of a middle atmosphere diagnostic scheme

    Science.gov (United States)

    Akmaev, Rashid A.

    1997-06-01

    A new assimilative diagnostic scheme based on the use of a spectral model was recently tested on the CIRA-86 empirical model. It reproduced the observed climatology with an annual global rms temperature deviation of 3.2 K in the 15-110 km layer. The most important new component of the scheme is that the zonal forcing necessary to maintain the observed climatology is diagnosed from empirical data and subsequently substituted into the simulation model at the prognostic stage of the calculation in an annual cycle mode. The simulation results are then quantitatively compared with the empirical model, and the above mentioned rms temperature deviation provides an objective measure of the `distance' between the two climatologies. This quantitative criterion makes it possible to apply standard optimization procedures to the whole diagnostic scheme and/or the model itself. The estimates of the zonal drag have been improved in this study by introducing a nudging (Newtonian-cooling) term into the thermodynamic equation at the diagnostic stage. A proper optimal adjustment of the strength of this term makes it possible to further reduce the rms temperature deviation of simulations down to approximately 2.7 K. These results suggest that direct optimization can successfully be applied to atmospheric model parameter identification problems of moderate dimensionality.

  1. Computing with high-resolution upwind schemes for hyperbolic equations

    International Nuclear Information System (INIS)

    Chakravarthy, S.R.; Osher, S.; California Univ., Los Angeles)

    1985-01-01

    Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and glitches, relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes. 21 references

  2. Error forecasting schemes of error correction at receiver

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-08-01

    To combat error in computer communication networks, ARQ (Automatic Repeat Request) techniques are used. Recently Chakraborty has proposed a simple technique called the packet combining scheme in which error is corrected at the receiver from the erroneous copies. Packet Combining (PC) scheme fails: (i) when bit error locations in erroneous copies are the same and (ii) when multiple bit errors occur. Both these have been addressed recently by two schemes known as Packet Reversed Packet Combining (PRPC) Scheme, and Modified Packet Combining (MPC) Scheme respectively. In the letter, two error forecasting correction schemes are reported, which in combination with PRPC offer higher throughput. (author)

  3. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  4. A rational function based scheme for solving advection equation

    International Nuclear Information System (INIS)

    Xiao, Feng; Yabe, Takashi.

    1995-07-01

    A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author)

  5. Innovations in Delta Differential One-Way Range: from Viking to Mars Science Laboratory

    Science.gov (United States)

    Border, James S.

    2009-01-01

    The Deep Space Network has provided the capability for very-long-baseline interferometry measurements in support of spacecraft navigation since the late 1970s. Both system implementation and the importance of such measurements to flight projects have evolved significantly over the past three decades. Innovations introduced through research and development programs have led to much better performance. This paper provides an overview of the development and use of interferometric tracking techniques in the DSN starting with the Viking era and continuing with a description of the current system and its planned use to support Mars Science Laboratory.

  6. Cohesive cracked-hinge model for simulation of fracture in one-way slabs on grade

    DEFF Research Database (Denmark)

    Skar, Asmus; Poulsen, Peter Noe; Olesen, John Forbes

    2017-01-01

    Numerical analysis of slab on grade structures subjected to mechanical loads is a complex matter often requiring computationally expensive models. In order to develop a simplified and general concept for non-linear analysis of slab on grade structures, this paper presents a cohesive cracked-hinge...

  7. MANCOVA for one way classification with homogeneity of regression coefficient vectors

    Science.gov (United States)

    Mokesh Rayalu, G.; Ravisankar, J.; Mythili, G. Y.

    2017-11-01

    The MANOVA and MANCOVA are the extensions of the univariate ANOVA and ANCOVA techniques to multidimensional or vector valued observations. The assumption of a Gaussian distribution has been replaced with the Multivariate Gaussian distribution for the vectors data and residual term variables in the statistical models of these techniques. The objective of MANCOVA is to determine if there are statistically reliable mean differences that can be demonstrated between groups later modifying the newly created variable. When randomization assignment of samples or subjects to groups is not possible, multivariate analysis of covariance (MANCOVA) provides statistical matching of groups by adjusting dependent variables as if all subjects scored the same on the covariates. In this research article, an extension has been made to the MANCOVA technique with more number of covariates and homogeneity of regression coefficient vectors is also tested.

  8. More than One Way to Tell a Story: Integrating Storytelling into Your Law Course

    Science.gov (United States)

    Steslow, Donna M.; Gardner, Carolyn

    2011-01-01

    Storytelling has been used in diverse educational settings. It is employed at all educational levels, from elementary schools to graduate schools. Approximately twenty years ago, law school professors began writing about the application of storytelling to various law school subjects as an alternative to the traditional case method. Legal scholars…

  9. One Way Multimedia Broadcasting as a Tool for Education and Development in Developing Nations

    Science.gov (United States)

    Chandrasekhar, M. G.; Venugopal, D.; Sebastian, M.; Chari, B.

    2000-07-01

    An improved quality of life through education and developmental communication is an important necessity of societal up-liftment in the new millennium, especially in the developing nations. The population explosion and the associated pressure on the scarce resources to meet the basic necessities have made it more or less impossible for most of the nations to invest reasonable resources in realizing adequate channels of formal education. Thanks to the developments in satellite communication and associated technologies, new vistas are available today to provide education and developmental communication opportunities to millions of people, spread across the globe. Satellite based Digital Audio and Multimedia Broadcasting is one such new development that is being viewed as an innovative space application in the coming decades. The potential of DAB technology to reach education, information and entertainment directly to the user through a specially designed receiver could be efficiently utilized by the developing nations to overcome their difficulties in realizing formal channels of education and information dissemination. WorldSpace plans to launch three geo-stationary satellites that would cover most of the developing economies in Africa, the Mediterranean, the Middle East, Asia, Latin America and the Caribbean. Apart from a variety of digital, high quality audio channels providing news, views, education and entertainment opportunities, the end users can also get a responsive multimedia. The multimedia is being planned as a specially packaged offering that can meet the demand of students, professionals as well as certain special groups who have certain specific data and information requirements. Apart from WorldSpace, renowned agencies/firms from different parts of the world shall provide the required content to meet these requirements. Though the Internet option is available, higher telephone charges and the difficulty in getting access have made this option less interesting and unpopular in most of the developing countries. The proposed digital audio and multimedia offering from WorldSpace to millions of consumers spread across more than 120 countries is considered as a unique tool for education and development, particularly in the developing nations. In this paper, an attempt is made to briefly describe the issues associated with education and development in developing countries, the WorldSpace offering and how a developing nation can benefit from this offering in the coming decades.

  10. One Way to Rein in the Cost of Textbooks: Make Them Free

    Science.gov (United States)

    Delespinasse, Paul F.

    2008-01-01

    The prices for college texts have soared way beyond inflation for the last quarter-century. As such, they have become a burden on today's financially strapped students. From the point of students and of faculty members who are concerned about their students' welfare, the important question is what can be done to drive text prices back down. In…

  11. No One Way: Differentiating School District Leadership and Support for School Improvement

    Science.gov (United States)

    Anderson, Stephen E.; Mascall, Blair; Stiegelbauer, Suzanne; Park, Jaddon

    2012-01-01

    This article examines findings from a qualitative investigation of how school district administrators in four mid to large sized urban school districts (10,000-50,000) identify and address differences in school performance. The analysis explores the interaction between district policies and actions that centralize and standardize expectations for…

  12. One way and the other: the bidirectional relationship between ambivalence and body movement.

    Science.gov (United States)

    Schneider, Iris K; Eerland, Anita; van Harreveld, Frenk; Rotteveel, Mark; van der Pligt, Joop; van der Stoep, Nathan; Zwaan, Rolf A

    2013-03-01

    Prior research exploring the relationship between evaluations and body movements has focused on one-sided evaluations. However, people regularly encounter objects or situations about which they simultaneously hold both positive and negative views, which results in the experience of ambivalence. Such experiences are often described in physical terms: For example, people say they are "wavering" between two sides of an issue or are "torn." Building on this observation, we designed two studies to explore the relationship between the experience of ambivalence and side-to-side movement, or wavering. In Study 1, we used a Wii Balance Board to measure movement and found that people who are experiencing ambivalence move from side to side more than people who are not experiencing ambivalence. In Study 2, we induced body movement to explore the reverse relationship and found that when people are made to move from side to side, their experiences of ambivalence are enhanced.

  13. One way and the other: the bidirectional relationship between ambivalence and body movement

    NARCIS (Netherlands)

    Schneider, I.K.; Eerland, A.; van Harreveld, F.; Rotteveel, M.; van der Pligt, J.; van der Stoep, N.; Zwaan, R.A.

    2013-01-01

    Prior research exploring the relationship between evaluations and body movements has focused on one-sided evaluations. However, people regularly encounter objects or situations about which they simultaneously hold both positive and negative views, which results in the experience of ambivalence. Such

  14. Topologically-protected one-way leaky waves in nonreciprocal plasmonic structures

    Science.gov (United States)

    Hassani Gangaraj, S. Ali; Monticone, Francesco

    2018-03-01

    We investigate topologically-protected unidirectional leaky waves on magnetized plasmonic structures acting as homogeneous photonic topological insulators. Our theoretical analyses and numerical experiments aim at unveiling the general properties of these exotic surface waves, and their nonreciprocal and topological nature. In particular, we study the behavior of topological leaky modes in stratified structures composed of a magnetized plasma at the interface with isotropic conventional media, and we show how to engineer their propagation and radiation properties, leading to topologically-protected backscattering-immune wave propagation, and highly directive and tunable radiation. Taking advantage of the non-trivial topological properties of these leaky modes, we also theoretically demonstrate advanced functionalities, including arbitrary re-routing of leaky waves on the surface of bodies with complex shapes, as well as the realization of topological leaky-wave (nano)antennas with isolated channels of radiation that are completely independent and separately tunable. Our findings help shedding light on the behavior of topologically-protected modes in open wave-guiding structures, and may open intriguing directions for future antenna generations based on topological structures, at microwaves and optical frequencies.

  15. Estimating an Effect Size in One-Way Multivariate Analysis of Variance (MANOVA)

    Science.gov (United States)

    Steyn, H. S., Jr.; Ellis, S. M.

    2009-01-01

    When two or more univariate population means are compared, the proportion of variation in the dependent variable accounted for by population group membership is eta-squared. This effect size can be generalized by using multivariate measures of association, based on the multivariate analysis of variance (MANOVA) statistics, to establish whether…

  16. A novel method for one-way hash function construction based on spatiotemporal chaos

    International Nuclear Information System (INIS)

    Ren Haijun; Wang Yong; Xie Qing; Yang Huaqian

    2009-01-01

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  17. Optimizing dynamic downscaling in one-way nesting using a regional ocean model

    Science.gov (United States)

    Pham, Van Sy; Hwang, Jin Hwan; Ku, Hyeyun

    2016-10-01

    Dynamical downscaling with nested regional oceanographic models has been demonstrated to be an effective approach for both operationally forecasted sea weather on regional scales and projections of future climate change and its impact on the ocean. However, when nesting procedures are carried out in dynamic downscaling from a larger-scale model or set of observations to a smaller scale, errors are unavoidable due to the differences in grid sizes and updating intervals. The present work assesses the impact of errors produced by nesting procedures on the downscaled results from Ocean Regional Circulation Models (ORCMs). Errors are identified and evaluated based on their sources and characteristics by employing the Big-Brother Experiment (BBE). The BBE uses the same model to produce both nesting and nested simulations; so it addresses those error sources separately (i.e., without combining the contributions of errors from different sources). Here, we focus on discussing errors resulting from the spatial grids' differences, the updating times and the domain sizes. After the BBE was separately run for diverse cases, a Taylor diagram was used to analyze the results and recommend an optimal combination of grid size, updating period and domain sizes. Finally, suggested setups for the downscaling were evaluated by examining the spatial correlations of variables and the relative magnitudes of variances between the nested model and the original data.

  18. Behind the scenes of GS: there’s only one way to go

    CERN Multimedia

    Anaïs Schaeffer

    2014-01-01

    At CERN, all of the Laboratory’s imports and exports are routed in the same way: through the Logistics Service. This GS-IS Group service is responsible for receiving, inspecting and distributing all goods sent to the Organization.   Whether products for the CERN Stores, components for the experiments, tools, machinery and materials for the workshops or equipment for users and members of the personnel, nothing escapes the attention of CERN’s Logistics Service, which every year processes nearly 70,000 incoming deliveries, 7,500 shipments and 160,000 distributed items. “The vast majority of our imports come from CERN Member States,” says imports and customs procedures manager Laurence Planque, “but we are receiving more and more goods for collaborators working at CERN from non-Member States such as China, India and Pakistan. All these imports are entitled to diplomatic exemption, so every day we have to manage the customs clearance procedures wit...

  19. Simulation of three lanes one-way freeway in low visibility weather by possible traffic accidents

    Science.gov (United States)

    Pang, Ming-bao; Zheng, Sha-sha; Cai, Zhang-hui

    2015-09-01

    The aim of this work is to investigate the traffic impact of low visibility weather on a freeway including the fraction of real vehicle rear-end accidents and road traffic capacity. Based on symmetric two-lane Nagel-Schreckenberg (STNS) model, a cellular automaton model of three-lane freeway mainline with the real occurrence of rear-end accidents in low visibility weather, which considers delayed reaction time and deceleration restriction, was established with access to real-time traffic information of intelligent transportation system (ITS). The characteristics of traffic flow in different visibility weather were discussed via the simulation experiments. The results indicate that incoming flow control (decreasing upstream traffic volume) and inputting variable speed limits (VSL) signal are effective in accident reducing and road actual traffic volume's enhancing. According to different visibility and traffic demand the appropriate control strategies should be adopted in order to not only decrease the probability of vehicle accidents but also avoid congestion.

  20. Twenty-one Ways to Develop Esprit De Corps Among Your Student Officials.

    Science.gov (United States)

    Kovalakides, Nick

    Student officials for intramural sports can be given special training to enhance their aptitude in the field, but their attitude is more difficult to develop. This paper suggests 21 ways to develop attitude among student officials. Some of the suggestions are: Athletic departments should emphasize the role of the official in the intramural…

  1. A novel method for one-way hash function construction based on spatiotemporal chaos

    Energy Technology Data Exchange (ETDEWEB)

    Ren Haijun [College of Software Engineering, Chongqing University, Chongqing 400044 (China); State Key Laboratory of Power Transmission Equipment and System Security and New Technology, Chongqing University, Chongqing 400044 (China)], E-mail: jhren@cqu.edu.cn; Wang Yong; Xie Qing [Key Laboratory of Electronic Commerce and Logistics of Chongqing, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Yang Huaqian [Department of Computer and Modern Education Technology, Chongqing Education of College, Chongqing 400067 (China)

    2009-11-30

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  2. More than one way to see it: Individual heuristics in avian visual computation.

    Science.gov (United States)

    Ravignani, Andrea; Westphal-Fitch, Gesche; Aust, Ulrike; Schlumpp, Martin M; Fitch, W Tecumseh

    2015-10-01

    Comparative pattern learning experiments investigate how different species find regularities in sensory input, providing insights into cognitive processing in humans and other animals. Past research has focused either on one species' ability to process pattern classes or different species' performance in recognizing the same pattern, with little attention to individual and species-specific heuristics and decision strategies. We trained and tested two bird species, pigeons (Columba livia) and kea (Nestor notabilis, a parrot species), on visual patterns using touch-screen technology. Patterns were composed of several abstract elements and had varying degrees of structural complexity. We developed a model selection paradigm, based on regular expressions, that allowed us to reconstruct the specific decision strategies and cognitive heuristics adopted by a given individual in our task. Individual birds showed considerable differences in the number, type and heterogeneity of heuristic strategies adopted. Birds' choices also exhibited consistent species-level differences. Kea adopted effective heuristic strategies, based on matching learned bigrams to stimulus edges. Individual pigeons, in contrast, adopted an idiosyncratic mix of strategies that included local transition probabilities and global string similarity. Although performance was above chance and quite high for kea, no individual of either species provided clear evidence of learning exactly the rule used to generate the training stimuli. Our results show that similar behavioral outcomes can be achieved using dramatically different strategies and highlight the dangers of combining multiple individuals in a group analysis. These findings, and our general approach, have implications for the design of future pattern learning experiments, and the interpretation of comparative cognition research more generally. Copyright © 2015 The Authors. Published by Elsevier B.V. All rights reserved.

  3. Joint Preprocesser-Based Detectors for One-Way and Two-Way Cooperative Communication Networks

    KAUST Repository

    Abuzaid, Abdulrahman I.

    2014-01-01

    Efficient receiver designs for cooperative communication networks are becoming increasingly important. In previous work, cooperative networks communicated with the use of L relays. As the receiver is constrained, channel shortening and reduced

  4. BWR fuel assembly bottom nozzle with one-way coolant flow valve

    International Nuclear Information System (INIS)

    Taleyarkhan, R.P.

    1987-01-01

    In a nuclear reactor having a flow of coolant/moderator fluid therein, at least one fuel assembly installed in the fluid flow, the fuel assembly is described comprising in combination: a bundle of elongated fuel rods disposed in side-by-side relationship so as to form an array of spaced fuel rods; an outer tubular flow channel surrounding the fuel rods so as to direct the flow of coolant/moderator fluid along the fuel rods; bottom and top nozzles mounted at opposite ends of the flow channel and having an inlet and outlet respectively for allowing entry and exit of the flow of coolant/moderator fluid into and from the flow channel and along the fuel rods therein; and a coolant flow direction control device operatively disposed in the bottom nozzle so as to open the inlet thereof to the flow of coolant/moderator fluid in an inflow direction into the flow channel through the bottom nozzle inlet but close the inlet to the flow of coolant/moderator fluid from the flow channel through the bottom nozzle inlet upon reversal of coolant/moderator fluid flow from the inflow direction

  5. A Modest Proposal: One Way to Save Journalism and Journalism Education

    Science.gov (United States)

    John, Jeffrey Alan

    2013-01-01

    This essay suggests that because anyone and everyone can now be a "journalist," the standards of the field of journalism have been greatly diminished. To regain respect for the profession and retain stature in the academy, journalism education should offer an assurance of the legitimacy of journalism program graduates by recognizing only…

  6. Balance in Representation - More Than One Way to Tip the Scales

    Science.gov (United States)

    Rowell, D. S.; Carlis, D. L.

    2017-12-01

    Too often diversity balance is seen as purely a numbers issue - one of influx and totals. And thus recruiting and retention being two sides of the same valuable coin. However, balance is not just numbers. There is more than one means to add diversity value to an organization. Numbers is one, but power is another. `Balance' is also reached through empowerment and voice. Whereas recruiting and retention can be seen as hard currency buying balanced demographics, empowerment is an investment that takes various forms and yields various dividends. Empowerment includes investment in people, and training, and systems, and pays dividends in performance, and voice, and careers, and service. In this way space is created for the benefits of diversity even where numbers and composition is statically unyielding. Equilibrium comes from tipping the scales with involvement, impact and affect. And finally in coming back full circle, empowerment has a bonus direct effect on the numbers, as it does improve diverse recruiting and retention. This presentation places a focus on balance in terms of gender efficacy. It will highlight the requirements to grow and mature gender empowerment investments and show how these investments have diversity dividends. And finally the presentation will note how NWS is taking a multi-faceted approach to diversity to achieve `balance' through empowerment, involvement, (gender) mainstreaming, training, etc…, and of course recruiting and retention.

  7. One-way gates based on EPR, GHZ and decoherence-free states of W class

    International Nuclear Information System (INIS)

    Basharov, A.M.; Gorbachev, V.N.; Trubilko, A.I.; Yakovleva, E.S.

    2009-01-01

    The logical gates using quantum measurement as a primitive of quantum computation are considered. It is found that these gates achieved with EPR, GHZ and W entangled states have the same structure, allow encoding the classical information into states of quantum system and can perform any calculations. A particular case of decoherence-free W states is discussed as in this very case the logical gate is decoherence-free.

  8. Egocentric framing - one way people may fail in a switch dilemma: evidence from excessive lane switching.

    Science.gov (United States)

    Navon, David; Kaplan, Todd R; Kasten, Ronen

    2013-11-01

    To study switching behavior, an experiment mimicking the state of a driver on the road was conducted. In each trial participants were given a chance to switch lanes. Despite the fact that lane switching had no sound rational basis, participants often switched lanes when the speed of driving in their lane on the previous trial was relatively slow. That tendency was discerned even when switching behavior had been sparsely reinforced, and was especially marked in almost a third of the participants, who manifested it consistently. The findings illustrate a type of behavior occurring in various contexts (e.g., stocks held in a portfolio, conduct pertinent for residual life expectancy, supermarket queues). We argue that this behavior may be due to a fallacy reminiscent of that arising in the well-known "envelopes problem", in which each of two players holds a sum of money of which she knows nothing about except that it is either half or twice the amount held by the other player. Players may be paradoxically tempted to exchange assets, since an exchange fallaciously appears to always yield an expected value greater than whatever is regarded as the player's present assets. We argue that the fallacy is due to egocentrically framing the problem as if the "amount I have" is definite, albeit unspecified, and shows that framing the paradox acentrically instead eliminates the incentive to exchange assets. A possible psychological source for the human disposition to frame problems in a way that inflates expected gain is discussed. Finally, a heuristic meant to avert the source of the fallacy is proposed. © 2013.

  9. More than one way to be happy: a typology of marital happiness.

    Science.gov (United States)

    Rauer, Amy; Volling, Brenda

    2013-09-01

    This study utilized observational and self-report data from 57 happily married couples to explore assumptions regarding marital happiness. Suggesting that happily married couples are not a homogeneous group, cluster analyses revealed the existence of three types of couples based on their observed behaviors in a problem-solving task: (1) mutually engaged couples (characterized by both spouses' higher negative and positive problem-solving); (2) mutually supportive couples (characterized by both spouses' higher positivity and support); and (3) wife compensation couples (characterized by high wife positivity). Although couples in all three clusters were equally happy with and committed to their marriages, these clusters were differentially associated with spouses' evaluations of their marriage. Spouses in the mutually supportive cluster reported greater intimacy and maintenance and less conflict and ambivalence, although this was more consistently the case in comparison to the wife compensation cluster, as opposed to the mutually engaged cluster. The implications of these typologies are discussed as they pertain to efforts on the part of both practitioners to promote marital happiness and repair marital relations when couples are faced with difficulties. © FPI, Inc.

  10. Approximate method for treating dispersion in one-way quantum channels

    International Nuclear Information System (INIS)

    Stace, T. M.; Wiseman, H. M.

    2006-01-01

    Coupling the output of a source quantum system into a target quantum system is easily treated by cascaded systems theory if the intervening quantum channel is dispersionless. However, dispersion may be important in some transfer protocols, especially in solid-state systems. In this paper we show how to generalize cascaded systems theory to treat such dispersion, provided it is not too strong. We show that the technique also works for fermionic systems with a low flux, and can be extended to treat fermionic systems with large flux. To test our theory, we calculate the effect of dispersion on the fidelity of a simple protocol of quantum state transfer. We find good agreement with an approximate analytical theory that had been previously developed for this example

  11. Preserving the Helmholtz dispersion relation: One-way acoustic wave propagation using matrix square roots

    Science.gov (United States)

    Keefe, Laurence

    2016-11-01

    Parabolized acoustic propagation in transversely inhomogeneous media is described by the operator update equation U (x , y , z + Δz) =eik0 (- 1 +√{ 1 + Z }) U (x , y , z) for evolution of the envelope of a wavetrain solution to the original Helmholtz equation. Here the operator, Z =∇T2 + (n2 - 1) , involves the transverse Laplacian and the refractive index distribution. Standard expansion techniques (on the assumption Z << 1)) produce pdes that approximate, to greater or lesser extent, the full dispersion relation of the original Helmholtz equation, except that none of them describe evanescent/damped waves without special modifications to the expansion coefficients. Alternatively, a discretization of both the envelope and the operator converts the operator update equation into a matrix multiply, and existing theorems on matrix functions demonstrate that the complete (discrete) Helmholtz dispersion relation, including evanescent/damped waves, is preserved by this discretization. Propagation-constant/damping-rates contour comparisons for the operator equation and various approximations demonstrate this point, and how poorly the lowest-order, textbook, parabolized equation describes propagation in lined ducts.

  12. Complex spatiotemporal behavior in a chain of one-way nonlinearly coupled elements

    DEFF Research Database (Denmark)

    Gaididei, Yuri Borisovich; Berkemer, Rainer; Gorria, C.

    2011-01-01

    the relaxation time is shorter than a critical one a spatially uniform stationary state is stable. In the supercritical regime due to a Hopf bifurcation traveling waves spontaneously create and propagate along the system. Our analytical approach is in good agreement with numerical simulations of the fully...

  13. Relationship between thermodynamic driving force and one-way fluxes in reversible processes.

    Directory of Open Access Journals (Sweden)

    Daniel A Beard

    Full Text Available Chemical reaction systems operating in nonequilibrium open-system states arise in a great number of contexts, including the study of living organisms, in which chemical reactions, in general, are far from equilibrium. Here we introduce a theorem that relates forward and reverse fluxes and free energy for any chemical process operating in a steady state. This relationship, which is a generalization of equilibrium conditions to the case of a chemical process occurring in a nonequilibrium steady state in dilute solution, provides a novel equivalent definition for chemical reaction free energy. In addition, it is shown that previously unrelated theories introduced by Ussing and Hodgkin and Huxley for transport of ions across membranes, Hill for catalytic cycle fluxes, and Crooks for entropy production in microscopically reversible systems, are united in a common framework based on this relationship.

  14. One-way data transfer for PLC to VME status reporting at the Advanced Photon Source

    International Nuclear Information System (INIS)

    Stein, S.J.

    1993-01-01

    The Personnel Safety System for the experimental beamlines at the Advanced Photon Source will use a large number of Allen Bradley Programmable Logic Controllers (PLC) to replace conventional relay logic. PLCs allow for the design of a very advanced safety system that can handle a large number of I/O points. Certain situations Require monitoring of the safety system from various locations around the storage ring via EPICS OPI (operator interface)consoles. This presentation covers the method of choice for transferring data from the Personnel Safety System into an EPICS database. Specifics on PLC ladder design, EPICS database design, and hardware selection are also discussed

  15. One way and the other: The bi-directional relationship between ambivalence and body movement

    NARCIS (Netherlands)

    Schneider, I.K.; Eerland, A.; van Harreveld, F.; Rotteveel, M.; van der Pligt, J.; van der Stoep, N.; Zwaan, R.A.

    2013-01-01

    Prior research exploring the relationship between evaluations and body movements has focused on one-sided evaluations. However, people regularly encounter objects or situations about which they simultaneously hold both positive and negative views, which results in the experience of ambivalence. Such

  16. One-way hash function construction based on chaotic map network

    International Nuclear Information System (INIS)

    Yang Huaqian; Wong, K.-W.; Liao Xiaofeng; Wang Yong; Yang Degang

    2009-01-01

    A novel chaotic hash algorithm based on a network structure formed by 16 chaotic maps is proposed. The original message is first padded with zeros to make the length a multiple of four. Then it is divided into a number of blocks each contains 4 bytes. In the hashing process, the blocks are mixed together by the chaotic map network since the initial value and the control parameter of each tent map are dynamically determined by the output of its neighbors. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high flexibility, as required by practical keyed hash functions.

  17. Monitoring Method and Apparatus Using Asynchronous, One-Way Transmission from Sensor to Base Station

    Science.gov (United States)

    Jensen, Scott L. (Inventor); Drouant, George J. (Inventor)

    2013-01-01

    A monitoring system is disclosed, which includes a base station and at least one sensor unit that is separate from the base station. The at least one sensor unit resides in a dormant state until it is awakened by the triggering of a vibration-sensitive switch. Once awakened, the sensor may take a measurement, and then transmit to the base station the measurement. Once data is transmitted from the sensor to the base station, the sensor may return to its dormant state. There may be various sensors for each base station and the various sensors may optionally measure different quantities, such as current, voltage, single-axis and/or three-axis magnetic fields.

  18. 47 CFR 22.589 - One-way or two-way application requirements.

    Science.gov (United States)

    2010-10-01

    ... exceeds 76.4 kilometers (47.5 miles); and identify each protected Basic Exchange Telephone Radio System... applications to operate a transmitter with ERP exceeding the basic power and height-power limits of § 22.565...

  19. 49 CFR 232.403 - Design standards for one-way end-of-train devices.

    Science.gov (United States)

    2010-10-01

    ... measuring the brake pipe pressure on the rear car with an accuracy of ±3 pounds per square inch (psig) and... requirements of the Federal Communications Commission (FCC) and use of a transmission format acceptable to the FCC. (2) If power is supplied by one or more batteries, the operating life shall be a minimum of 36...

  20. Twenty-One Ways to Use Music in Teaching the Language Arts.

    Science.gov (United States)

    Cardarelli, Aldo F.

    Twenty-one activities that integrate music and the language arts in order to capitalize on children's interests are described in this paper. Topics of the activities are as follows: alphabetical order, pantomime, vocabulary building from words of a favorite song, words that are "the most (whatever)" from songs, mood words, a configuration clue…

  1. Group Presentation as One Way of Increasing Students’ Participation in the Classroom

    Directory of Open Access Journals (Sweden)

    Clara Herlina Karjo

    2008-11-01

    Full Text Available Teaching English (TOEFL to a class of 50 students or more is a difficult task for a lecturer. Some problems will occur, for example, the improbability for all students to get equal teacher’s attention and equal chance for learning and studying in class. To overcome these problems, the writer conducts a quasi-experimental research involving 100 students in her two classes in Bina Nusantara University. In this research, the writer applies the group presentation method for teaching TOEFL for one semester. The research shows that group scores are slightly higher than individual students’ scores.Keywords:

  2. Creating and Sharing Annotated Bibliographies: One Way to Become Familiar with Exemplary Multicultural Literature

    Science.gov (United States)

    Richards, Janet C.

    2015-01-01

    Teachers who meet Common Core recommendations about teaching with multicultural literature need to recognize the traditions, values, and customs of various cultures so they can make sound decisions about the authenticity of the books they select for their students. Furthermore, teachers who support students' literacy achievements with exemplary…

  3. One-way quantum computation with four-dimensional photonic qudits

    International Nuclear Information System (INIS)

    Joo, Jaewoo; Knight, Peter L.; O'Brien, Jeremy L.; Rudolph, Terry

    2007-01-01

    We consider the possibility of performing linear optical quantum computations making use of extra photonic degrees of freedom. In particular, we focus on the case where we use photons as quadbits, four-dimensional photonic qudits. The basic 2-quadbit cluster state is a hyperentangled state across polarization and two spatial mode degrees of freedom. We examine the nondeterministic methods whereby such states can be created from single photons and/or Bell pairs and then give some mechanisms for performing higher-dimensional fusion gates

  4. Inter-hospital communications and transport: turning one-way funnels into two-way networks.

    Science.gov (United States)

    Rokos, Ivan C; Sanddal, Nels D; Pancioli, Arthur M; Wolff, Catherine; Gaieski, David F

    2010-12-01

    The Inter-hospital Communications and Transport workgroup was charged with exploring the current status, barriers, and data necessary to optimize the initial destination and subsequent transfer of patients between and among acute care settings. The subtitle, "Turning Funnels Into Two-way Networks," is descriptive of the approach that the workgroup took by exploring how and when smaller facilities in suburban, rural, and frontier areas can contribute to the daily business of caring for emergency patients across the lower-acuity spectrum-in some instances with consultant support from academic medical centers. It also focused on the need to identify high-acuity patients and expedite triage and transfer of those patients to facilities with specialty resources. Draft research recommendations were developed through an iterative writing process and presented to a breakout session of Academic Emergency Medicine's 2010 consensus conference, "Beyond Regionalization: Integrated Networks of Emergency Care." Priority research areas were determined by informal consensus of the breakout group. A subsequent iterative writing process was undertaken to complete this article. A number of broad research questions are presented. 2010 by the Society for Academic Emergency Medicine.

  5. A New Adaptive Hungarian Mating Scheme in Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chanju Jung

    2016-01-01

    Full Text Available In genetic algorithms, selection or mating scheme is one of the important operations. In this paper, we suggest an adaptive mating scheme using previously suggested Hungarian mating schemes. Hungarian mating schemes consist of maximizing the sum of mating distances, minimizing the sum, and random matching. We propose an algorithm to elect one of these Hungarian mating schemes. Every mated pair of solutions has to vote for the next generation mating scheme. The distance between parents and the distance between parent and offspring are considered when they vote. Well-known combinatorial optimization problems, the traveling salesperson problem, and the graph bisection problem are used for the test bed of our method. Our adaptive strategy showed better results than not only pure and previous hybrid schemes but also existing distance-based mating schemes.

  6. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  7. Strongly coupled partitioned FSI using proper orthogonal decomposition

    CSIR Research Space (South Africa)

    Bogaers, Alfred EJ

    2012-12-01

    Full Text Available structural deformation. The structural and fluid field solvers employed for this problem are the open-source solvers Calculix and OpenFOAM. 1600 eight node hexahedral finite-volume elements and 96 twenty node quadratic brick finite elements are employed...

  8. Treatment of fully enclosed FSI using artificial compressibility

    CSIR Research Space (South Africa)

    Bogaers, Alfred EJ

    2013-07-01

    Full Text Available artificial compressibility (AC), whereby the fluid equations are modified to allow for compressibility which internally incorporates an approximation of the system volume change as a function of pressure....

  9. FSI analysis of piping systems under seismic excitation

    International Nuclear Information System (INIS)

    Uras, R.A.; Ma, D.C.; Chang, Yao W.; Liu, Wing Kam

    1991-01-01

    A formulation which accounts for fluid-structure interaction of piping system under seismic excitation is presented. The governing equations of the fluid and the structure to model the pipe are stated. Using the finite element method the discretized equations are obtained. A transformation procedure for proper assembly of matrices is introduced. A solution algorithm is described. 9 refs., 2 figs

  10. A Fuzzy Commitment Scheme with McEliece's Cipher

    Directory of Open Access Journals (Sweden)

    Deo Brat Ojha

    2010-04-01

    Full Text Available In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. This scheme is one of the interesting candidates for post quantum cryptography. Hence our interest to deal with this system with fuzzy commitment scheme. The concept itself is illustrated with the help of a simple situation and the validation of mathematical experimental verification is provided.

  11. Color encryption scheme based on adapted quantum logistic map

    Science.gov (United States)

    Zaghloul, Alaa; Zhang, Tiejun; Amin, Mohamed; Abd El-Latif, Ahmed A.

    2014-04-01

    This paper presents a new color image encryption scheme based on quantum chaotic system. In this scheme, a new encryption scheme is accomplished by generating an intermediate chaotic key stream with the help of quantum chaotic logistic map. Then, each pixel is encrypted by the cipher value of the previous pixel and the adapted quantum logistic map. The results show that the proposed scheme has adequate security for the confidentiality of color images.

  12. Quantum Communication Scheme Using Non-symmetric Quantum Channel

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Zhonghua; Song Heshan

    2008-01-01

    A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel

  13. A practicable γ5-scheme in dimensional regularization

    International Nuclear Information System (INIS)

    Koerner, J.G.; Kreimer, D.; Schilcher, K.

    1991-08-01

    We present a new simple Υ 5 regularization scheme. We discuss its use in the standard radiative correction calculations including the anomaly contributions. The new scheme features an anticommuting Υ 5 which leads to great simplifications in practical calculations. We carefully discuss the underlying mathematics of our Υ 5 -scheme which is formulated in terms of simple projection operations. (orig.)

  14. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  15. A combined spectrum sensing and OFDM demodulation scheme

    NARCIS (Netherlands)

    Heskamp, M.; Slump, Cornelis H.

    2009-01-01

    In this paper we propose a combined signaling and spectrum sensing scheme for cognitive radio that can detect in-band primary users while the networks own signal is active. The signaling scheme uses OFDM with phase shift keying modulated sub-carriers, and the detection scheme measures the deviation

  16. Developing and Rewarding Excellent Teachers: The Scottish Chartered Teacher Scheme

    Science.gov (United States)

    Ingvarson, Lawrence

    2009-01-01

    The Scottish Chartered Teacher Scheme was designed to recognise and reward teachers who attained high standards of practice. The scheme emerged in 2001 as part of an agreement between government, local employing authorities and teacher organisations. Policies such as the chartered teacher scheme aim to benefit students in two main ways: by…

  17. On doublet composite schemes of leptons and quarks

    International Nuclear Information System (INIS)

    Pirogov, Yu.F.

    1981-01-01

    All simplest doublet composite schemes are classified. Four different doublet schemes are shown to be available. A new scheme with charge doublet Q=(2/3, -1/3) rather advantageous as compared with the previous ones is being considered. Some difficulties in interpreting the colour as an effective symmetry are pointed out [ru

  18. Finite Difference Schemes as Algebraic Correspondences between Layers

    Science.gov (United States)

    Malykh, Mikhail; Sevastianov, Leonid

    2018-02-01

    For some differential equations, especially for Riccati equation, new finite difference schemes are suggested. These schemes define protective correspondences between the layers. Calculation using these schemes can be extended to the area beyond movable singularities of exact solution without any error accumulation.

  19. Lattice-Boltzmann scheme for natural convection in porous media

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    1997-01-01

    A lattice-Boltzmann scheme for natural convection in porous media is developed and applied to the heat transfer problem of a 1000 kg potato packaging. The scheme has features new to the field of LB schemes. It is mapped on a orthorhombic lattice instead of the traditional cubic lattice. Furthermore

  20. Schemes for Greenberger-Horne-Zeilinger and cluster state preparation

    International Nuclear Information System (INIS)

    Song Jie; Xia Yan; Song Heshan

    2008-01-01

    Schemes to generate Greenberger-Horne-Zeilinger (GHZ) and cluster states of three atoms are proposed in a two-mode cavity. The advantages of the schemes are their robustness against decoherence due to spontaneous emission of the excited states and decay of the cavity modes. Moreover, the schemes can be generalized to generate N-atom entangled states

  1. Numerical Schemes for Rough Parabolic Equations

    Energy Technology Data Exchange (ETDEWEB)

    Deya, Aurelien, E-mail: deya@iecn.u-nancy.fr [Universite de Nancy 1, Institut Elie Cartan Nancy (France)

    2012-04-15

    This paper is devoted to the study of numerical approximation schemes for a class of parabolic equations on (0,1) perturbed by a non-linear rough signal. It is the continuation of Deya (Electron. J. Probab. 16:1489-1518, 2011) and Deya et al. (Probab. Theory Relat. Fields, to appear), where the existence and uniqueness of a solution has been established. The approach combines rough paths methods with standard considerations on discretizing stochastic PDEs. The results apply to a geometric 2-rough path, which covers the case of the multidimensional fractional Brownian motion with Hurst index H>1/3.

  2. Cryptanalysis of Two Fault Countermeasure Schemes

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey

    2015-01-01

    function with some additional randomness and computes the value of the function. The second called the unmasking function, is computed securely using a different register and undoes the effect of the masking with random bits. We will show that there exists a weakness in the way in which both these schemes...... is meant for the protection of block ciphers like AES. The second countermeasure was proposed in IEEE-HOST 2015 and protects the Grain-128 stream cipher. The design divides the output function used in Grain-128 into two components. The first called the masking function, masks the input bits to the output...

  3. A general scheme for obtaining graviton spectrums

    International Nuclear Information System (INIS)

    GarcIa-Cuadrado, G

    2006-01-01

    The aim of this contribution is to present a general scheme for obtaining graviton spectra from modified gravity theories, based on a theory developed by Grishchuk in the mid 1970s. We try to be pedagogical, putting in order some basic ideas in a compact procedure and also giving a review of the current trends in this arena. With the aim to fill a gap for the interface between quantum field theorists and observational cosmologist in this matter, we highlight two interesting applications to cosmology: clues as to the nature of dark energy; and the possibility of reconstruction of the scalar potential in scalar-tensor gravity theories

  4. Pay-what-you-want pricing schemes

    DEFF Research Database (Denmark)

    Kahsay, Goytom Abraha; Samahita, Margaret

    2015-01-01

    Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular. We develop a model incorporating self-image into the buyer’s utility function and introduce heterogeneity in consumption utility and image-sensitivity, generating different purchase decisions and optimal prices across...... individuals. When a good’s fixed price is lower than a threshold fair value, PWYW can lead to a lower utility. This may result in a lower purchase rate and higher average price, accounting for previously unexplained field experimental evidence. An increase in the threshold value decreases the buyer’s utility...... and may further lower the purchase rate, resulting in a further increase in purchase price....

  5. Investigation of a monochromator scheme for SPEAR

    International Nuclear Information System (INIS)

    Wille, K.; Chao, A.W.

    1984-08-01

    The possibility of mono-chromatizing SPEAR for the purpose of increasing the hadronic event rate at the narrow resonances was investigated. By using two pairs of electostatic skew quads in monochromator scheme it is found that the event rate can be increased by a factor of 2 for the mini beta optics assuming the luminosity is kept unchanged. An attempt to increase this enhancement factor by major rearrangements of the ring magnets has encountered serious optical difficulties; although enhancement factor of 8 seems possible in principle, this alternative is not recommended

  6. SCHEME ANALYSIS TREE DIMENSIONS AND TOLERANCES PROCESSING

    Directory of Open Access Journals (Sweden)

    Constanta RADULESCU

    2011-07-01

    Full Text Available This paper presents one of the steps that help us to determine the optimal tolerances depending on thetechnological capability of processing equipment. To determine the tolerances in this way is necessary to takethe study and to represent schematically the operations are used in technological process of making a piece.Also in this phase will make the tree diagram of the dimensions and machining tolerances, dimensions andtolerances shown that the design execution. Determination processes, and operations of the dimensions andtolerances tree scheme will make for a machined piece is both indoor and outdoor.

  7. Small hydro schemes in Turtmanntal, Switzerland

    International Nuclear Information System (INIS)

    2008-01-01

    This two-part report for the Swiss Federal Office of Energy (SFOE) presents several variants and two preliminary projects with respect to schemes for the use of hydropower in the Turtmanntal valley in the Swiss Alps. The various possible sites for the power stations both on the left and right-hand sides of the main valley are described. Technical details and prognoses for costs and energy production are discussed for all these variants. In the second part of the report, preliminary projects for hydropower installations on the Braendji and Piji streams are presented. Costs and economic viability are discussed and time-scales for the realisation are examined.

  8. A Classification Scheme for Glaciological AVA Responses

    Science.gov (United States)

    Booth, A.; Emir, E.

    2014-12-01

    A classification scheme is proposed for amplitude vs. angle (AVA) responses as an aid to the interpretation of seismic reflectivity in glaciological research campaigns. AVA responses are a powerful tool in characterising the material properties of glacier ice and its substrate. However, before interpreting AVA data, careful true amplitude processing is required to constrain basal reflectivity and compensate amplitude decay mechanisms, including anelastic attenuation and spherical divergence. These fundamental processing steps can be difficult to design in cases of noisy data, e.g. where a target reflection is contaminated by surface wave energy (in the case of shallow glaciers) or by energy reflected from out of the survey plane. AVA methods have equally powerful usage in estimating the fluid fill of potential hydrocarbon reservoirs. However, such applications seldom use true amplitude data and instead consider qualitative AVA responses using a well-defined classification scheme. Such schemes are often defined in terms of the characteristics of best-fit responses to the observed reflectivity, e.g. the intercept (I) and gradient (G) of a linear approximation to the AVA data. The position of the response on a cross-plot of I and G then offers a diagnostic attribute for certain fluid types. We investigate the advantages in glaciology of emulating this practice, and develop a cross-plot based on the 3-term Shuey AVA approximation (using I, G, and a curvature term C). Model AVA curves define a clear lithification trend: AVA responses to stiff (lithified) substrates fall discretely into one quadrant of the cross-plot, with positive I and negative G, whereas those to fluid-rich substrates plot diagonally opposite (in the negative I and positive G quadrant). The remaining quadrants are unoccupied by plausible single-layer responses and may therefore be diagnostic of complex thin-layer reflectivity, and the magnitude and polarity of the C term serves as a further indicator

  9. Simplified scheme or radioactive plume calculations

    International Nuclear Information System (INIS)

    Gibson, T.A.; Montan, D.N.

    1976-01-01

    A simplified mathematical scheme to estimate external whole-body γ radiation exposure rates from gaseous radioactive plumes was developed for the Rio Blanco Gas Field Nuclear Stimulation Experiment. The method enables one to calculate swiftly, in the field, downwind exposure rates knowing the meteorological conditions and γ radiation exposure rates measured by detectors positioned near the plume source. The method is straightforward and easy to use under field conditions without the help of mini-computers. It is applicable to a wide range of radioactive plume situations. It should be noted that the Rio Blanco experiment was detonated on May 17, 1973, and no seep or release of radioactive material occurred

  10. Secure Biometric E-Voting Scheme

    Science.gov (United States)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  11. Addressing Longevity’ Heterogeneity in Pension Scheme Design

    OpenAIRE

    Ayuso, Mercedes; Bravo, Jorge Miguel; Holzmann, Robert

    2017-01-01

    Ayuso, M., Bravo, J. M., & Holzmann, R. (2017). Addressing Longevity’ Heterogeneity in Pension Scheme Design. Journal of Finance and Economics, 6(1), 1-21. DOI: 10.12735/jfe.v6n1p1 This paper demonstrates that the link between heterogeneity in longevity and lifetime income across countries is mostly high and often increasing; that it translates into an implicit tax/subsidy, with rates reaching 20 percent and higher in some countries; that such rates risk perverting redistributive objective...

  12. New Financing Schemes of Public Infrastructure

    Directory of Open Access Journals (Sweden)

    Ignacio de la Riva

    2017-01-01

    Full Text Available Public works procurements and concessions are traditional legal techniques used to shape the financing of public infrastructure. Fiscal constraints faced by public administrations at the end of the 20th century, and the subsequent increase of private participation in the provision of public goods and services, encouraged the development of new legal schemes allowing a higher degree of private investment in public infrastructure; such as Public Private Partnerships, project finance, securitizations, the shadow toll, turn-key agreements, public leasing and public trusts.

  13. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  14. Finite-difference schemes for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: es@cwi.nl [Centrum Wiskunde and Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands)

    2014-09-01

    In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.

  15. Studies of the plasma droplet accelerator scheme

    International Nuclear Information System (INIS)

    Mori, W.B.; Joshi, C.; Dawson, J.M.; Lee, K.; Forslund, D.W.; Kindel, J.M.

    1985-01-01

    In the plasma droplet accelerator scheme, proposed by R. Palmer, a sequence of liquid micro-spheres generated by a jet printer are ionized by an incoming intense laser. The hope is that the micro-spheres now acting as conducting balls will allow efficient coupling of the incoming laser radiation into an accelerating mode. Motivated by this the authors have carried out 2D, particle simulations in order to answer some of the plasma physics questions hitherto unaddressed. In particular they find that at least for laser intensities exceeding v 0 /c=0.03 (/sup ∼/10 13 w/cm 2 for a CO 2 laser), the incident laser light is rather efficiently absorbed in a hot electron distribution. Up to 70% of the incident energy can be absorbed by these electrons which rapidly expand and fill the vacuum space between the microspheres with a low density plasma. These results indicate that it is advisable to stay clear of plasma formation and thus put on an upper limit on the maximum surface fields that can be tolerated in the droplet-accelerator scheme

  16. Studies of the plasma droplet accelerator scheme

    International Nuclear Information System (INIS)

    Mori, W.B.; Dawson, J.M.; Forslund, D.W.; Joshi, C.; Kindel, J.M.; Lee, K.

    1985-01-01

    In the plasma droplet accelerator scheme, proposed by R. Palmer, a sequence of liquid micro-spheres generated by a jet printer are ionized by an incoming intense laser. The hope is that the micro-spheres now acting as conducting balls will allow efficient coupling of the incoming laser radiation into an accelerating mode. Motivated by this we have carried out 2D, particle simulations in order to answer some of the plasma physics questions hitherto unaddressed. In particular we find that at least for laser intensities exceeding v /SUB o/ /c=0.03 ( about10 13 w/cm 2 for a CO 2 laser), the incident laser light is rather efficiently absorbed in a hot electron distribution. Up to 70% of the incident energy can be absorbed by these electrons which rapidly expand and fill the vacuum space between the microspheres with a low density plasma. These results indicate that it is advisable to stay clear of plasma formation and thus put on an upper limit on the maximum surface fields that can be tolerated in the droplet-accelerator scheme

  17. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  18. Lightweight SIP/SDP compression scheme (LSSCS)

    Science.gov (United States)

    Wu, Jian J.; Demetrescu, Cristian

    2001-10-01

    In UMTS new IP based services with tight delay constraints will be deployed over the W-CDMA air interface such as IP multimedia and interactive services. To integrate the wireline and wireless IP services, 3GPP standard forum adopted the Session Initiation Protocol (SIP) as the call control protocol for the UMTS Release 5, which will implement next generation, all IP networks for real-time QoS services. In the current form the SIP protocol is not suitable for wireless transmission due to its large message size which will need either a big radio pipe for transmission or it will take far much longer to transmit than the current GSM Call Control (CC) message sequence. In this paper we present a novel compression algorithm called Lightweight SIP/SDP Compression Scheme (LSSCS), which acts at the SIP application layer and therefore removes the information redundancy before it is sent to the network and transport layer. A binary octet-aligned header is added to the compressed SIP/SDP message before sending it to the network layer. The receiver uses this binary header as well as the pre-cached information to regenerate the original SIP/SDP message. The key features of the LSSCS compression scheme are presented in this paper along with implementation examples. It is shown that this compression algorithm makes SIP transmission efficient over the radio interface without losing the SIP generality and flexibility.

  19. Special Semaphore Scheme for UHF Spacecraft Communications

    Science.gov (United States)

    Butman, Stanley; Satorius, Edgar; Ilott, Peter

    2006-01-01

    A semaphore scheme has been devised to satisfy a requirement to enable ultrahigh- frequency (UHF) radio communication between a spacecraft descending from orbit to a landing on Mars and a spacecraft, in orbit about Mars, that relays communications between Earth and the lander spacecraft. There are also two subsidiary requirements: (1) to use UHF transceivers, built and qualified for operation aboard the spacecraft that operate with residual-carrier binary phase-shift-keying (BPSK) modulation at a selectable data rate of 8, 32, 128, or 256 kb/s; and (2) to enable low-rate signaling even when received signals become so weak as to prevent communication at the minimum BPSK rate of 8 kHz. The scheme involves exploitation of Manchester encoding, which is used in conjunction with residual-carrier modulation to aid the carrier-tracking loop. By choosing various sequences of 1s, 0s, or 1s alternating with 0s to be fed to the residual-carrier modulator, one would cause the modulator to generate sidebands at a fundamental frequency of 4 or 8 kHz and harmonics thereof. These sidebands would constitute the desired semaphores. In reception, the semaphores would be detected by a software demodulator.

  20. A subgrid parameterization scheme for precipitation

    Directory of Open Access Journals (Sweden)

    S. Turner

    2012-04-01

    Full Text Available With increasing computing power, the horizontal resolution of numerical weather prediction (NWP models is improving and today reaches 1 to 5 km. Nevertheless, clouds and precipitation formation are still subgrid scale processes for most cloud types, such as cumulus and stratocumulus. Subgrid scale parameterizations for water vapor condensation have been in use for many years and are based on a prescribed probability density function (PDF of relative humidity spatial variability within the model grid box, thus providing a diagnosis of the cloud fraction. A similar scheme is developed and tested here. It is based on a prescribed PDF of cloud water variability and a threshold value of liquid water content for droplet collection to derive a rain fraction within the model grid. Precipitation of rainwater raises additional concerns relative to the overlap of cloud and rain fractions, however. The scheme is developed following an analysis of data collected during field campaigns in stratocumulus (DYCOMS-II and fair weather cumulus (RICO and tested in a 1-D framework against large eddy simulations of these observed cases. The new parameterization is then implemented in a 3-D NWP model with a horizontal resolution of 2.5 km to simulate real cases of precipitating cloud systems over France.

  1. Extended lattice Boltzmann scheme for droplet combustion.

    Science.gov (United States)

    Ashna, Mostafa; Rahimian, Mohammad Hassan; Fakhari, Abbas

    2017-05-01

    The available lattice Boltzmann (LB) models for combustion or phase change are focused on either single-phase flow combustion or two-phase flow with evaporation assuming a constant density for both liquid and gas phases. To pave the way towards simulation of spray combustion, we propose a two-phase LB method for modeling combustion of liquid fuel droplets. We develop an LB scheme to model phase change and combustion by taking into account the density variation in the gas phase and accounting for the chemical reaction based on the Cahn-Hilliard free-energy approach. Evaporation of liquid fuel is modeled by adding a source term, which is due to the divergence of the velocity field being nontrivial, in the continuity equation. The low-Mach-number approximation in the governing Navier-Stokes and energy equations is used to incorporate source terms due to heat release from chemical reactions, density variation, and nonluminous radiative heat loss. Additionally, the conservation equation for chemical species is formulated by including a source term due to chemical reaction. To validate the model, we consider the combustion of n-heptane and n-butanol droplets in stagnant air using overall single-step reactions. The diameter history and flame standoff ratio obtained from the proposed LB method are found to be in good agreement with available numerical and experimental data. The present LB scheme is believed to be a promising approach for modeling spray combustion.

  2. Single particle level scheme for alpha decay

    International Nuclear Information System (INIS)

    Mirea, M.

    1998-01-01

    The fine structure phenomenon in alpha decay was evidenced by Rosenblum. In this process the kinetic energy of the emitted particle has several determined values related to the structure of the parent and the daughter nucleus. The probability to find the daughter in a low lying state was considered strongly dependent on the spectroscopic factor defined as the square of overlap between the wave function of the parent in the ground state and the wave functions of the specific excited states of the daughter. This treatment provides a qualitative agreement with the experimental results if the variations of the penetrability between different excited states are neglected. Based on single particle structure during fission, a new formalism explained quantitatively the fine structure of the cluster decay. It was suggested that this formalism can be applied also to alpha decay. For this purpose, the first step is to construct the level scheme of this type of decay. Such a scheme, obtained with the super-asymmetric two-center potential, is plotted for the alpha decay of 223 Ra. It is interesting to note that, diabatically, the level with spin 3/2 emerging from 1i 11/2 (ground state of the parent) reaches an excited state of the daughter in agreement with the experiment. (author)

  3. Present and future nuclear power financing schemes

    International Nuclear Information System (INIS)

    Diel, R.

    1977-01-01

    The financial requirement for nuclear power plants in the Federal Republic of Germany for the period up until 1985 was estimated to run up to some DM 100 billion already in the Nuclear Energy Study published by the Dresdner Bank in 1974. This figure is not changed in any way by the reduction the nuclear power program has suffered in the meantime, because the lower requirement for investment capital is more than offset by the price increases that have occurred meanwhile. A capital requirement in the order of DM 100 billion raises major problems for the power producing industry and the banks which, however, are not going to hamper the further expansion of nuclear power, because new financing schemes have been specially developed for the nuclear field. They include financing by leasing, the use of funds from real estate credit institutions for long term financing, borrowing of long term funds in the Euro market, and financing through subsidiaries of the utilities. The new financing schemes also apply to the large financial requirement associated with the nuclear fuel cycle, waste management in particular. In this sector the utilities agree to bear the economic risk of the companies implementing the respective projects. Accordingly, financing will not entail any major difficulties. Another area of great importance is export financing. The German-Brazilian nuclear agreement is a model of this instrument. (orig.) [de

  4. A magnet lattice for a tau-charm factory suitable for both standard scheme and monochromatization scheme

    International Nuclear Information System (INIS)

    Beloshitsky, P.

    1992-06-01

    A versatile magnet lattice for a tau-charm factory is considered in this report. The main feature of this lattice is the possibility to use it for both standard flat beam scheme and beam monochromatization scheme. The detailed description of the lattice is given. The restrictions following the compatibility of both schemes are discussed

  5. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  6. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  7. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  8. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  9. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  10. Estimating plume dispersion: a comparison of several sigma schemes

    International Nuclear Information System (INIS)

    Irwin, J.S.

    1983-01-01

    The lateral and vertical Gaussian plume dispersion parameters are estimated and compared with field tracer data collected at 11 sites. The dispersion parameter schemes used in this analysis include Cramer's scheme, suggested for tall stack dispersion estimates, Draxler's scheme, suggested for elevated and surface releases, Pasquill's scheme, suggested for interim use in dispersion estimates, and the Pasquill--Gifford scheme using Turner's technique for assigning stability categories. The schemes suggested by Cramer, Draxler and Pasquill estimate the dispersion parameters using onsite measurements of the vertical and lateral wind-velocity variances at the effective release height. The performances of these schemes in estimating the dispersion parameters are compared with that of the Pasquill--Gifford scheme, using the Prairie Grass and Karlsruhe data. For these two experiments, the estimates of the dispersion parameters using Draxler's scheme correlate better with the measurements than did estimates using the Pasquill--Gifford scheme. Comparison of the dispersion parameter estimates with the measurement suggests that Draxler's scheme for characterizing the dispersion results in the smallest mean fractional error in the estimated dispersion parameters and the smallest variance of the fractional errors

  11. A numerical scheme for the generalized Burgers–Huxley equation

    Directory of Open Access Journals (Sweden)

    Brajesh K. Singh

    2016-10-01

    Full Text Available In this article, a numerical solution of generalized Burgers–Huxley (gBH equation is approximated by using a new scheme: modified cubic B-spline differential quadrature method (MCB-DQM. The scheme is based on differential quadrature method in which the weighting coefficients are obtained by using modified cubic B-splines as a set of basis functions. This scheme reduces the equation into a system of first-order ordinary differential equation (ODE which is solved by adopting SSP-RK43 scheme. Further, it is shown that the proposed scheme is stable. The efficiency of the proposed method is illustrated by four numerical experiments, which confirm that obtained results are in good agreement with earlier studies. This scheme is an easy, economical and efficient technique for finding numerical solutions for various kinds of (nonlinear physical models as compared to the earlier schemes.

  12. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  13. Hilbert schemes of points and infinite dimensional Lie algebras

    CERN Document Server

    Qin, Zhenbo

    2018-01-01

    Hilbert schemes, which parametrize subschemes in algebraic varieties, have been extensively studied in algebraic geometry for the last 50 years. The most interesting class of Hilbert schemes are schemes X^{[n]} of collections of n points (zero-dimensional subschemes) in a smooth algebraic surface X. Schemes X^{[n]} turn out to be closely related to many areas of mathematics, such as algebraic combinatorics, integrable systems, representation theory, and mathematical physics, among others. This book surveys recent developments of the theory of Hilbert schemes of points on complex surfaces and its interplay with infinite dimensional Lie algebras. It starts with the basics of Hilbert schemes of points and presents in detail an example of Hilbert schemes of points on the projective plane. Then the author turns to the study of cohomology of X^{[n]}, including the construction of the action of infinite dimensional Lie algebras on this cohomology, the ring structure of cohomology, equivariant cohomology of X^{[n]} a...

  14. A simple language to script and simulate breeding schemes: the breeding scheme language

    Science.gov (United States)

    It is difficult for plant breeders to determine an optimal breeding strategy given that the problem involves many factors, such as target trait genetic architecture and breeding resource availability. There are many possible breeding schemes for each breeding program. Although simulation study may b...

  15. Furniture and Timber Training Board, Fourth Year's Scheme; Training Grants Scheme, 1969-70.

    Science.gov (United States)

    British Furniture and Timber Training Board, Wembly (England).

    This booklet explains what training grants are offered by the Furniture and Timber Training Board of Great Britain, indicates how to claim them, and outlines the Board's training philosophy. Foldouts present conditions which apply in whole or in part to the Training Grants Scheme, followed by guidelines for completing forms. The main section…

  16. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  17. An efficient compression scheme for bitmap indices

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2004-04-13

    When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time

  18. Introduction to the theory of schemes

    CERN Document Server

    Manin, Yuri I

    2018-01-01

    This English edition of Yuri I. Manin's well-received lecture notes provides a concise but extremely lucid exposition of the basics of algebraic geometry and sheaf theory. The lectures were originally held in Moscow in the late 1960s, and the corresponding preprints were widely circulated among Russian mathematicians. This book will be of interest to students majoring in algebraic geometry and theoretical physics (high energy physics, solid body, astrophysics) as well as to researchers and scholars in these areas. "This is an excellent introduction to the basics of Grothendieck's theory of schemes; the very best first reading about the subject that I am aware of. I would heartily recommend every grad student who wants to study algebraic geometry to read it prior to reading more advanced textbooks." - Prof. Alexander Beilinson.

  19. Pay-what-you-want pricing schemes

    DEFF Research Database (Denmark)

    Kahsay, Goytom Abraha; Samahita, Margaret

    this threshold, however, PWYW can lead to a lower utility. This may result in a lower purchase rate and higher average price, in line with previously unexplained evidence from field experiments. Moreover, an increase in the threshold value decreases the buyer's utility and may further lower the purchase rate......Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular in a wide range of industries. We develop a model incorporating self-image into the buyer's utility function and introduce heterogeneity in consumption utility and image-sensitivity, which generates different purchase...... decisions and optimal prices across individuals. When a good is sold at a fixed price higher than a threshold value, a price that the individual thinks is fair, the adoption of PWYW increases his utility and hence results in a weakly higher purchase rate. When a good is sold at a fixed price lower than...

  20. The decay scheme of 229Ra

    International Nuclear Information System (INIS)

    Yang, W.F.; Yuan, S.G.; Fang, K.M.; Shen, S.F.; Mou, W.T.; Zhang, X.Q.; Li, Z.Q.

    1997-01-01

    By bombarding the natural thorium targets with 14 MeV neutrons, 229 Ra was produced through the reaction 232 Th(n,α) 229 Ra. The radium activities were separated from the irradiated targets by coprecipitation with the BaCl 2 . A total of 18 new weak γ rays with energies of 14.5, 15.6, 18.8, 21.8, 22.5, 44.0, 47.5, 55.0, 63.0, 69.6, 93.6, 94.1, 98.5, 102.2, 104.5, 106.1, 161.1, and 171.5 keV which could be assigned to the decay of 229 Ra were observed in the isolated radium fractions employing high resolution HPGe detectors and γ(X)-γ coincidence methods. A decay scheme of 229 Ra based on these observations is proposed. (orig.). With 2 figs