WorldWideScience

Sample records for one-way fsi scheme

  1. Study on stress characteristics of Francis hydraulic turbine runner based on two-way FSI

    International Nuclear Information System (INIS)

    Zhu, W R; Xiao, R F; Yang, W; Wang, F J; Liu, J

    2012-01-01

    In recent years, cracking phenomenon occurs in many large-sized turbines both nationally and internationally, which has threatened the stable operation of hydraulic turbines. Consequently, Stress characteristics calculation and analysis of a Francis hydraulic turbine runner by application of fluid-structure interaction (FSI) technology become significantly important. In order to introduce two-way coupling technology to hydraulic machinery, two-way FSI technology is applied in this article to calculate and analyze stress characteristics. Through coordinate system transformation, the continuity equations and Navier-Stokes equations in the Cartesian coordinates system are firstly transformed to ALE coordinates system. The fluid field control equations are then constructed and discrete equations can be obtained by using flow-condition-based interpolation (FBIC-C). The structure static mechanics equations used are established in rotation coordinate system, and modeled with the finite method. Two-way coupling is computed by using iteration method. The fluid equations and structure equations are iterated until coupling coefficients converge. According to structure result, the maximum stress, displacement as well as its location can be found. As a result, the most easily wear position can be discovered which provides valuable basis for optimized design and stable operation of Francis hydraulic turbines. After comparing the results with that of one-way coupling, it is discovered that displacements is the key factors which affects the results of one-way and two-way coupling.

  2. One-Way Fluid-Structure Interaction Simulation of an Offshore Wind Turbine

    Directory of Open Access Journals (Sweden)

    Zhi-Kui Wang

    2014-07-01

    Full Text Available The Fluid-Structure Interaction (FSI has gained great interest of scholars recently, meanwhile, extensive studies have been conducted by the virtue of numerical methods which have been implemented on wind turbine models. The blades of a wind turbine have been gained a deep insight into the FSI analyses, however, few studies have been conducted on the tower and nacelle, which are key components of the wind turbine, using this method. We performed the one-way FSI analysis on a 2-MW offshore wind turbine, using the Finite Volume Method (FVM with ANSYS CFX solver and the RNG k-ε turbulence model, to achieve a comprehensive cognition of it. The grid convergence was studied and verified in this study, and the torque value is chosen to determine the optimal case. The superior case, which was chosen to conduct the FSI analysis, with a relative error is only 2.15%, thus, the accuracy of results is credible.

  3. Development of strongly coupled FSI technology involving thin walled structures

    CSIR Research Space (South Africa)

    Suliman, Ridhwaan

    2011-01-01

    Full Text Available A strongly coupled finite volume-finite element fluid-structure interaction (FSI) scheme is developed. Both an edge-based finite volume and Galerkin finite element scheme are implemented and evaluated for modelling the mechanics of solids...

  4. DTK C/Fortran Interface Development for NEAMS FSI Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Slattery, Stuart R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Lebrun-Grandie, Damien T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-09-19

    This report documents the development of DataTransferKit (DTK) C and Fortran interfaces for fluid-structure-interaction (FSI) simulations in NEAMS. In these simulations, the codes Nek5000 and Diablo are being coupled within the SHARP framework to study flow-induced vibration (FIV) in reactor steam generators. We will review the current Nek5000/Diablo coupling algorithm in SHARP and the current state of the solution transfer scheme used in this implementation. We will then present existing DTK algorithms which may be used instead to provide an improvement in both flexibility and scalability of the current SHARP implementation. We will show how these can be used within the current FSI scheme using a new set of interfaces to the algorithms developed by this work. These new interfaces currently expose the mesh-free solution transfer algorithms in DTK, a C++ library, and are written in C and Fortran to enable coupling of both Nek5000 and Diablo in their native Fortran language. They have been compiled and tested on Cooley, the test-bed machine for Mira at ALCF.

  5. A geometry-adaptive IB-LBM for FSI problems at moderate and high Reynolds numbers

    Science.gov (United States)

    Tian, Fangbao; Xu, Lincheng; Young, John; Lai, Joseph C. S.

    2017-11-01

    An FSI framework combining the LBM and an improved IBM is introduced for FSI problems at moderate and high Reynolds numbers. In this framework, the fluid dynamics is obtained by the LBM. The FSI boundary conditions are handled by an improved IBM based on the feedback scheme where the feedback coefficient is mathematically derived and explicitly approximated. The Lagrangian force is divided into two parts: one is caused by the mismatching of the flow velocity and the boundary velocity at previous time step, and the other is caused by the boundary acceleration. Such treatment significantly enhances the numerical stability. A geometry-adaptive refinement is applied to provide fine resolution around the immersed geometries. The overlapping grids between two adjacent refinements consist of two layers. The movement of fluid-structure interfaces only causes adding or removing grids at the boundaries of refinements. Finally, the classic Smagorinsky large eddy simulation model is incorporated into the framework to model turbulent flows at relatively high Reynolds numbers. Several validation cases are conducted to verify the accuracy and fidelity of the present solver over a range of Reynolds numbers. Mr L. Xu acknowledges the support of the University International Postgraduate Award by University of New South Wales. Dr. F.-B. Tian is the recipient of an Australian Research Council Discovery Early Career Researcher Award (Project Number DE160101098).

  6. One-way entangled-photon autocompensating quantum cryptography

    Science.gov (United States)

    Walton, Zachary D.; Abouraddy, Ayman F.; Sergienko, Alexander V.; Saleh, Bahaa E.; Teich, Malvin C.

    2003-06-01

    A quantum cryptography implementation is presented that uses entanglement to combine one-way operation with an autocompensating feature that has hitherto only been available in implementations that require the signal to make a round trip between the users. Using the concept of advanced waves, it is shown that this proposed implementation is related to the round-trip implementation in the same way that Ekert’s two-particle scheme is related to the original one-particle scheme of Bennett and Brassard. The practical advantages and disadvantages of the proposed implementation are discussed in the context of existing schemes.

  7. One-way entangled-photon autocompensating quantum cryptography

    International Nuclear Information System (INIS)

    Walton, Zachary D.; Abouraddy, Ayman F.; Sergienko, Alexander V.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2003-01-01

    A quantum cryptography implementation is presented that uses entanglement to combine one-way operation with an autocompensating feature that has hitherto only been available in implementations that require the signal to make a round trip between the users. Using the concept of advanced waves, it is shown that this proposed implementation is related to the round-trip implementation in the same way that Ekert's two-particle scheme is related to the original one-particle scheme of Bennett and Brassard. The practical advantages and disadvantages of the proposed implementation are discussed in the context of existing schemes

  8. FSI-based Overflow Assessment of the Seismically-Isolated SFP with Fuel Racks

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Gil Y.; Park, Hyun T.; Chang, Soo-Hyuk [Korea Maintenance Co., Seoul (Korea, Republic of); Lee, Sang-Hoon [KEPCO E-C, Yongin (Korea, Republic of)

    2014-10-15

    To date, effectiveness of the seismic isolation systems for reducing seismic force effectively has been well demonstrated. In this context, practical application of the technology in nuclear engineering fields has become an important issue more and more. This is because fluid motion can be rather amplified due to the increased relative displacement between the base and superstructures by a long-period shift. Therefore, overflow assessment and prediction of the seismically-isolated SFP have to be conducted in design phase. For performing sloshing-induced overflow of the seismically-isolated SFP, a fluid-structure interaction(FSI) approach making a two-way coupling process between structural and fluid solvers is herein employed. In this study, fuel racks inside the SFP are included in FSI modeling to investigate effect of fuel-cell assemblies on SFP overflow. Accordingly, three different assembly sets of fuel cells are assumed to be inserted in fuel racks. In addition, floor acceleration time-histories produced from three different amplitudes of peak ground acceleration (PGA) are applied to the SFP base to investigate load effect on liquid overflow. An approach for the liquid overflow assessment of the seismically-isolated nuclear SFP with fuel storage racks based on FSI analysis was addressed. From the results of the identified cases, the following conclusions are drawn: (i) FSI technique can be effectively used to assess the seismically-isolated SFP overflow, (ii) In a conservative way, the isolated SFP without fuel racks can be used to assess its sloshing-induced overflow under earthquake since effect of fuel-cell assemblies on the SFP overflow is not significant, (iii) for given same conditions (e.g., constant design free surface, same fuel-cell assembly) except seismic loading, the higher PGA is, the more liquid overflow increases.

  9. On the sub-model errors of a generalized one-way coupling scheme for linking models at different scales

    Science.gov (United States)

    Zeng, Jicai; Zha, Yuanyuan; Zhang, Yonggen; Shi, Liangsheng; Zhu, Yan; Yang, Jinzhong

    2017-11-01

    Multi-scale modeling of the localized groundwater flow problems in a large-scale aquifer has been extensively investigated under the context of cost-benefit controversy. An alternative is to couple the parent and child models with different spatial and temporal scales, which may result in non-trivial sub-model errors in the local areas of interest. Basically, such errors in the child models originate from the deficiency in the coupling methods, as well as from the inadequacy in the spatial and temporal discretizations of the parent and child models. In this study, we investigate the sub-model errors within a generalized one-way coupling scheme given its numerical stability and efficiency, which enables more flexibility in choosing sub-models. To couple the models at different scales, the head solution at parent scale is delivered downward onto the child boundary nodes by means of the spatial and temporal head interpolation approaches. The efficiency of the coupling model is improved either by refining the grid or time step size in the parent and child models, or by carefully locating the sub-model boundary nodes. The temporal truncation errors in the sub-models can be significantly reduced by the adaptive local time-stepping scheme. The generalized one-way coupling scheme is promising to handle the multi-scale groundwater flow problems with complex stresses and heterogeneity.

  10. Motion simulation of hydraulic driven safety rod using FSI method

    International Nuclear Information System (INIS)

    Jung, Jaeho; Kim, Sanghaun; Yoo, Yeonsik; Cho, Yeonggarp; Kim, Jong In

    2013-01-01

    Hydraulic driven safety rod which is one of them is being developed by Division for Reactor Mechanical Engineering, KAERI. In this paper the motion of this rod is simulated by fluid structure interaction (FSI) method before manufacturing for design verification and pump sizing. A newly designed hydraulic driven safety rod which is one of reactivity control mechanism is simulated using FSI method for design verification and pump sizing. The simulation is done in CFD domain with UDF. The pressure drop is changed slightly by flow rates. It means that the pressure drop is mainly determined by weight of moving part. The simulated velocity of piston is linearly proportional to flow rates so the pump can be sized easily according to the rising and drop time requirement of the safety rod using the simulation results

  11. Fermionic One-Way Quantum Computation

    International Nuclear Information System (INIS)

    Cao Xin; Shang Yun

    2014-01-01

    Fermions, as another major class of quantum particles, could be taken as carriers for quantum information processing beyond spins or bosons. In this work, we consider the fermionic generalization of the one-way quantum computation model and find that one-way quantum computation can also be simulated with fermions. In detail, using the n → 2n encoding scheme from a spin system to a fermion system, we introduce the fermionic cluster state, then the universal computing power with a fermionic cluster state is demonstrated explicitly. Furthermore, we show that the fermionic cluster state can be created only by measurements on at most four modes with |+〉 f (fermionic Bell state) being free

  12. Water hammer (with FSI): exact solution : parallelization and application

    NARCIS (Netherlands)

    Loh, K.; Tijsseling, A.S.

    2014-01-01

    The 1D fully coupled Fluid-Structure Interaction (FSI) model can adequately describe the water hammer effect on the fluid, and the structural behaviour of the pipe. This paper attempts to increase the capability of using an exact solution of the 1D FSI problem applied to a straight pipe with a

  13. A stable partitioned FSI algorithm for incompressible flow and deforming beams

    International Nuclear Information System (INIS)

    Li, L.; Henshaw, W.D.; Banks, J.W.; Schwendeman, D.W.; Main, A.

    2016-01-01

    An added-mass partitioned (AMP) algorithm is described for solving fluid–structure interaction (FSI) problems coupling incompressible flows with thin elastic structures undergoing finite deformations. The new AMP scheme is fully second-order accurate and stable, without sub-time-step iterations, even for very light structures when added-mass effects are strong. The fluid, governed by the incompressible Navier–Stokes equations, is solved in velocity-pressure form using a fractional-step method; large deformations are treated with a mixed Eulerian-Lagrangian approach on deforming composite grids. The motion of the thin structure is governed by a generalized Euler–Bernoulli beam model, and these equations are solved in a Lagrangian frame using two approaches, one based on finite differences and the other on finite elements. The key AMP interface condition is a generalized Robin (mixed) condition on the fluid pressure. This condition, which is derived at a continuous level, has no adjustable parameters and is applied at the discrete level to couple the partitioned domain solvers. Special treatment of the AMP condition is required to couple the finite-element beam solver with the finite-difference-based fluid solver, and two coupling approaches are described. A normal-mode stability analysis is performed for a linearized model problem involving a beam separating two fluid domains, and it is shown that the AMP scheme is stable independent of the ratio of the mass of the fluid to that of the structure. A traditional partitioned (TP) scheme using a Dirichlet–Neumann coupling for the same model problem is shown to be unconditionally unstable if the added mass of the fluid is too large. A series of benchmark problems of increasing complexity are considered to illustrate the behavior of the AMP algorithm, and to compare the behavior with that of the TP scheme. The results of all these benchmark problems verify the stability and accuracy of the AMP scheme. Results for

  14. A stable partitioned FSI algorithm for incompressible flow and deforming beams

    Energy Technology Data Exchange (ETDEWEB)

    Li, L., E-mail: lil19@rpi.edu [Department of Mathematical Sciences, Rensselaer Polytechnic Institute, Troy, NY 12180 (United States); Henshaw, W.D., E-mail: henshw@rpi.edu [Department of Mathematical Sciences, Rensselaer Polytechnic Institute, Troy, NY 12180 (United States); Banks, J.W., E-mail: banksj3@rpi.edu [Department of Mathematical Sciences, Rensselaer Polytechnic Institute, Troy, NY 12180 (United States); Schwendeman, D.W., E-mail: schwed@rpi.edu [Department of Mathematical Sciences, Rensselaer Polytechnic Institute, Troy, NY 12180 (United States); Main, A., E-mail: amain8511@gmail.com [Department of Civil and Environmental Engineering, Duke University, Durham, NC 27708 (United States)

    2016-05-01

    An added-mass partitioned (AMP) algorithm is described for solving fluid–structure interaction (FSI) problems coupling incompressible flows with thin elastic structures undergoing finite deformations. The new AMP scheme is fully second-order accurate and stable, without sub-time-step iterations, even for very light structures when added-mass effects are strong. The fluid, governed by the incompressible Navier–Stokes equations, is solved in velocity-pressure form using a fractional-step method; large deformations are treated with a mixed Eulerian-Lagrangian approach on deforming composite grids. The motion of the thin structure is governed by a generalized Euler–Bernoulli beam model, and these equations are solved in a Lagrangian frame using two approaches, one based on finite differences and the other on finite elements. The key AMP interface condition is a generalized Robin (mixed) condition on the fluid pressure. This condition, which is derived at a continuous level, has no adjustable parameters and is applied at the discrete level to couple the partitioned domain solvers. Special treatment of the AMP condition is required to couple the finite-element beam solver with the finite-difference-based fluid solver, and two coupling approaches are described. A normal-mode stability analysis is performed for a linearized model problem involving a beam separating two fluid domains, and it is shown that the AMP scheme is stable independent of the ratio of the mass of the fluid to that of the structure. A traditional partitioned (TP) scheme using a Dirichlet–Neumann coupling for the same model problem is shown to be unconditionally unstable if the added mass of the fluid is too large. A series of benchmark problems of increasing complexity are considered to illustrate the behavior of the AMP algorithm, and to compare the behavior with that of the TP scheme. The results of all these benchmark problems verify the stability and accuracy of the AMP scheme. Results for

  15. Two-way Fluid-Structure Interaction Simulation of a Micro Horizontal Axis Wind Turbine

    Directory of Open Access Journals (Sweden)

    Yi-Bao Chen

    2015-01-01

    Full Text Available A two-way Fluid-Structure Interaction (FSI analyses performed on a micro horizontal axis wind turbine (HAWT which coupled the CFX solver with Structural solver in ANSYS Workbench was conducted in this paper. The partitioned approach-based non-conforming mesh methods and the k-ε turbulence model were adopted to perform the study. Both the results of one-way and two-way FSI analyses were presented and compared with each other, and discrepancy of the results, especially the mechanical properties, were analysed. Grid convergence which is crucial to the results was performed, and the relationship between the inner flow field domain (rotational domain and the number of grids (number of cells, elements was verified for the first time. Dynamical analyses of the wind turbine were conducted using the torque as a reference value, to verify the rationality of the model which dominates the accuracy of results. The optimal case was verified and used to conduct the study, thus, the results derived from the simulation of the FSI are accurate and credible.

  16. A fault-tolerant one-way quantum computer

    International Nuclear Information System (INIS)

    Raussendorf, R.; Harrington, J.; Goyal, K.

    2006-01-01

    We describe a fault-tolerant one-way quantum computer on cluster states in three dimensions. The presented scheme uses methods of topological error correction resulting from a link between cluster states and surface codes. The error threshold is 1.4% for local depolarizing error and 0.11% for each source in an error model with preparation-, gate-, storage-, and measurement errors

  17. The Family Socialization Interview-Revised (FSI-R): a Comprehensive Assessment of Parental Disciplinary Behaviors.

    Science.gov (United States)

    O'Dor, Sarah L; Grasso, Damion J; Forbes, Danielle; Bates, John E; McCarthy, Kimberly J; Wakschlag, Lauren S; Briggs-Gowan, Margaret J

    2017-04-01

    Elucidating the complex mechanisms by which harsh parenting increases risk of child psychopathology is key to targeted prevention. This requires nuanced methods that capture the varied perceptions and experiences of diverse families. The Family Socialization Interview-Revised (FSI-R), adapted from an interview developed by Dodge et al. (Child Development, 65, 649-665, 1994), is a comprehensive, semi-structured interview for characterizing methods of parental discipline used with young children. The FSI-R coding system systematically rates parenting style, usual discipline techniques, and most intense physical and psychological discipline based on rater judgment across two eras: (1) birth to the previous year, and (2) the previous year to present. The current study examined the psychometric properties of the FSI-R in a diverse, high-risk community sample of 386 mothers and their children, ages 3 to 6 years. Interrater reliability was good to excellent for codes capturing physically and psychologically harsh parenting, and restrictive/punitive parenting styles. Findings supported the FSI-R's convergent and incremental validity. Importantly, the FSI-R demonstrated incremental utility, explaining unique variance in children's externalizing and internalizing symptoms beyond that explained by traditional surveys and observed parenting. The FSI-R appeared particularly promising for capturing risk associated with young children's depressive symptoms, as these were generally not significantly associated with other measures of harsh parenting. Overall, findings support the added value of the FSI-R within a multi-method assessment of disciplinary practices across early child development. Future implications for prevention are discussed.

  18. The Family Socialization Interview—Revised (FSI-R): a Comprehensive Assessment of Parental Disciplinary Behaviors

    Science.gov (United States)

    O’Dor, Sarah L.; Grasso, Damion J.; Forbes, Danielle; Bates, John E.; McCarthy, Kimberly J.; Wakschlag, Lauren S.

    2017-01-01

    Elucidating the complex mechanisms by which harsh parenting increases risk of child psychopathology is key to targeted prevention. This requires nuanced methods that capture the varied perceptions and experiences of diverse families. The Family Socialization Interview—Revised (FSI-R), adapted from an interview developed by Dodge et al. (Child Development, 65,649–665,1994), is a comprehensive, semi-structured interview for characterizing methods of parental discipline used with young children. The FSI-R coding system systematically rates parenting style, usual discipline techniques, and most intense physical and psychological discipline based on rater judgment across two eras: (1) birth to the previous year, and (2) the previous year to present. The current study examined the psychometric properties of the FSI-R in a diverse, high-risk community sample of 386 mothers and their children, ages 3 to 6 years. Interrater reliability was good to excellent for codes capturing physically and psychologically harsh parenting, and restrictive/punitive parenting styles. Findings supported the FSI-R’s convergent and incremental validity. Importantly, the FSI-R demonstrated incremental utility, explaining unique variance in children’s externalizing and internalizing symptoms beyond that explained by traditional surveys and observed parenting. The FSI-R appeared particularly promising for capturing risk associated with young children’s depressive symptoms, as these were generally not significantly associated with other measures of harsh parenting. Overall, findings support the added value of the FSI-R within a multi-method assessment of disciplinary practices across early child development. Future implications for prevention are discussed. PMID:27718104

  19. Tag-KEM from Set Partial Domain One-Way Permutations

    Science.gov (United States)

    Abe, Masayuki; Cui, Yang; Imai, Hideki; Kurosawa, Kaoru

    Recently a framework called Tag-KEM/DEM was introduced to construct efficient hybrid encryption schemes. Although it is known that generic encode-then-encrypt construction of chosen ciphertext secure public-key encryption also applies to secure Tag-KEM construction and some known encoding method like OAEP can be used for this purpose, it is worth pursuing more efficient encoding method dedicated for Tag-KEM construction. This paper proposes an encoding method that yields efficient Tag-KEM schemes when combined with set partial one-way permutations such as RSA and Rabin's encryption scheme. To our knowledge, this leads to the most practical hybrid encryption scheme of this type. We also present an efficient Tag-KEM which is CCA-secure under general factoring assumption rather than Blum factoring assumption.

  20. Quasi-Newton methods for implicit black-box FSI coupling

    CSIR Research Space (South Africa)

    Bogaers, Alfred EJ

    2014-09-01

    Full Text Available In this paper we introduce a new multi-vector update quasi-Newton (MVQN) method for implicit coupling of partitioned, transient FSI solvers. The new quasi-Newton method facilitates the use of 'black-box' field solvers and under certain circumstances...

  1. Fluid-Induced Vibration Analysis for Reactor Internals Using Computational FSI Method

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Jong Sung; Yi, Kun Woo; Sung, Ki Kwang; Im, In Young; Choi, Taek Sang [KEPCO E and C, Daejeon (Korea, Republic of)

    2013-10-15

    This paper introduces a fluid-induced vibration analysis method which calculates the response of the RVI to both deterministic and random loads at once and utilizes more realistic pressure distribution using the computational Fluid Structure Interaction (FSI) method. As addressed above, the FIV analysis for the RVI was carried out using the computational FSI method. This method calculates the response to deterministic and random turbulence loads at once. This method is also a simple and integrative method to get structural dynamic responses of reactor internals to various flow-induced loads. Because the analysis of this paper omitted the bypass flow region and Inner Barrel Assembly (IBA) due to the limitation of computer resources, it is necessary to find an effective way to consider all regions in the RV for the FIV analysis in the future. Reactor coolant flow makes Reactor Vessel Internals (RVI) vibrate and may affect the structural integrity of them. U. S. NRC Regulatory Guide 1.20 requires the Comprehensive Vibration Assessment Program (CVAP) to verify the structural integrity of the RVI for Fluid-Induced Vibration (FIV). The hydraulic forces on the RVI of OPR1000 and APR1400 were computed from the hydraulic formulas and the CVAP measurements in Palo Verde Unit 1 and Yonggwang Unit 4 for the structural vibration analyses. In this method, the hydraulic forces were divided into deterministic and random turbulence loads and were used for the excitation forces of the separate structural analyses. These forces are applied to the finite element model and the responses to them were combined into the resultant stresses.

  2. ZrFsy1, a high-affinity fructose/H+ symporter from fructophilic yeast Zygosaccharomyces rouxii.

    Directory of Open Access Journals (Sweden)

    Maria José Leandro

    Full Text Available Zygosaccharomyces rouxii is a fructophilic yeast than can grow at very high sugar concentrations. We have identified an ORF encoding a putative fructose/H(+ symporter in the Z. rouxii CBS 732 genome database. Heterologous expression of this ORF in a S. cerevisiae strain lacking its own hexose transporters (hxt-null and subsequent kinetic characterization of its sugar transport activity showed it is a high-affinity low-capacity fructose/H(+ symporter, with Km 0.45 ± 0.07 mM and Vmax 0.57 ± 0.02 mmol h(-1 (gdw(-1. We named it ZrFsy1. This protein also weakly transports xylitol and sorbose, but not glucose or other hexoses. The expression of ZrFSY1 in Z. rouxii is higher when the cells are cultivated at extremely low fructose concentrations (<0.2% and on non-fermentable carbon sources such as mannitol and xylitol, where the cells have a prolonged lag phase, longer duplication times and change their microscopic morphology. A clear phenotype was determined for the first time for the deletion of a fructose/H(+ symporter in the genome where it occurs naturally. The effect of the deletion of ZrFSY1 in Z. rouxii cells is only evident when the cells are cultivated at very low fructose concentrations, when the ZrFsy1 fructose symporter is the main active fructose transporter system.

  3. Relay Selection and Resource Allocation in One-Way and Two-Way Cognitive Relay Networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-05-08

    In this work, the problem of relay selection and resource power allocation in one- way and two-way cognitive relay networks using half duplex channels with different relaying protocols is investigated. Optimization problems for both single and multiple relay selection that maximize the sum rate of the secondary network without degrading the quality of service of the primary network by respecting a tolerated interference threshold were formulated. Single relay selection and optimal power allocation for two-way relaying cognitive radio networks using decode-and-forward and amplify-and-forward protocols were studied. Dual decomposition and subgradient methods were used to find the optimal power allocation. The transmission process to exchange two different messages between two transceivers for two-way relaying technique takes place in two time slots. In the first slot, the transceivers transmit their signals simultaneously to the relay. Then, during the second slot the relay broadcasts its signal to the terminals. Moreover, improvement of both spectral and energy efficiency can be achieved compared with the one-way relaying technique. As an extension, a multiple relay selection for both one-way and two-way relaying under cognitive radio scenario using amplify-and-forward were discussed. A strong optimization tool based on genetic and iterative algorithms was employed to solve the 
formulated optimization problems for both single and multiple relay selection, where discrete relay power levels were considered. Simulation results show that the practical and low-complexity heuristic approaches achieve almost the same performance of the optimal relay selection schemes either with discrete or continuous power distributions while providing a considerable saving in terms of computational complexity.

  4. One way quantum repeaters with quantum Reed-Solomon codes

    OpenAIRE

    Muralidharan, Sreraman; Zou, Chang-Ling; Li, Linshu; Jiang, Liang

    2018-01-01

    We show that quantum Reed-Solomon codes constructed from classical Reed-Solomon codes can approach the capacity on the quantum erasure channel of $d$-level systems for large dimension $d$. We study the performance of one-way quantum repeaters with these codes and obtain a significant improvement in key generation rate compared to previously investigated encoding schemes with quantum parity codes and quantum polynomial codes. We also compare the three generation of quantum repeaters using quan...

  5. One-way EPR steering and genuine multipartite EPR steering

    Science.gov (United States)

    He, Qiongyi; Reid, Margaret D.

    2012-11-01

    We propose criteria and experimental strategies to realise the Einstein-Podolsky-Rosen (EPR) steering nonlocality. One-way steering can be obtained where there is asymmetry of thermal noise on each system. We also present EPR steering inequalities that act as signatures and suggest how to optimise EPR correlations in specific schemes so that the genuine multipartite EPR steering nonlocality (EPR paradox) can also possibly be realised. The results presented here also apply to the spatially separated macroscopic atomic ensembles.

  6. Improvement of One Quantum Encryption Scheme

    Science.gov (United States)

    Cao, Zhengjun; Liu, Lihua

    2012-01-01

    Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.

  7. Faithful One-way Trip Deterministic Secure Quantum Communication Scheme Against Collective Rotating Noise Based on Order Rearrangement of Photon Pairs

    Science.gov (United States)

    Yuan, Hao; Zhang, Qin; Hong, Liang; Yin, Wen-jie; Xu, Dong

    2014-08-01

    We present a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel. Four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In this scheme, the information carriers transmite over the quantum channel only one time, which can effectively reduce the influence of other noise existing in quantum channel. The information receiver need only perform two single-photon collective measurements to decode the secret messages, which can make the present scheme more convenient in practical application. It will be showed that our scheme has a relatively high information capacity and intrisic efficiency. Foremostly, the decoy photon pair checking technique and the order rearrangement of photon pairs technique guarantee that the present scheme is unconditionally secure.

  8. One-way quantum repeaters with quantum Reed-Solomon codes

    Science.gov (United States)

    Muralidharan, Sreraman; Zou, Chang-Ling; Li, Linshu; Jiang, Liang

    2018-05-01

    We show that quantum Reed-Solomon codes constructed from classical Reed-Solomon codes can approach the capacity on the quantum erasure channel of d -level systems for large dimension d . We study the performance of one-way quantum repeaters with these codes and obtain a significant improvement in key generation rate compared to previously investigated encoding schemes with quantum parity codes and quantum polynomial codes. We also compare the three generations of quantum repeaters using quantum Reed-Solomon codes and identify parameter regimes where each generation performs the best.

  9. Acoustic one-way mode conversion and transmission by sonic crystal waveguides

    Science.gov (United States)

    Ouyang, Shiliang; He, Hailong; He, Zhaojian; Deng, Ke; Zhao, Heping

    2016-09-01

    We proposed a scheme to achieve one-way acoustic propagation and even-odd mode switching in two mutually perpendicular sonic crystal waveguides connected by a resonant cavity. The even mode in the entrance waveguide is able to switch to the odd mode in the exit waveguide through a symmetry match between the cavity resonant modes and the waveguide modes. Conversely, the odd mode in the exit waveguide is unable to be converted into the even mode in the entrance waveguide as incident waves and eigenmodes are mismatched in their symmetries at the waveguide exit. This one-way mechanism can be applied to design an acoustic diode for acoustic integration devices and can be used as a convertor of the acoustic waveguide modes.

  10. AN/FSY-3 Space Fence System – Sensor Site One/Operations Center Integration Status and Sensor Site Two Planned Capability

    Science.gov (United States)

    Fonder, G. P.; Hack, P. J.; Hughes, M. R.

    This paper covers two topics related to Space Fence System development: Sensor Site One / Operations Center construction and integration status including risk reduction integration and test efforts at the Moorestown, NJ Integrated Test Bed (ITB); and the planned capability of Sensor Site Two. The AN/FSY-3 Space Fence System is a ground-based system of S-band radars integrated with an Operations Center designed to greatly enhance the Air Force Space Surveillance network. The radar architecture is based on Digital Beam-forming. This capability permits tremendous user-defined flexibility to customize volume surveillance and track sectors instantaneously without impacting routine surveillance functions. Space Fence provides unprecedented sensitivity, coverage and tracking accuracy, and contributes to key mission threads with the ability to detect, track and catalog small objects in LEO, MEO and GEO. The system is net-centric and will seamlessly integrate into the existing Space Surveillance Network, providing services to external users—such as JSpOC—and coordinating handoffs to other SSN sites. Sensor Site One construction on the Kwajalein Atoll is in progress and nearing completion. The Operations Center in Huntsville, Alabama has been configured and will be integrated with Sensor Site One in the coming months. System hardware, firmware, and software is undergoing integration testing at the Mooretown, NJ ITB and will be deployed at Sensor Site One and the Operations Center. The preliminary design for Sensor Site Two is complete and will provide critical coverage, timeliness, and operational flexibility to the overall system.

  11. Computational Fluid Dynamic Analysis of a Vibrating Turbine Blade

    Directory of Open Access Journals (Sweden)

    Osama N. Alshroof

    2012-01-01

    Full Text Available This study presents the numerical fluid-structure interaction (FSI modelling of a vibrating turbine blade using the commercial software ANSYS-12.1. The study has two major aims: (i discussion of the current state of the art of modelling FSI in gas turbine engines and (ii development of a “tuned” one-way FSI model of a vibrating turbine blade to investigate the correlation between the pressure at the turbine casing surface and the vibrating blade motion. Firstly, the feasibility of the complete FSI coupled two-way, three-dimensional modelling of a turbine blade undergoing vibration using current commercial software is discussed. Various modelling simplifications, which reduce the full coupling between the fluid and structural domains, are then presented. The one-way FSI model of the vibrating turbine blade is introduced, which has the computational efficiency of a moving boundary CFD model. This one-way FSI model includes the corrected motion of the vibrating turbine blade under given engine flow conditions. This one-way FSI model is used to interrogate the pressure around a vibrating gas turbine blade. The results obtained show that the pressure distribution at the casing surface does not differ significantly, in its general form, from the pressure at the vibrating rotor blade tip.

  12. Numerical study of read scheme in one-selector one-resistor crossbar array

    Science.gov (United States)

    Kim, Sungho; Kim, Hee-Dong; Choi, Sung-Jin

    2015-12-01

    A comprehensive numerical circuit analysis of read schemes of a one selector-one resistance change memory (1S1R) crossbar array is carried out. Three schemes-the ground, V/2, and V/3 schemes-are compared with each other in terms of sensing margin and power consumption. Without the aid of a complex analytical approach or SPICE-based simulation, a simple numerical iteration method is developed to simulate entire current flows and node voltages within a crossbar array. Understanding such phenomena is essential in successfully evaluating the electrical specifications of selectors for suppressing intrinsic drawbacks of crossbar arrays, such as sneaky current paths and series line resistance problems. This method provides a quantitative tool for the accurate analysis of crossbar arrays and provides guidelines for developing an optimal read scheme, array configuration, and selector device specifications.

  13. A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach

    Directory of Open Access Journals (Sweden)

    Qiao Liu

    2017-01-01

    Full Text Available Security issue has been considered as one of the most pivotal aspects for the fifth-generation mobile network (5G due to the increasing demands of security service as well as the growing occurrence of security threat. In this paper, instead of focusing on the security architecture in the upper layer, we investigate the secure transmission for a basic channel model in a heterogeneous network, that is, two-way relay channels. By exploiting the properties of the transmission medium in the physical layer, we propose a novel secure scheme for the aforementioned channel mode. With precoding design, the proposed scheme is able to achieve a high transmission efficiency as well as security. Two different approaches have been introduced: information theoretical approach and physical layer encryption approach. We show that our scheme is secure under three different adversarial models: (1 untrusted relay attack model, (2 trusted relay with eavesdropper attack model, and (3 untrusted relay with eavesdroppers attack model. We also derive the secrecy capacity of the two different approaches under the three attacks. Finally, we conduct three simulations of our proposed scheme. The simulation results agree with the theoretical analysis illustrating that our proposed scheme could achieve a better performance than the existing schemes.

  14. Joint Preprocesser-Based Detectors for One-Way and Two-Way Cooperative Communication Networks

    KAUST Repository

    Abuzaid, Abdulrahman I.

    2014-05-01

    Efficient receiver designs for cooperative communication networks are becoming increasingly important. In previous work, cooperative networks communicated with the use of L relays. As the receiver is constrained, channel shortening and reduced-rank techniques were employed to design the preprocessing matrix that reduces the length of the received vector from L to U. In the first part of the work, a receiver structure is proposed which combines our proposed threshold selection criteria with the joint iterative optimization (JIO) algorithm that is based on the mean square error (MSE). Our receiver assists in determining the optimal U. Furthermore, this receiver provides the freedom to choose U for each frame depending on the tolerable difference allowed for MSE. Our study and simulation results show that by choosing an appropriate threshold, it is possible to gain in terms of complexity savings while having no or minimal effect on the BER performance of the system. Furthermore, the effect of channel estimation on the performance of the cooperative system is investigated. In the second part of the work, a joint preprocessor-based detector for cooperative communication networks is proposed for one-way and two-way relaying. This joint preprocessor-based detector operates on the principles of minimizing the symbol error rate (SER) instead of minimizing MSE. For a realistic assessment, pilot symbols are used to estimate the channel. From our simulations, it can be observed that our proposed detector achieves the same SER performance as that of the maximum likelihood (ML) detector with all participating relays. Additionally, our detector outperforms selection combining (SC), channel shortening (CS) scheme and reduced-rank techniques when using the same U. Finally, our proposed scheme has the lowest computational complexity.

  15. TVD schemes in one and two space dimensions

    International Nuclear Information System (INIS)

    Leveque, R.J.; Goodman, J.B.; New York Univ., NY)

    1985-01-01

    The recent development of schemes which are second order accurate in smooth regions has made it possible to overcome certain difficulties which used to arise in numerical computations of discontinuous solutions of conservation laws. The present investigation is concerned with scalar conservation laws, taking into account the employment of total variation diminishing (TVD) schemes. The concept of a TVD scheme was introduced by Harten et al. (1976). Harten et al. first constructed schemes which are simultaneously TVD and second order accurate on smooth solutions. In the present paper, a summary is provided of recently conducted work in this area. Attention is given to TVD schemes in two space dimensions, a second order accurate TVD scheme in one dimension, and the entropy condition and spreading of rarefaction waves. 19 references

  16. Residual stresses analysis of friction stir welding using one-way FSI simulation

    International Nuclear Information System (INIS)

    Kang, Sung Wook; Jang, Beom Seon; Song, Ha Cheol

    2015-01-01

    When certain mechanisms, such as plastic deformations and temperature gradients, occur and are released in a structure, stresses remain because of the shape of the structure and external constraints. These stresses are referred to as residual stresses. The base material locally expands during heating in the welding process. When the welding is completed and cooled to room temperature, the residual stresses are left at nearly the yield strength level. In the case of friction stir welding, the maximum temperature is 80% to 90% of the melting point of the materials. Thus, the residual stresses in the welding process are smaller than those in other fusion welding processes; these stresses have not been considered previously. However, friction stir welding residual stresses are sometimes measured at approximately 70% or above. These residual stresses significantly affect fatigue behavior and lifetime. The present study investigates the residual stress distributions in various welding conditions and shapes of friction stir welding. In addition, the asymmetric feature is considered in temperature and residual stress distribution. Heat transfer analysis is conducted using the commercial computational fluid dynamics program Fluent, and results are used in the finite element structural analysis with the ANSYS Multiphysics software. The calculated residual stresses are compared with experimental values using the X-ray diffraction method.

  17. Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming

    Directory of Open Access Journals (Sweden)

    Lin Xiao

    2017-01-01

    Full Text Available An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes. Specifically, we classify the intermediate relay as an eavesdropper into two modes: active eavesdropper and nonactive eavesdropper, depending on whether it has sufficient energy of its own to transmit the message or not. Under a simplified three-node fading wiretap channel setup, the transmit power allocation and power splitting ratio are jointly optimized to minimize the outage probability in the delay-sensitive case and to maximize the average rate in the delay-insensitive case, subject to the average and peak total power constraints. Applying the dual-decomposition method, the optimization problem can be efficiently solved in the delay-sensitive scenario. Moreover, an iterative algorithm is proposed to derive the solution to maximize the average rate in the delay-insensitive scenario. Numerical results demonstrate the performance of system outage probability in the two modes versus different rates and how efficiently the secrecy rate is improved compared with traditional schemes.

  18. LiFSI vs. LiPF6 electrolytes in contact with lithiated graphite: Comparing thermal stabilities and identification of specific SEI-reinforcing additives

    International Nuclear Information System (INIS)

    Eshetu, Gebrekidan Gebresilassie; Grugeon, Sylvie; Gachot, Grégory; Mathiron, David; Armand, Michel; Laruelle, Stephane

    2013-01-01

    Lithium bis(fluorosulfonyl) imide (LiFSI) is regarded as an alternative to the classical LiPF 6 salt in today's LiFePO 4 /graphite-based Li-ion batteries electrolyte owing to its slightly higher conductivity and lower fluorine content. In an attempt to better evaluate the safety issues, here we report the comparative study of the LiFSI and LiPF 6 based electrolyte/lithiated graphite interface thermal behavior. DSC measurements with LiFSI-based electrolyte reveal a sharp exotherm with large heat release though at higher onset and peak temperatures compared to LiPF 6 -based electrolyte. With the help of GC/MS, 19 F NMR and ESI-HRMS analyses, we assume that this highly energetic peak around 200 °C, which is dependant upon the lithium content, is mainly related to electrochemical reduction of FSI − anion. In a strategy to limit the probability and damage of thermal runaway event, electrolyte additives such as vinylene carbonate (VC), fluoro ethylene carbonate (FEC), di-isocyanato hexane (DIH) and toluene di-isocyanate (TDI) have been investigated and shown to significantly lower the energy associated with the exothermic phenomenon

  19. Efficient Constructions for One-way Hash Chains

    National Research Council Canada - National Science Library

    Hu, Yih-Chun; Jakobsson, Markus; Perrig, Adrian

    2003-01-01

    .... Our first construction, the Sandwich-chain, provides a smaller bandwidth overhead for one-way chain values, and enables efficient verification of one-way chain values if the trusted one-way chain value is far away...

  20. From WSN towards WoT: Open API Scheme Based on oneM2M Platforms

    Science.gov (United States)

    Kim, Jaeho; Choi, Sung-Chan; Ahn, Il-Yeup; Sung, Nak-Myoung; Yun, Jaeseok

    2016-01-01

    Conventional computing systems have been able to be integrated into daily objects and connected to each other due to advances in computing and network technologies, such as wireless sensor networks (WSNs), forming a global network infrastructure, called the Internet of Things (IoT). To support the interconnection and interoperability between heterogeneous IoT systems, the availability of standardized, open application programming interfaces (APIs) is one of the key features of common software platforms for IoT devices, gateways, and servers. In this paper, we present a standardized way of extending previously-existing WSNs towards IoT systems, building the world of the Web of Things (WoT). Based on the oneM2M software platforms developed in the previous project, we introduce a well-designed open API scheme and device-specific thing adaptation software (TAS) enabling WSN elements, such as a wireless sensor node, to be accessed in a standardized way on a global scale. Three pilot services are implemented (i.e., a WiFi-enabled smart flowerpot, voice-based control for ZigBee-connected home appliances, and WiFi-connected AR.Drone control) to demonstrate the practical usability of the open API scheme and TAS modules. Full details on the method of integrating WSN elements into three example systems are described at the programming code level, which is expected to help future researchers in integrating their WSN systems in IoT platforms, such as oneM2M. We hope that the flexibly-deployable, easily-reusable common open API scheme and TAS-based integration method working with the oneM2M platforms will help the conventional WSNs in diverse industries evolve into the emerging WoT solutions. PMID:27782058

  1. From WSN towards WoT: Open API Scheme Based on oneM2M Platforms

    Directory of Open Access Journals (Sweden)

    Jaeho Kim

    2016-10-01

    Full Text Available Conventional computing systems have been able to be integrated into daily objects and connected to each other due to advances in computing and network technologies, such as wireless sensor networks (WSNs, forming a global network infrastructure, called the Internet of Things (IoT. To support the interconnection and interoperability between heterogeneous IoT systems, the availability of standardized, open application programming interfaces (APIs is one of the key features of common software platforms for IoT devices, gateways, and servers. In this paper, we present a standardized way of extending previously-existing WSNs towards IoT systems, building the world of the Web of Things (WoT. Based on the oneM2M software platforms developed in the previous project, we introduce a well-designed open API scheme and device-specific thing adaptation software (TAS enabling WSN elements, such as a wireless sensor node, to be accessed in a standardized way on a global scale. Three pilot services are implemented (i.e., a WiFi-enabled smart flowerpot, voice-based control for ZigBee-connected home appliances, and WiFi-connected AR.Drone control to demonstrate the practical usability of the open API scheme and TAS modules. Full details on the method of integrating WSN elements into three example systems are described at the programming code level, which is expected to help future researchers in integrating their WSN systems in IoT platforms, such as oneM2M. We hope that the flexibly-deployable, easily-reusable common open API scheme and TAS-based integration method working with the oneM2M platforms will help the conventional WSNs in diverse industries evolve into the emerging WoT solutions.

  2. From WSN towards WoT: Open API Scheme Based on oneM2M Platforms.

    Science.gov (United States)

    Kim, Jaeho; Choi, Sung-Chan; Ahn, Il-Yeup; Sung, Nak-Myoung; Yun, Jaeseok

    2016-10-06

    Conventional computing systems have been able to be integrated into daily objects and connected to each other due to advances in computing and network technologies, such as wireless sensor networks (WSNs), forming a global network infrastructure, called the Internet of Things (IoT). To support the interconnection and interoperability between heterogeneous IoT systems, the availability of standardized, open application programming interfaces (APIs) is one of the key features of common software platforms for IoT devices, gateways, and servers. In this paper, we present a standardized way of extending previously-existing WSNs towards IoT systems, building the world of the Web of Things (WoT). Based on the oneM2M software platforms developed in the previous project, we introduce a well-designed open API scheme and device-specific thing adaptation software (TAS) enabling WSN elements, such as a wireless sensor node, to be accessed in a standardized way on a global scale. Three pilot services are implemented (i.e., a WiFi-enabled smart flowerpot, voice-based control for ZigBee-connected home appliances, and WiFi-connected AR.Drone control) to demonstrate the practical usability of the open API scheme and TAS modules. Full details on the method of integrating WSN elements into three example systems are described at the programming code level, which is expected to help future researchers in integrating their WSN systems in IoT platforms, such as oneM2M. We hope that the flexibly-deployable, easily-reusable common open API scheme and TAS-based integration method working with the oneM2M platforms will help the conventional WSNs in diverse industries evolve into the emerging WoT solutions.

  3. One way to save the number of BPM buttons in the arcs that is not recommended

    International Nuclear Information System (INIS)

    Chao, A.; Kheifets, S.

    1983-12-01

    It has been suggested as a possibility by the beam dynamic task force that the SLC arcs be provided a beam position monitor at every gap between magnets. In this scenario of orbit correction scheme, the BPM's are used alternately for the horizontal and the vertical orbit measurements. One way to construct these BPM's is therefore in the x and y planes. One problem of this construction, as pointed out by Pellegrin and Rees, is that synchrotron radiation will hit the buttons of the x-BPM's. It was suggested then that the x-BPM's should use four buttons, orthogonal, but rotated 45 0 from the x and y planes. This construction requires 4 buttons instead of 2, meaning an increase of cost. As an attempt to reduce the number of buttons needed for arc orbit correction, we have studied a variation of the orbit correction scheme. In this scheme, orbits are not corrected in the x and y coordinates but in the coordinates that are tilted by 45 0 relative to x and y. Let these coordinates be called u and v. The result of the study is that this scheme is not recommended

  4. 3D MRI-based anisotropic FSI models with cyclic bending for human coronary atherosclerotic plaque mechanical analysis.

    Science.gov (United States)

    Tang, Dalin; Yang, Chun; Kobayashi, Shunichi; Zheng, Jie; Woodard, Pamela K; Teng, Zhongzhao; Billiar, Kristen; Bach, Richard; Ku, David N

    2009-06-01

    Heart attack and stroke are often caused by atherosclerotic plaque rupture, which happens without warning most of the time. Magnetic resonance imaging (MRI)-based atherosclerotic plaque models with fluid-structure interactions (FSIs) have been introduced to perform flow and stress/strain analysis and identify possible mechanical and morphological indices for accurate plaque vulnerability assessment. For coronary arteries, cyclic bending associated with heart motion and anisotropy of the vessel walls may have significant influence on flow and stress/strain distributions in the plaque. FSI models with cyclic bending and anisotropic vessel properties for coronary plaques are lacking in the current literature. In this paper, cyclic bending and anisotropic vessel properties were added to 3D FSI coronary plaque models so that the models would be more realistic for more accurate computational flow and stress/strain predictions. Six computational models using one ex vivo MRI human coronary plaque specimen data were constructed to assess the effects of cyclic bending, anisotropic vessel properties, pulsating pressure, plaque structure, and axial stretch on plaque stress/strain distributions. Our results indicate that cyclic bending and anisotropic properties may cause 50-800% increase in maximum principal stress (Stress-P1) values at selected locations. The stress increase varies with location and is higher when bending is coupled with axial stretch, nonsmooth plaque structure, and resonant pressure conditions (zero phase angle shift). Effects of cyclic bending on flow behaviors are more modest (9.8% decrease in maximum velocity, 2.5% decrease in flow rate, 15% increase in maximum flow shear stress). Inclusion of cyclic bending, anisotropic vessel material properties, accurate plaque structure, and axial stretch in computational FSI models should lead to a considerable improvement of accuracy of computational stress/strain predictions for coronary plaque vulnerability

  5. One-step trinary signed-digit arithmetic using an efficient encoding scheme

    Science.gov (United States)

    Salim, W. Y.; Fyath, R. S.; Ali, S. A.; Alam, Mohammad S.

    2000-11-01

    The trinary signed-digit (TSD) number system is of interest for ultra fast optoelectronic computing systems since it permits parallel carry-free addition and borrow-free subtraction of two arbitrary length numbers in constant time. In this paper, a simple coding scheme is proposed to encode the decimal number directly into the TSD form. The coding scheme enables one to perform parallel one-step TSD arithmetic operation. The proposed coding scheme uses only a 5-combination coding table instead of the 625-combination table reported recently for recoded TSD arithmetic technique.

  6. Optimal design of impeller for centrifugal compressor under the influence of one-way fluid-structure interaction

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Hyun Soo; Kim, Youn Jae [Sungkyunkwan University, Suwon (Korea, Republic of)

    2016-09-15

    In this study, a method for optimal design of impeller for centrifugal compressor under the influence of Fluid-structure interaction (FSI) and Response surface method (RSM) was studied. Numerical simulation was conducted using ANSYS Multi-physics with various configurations of impeller geometry. Each of the design parameters was divided into 3 levels. Total 45 design points were planned by Central composite design (CCD) method, which is one of the Design of experiment (DOE) techniques. Response surfaces generated based on the DOE results were used to find the optimal shape of impeller for high aerodynamic performance. The whole process of optimization was conducted using ANSYS Design xplorer (DX). Through the optimization, structural safety and aerodynamic performance of centrifugal compressor were improved.

  7. Optimal design of impeller for centrifugal compressor under the influence of one-way fluid-structure interaction

    International Nuclear Information System (INIS)

    Kang, Hyun Soo; Kim, Youn Jae

    2016-01-01

    In this study, a method for optimal design of impeller for centrifugal compressor under the influence of Fluid-structure interaction (FSI) and Response surface method (RSM) was studied. Numerical simulation was conducted using ANSYS Multi-physics with various configurations of impeller geometry. Each of the design parameters was divided into 3 levels. Total 45 design points were planned by Central composite design (CCD) method, which is one of the Design of experiment (DOE) techniques. Response surfaces generated based on the DOE results were used to find the optimal shape of impeller for high aerodynamic performance. The whole process of optimization was conducted using ANSYS Design xplorer (DX). Through the optimization, structural safety and aerodynamic performance of centrifugal compressor were improved

  8. A numerical scheme for the one-dimensional pressureless gases system

    OpenAIRE

    Boudin , Laurent; Mathiaud , Julien

    2012-01-01

    International audience; In this work, we investigate the numerical solving of the one-dimensional pressureless gases system. After briefly recalling the mathematical framework of the duality solutions introduced by Bouchut and James, we point out that the upwind scheme for the density and momentum does not satisfy the one-sided Lipschitz (OSL) condition on the expansion rate required for the duality solutions. Then we build a diffusive scheme which allows to recover the OSL condition by follo...

  9. Performance of a reduced-order FSI model for flow-induced vocal fold vibration

    Science.gov (United States)

    Luo, Haoxiang; Chang, Siyuan; Chen, Ye; Rousseau, Bernard; PhonoSim Team

    2017-11-01

    Vocal fold vibration during speech production involves a three-dimensional unsteady glottal jet flow and three-dimensional nonlinear tissue mechanics. A full 3D fluid-structure interaction (FSI) model is computationally expensive even though it provides most accurate information about the system. On the other hand, an efficient reduced-order FSI model is useful for fast simulation and analysis of the vocal fold dynamics, which can be applied in procedures such as optimization and parameter estimation. In this work, we study performance of a reduced-order model as compared with the corresponding full 3D model in terms of its accuracy in predicting the vibration frequency and deformation mode. In the reduced-order model, we use a 1D flow model coupled with a 3D tissue model that is the same as in the full 3D model. Two different hyperelastic tissue behaviors are assumed. In addition, the vocal fold thickness and subglottal pressure are varied for systematic comparison. The result shows that the reduced-order model provides consistent predictions as the full 3D model across different tissue material assumptions and subglottal pressures. However, the vocal fold thickness has most effect on the model accuracy, especially when the vocal fold is thin.

  10. LES with acoustics and FSI for deforming plates in gas flow

    Energy Technology Data Exchange (ETDEWEB)

    Nilsson, Per, E-mail: pnilsson@tuv-nord.com [European Spallation Source, Lund (Sweden); Lillberg, Eric [Westinghouse, Vaesteras (Sweden); Wikstroem, Niklas [FS Dynamics, Stockholm (Sweden)

    2012-12-15

    This concerns Flow Induced Vibrations (FIV) in nuclear reactors and numerical analysis of such. Special attention is paid to structural excitation by sound generated remotely and turbulent flow around the structure. One hypothesis was that these phenomena can interact, so that the structure accumulates more energy from the flow if it also excited by sound from another source. In the studies, Fluid-Structure Interaction (FSI) is simulated with Large Eddy Simulations (LESs). It is shown possible to simulate excitation due to both acoustic and turbulence loads using the reported methods, at least qualitatively. The excitation levels are even of the right order of magnitude in some parts. However, there are some shortcomings in the modeling. The most important is perhaps the lack of non-reflecting boundary conditions. Another problem is the strong numerical damping in combination with demanding numerics for the selected solid solution methodology. Three cases are simulated, two for validation and one applied about steam dryers. For the applied case, it is concluded unlikely that excitation by the acoustic and turbulence loads can interact. The main reason is that the flow is controlled more by static geometrical factors, such as solid rotation sharp edges, than small deformations due to vibrations.

  11. The Family Socialization Interview—Revised (FSI-R): a Comprehensive Assessment of Parental Disciplinary Behaviors

    OpenAIRE

    O’Dor, Sarah L.; Grasso, Damion J.; Forbes, Danielle; Bates, John E.; McCarthy, Kimberly J.; Wakschlag, Lauren S.; Briggs-Gowan, Margaret J.

    2017-01-01

    Elucidating the complex mechanisms by which harsh parenting increases risk of child psychopathology is key to targeted prevention. This requires nuanced methods that capture the varied perceptions and experiences of diverse families. The Family Socialization Interview—Revised (FSI-R), adapted from an interview developed by Dodge et al. (Child Development, 65,649–665,1994), is a comprehensive, semi-structured interview for characterizing methods of parental discipline used with young children....

  12. Scheme for teleportation of entangled states without Bell-state measurement by using one atom

    Energy Technology Data Exchange (ETDEWEB)

    Qiang Wenchao; Zhang Lei; Zhang Aiping [Faculty of Science, Xi' an University of Architecture and Technology, Xi' an 710055 (China); Dong Shihai, E-mail: qwcqj@163.com [Departamento de Fisica, Esc. Sup de Fisica y Matematicas, Instituto Politecnico Nacional, Edificio 9, Unidad Profesional Adolfo Lopez Mateos, Mexico, DF 07738 (Mexico)

    2011-07-01

    We propose a scheme for approximately and conditionally teleporting an entanglement of zero- and one-photon states from a cavity with left- and right-polarized modes to another similar one, with a fidelity exceeding 99%. Instead of using the Bell-state measurement, only one atom is used in our scheme. The time spent, the success probability and the feasibility of the proposed scheme are also discussed.

  13. One-Way Functions and Composition of Conjugacy and Discrete Logarithm Problems in the Small Cancellation Groups

    Directory of Open Access Journals (Sweden)

    N. V. Bezverkhniy

    2015-01-01

    Full Text Available The paper considers the possibility for building a one-way function in the small cancellation group. Thus, it uses the algorithm to solve the problem for a cyclic subgroup, also known as a discrete logarithm problem, and the algorithm to solve the word problem in this class of groups.Research is conducted using geometric methods of combinatorial group theory (the method of diagrams in groups.In public channel exchange of information are used one-way functions, direct calculation of which should be much less complicated than the calculation of the inverse function. The paper considers the combination of two problems: discrete logarithms and conjugacy. This leads to the problem of conjugate membership for a cyclic subgroup. The work proposes an algorithm based on this problem, which can be used as a basis in investigation of the appropriate one-way function for its fitness to build a public key distribution scheme.The study used doughnut charts of word conjugacy, and for one special class of such charts has been proven a property of the layer-based periodicity. The presence of such properties is obviously leads to a solution of the power conjugacy of words in the considered class of groups. Unfortunately, this study failed to show any periodicity of a doughnut chart, but for one of two possible classes this periodicity has been proven.The building process of one-way function considered in the paper was studied in terms of possibility to calculate both direct and inverse mappings. The computational complexity was not considered. Thus, the following two tasks were yet unresolved: determining the quality of one-way function in the above protocol of the public key distribution and completing the study of the periodicity of doughnut charts of word conjugacy, leading to a positive solution of the power conjugacy of words in the class groups under consideration.

  14. Comparative analysis of the performance of One-Way and Two-Way urban road networks

    Science.gov (United States)

    Gheorghe, Carmen

    2017-10-01

    The fact that the number of vehicles is increasing year after year represents a challenge in road traffic management because it is necessary to adjust the road traffic, in order to prevent any incidents, using mostly the same road infrastructure. At this moment one-way road network provides efficient traffic flow for vehicles but it is not ideal for pedestrians. Therefore, a proper solution must be found and applied when and where it is necessary. Replacing one-way road network with two-way road network may be a viable solution especially if in the area is high pedestrian traffic. The paper aims to highlight the influence of both, one-way and two-way urban road networks through an experimental research which was performed by using traffic data collected in the field. Each of the two scenarios analyzed were based on the same traffic data, the same geometrical conditions of the road (lane width, total road segment width, road slopes, total length of the road network) and also the same signaling conditions (signalised intersection or roundabout). The analysis which involves two-way scenario reveals changes in the performance parameters like delay average, stops average, delay stop average and vehicle speed average. Based on the values obtained, it was possible to perform a comparative analysis between the real, one-way, scenario and the theoretical, two-way, scenario.

  15. Decoy-state quantum key distribution with two-way classical postprocessing

    International Nuclear Information System (INIS)

    Ma Xiongfeng; Fung, C.-H.F.; Chen Kai; Lo, H.-K.; Dupuis, Frederic; Tamaki, Kiyoshi

    2006-01-01

    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD) protocols when a coherent-state source is used. Previously, data postprocessing schemes based on one-way classical communications were considered for use with decoy states. In this paper, we develop two data postprocessing schemes for the decoy-state method using two-way classical communications. Our numerical simulation (using parameters from a specific QKD experiment as an example) results show that our scheme is able to extend the maximal secure distance from 142 km (using only one-way classical communications with decoy states) to 181 km. The second scheme is able to achieve a 10% greater key generation rate in the whole regime of distances. We conclude that decoy-state QKD with two-way classical postprocessing is of practical interest

  16. Deterministic one-way simulation of two-way, real-time cellular automata and its related problems

    Energy Technology Data Exchange (ETDEWEB)

    Umeo, H; Morita, K; Sugata, K

    1982-06-13

    The authors show that for any deterministic two-way, real-time cellular automaton, m, there exists a deterministic one-way cellular automation which can simulate m in twice real-time. Moreover the authors present a new type of deterministic one-way cellular automata, called circular cellular automata, which are computationally equivalent to deterministic two-way cellular automata. 7 references.

  17. Moments Based Framework for Performance Analysis of One-Way/Two-Way CSI-Assisted AF Relaying

    KAUST Repository

    Xia, Minghua

    2012-09-01

    When analyzing system performance of conventional one-way relaying or advanced two-way relaying, these two techniques are always dealt with separately and, thus, their performance cannot be compared efficiently. Moreover, for ease of mathematical tractability, channels considered in such studies are generally assumed to be subject to Rayleigh fading or to be Nakagami-$m$ channels with integer fading parameters, which is impractical in typical urban environments. In this paper, we propose a unified moments-based framework for general performance analysis of channel-state-information (CSI) assisted amplify-and-forward (AF) relaying systems. The framework is applicable to both one-way and two-way relaying over arbitrary Nakagami-$m$ fading channels, and it includes previously reported results as special cases. Specifically, the mathematical framework is firstly developed under the umbrella of the weighted harmonic mean of two Gamma-distributed variables in conjunction with the theory of Pad\\\\\\'e approximants. Then, general expressions for the received signal-to-noise ratios of the users in one-way/two-way relaying systems and the corresponding moments, moment generation function, and cumulative density function are established. Subsequently, the mathematical framework is applied to analyze, compare, and gain insights into system performance of one-way and two-way relaying techniques, in terms of outage probability, average symbol error probability, and achievable data rate. All analytical results are corroborated by simulation results as well as previously reported results whenever available, and they are shown to be efficient tools to evaluate and compare system performance of one-way and two-way relaying.

  18. Pyrrolidinium FSI and TFSI-Based Polymerized Ionic Liquids as Electrolytes for High-Temperature Lithium-Ion Batteries

    Directory of Open Access Journals (Sweden)

    Manfred Kerner

    2018-02-01

    Full Text Available Promising electrochemical and dynamical properties, as well as high thermal stability, have been the driving forces behind application of ionic liquids (ILs and polymerized ionic liquids (PILs as electrolytes for high-temperature lithium-ion batteries (HT-LIBs. Here, several ternary lithium-salt/IL/PIL electrolytes (PILel have been investigated for synergies of having both FSI and TFSI anions present, primarily in terms of physico-chemical properties, for unique application in HT-LIBs operating at 80 °C. All of the electrolytes tested have low Tg and are thermally stable ≥100 °C, and with TFSI as the exclusive anion the electrolytes (set A have higher thermal stabilities ≥125 °C. Ionic conductivities are in the range of 1 mS/cm at 100 °C and slightly higher for set A PILel, which, however, have lower oxidation stabilities than set B PILel with both FSI and TFSI anions present: 3.4–3.7 V vs. 4.2 V. The evolution of the interfacial resistance increases for all PILel during the first 40 h, but are much lower for set B PILel and generally decrease with increasing Li-salt content. The higher interfacial resistances only influence the cycling performance at high C-rates (1 C, where set B PILel with high Li-salt content performs better, while the discharge capacities at the 0.1 C rate are comparable. Long-term cycling at 0.5 C, however, shows stable discharge capacities for 100 cycles, with the exception of the set B PILel with high Li-salt content. Altogether, the presence of both FSI and TFSI anions in the PILel results in lower ionic conductivities and decreased thermal stabilities, but also higher oxidation stabilities and reduced interfacial resistances and, in total, result in an improved rate capability, but compromised long-term capacity retention. Overall, these electrolytes open for novel designs of HT-LIBs.

  19. Efficient quantum circuits for one-way quantum computing.

    Science.gov (United States)

    Tanamoto, Tetsufumi; Liu, Yu-Xi; Hu, Xuedong; Nori, Franco

    2009-03-13

    While Ising-type interactions are ideal for implementing controlled phase flip gates in one-way quantum computing, natural interactions between solid-state qubits are most often described by either the XY or the Heisenberg models. We show an efficient way of generating cluster states directly using either the imaginary SWAP (iSWAP) gate for the XY model, or the sqrt[SWAP] gate for the Heisenberg model. Our approach thus makes one-way quantum computing more feasible for solid-state devices.

  20. FVCOM one-way and two-way nesting using ESMF: Development and validation

    Science.gov (United States)

    Qi, Jianhua; Chen, Changsheng; Beardsley, Robert C.

    2018-04-01

    Built on the Earth System Modeling Framework (ESMF), the one-way and two-way nesting methods were implemented into the unstructured-grid Finite-Volume Community Ocean Model (FVCOM). These methods help utilize the unstructured-grid multi-domain nesting of FVCOM with an aim at resolving the multi-scale physical and ecosystem processes. A detail of procedures on implementing FVCOM into ESMF was described. The experiments were made to validate and evaluate the performance of the nested-grid FVCOM system. The first was made for a wave-current interaction case with a two-domain nesting with an emphasis on qualifying a critical need of nesting to resolve a high-resolution feature near the coast and harbor with little loss in computational efficiency. The second was conducted for the pseudo river plume cases to examine the differences in the model-simulated salinity between one-way and two-way nesting approaches and evaluate the performance of mass conservative two-way nesting method. The third was carried out for the river plume case in the realistic geometric domain in Mass Bay, supporting the importance for having the two-way nesting for coastal-estuarine integrated modeling. The nesting method described in this paper has been used in the Northeast Coastal Ocean Forecast System (NECOFS)-a global-regional-coastal nesting FVCOM system that has been placed into the end-to-end forecast and hindcast operations since 2007.

  1. fs-i "2004" : linnamängud värvidega ja ilma / Maija Burima ; inglise keelest tlk. Silver Rattasepp

    Index Scriptorium Estoniae

    Burima, Maija

    2007-01-01

    Artiklis analüüsitakse fs-i luulekogu "2004" venekeelse tõlke põhjal. Artikli aluseks on ingliskeelne ettekanne Underi ja Tuglase Kirjanduskeskuse seminaril "Turn of the Century, Turns in Literature II : Estonian and Latvian Literature in the European Context at the Turn of the 20th/21st Centuries" Viinistus 22.-23. mail 2007

  2. Four-Way Relaying in Wireless Cellular Systems

    DEFF Research Database (Denmark)

    Liu, Huaping; Popovski, Petar; De Carvalho, Elisabeth

    2013-01-01

    Two-way relaying in wireless systems has initiated a large research effort during the past few years. Nevertheless, it represents only a specific traffic pattern and it is of interest to investigate other traffic patterns where such a simultaneous processing of information flows can bring...... performance advantage. In this paper we consider a \\emph{four-way relaying} scenario, where each of the two Mobile Stations (MSs) has a two-way connection to the same Base Station (BS), while each connection is through a dedicated Relay Station (RS). The RSs are placed in such a way that one RS...... of the new scheme for Decode-and-Forward (DF) operational model for the RS. We compare the performance with a state-of-the-art reference scheme, based on two-way relaying with DF. The results indicate that the achievable rate regions are significantly enlarged for the new scheme....

  3. AP1000 Shield Building Dynamic Response for Different Water Levels of PCCWST Subjected to Seismic Loading considering FSI

    Directory of Open Access Journals (Sweden)

    Daogang Lu

    2015-01-01

    Full Text Available Huge water storage tank on the top of many buildings may affect the safety of the structure caused by fluid-structure interaction (FSI under the earthquake. AP1000 passive containment cooling system water storage tank (PCCWST placed at the top of shield building is a key component to ensure the safety of nuclear facilities. Under seismic loading, water will impact the wall of PCCWST, which may pose a threat to the integrity of the shield building. In the present study, an FE model of AP1000 shield building is built for the modal and transient seismic analysis considering the FSI. Six different water levels in PCCWST were discussed by comparing the modal frequency, seismic acceleration response, and von Mises stress distribution. The results show the maximum von Mises stress emerges at the joint of shield building roof and water around the air inlet. However, the maximum von Mises stress is below the yield strength of reinforced concrete. The results may provide a reference for design of the AP1000 and CAP1400 in the future.

  4. One-way shared memory

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2018-01-01

    Standard multicore processors use the shared main memory via the on-chip caches for communication between cores. However, this form of communication has two limitations: (1) it is hardly time-predictable and therefore not a good solution for real-time systems and (2) this single shared memory...... is a bottleneck in the system. This paper presents a communication architecture for time-predictable multicore systems where core-local memories are distributed on the chip. A network-on-chip constantly copies data from a sender core-local memory to a receiver core-local memory. As this copying is performed...... in one direction we call this architecture a one-way shared memory. With the use of time-division multiplexing for the memory accesses and the network-on-chip routers we achieve a time-predictable solution where the communication latency and bandwidth can be bounded. An example architecture for a 3...

  5. One-way functions based on the discrete logarithm problem in the groups meeting conditions C(3-T (6

    Directory of Open Access Journals (Sweden)

    N. V. Bezverkhniy

    2014-01-01

    Full Text Available In this work we are consider a possibility to create schemes of open key distribution in the groups meeting conditions C(3-T(6. Our constructions use the following algorithms.1. The algorithm that solves the membership problem for cyclic subgroups, also known as the discrete logarithm problem.2. The algorithm that solves the word problem in this class of groups.Our approach is based on the geometric methods of combinatorial group theory (the method of diagrams in groups.In a cryptographic scheme based on the open key distribution one-way functions are used, i.e. functions direct calculation of which must be much easier than that of the inverse one. Our task was to construct a one-way function using groups with small cancelation conditions C(3-T(6 and to compare the calculation complexity of this function with the calculation complexity of its inverse.P.W. Shor has shown in the paper that there exists a polynomial algorithm that can be implemented in a quantum computer to solve the discrete logarithm problem in the groups of units of finite fields and the rings of congruences mod n. This stimulated a series of investigations trying to find alternative complicated mathematical problems that can be used for construction of new asymmetric cryptosystems. For example, open key distribution systems based on the conjugacy problem in matrix groups and the braid groups were proposed.In the other papers the constructions used the discrete logarithm problem in the groups of inner automorphisms of semi-direct products of SL(2,Z and Zp and GL(2,Zp and Zp. groups. The paper of E. Sakalauskas, P. Tvarijonas, A. Raulinaitis proposed a scheme that uses a composition of two problems of group theory, namely the conjugacy problem and the discrete logarithm problem.Our results show that the scheme that we propose is of polynomial complexity. Therefore its security is not sufficient for further applications in communications. However the security can be improved

  6. One-way mode transmission in one-dimensional phononic crystal plates

    Science.gov (United States)

    Zhu, Xuefeng; Zou, Xinye; Liang, Bin; Cheng, Jianchun

    2010-12-01

    We investigate theoretically the band structures of one-dimensional phononic crystal (PC) plates with both antisymmetric and symmetric structures, and show how unidirectional transmission behavior can be obtained for either antisymmetric waves (A modes) or symmetric waves (S modes) by exploiting mode conversion and selection in the linear plate systems. The theoretical approach is illustrated for one PC plate example where unidirectional transmission behavior is obtained in certain frequency bands. Employing harmonic frequency analysis, we numerically demonstrate the one-way mode transmission for the PC plate with finite superlattice by calculating the steady-state displacement fields under A modes source (or S modes source) in forward and backward direction, respectively. The results show that the incident waves from A modes source (or S modes source) are transformed into S modes waves (or A modes waves) after passing through the superlattice in the forward direction and the Lamb wave rejections in the backward direction are striking with a power extinction ratio of more than 1000. The present structure can be easily extended to two-dimensional PC plate and efficiently encourage practical studies of experimental realization which is believed to have much significance for one-way Lamb wave mode transmission.

  7. Experimental all-optical one-way quantum computing

    International Nuclear Information System (INIS)

    Prevedel, R.

    2009-01-01

    In recent years, the relatively new field of quantum information processing (QIP) has attracted the attention of many scientists around the world due to its promise of increased computational speed, absolute secure communication and the potential to simulate complex quantum mechanical systems. The very essence of this new quantum information technology are two concepts at the very heart of quantum mechanics, namely superposition and entanglement. The present Thesis contains the results of four different experiments that were all aimed at the demonstration of an entirely new model for quantum computing with linear optics, the 'one-way' quantum computer. For this purpose a multi-photon entangled state of four photons has been generated via the process of spontaneous parametric down-conversion and by using an interferometric setup. This entangled state acts as a resource that allowed for novel demonstrations of quantum algorithms and relevant experimental techniques. By exploiting the advances developed in both theory and experiment, in this Thesis we report the implementation of fast, active feed-forward that allowed, for the first time, the realization of deterministic linear optics quantum computing at an unprecedented speed. Further we were able to demonstrate the Deutsch algorithm on our one-way quantum computer, an important quantum algorithm that is capable of distinguishing whether a function is constant or balanced. Classically one needs to query the algorithm at least 2N/2 + 1 times for an N-bit binary input string, however, in the quantum regime, this can be done with one evaluation of the algorithm, independent of the size of the input. In another experiment we succeeded in playing an instance of a quantum game - the so-called Prisoner's dilemma - on our one-way quantum computer. Playing such a game is essentially the execution of a quantum algorithm made up of a distinct set of one- and two-qubit gates. This allows the individual players to increase their

  8. On the security of the Winternitz one-time signature scheme

    NARCIS (Netherlands)

    Buchmann, Johannes; Dahmen, Erik; Ereth, Sarah; Hülsing, Andreas; Rückert, Markus; Nitaj, A.; Pointcheval, D.

    2011-01-01

    We show that the Winternitz one-time signature scheme is existentially unforgeable under adaptive chosen message attacks when instantiated with a family of pseudo random functions. Compared to previous results, which require a collision resistant hash function, our result provides significantly

  9. One-way spatial integration of hyperbolic equations

    Science.gov (United States)

    Towne, Aaron; Colonius, Tim

    2015-11-01

    In this paper, we develop and demonstrate a method for constructing well-posed one-way approximations of linear hyperbolic systems. We use a semi-discrete approach that allows the method to be applied to a wider class of problems than existing methods based on analytical factorization of idealized dispersion relations. After establishing the existence of an exact one-way equation for systems whose coefficients do not vary along the axis of integration, efficient approximations of the one-way operator are constructed by generalizing techniques previously used to create nonreflecting boundary conditions. When physically justified, the method can be applied to systems with slowly varying coefficients in the direction of integration. To demonstrate the accuracy and computational efficiency of the approach, the method is applied to model problems in acoustics and fluid dynamics via the linearized Euler equations; in particular we consider the scattering of sound waves from a vortex and the evolution of hydrodynamic wavepackets in a spatially evolving jet. The latter problem shows the potential of the method to offer a systematic, convergent alternative to ad hoc regularizations such as the parabolized stability equations.

  10. Relay Selection and Resource Allocation in One-Way and Two-Way Cognitive Relay Networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-01-01

    In this work, the problem of relay selection and resource power allocation in one- way and two-way cognitive relay networks using half duplex channels with different relaying protocols is investigated. Optimization problems for both single

  11. One-way quantum computing in superconducting circuits

    Science.gov (United States)

    Albarrán-Arriagada, F.; Alvarado Barrios, G.; Sanz, M.; Romero, G.; Lamata, L.; Retamal, J. C.; Solano, E.

    2018-03-01

    We propose a method for the implementation of one-way quantum computing in superconducting circuits. Measurement-based quantum computing is a universal quantum computation paradigm in which an initial cluster state provides the quantum resource, while the iteration of sequential measurements and local rotations encodes the quantum algorithm. Up to now, technical constraints have limited a scalable approach to this quantum computing alternative. The initial cluster state can be generated with available controlled-phase gates, while the quantum algorithm makes use of high-fidelity readout and coherent feedforward. With current technology, we estimate that quantum algorithms with above 20 qubits may be implemented in the path toward quantum supremacy. Moreover, we propose an alternative initial state with properties of maximal persistence and maximal connectedness, reducing the required resources of one-way quantum computing protocols.

  12. New Encryption Scheme of One-Time Pad Based on KDC

    Science.gov (United States)

    Xie, Xin; Chen, Honglei; Wu, Ying; Zhang, Heng; Wu, Peng

    As more and more leakage incidents come up, traditional encryption system has not adapted to the complex and volatile network environment, so, there should be a new encryption system that can protect information security very well, this is the starting point of this paper. Based on DES and RSA encryption system, this paper proposes a new scheme of one time pad, which really achieves "One-time pad" and provides information security a new and more reliable encryption method.

  13. Robust and scalable optical one-way quantum computation

    International Nuclear Information System (INIS)

    Wang Hefeng; Yang Chuiping; Nori, Franco

    2010-01-01

    We propose an efficient approach for deterministically generating scalable cluster states with photons. This approach involves unitary transformations performed on atoms coupled to optical cavities. Its operation cost scales linearly with the number of qubits in the cluster state, and photon qubits are encoded such that single-qubit operations can be easily implemented by using linear optics. Robust optical one-way quantum computation can be performed since cluster states can be stored in atoms and then transferred to photons that can be easily operated and measured. Therefore, this proposal could help in performing robust large-scale optical one-way quantum computation.

  14. Asymptotic behavior of a diffusive scheme solving the inviscid one-dimensional pressureless gases system

    OpenAIRE

    Boudin , Laurent; Mathiaud , Julien

    2012-01-01

    In this work, we discuss some numerical properties of the viscous numerical scheme introduced in [Boudin, Mathiaud, NMPDE 2012] to solve the one-dimensional pressureless gases system, and study in particular, from a computational viewpoint, its asymptotic behavior when the viscosity parameter used in the scheme becomes smaller.

  15. Fundamentals of universality in one-way quantum computation

    International Nuclear Information System (INIS)

    Nest, M van den; Duer, W; Miyake, A; Briegel, H J

    2007-01-01

    In this paper, we build a framework allowing for a systematic investigation of the fundamental issue: 'Which quantum states serve as universal resources for measurement-based (one-way) quantum computation?' We start our study by re-examining what is exactly meant by 'universality' in quantum computation, and what the implications are for universal one-way quantum computation. Given the framework of a measurement-based quantum computer, where quantum information is processed by local operations only, we find that the most general universal one-way quantum computer is one which is capable of accepting arbitrary classical inputs and producing arbitrary quantum outputs-we refer to this property as CQ-universality. We then show that a systematic study of CQ-universality in one-way quantum computation is possible by identifying entanglement features that are required to be present in every universal resource. In particular, we find that a large class of entanglement measures must reach its supremum on every universal resource. These insights are used to identify several families of states as being not universal, such as one-dimensional (1D) cluster states, Greenberger-Horne-Zeilinger (GHZ) states, W states, and ground states of non-critical 1D spin systems. Our criteria are strengthened by considering the efficiency of a quantum computation, and we find that entanglement measures must obey a certain scaling law with the system size for all efficient universal resources. This again leads to examples of non-universal resources, such as, e.g. ground states of critical 1D spin systems. On the other hand, we provide several examples of efficient universal resources, namely graph states corresponding to hexagonal, triangular and Kagome lattices. Finally, we consider the more general notion of encoded CQ-universality, where quantum outputs are allowed to be produced in an encoded form. Again we provide entanglement-based criteria for encoded universality. Moreover, we present a

  16. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  17. A one-way text messaging intervention for obesity.

    Science.gov (United States)

    Ahn, Ahleum; Choi, Jaekyung

    2016-04-01

    Worldwide, there has been a startling increase in the number of people who are obese or overweight. Obesity increases the risk of cardiovascular disease and overall mortality. Mobile phone messaging is an important means of human communication globally. Because the mobile phone can be used anywhere at any time, mobile phone messaging has the potential to manage obesity. We investigated the effectiveness of a one-way text messaging intervention for obesity. Participants' body mass index and waist circumference were measured at the beginning of the programme and again after 12 weeks. The text message group received text messages about exercise, dietary intake, and general information about obesity three times a week, while the control group did not receive any text messages from the study. Of the 80 participants, 25 subjects in the text message group and 29 participants in the control group completed the study. After adjusting for baseline body mass index, the body mass index was significantly lower in the text message group than in the control group (27.9 vs. 28.3; p = 0.02). After adjusting for the baseline waist circumference, the difference of waist circumference between the text message group and control group was not significant (93.4 vs. 94.6; p = 0.13). The one-way text messaging intervention was a simple and effective way to manage obesity. The one-way text messaging intervention may be a useful method for lifestyle modification in obese subjects. © The Author(s) 2015.

  18. Efficient one-way quantum computations for quantum error correction

    International Nuclear Information System (INIS)

    Huang Wei; Wei Zhaohui

    2009-01-01

    We show how to explicitly construct an O(nd) size and constant quantum depth circuit which encodes any given n-qubit stabilizer code with d generators. Our construction is derived using the graphic description for stabilizer codes and the one-way quantum computation model. Our result demonstrates how to use cluster states as scalable resources for many multi-qubit entangled states and how to use the one-way quantum computation model to improve the design of quantum algorithms.

  19. Deducing trapdoor primitives in public key encryption schemes

    Science.gov (United States)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  20. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  1. MIMO Four-Way Relaying

    DEFF Research Database (Denmark)

    Liu, Huaping; Sun, Fan; De Carvalho, Elisabeth

    2013-01-01

    Two-way relaying in wireless systems has initiated a large research effort during the past few years. Nevertheless, it represents only a specific traffic pattern and it is of interest to investigate other traffic patterns where such a simultaneous processing of information flows can bring...... performance advantage. In this paper we consider a \\emph{four-way relaying} multiple-input multiple-output (MIMO) scenario, where each of the two Mobile Stations (MSs) has a two-way connection to the same Base Station (BS), while each connection is through a dedicated Relay Station (RS). The RSs are placed...... the sum-rate of the new scheme for Decode-and-Forward (DF) operational model for the RS. We compare the performance with state-of-the-art reference schemes, based on two-way relaying with DF. The results indicate that the sum-rate of the two-phase four-way relaying scheme largely outperforms the four...

  2. Meal box schemes as a convenient way to avoid convenience food?

    DEFF Research Database (Denmark)

    Hertz, Frej; Halkier, Bente

    2017-01-01

    to categorize meal box schemes as a new form of convenience food called convenient food. In addition, results suggest that meal box schemes reduce leftovers from dinner. Meal boxes also influence dinner related activities such as planning ahead in time and grocery shopping, which require less physical......The term convenience food is subject to diversification, lack of clarity and moral ambiguity. In this paper we address these issues and critically discuss convenience food by using empirical findings from a Danish study that deals with practitioners' uses of meal box schemes. The methodological...

  3. Closed loop identification using a modified Hansen scheme

    DEFF Research Database (Denmark)

    Sekunda, André Krabdrup; Niemann, Hans Henrik; Poulsen, Niels Kjølstad

    2015-01-01

    in closed loop [4], and one such method is the Hansen scheme [1]. Standard identification using Hansen scheme demands generating the identification signals indirectly. In this paper it is instead proposed to use the relationship between the Youla factorization of a plant and its stabilizing controller...... in order to keep the system stable. Furthermore because the dynamics of such a system depends on the rotational speed it is needed to conduct an identification while the system is part of a closed loop scheme. The authors believe the paper able to contribute towards a simpler and more direct way...... of identifying closed loop plants using Hansen scheme....

  4. A parallel nearly implicit time-stepping scheme

    OpenAIRE

    Botchev, Mike A.; van der Vorst, Henk A.

    2001-01-01

    Across-the-space parallelism still remains the most mature, convenient and natural way to parallelize large scale problems. One of the major problems here is that implicit time stepping is often difficult to parallelize due to the structure of the system. Approximate implicit schemes have been suggested to circumvent the problem. These schemes have attractive stability properties and they are also very well parallelizable. The purpose of this article is to give an overall assessment of the pa...

  5. One-Way Deficit and Quantum Phase Transitions in XX Model

    Science.gov (United States)

    Wang, Yao-Kun; Zhang, Yu-Ran

    2018-02-01

    Quantum correlations including entanglement and quantum discord have drawn much attention in characterizing quantum phase transitions. Quantum deficit originates in questions regarding work extraction from quantum systems coupled to a heat bath (Oppenheim et al. Phys. Rev. Lett. 89, 180402, 2002). It links quantum thermodynamics with quantum correlations and provides a new standpoint for understanding quantum non-locality. In this paper, we evaluate the one-way deficit of two adjacent spins in the bulk for the XX model. In the thermodynamic limit, the XX model undergoes a first order transition from fully polarized to a critical phase with quasi-long-range order with decrease of quantum parameter. We find that the one-way deficit becomes nonzero after the critical point. Therefore, the one-way deficit characterizes the quantum phase transition in the XX model.

  6. Demonstration of Multisetting One-Way Einstein-Podolsky-Rosen Steering in Two-Qubit Systems

    Science.gov (United States)

    Xiao, Ya; Ye, Xiang-Jun; Sun, Kai; Xu, Jin-Shi; Li, Chuan-Feng; Guo, Guang-Can

    2017-04-01

    Einstein-Podolsky-Rosen (EPR) steering describes the ability of one party to remotely affect another's state through local measurements. One of the most distinguishable properties of EPR steering is its asymmetric aspect. Steering can work in one direction but fail in the opposite direction. This type of one-way steering, which is different from the symmetry concepts of entanglement and Bell nonlocality, has garnered much interest. However, an experimental demonstration of genuine one-way EPR steering in the simplest scenario, i.e., one that employs two-qubit systems, is still lacking. In this Letter, we experimentally demonstrate one-way EPR steering with multimeasurement settings for a class of two-qubit states, which are still one-way steerable even with infinite settings. The steerability is quantified by the steering radius, which represents a necessary and sufficient steering criterion. The demonstrated one-way steering in the simplest bipartite quantum system is of fundamental interest and may provide potential applications in one-way quantum information tasks.

  7. Development of a reactivity worth correction scheme for the one-dimensional transient analysis

    International Nuclear Information System (INIS)

    Cho, J. Y.; Song, J. S.; Joo, H. G.; Kim, H. Y.; Kim, K. S.; Lee, C. C.; Zee, S. Q.

    2003-11-01

    This work is to develop a reactivity worth correction scheme for the MASTER one-dimensional (1-D) calculation model. The 1-D cross section variations according to the core state in the MASTER input file, which are produced for 1-D calculation performed by the MASTER code, are incorrect in most of all the core states except for exactly the same core state where the variations are produced. Therefore this scheme performs the reactivity worth correction factor calculations before the main 1-D transient calculation, and generates correction factors for boron worth, Doppler and moderator temperature coefficients, and control rod worth, respectively. These correction factors force the one dimensional calculation to generate the same reactivity worths with the 3-dimensional calculation. This scheme is applied to the control bank withdrawal accident of Yonggwang unit 1 cycle 14, and the performance is examined by comparing the 1-D results with the 3-D results. This problem is analyzed by the RETRAN-MASTER consolidated code system. Most of all results of 1-D calculation including the transient power behavior, the peak power and time are very similar with the 3-D results. In the MASTER neutronics computing time, the 1-D calculation including the correction factor calculation requires the negligible time comparing with the 3-D case. Therefore, the reactivity worth correction scheme is concluded to be very good in that it enables the 1-D calculation to produce the very accurate results in a few computing time

  8. Detection technology research on the one-way clutch of automatic brake adjuster

    Science.gov (United States)

    Jiang, Wensong; Luo, Zai; Lu, Yi

    2013-10-01

    In this article, we provide a new testing method to evaluate the acceptable quality of the one-way clutch of automatic brake adjuster. To analysis the suitable adjusting brake moment which keeps the automatic brake adjuster out of failure, we build a mechanical model of one-way clutch according to the structure and the working principle of one-way clutch. The ranges of adjusting brake moment both clockwise and anti-clockwise can be calculated through the mechanical model of one-way clutch. Its critical moment, as well, are picked up as the ideal values of adjusting brake moment to evaluate the acceptable quality of one-way clutch of automatic brake adjuster. we calculate the ideal values of critical moment depending on the different structure of one-way clutch based on its mechanical model before the adjusting brake moment test begin. In addition, an experimental apparatus, which the uncertainty of measurement is ±0.1Nm, is specially designed to test the adjusting brake moment both clockwise and anti-clockwise. Than we can judge the acceptable quality of one-way clutch of automatic brake adjuster by comparing the test results and the ideal values instead of the EXP. In fact, the evaluation standard of adjusting brake moment applied on the project are still using the EXP provided by manufacturer currently in China, but it would be unavailable when the material of one-way clutch changed. Five kinds of automatic brake adjusters are used in the verification experiment to verify the accuracy of the test method. The experimental results show that the experimental values of adjusting brake moment both clockwise and anti-clockwise are within the ranges of theoretical results. The testing method provided by this article vividly meet the requirements of manufacturer's standard.

  9. Two schemes of perfect teleportation one-particle state by a three-particle general W state

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    In teleportation, it can be seen that the probability of success is determined by Alice's measurement and quantum channel. If the Alice's measurement is appropriate, the teleportation can be successfully realized with the maximal probability. In accordance with transformation operator, two schemes are proposed for teleportation of an unknown one-particle state via a general W state, through which the successful probability and the fidelity of both schemes reach 1. Furthermore, two optimal matches of orthogonal complete measurement bases are given for teleporting an unknown one-particle state.

  10. Error function attack of chaos synchronization based encryption schemes.

    Science.gov (United States)

    Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu

    2004-03-01

    Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor. Copyright 2004 American Institute of Physics.

  11. File-Based One-Way BISON Coupling Through VERA: User's Manual

    Energy Technology Data Exchange (ETDEWEB)

    Stimpson, Shane G. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-02-28

    Activities to incorporate fuel performance capabilities into the Virtual Environment for Reactor Applications (VERA) are receiving increasing attention [1–6]. The multiphysics emphasis is expanding as the neutronics (MPACT) and thermal-hydraulics (CTF) packages are becoming more mature. Capturing the finer details of fuel phenomena (swelling, densification, relocation, gap closure, etc.) is the natural next step in the VERA development process since these phenomena are currently not directly taken into account. While several codes could be used to accomplish this, the BISON fuel performance code [8,9] being developed by the Idaho National Laboratory (INL) is the focus of ongoing work in the Consortium for Advanced Simulation of Light Water Reactors (CASL). Built on INL’s MOOSE framework [10], BISON uses the finite element method for geometric representation and a Jacobian-free Newton-Krylov (JFNK) scheme to solve systems of partial differential equations for various fuel characteristic relationships. There are several modes of operation in BISON, but, this work uses a 2D azimuthally symmetric (R-Z) smeared-pellet model. This manual is intended to cover (1) the procedure pertaining to the standalone BISON one-way coupling from VERA and (2) the procedure to generate BISON fuel temperature tables that VERA can use.

  12. Statistical and Geometrical Way of Model Selection for a Family of Subdivision Schemes

    Institute of Scientific and Technical Information of China (English)

    Ghulam MUSTAFA

    2017-01-01

    The objective of this article is to introduce a generalized algorithm to produce the m-point n-ary approximating subdivision schemes (for any integer m,n ≥ 2).The proposed algorithm has been derived from uniform B-spline blending functions.In particular,we study statistical and geometrical/traditional methods for the model selection and assessment for selecting a subdivision curve from the proposed family of schemes to model noisy and noisy free data.Moreover,we also discuss the deviation of subdivision curves generated by proposed family of schemes from convex polygonal curve.Furthermore,visual performances of the schemes have been presented to compare numerically the Gibbs oscillations with the existing family of schemes.

  13. Shape Optimization of Impeller Blades for 15,000 HP Centrifugal Compressor Using Fluid Structural Interaction Analysis

    International Nuclear Information System (INIS)

    Kang, Hyun Su; Oh, Jeongsu; Han, Jeong Sam

    2014-01-01

    This paper discusses a one-way fluid structural interaction (FSI) analysis and shape optimization of the impeller blades for a 15,000 HP centrifugal compressor using the response surface method (RSM). Because both the aerodynamic performance and the structural safety of the impeller are affected by the shape of its blades, shape optimization is necessary using the FSI analysis, which includes a structural analysis for the induced fluid pressure and centrifugal force. The FSI analysis is performed in ANSYS Workbench: ANSYS CFX is used for the flow field and ANSYS Mechanical is used for the structural field. The response surfaces for the FSI results (efficiency, pressure ratio, maximum stress, etc.) generated based on the design of experiments (DOE) are used to find an optimal shape for the impeller blades, which provides the maximum aerodynamic performance subject to the structural safety constraints

  14. Shape Optimization of Impeller Blades for 15,000 HP Centrifugal Compressor Using Fluid Structural Interaction Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Hyun Su [Sungkyunkwan University, Suwon (Korea, Republic of); Oh, Jeongsu [Daejoo Machinery Co., Daegu (Korea, Republic of); Han, Jeong Sam [Andong National University, Andong (Korea, Republic of)

    2014-06-15

    This paper discusses a one-way fluid structural interaction (FSI) analysis and shape optimization of the impeller blades for a 15,000 HP centrifugal compressor using the response surface method (RSM). Because both the aerodynamic performance and the structural safety of the impeller are affected by the shape of its blades, shape optimization is necessary using the FSI analysis, which includes a structural analysis for the induced fluid pressure and centrifugal force. The FSI analysis is performed in ANSYS Workbench: ANSYS CFX is used for the flow field and ANSYS Mechanical is used for the structural field. The response surfaces for the FSI results (efficiency, pressure ratio, maximum stress, etc.) generated based on the design of experiments (DOE) are used to find an optimal shape for the impeller blades, which provides the maximum aerodynamic performance subject to the structural safety constraints.

  15. A hybrid scheme for absorbing edge reflections in numerical modeling of wave propagation

    KAUST Repository

    Liu, Yang; Sen, Mrinal K.

    2010-01-01

    We propose an efficient scheme to absorb reflections from the model boundaries in numerical solutions of wave equations. This scheme divides the computational domain into boundary, transition, and inner areas. The wavefields within the inner and boundary areas are computed by the wave equation and the one-way wave equation, respectively. The wavefields within the transition area are determined by a weighted combination of the wavefields computed by the wave equation and the one-way wave equation to obtain a smooth variation from the inner area to the boundary via the transition zone. The results from our finite-difference numerical modeling tests of the 2D acoustic wave equation show that the absorption enforced by this scheme gradually increases with increasing width of the transition area. We obtain equally good performance using pseudospectral and finite-element modeling with the same scheme. Our numerical experiments demonstrate that use of 10 grid points for absorbing edge reflections attains nearly perfect absorption. © 2010 Society of Exploration Geophysicists.

  16. A hybrid scheme for absorbing edge reflections in numerical modeling of wave propagation

    KAUST Repository

    Liu, Yang

    2010-03-01

    We propose an efficient scheme to absorb reflections from the model boundaries in numerical solutions of wave equations. This scheme divides the computational domain into boundary, transition, and inner areas. The wavefields within the inner and boundary areas are computed by the wave equation and the one-way wave equation, respectively. The wavefields within the transition area are determined by a weighted combination of the wavefields computed by the wave equation and the one-way wave equation to obtain a smooth variation from the inner area to the boundary via the transition zone. The results from our finite-difference numerical modeling tests of the 2D acoustic wave equation show that the absorption enforced by this scheme gradually increases with increasing width of the transition area. We obtain equally good performance using pseudospectral and finite-element modeling with the same scheme. Our numerical experiments demonstrate that use of 10 grid points for absorbing edge reflections attains nearly perfect absorption. © 2010 Society of Exploration Geophysicists.

  17. Performance Analysis of a Forecasting Relocation Model for One-Way Carsharing

    Directory of Open Access Journals (Sweden)

    Ganjar Alfian

    2017-06-01

    Full Text Available A carsharing service can be seen as a transport alternative between private and public transport that enables a group of people to share vehicles based at certain stations. The advanced carsharing service, one-way carsharing, enables customers to return the car to another station. However, one-way implementation generates an imbalanced distribution of cars in each station. Thus, this paper proposes forecasting relocation to solve car distribution imbalances for one-way carsharing services. A discrete event simulation model was developed to help evaluate the proposed model performance. A real case dataset was used to find the best simulation result. The results provide a clear insight into the impact of forecasting relocation on high system utilization and the reservation acceptance ratio compared to traditional relocation methods.

  18. Analysis of loads and fluid-structure interactions in a condensation pool

    Energy Technology Data Exchange (ETDEWEB)

    Timperi, A.; Paettikangas, T.; Niemi, J. [VTT, Technical Research Centre of Finland (Finland)

    2007-04-15

    A simplified direct contact condensation model was implemented into the Volume of Fluid model of the Fluent CFD code. Transient three-dimensional test runs for the POOLEX experiments, where steam is blown into a water pool were performed. The model was found to provide too small condensation rate for steam when compared to experiments. In addition, the calculated back and forth oscillation of the steam water interface was much smaller than in the experiments. The model was found to be numerically quite robust. The discrepancies of the simulation, such as the too small condensation rate, could be to some extent cured by making improvements into the condensation model. As an alternative estimation method of thermohydraulic loads in condensation pools, the SILA code based on potential flow theory, was taken into use. SILA solves the pressure distribution caused by oscillating bubbles in a pool, and is easier to use and more flexible than Method of Images studied earlier. SILA has been modified for pools without an inner cylinder and test simulations for the POOLEX water pool were performed. The MpCCI FSI coupling software employs an explicit coupling scheme, which results in numerical instability in the case of the POOLEX facility. In order to improve stability, ways for implementing an implicit coupling scheme with MpCCI were examined. It was found that such a scheme is difficult to achieve without access to the source codes. An implicit coupling scheme is expected to be available with MpCCI in forthcoming years. A method was developed which can be used for analysing two-way FSI problems realistically by using only one-way coupling of CFD and structural analysis codes. In the method, the mass of the fluid is accounted for in the structural motion by adding the fluid to the structural model as an acoustic medium. Validity of the method was examined with promising results mathematically by an order of magnitude analysis and by comparing numerical results with a full

  19. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    International Nuclear Information System (INIS)

    Zheng, Jinbin

    2014-01-01

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software

  20. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Jinbin, E-mail: jbzheng518@163.com [School of Mathematics and Computer Science, Long Yan University, Longyan 364012 (China)

    2014-10-06

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.

  1. Experimental demonstration of deterministic one-way quantum computing on a NMR quantum computer

    OpenAIRE

    Ju, Chenyong; Zhu, Jing; Peng, Xinhua; Chong, Bo; Zhou, Xianyi; Du, Jiangfeng

    2008-01-01

    One-way quantum computing is an important and novel approach to quantum computation. By exploiting the existing particle-particle interactions, we report the first experimental realization of the complete process of deterministic one-way quantum Deutsch-Josza algorithm in NMR, including graph state preparation, single-qubit measurements and feed-forward corrections. The findings in our experiment may shed light on the future scalable one-way quantum computation.

  2. A third-order moving mesh cell-centered scheme for one-dimensional elastic-plastic flows

    Science.gov (United States)

    Cheng, Jun-Bo; Huang, Weizhang; Jiang, Song; Tian, Baolin

    2017-11-01

    A third-order moving mesh cell-centered scheme without the remapping of physical variables is developed for the numerical solution of one-dimensional elastic-plastic flows with the Mie-Grüneisen equation of state, the Wilkins constitutive model, and the von Mises yielding criterion. The scheme combines the Lagrangian method with the MMPDE moving mesh method and adaptively moves the mesh to better resolve shock and other types of waves while preventing the mesh from crossing and tangling. It can be viewed as a direct arbitrarily Lagrangian-Eulerian method but can also be degenerated to a purely Lagrangian scheme. It treats the relative velocity of the fluid with respect to the mesh as constant in time between time steps, which allows high-order approximation of free boundaries. A time dependent scaling is used in the monitor function to avoid possible sudden movement of the mesh points due to the creation or diminishing of shock and rarefaction waves or the steepening of those waves. A two-rarefaction Riemann solver with elastic waves is employed to compute the Godunov values of the density, pressure, velocity, and deviatoric stress at cell interfaces. Numerical results are presented for three examples. The third-order convergence of the scheme and its ability to concentrate mesh points around shock and elastic rarefaction waves are demonstrated. The obtained numerical results are in good agreement with those in literature. The new scheme is also shown to be more accurate in resolving shock and rarefaction waves than an existing third-order cell-centered Lagrangian scheme.

  3. Semi-device-independent security of one-way quantum key distribution

    International Nuclear Information System (INIS)

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being ''device-independent.'' Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are noncharacterized, but the dimensionality of the quantum systems used in the protocol is assumed to be bounded. Our security proof relies on the analogies between one-way QKD, dimension witnesses, and random-access codes.

  4. One-dimensional Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterostructures for enhanced hydrogen generation

    Energy Technology Data Exchange (ETDEWEB)

    Gao, Hongqing [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Zhang, Peng, E-mail: Zhangp@zzu.edu.cn [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Hu, Junhua, E-mail: Hujh@zzu.edu.cn [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Pan, Jimin [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); Fan, Jiajie [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Shao, Guosheng [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Institute for Renewable Energy and Environmental Technologies, University of Bolton, Bolton BL35AB (United Kingdom)

    2017-01-01

    Graphical abstract: We reported one-dimensional solid-state Z-scheme photosynthetic heterojunction system with Pt nanoparticle as an electron collector and WO{sub 3} as a hole collector, leading to effective charge separation. - Highlights: • The composite nanofibers were fabricated by facile electrospinning technique. • The composite nanofibers exhibited enhanced activity for H{sub 2} evolution. • Enhanced activity is due to the formation of Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterojunction. - Abstract: One-dimensional Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterostructures were fabricated by integrating a facile electrospinning technique and subsequent annealing in air. X-ray diffraction, scanning electron microscopy, transmission electron microscopy, X-ray photoelectron spectroscopy and UV–vis diffuse reflectance spectroscopy, were used to characterize the as-fabricated samples. The results showed that the H{sub 2}-generation of the as-fabricated one-dimensional Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterostructures (S2) was greatly enhanced compared with pure TiO{sub 2} nanofibers (S0) and TiO{sub 2}/WO{sub 3} nanofibers (S1). The enhanced photocatalyst activities were mainly attributed to the solid-state Z-scheme photosynthetic heterojunction system with Pt nanoparticle as an electron collector and WO{sub 3} as a hole collector, leading to effective charge separation on these semiconductors, which were evidenced by electrochemical impedance spectroscopy (EIS) and photocurrent analysis.

  5. Modified one-way coupled map lattices as communication cryptosystems

    International Nuclear Information System (INIS)

    Zhao Mingchao; Li Kezan; Fu Xinchu

    2009-01-01

    In this paper, we modify the original communication cryptosystem based on OCML (one-way coupled map lattices), and present a modified OCML communication cryptosystem. The modified OCML communication cryptosystem is shown to have some additional advantages compared to the original one, e.g., it has a larger parameter space, and is more capable of anti-error analysis. And, we apply this modified OCML communication cryptosystem for multiplex OCML communication.

  6. Fluid structure interaction modeling of liquid sloshing phenomena in flexible tanks

    International Nuclear Information System (INIS)

    Nicolici, S.; Bilegan, R.M.

    2013-01-01

    Highlights: ► We used Ansys Workbench package to study sloshing phenomena in liquid containers. ► The interaction liquid–structure is modeled considering full and one-way coupling. ► The results obtained with the FSI models were compared against design codes. ► The results have shown that the sloshing is influenced by tank wall elasticity. -- Abstract: The present paper is concerned with the problem of modeling the fluid–structure interaction (FSI) in partially filled liquid containers. The study focuses on the sloshing phenomena and on the coupling computational fluid dynamics (CFD) analysis with the finite element stress analysis (FEA) used to predict the sloshing wave amplitude, convective mode frequency, pressure exerted on the walls and the effect of sloshing on the anchoring points forces. The interaction between fluids (water and air) and tank wall is modeled considering full and one-way coupling. Using the time history of an earthquake excitation, the results of the FSI model are compared with those obtained employing simplified mechanical models given in design codes. The coupling phenomenon was found to influence the sloshing effect, the impulsive pressure being amplified by the wall elasticity. The applied FSI methodology proves to be feasible in analyzing a 3D full coupled CFD/FEA storage tank subjected to a long time history excitation

  7. Fiber-FSO/wireless convergent systems based on dual-polarization and one optical sideband transmission schemes

    Science.gov (United States)

    Huang, Xu-Hong; Lu, Hai-Han; Li, Chung-Yi; Wang, Yun-Chieh; Chang, Jen-Chieh; Jheng, Yu-Bo; Tsai, Wen-Shing

    2018-06-01

    A bidirectional fiber-free-space optical (FSO)/wireless convergent system that uses dual-polarization and one optical sideband transmission schemes for hybrid vestigial sideband (VSB)–four-level pulse amplitude modulation (PAM4)/millimeter-wave signal transmission is proposed and demonstrated. Using a dual-polarization scheme, one optical sideband that is modulated by a 56 Gb s‑1 VSB–PAM4 signal (x-polarization) and another optical sideband that is modulated by a 10 Gbps data stream (y-polarization) are separated and polarized orthogonally. One optical sideband modulated by a 10 Gbps data stream (y-polarization) is delivered to efficaciously suppress the dispersion-induced limitation due to a span of 40 km single-mode fiber (SMF) and the distortion due to the beating among multiple sidebands. The proposed bidirectional fiber-FSO/wireless convergent system is a prominent one for providing broadband integrated services, such as the Internet, telecommunication, and 5G mobile networks.

  8. Development of seismic analysis method considered FSI effect on a neutron reflector for APWR reactor internals

    Energy Technology Data Exchange (ETDEWEB)

    Hideyuki, Morika; Tomomichi, Nakamura [Mitsubishi Heavy Industries Ltd., Takasago R and D Center, Hyogo (Japan); Toshio, Ichikawa; Kazuo, Hirota; Hiroyuki, Murakiso [Mitsubishi Heavy Industries Ltd., Kobe Shipyard and Machinery Works, Hyogo, Kobe (Japan); Minoru, Murota [Japan Atomic Power Co., Tokyo (Japan)

    2004-07-01

    A Neutron Reflector (NR) is a new structure designed for improving the structure reliability of Advanced Pressurized Water Reactors (APWR,). The NR is placed in a narrow gap between the NR and a Core Barrel (CB). In the case of a structure surrounded by liquid in a narrow gap, the added fluid mass and the damping increases compared with in the air. This effect is famous for Fluid-Structure Interaction effect (FSI effect) in the narrow gap and it depends on the vibration displacement of the structure. A new method to estimate the added fluid damping for this case has been introduced by some of the authors in 2001, which is based on a narrow passage flow theory (Morita et al., 2001). Following this theory, a vibration test was performed to assess the appropriateness of the analysis method employed to measure the response of the NR during an earthquake (Nakamura et al., 2002). In this paper, results of a model test are shown comparing the data with the calculated ones based on the new analysis method that is combined the above method with the ANSYS computer code. As a result, a new seismic analysis method using the above theory was developed. The analytical results are in good agreement with the test results. (authors)

  9. Measurement of one-way velocity of light and light-year

    Science.gov (United States)

    Chen, Shao-Guang

    For space science and astronomy the fundamentality of one-way velocity of light (OWVL) is selfevident. The measurement of OWVL (distance / interval) and the clock synchronization with light-signal transfer make a logical circulation. This means that OWVL could not be directly measured but only come indirectly from astronomical method (Romer's Io eclipse and Bradley's sidereal aberration). Furthermore, the light-year by definitional OWVL and the trigonometry distance with AU are also un-measurable. In this report two methods of clock synchronization to solve this problem were proposed: The arriving-time difference of longitudinal-transverse wave (Ts - Tp) or ordinary-extraordinary light (Te - To) is measured by single clock at one end of a dual-speed transmission-line, the signal transmission-delay (from sending-end time Tx to receiving-end time Tp or To) calculated with wave-speed ratio is: (Tp -Tx) = (Ts -Tp) / ((Vp / Vs) - 1) or: (To -Tx) = (Te - To) / ((Vo / Ve ) - 1), where (Vp / Vs) = (E / k) 1/2 is Yang's / shear elastic-modulus ratio obtained by comparing two strains at same stress, (Vo / Ve) = (ne / no) is extraordinary/ordinary light refractive-index ratio obtained by comparing two deflection-angles. Then, two clocks at transmission-line two ends can be synchronized directly to measure the one-way velocity of light and light-year, which work as one earthquakestation with single clock measures first-shake-time and the distance to epicenter. The readings Na and Nb of two counters Ca and Cb with distance L are transferred into a computer C by two leads with transmission-delay Tac and Tbc respectively. The computer progressing subtraction operation exports steady value: (Nb - Na) = f (Ta - Tb ) + f (Tac - Tbc ), where f is the frequency of light-wave always passing Ca and Cb, Ta and Tb are the count-start time of Ca and Cb respectively. From the transmission-delay possess the spatial translational and rotational invariability, the computer exports steady value

  10. Evaluating the far-field sound of a turbulent jet with one-way Navier-Stokes equations

    Science.gov (United States)

    Pickering, Ethan; Rigas, Georgios; Towne, Aaron; Colonius, Tim

    2017-11-01

    The one-way Navier-Stokes (OWNS) method has shown promising ability to predict both near field coherent structures (i.e. wave packets) and far field acoustics of turbulent jets while remaining computationally efficient through implementation of a spatial marching scheme. Considering the speed and relative accuracy of OWNS, a predictive model for various jet configurations may be conceived and applied for noise control. However, there still remain discrepancies between OWNS and large eddy simulation (LES) databases which may be linked to the previous neglect of nonlinear forcing. Therefore, to better predict wave packets and far field acoustics, this study investigates the effect of nonlinear forcing terms derived from high-fidelity LES databases. The results of the nonlinear forcings are evaluated for several azimuthal modes and frequencies, as well as compared to LES derived acoustics using spectral proper orthogonal decomposition (SPOD). This research was supported by the Department of Defense (DoD) through the Office of Naval Research (Grant No. N00014-16-1-2445) and the National Defense Science & Engineering Graduate Fellowship (NDSEG) Program.

  11. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  12. A New Pricing Scheme for Controlling Energy Storage Devices in Future Smart Grid

    OpenAIRE

    Zhu, Jingwei; Chen, Michael Z. Q.; Du, Baozhu

    2014-01-01

    Improvement of the overall efficiency of energy infrastructure is one of the main anticipated benefits of the deployment of smart grid technology. Advancement in energy storage technology and two-way communication in the electric network are indispensable components to achieve such a vision, while efficient pricing schemes and appropriate storage management are also essential. In this paper, we propose a universal pricing scheme which permits one to indirectly control the energy storage devic...

  13. How Green is your scheme? Greenhouse gas control the Australian way

    International Nuclear Information System (INIS)

    Lo, Alex Y.; Spash, Clive L.

    2012-01-01

    Australia managed to pass a national carbon pricing scheme into legislation in November 2011, which has come into effect from July 2012. The scheme includes elements of a CO 2 -equivalent tax as a short prelude to emission trading. Several fundamental problems remain unaddressed, including: the continuing rise of emissions, the scale of growth and economic activity, the promotion of emission trading, subsidies to polluters, the hidden promotion of banking and finance sectors. The new policy appears primarily targeted at job creation and business as usual. We argue that the prospects for any meaningful reduction in emission levels are extremely unlikely.

  14. One-way Ponderomotive Barrier in a Uniform Magnetic Field

    International Nuclear Information System (INIS)

    Dodin, I.Y.; Fisch, N.J.

    2005-01-01

    The possibility of an asymmetric ponderomotive barrier in a nonuniform dc magnetic field by high-frequency radiation near the cyclotron resonance for selected plasma species was contemplated in Physics of Plasmas 11 (November 2004) 5046-5064. Here we show that a similar one-way barrier, which reflects particles incident from one side while transmitting those incident from the opposite side, can be produced also in a uniform magnetic field, entirely due to inhomogeneity of high-frequency drive

  15. Open-channel effects on heavy-quarkonium spectra: a phenomenological study within a one-open-channel approximation

    International Nuclear Information System (INIS)

    Matsuda, Y.; Kato, K.; Yabusaki, N.; Hirano, M.; Nakanishi, R.; Sakai, M.

    1997-01-01

    Open-channel effects on charmonium (S- and D-waves) and bottomonium (S-wave) J P = 1 - spectra are investigated within a one-open-channel approximation. Mass shifts and decay widths of these states just above the threshold are obtained by taking into account a coupling between confined quarkonium states and decaying states of the open channel. The final-state interaction (FSI) between the decaying meson and antimeson plays a very important role in producing a reasonable magnitude of coupling; the FSI provides the open-channel poles (R 1 , R 2 ) at the appropriate positions on the complex energy plane. The result is found to be independent of the detailed form of the transition potential and the final-state interaction. (author)

  16. Collation of chewing efficiency and dentures with diverse occlusal schemes

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Peddinti

    2017-01-01

    Full Text Available Background: Rehabilitation of an edentulous patient nurtures satisfaction and this lies in the chewing ability provided by the prosthesis. Aim: To evaluate and compare the masticatory efficiencies of complete dentures with different occlusal schemes. Materials and Methods: Fourteen completely edentulous patients from the age group of 50-70 years were selected according to the inclusion criteria followed in this study. The dentures were made with three different occlusal schemes, i.e., anatomic occlusion without balancing, anatomic occlusion with balancing, and lingualized occlusion and stored in water till the date of denture insertion. Post-insertion instructions were given to the patients at the time of delivery of the dentures. Patients were recalled after seven days and then masticatory efficiency was performed. The test was performed using boiled peanuts and Sieve system. Statistical Analysis: One-way analysis of variance (ANOVA test and unpaired t-test were carried out. Results: The obtained masticatory efficiency values with anatomic occlusion without balancing, anatomic occlusion with balancing, and lingualized occlusion LO were analyzed using one-way ANOVA test and unpaired “t” test. The tests showed that lingualized scheme had highest masticatory efficiency. Conclusion: Within the scope of this study, it can be concluded that the masticatory efficiency will be generally higher in patients provided with complete dentures fabricated using the lingualized occlusal scheme.

  17. Numerical simulation of the fluid-structure interaction between air blast waves and soil structure

    Science.gov (United States)

    Umar, S.; Risby, M. S.; Albert, A. Luthfi; Norazman, M.; Ariffin, I.; Alias, Y. Muhamad

    2014-03-01

    Normally, an explosion threat on free field especially from high explosives is very dangerous due to the ground shocks generated that have high impulsive load. Nowadays, explosion threats do not only occur in the battlefield, but also in industries and urban areas. In industries such as oil and gas, explosion threats may occur on logistic transportation, maintenance, production, and distribution pipeline that are located underground to supply crude oil. Therefore, the appropriate blast resistances are a priority requirement that can be obtained through an assessment on the structural response, material strength and impact pattern of material due to ground shock. A highly impulsive load from ground shocks is a dynamic load due to its loading time which is faster than ground response time. Of late, almost all blast studies consider and analyze the ground shock in the fluid-structure interaction (FSI) because of its influence on the propagation and interaction of ground shock. Furthermore, analysis in the FSI integrates action of ground shock and reaction of ground on calculations of velocity, pressure and force. Therefore, this integration of the FSI has the capability to deliver the ground shock analysis on simulation to be closer to experimental investigation results. In this study, the FSI was implemented on AUTODYN computer code by using Euler-Godunov and the arbitrary Lagrangian-Eulerian (ALE). Euler-Godunov has the capability to deliver a structural computation on a 3D analysis, while ALE delivers an arbitrary calculation that is appropriate for a FSI analysis. In addition, ALE scheme delivers fine approach on little deformation analysis with an arbitrary motion, while the Euler-Godunov scheme delivers fine approach on a large deformation analysis. An integrated scheme based on Euler-Godunov and the arbitrary Lagrangian-Eulerian allows us to analyze the blast propagation waves and structural interaction simultaneously.

  18. Validation of a numerical FSI simulation of an aortic BMHV by in vitro PIV experiments.

    Science.gov (United States)

    Annerel, S; Claessens, T; Degroote, J; Segers, P; Vierendeels, J

    2014-08-01

    In this paper, a validation of a recently developed fluid-structure interaction (FSI) coupling algorithm to simulate numerically the dynamics of an aortic bileaflet mechanical heart valve (BMHV) is performed. This validation is done by comparing the numerical simulation results with in vitro experiments. For the in vitro experiments, the leaflet kinematics and flow fields are obtained via the particle image velocimetry (PIV) technique. Subsequently, the same case is numerically simulated by the coupling algorithm and the resulting leaflet kinematics and flow fields are obtained. Finally, the results are compared, revealing great similarity in leaflet motion and flow fields between the numerical simulation and the experimental test. Therefore, it is concluded that the developed algorithm is able to capture very accurately all the major leaflet kinematics and dynamics and can be used to study and optimize the design of BMHVs. Copyright © 2014 IPEM. Published by Elsevier Ltd. All rights reserved.

  19. Three dimensional, numerical analysis of an elasto hydrodynamic lubrication using fluid structure interaction (FSI) approach

    Science.gov (United States)

    Hanoca, P.; Ramakrishna, H. V.

    2018-03-01

    This work is related to develop a methodology to model and simulate the TEHD using the sequential application of CFD and CSD. The FSI analyses are carried out using ANSYS Workbench. In this analysis steady state, 3D Navier-Stoke equations along with energy equation are solved. Liquid properties are introduced where the viscosity and density are the function of pressure and temperature. The cavitation phenomenon is adopted in the analysis. Numerical analysis has been carried at different speeds and surfaces temperatures. During the analysis, it was found that as speed increases, hydrodynamic pressures will also increases. The pressure profile obtained from the Roelands equation is more sensitive to the temperature as compared to the Barus equation. The stress distributions specify the significant positions in the bearing structure. The developed method is capable of giving latest approaching into the physics of elasto hydrodynamic lubrication.

  20. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  1. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  2. [Extracorporeal ventriculoatrial shunt with the use of one-way ball valve].

    Science.gov (United States)

    Kubo, Shigeki; Takimoto, Hiroshi; Hosoi, Kazuki; Toyota, Shingo; Takakura, Shuji; Hayashi, Yasuhiro; Ueno, Masato; Morisako, Toshitaka; Karasawa, Jun; Ninaga, Hideo; Yoshimine, Toshiki

    2002-04-01

    We developed a simple system of an "extracorporeal" ventriculoatrial (VA) shunt using a one-way ball valve (Acty valve II, Kaneka Medix) to release the patient from postoperative constraint during the ventricular drainage. The system is constructed in such a way that the ventricular drainage tube is connected to the central venous catheter via a one-way valve. The CSF is regulated by using the valve and is diverted into the systemic circulation as in the conventional ventriculoatrial shunt. After 2 or 3 weeks of CSF diversion through the extracorporeal VA shunt, a ventriculoperitoneal shunt is placed if hydrocephalus is apparent by temporary occlusion of the system. We applied this system to 4 patients with hydrocephalus, and we found it useful and free from adverse effects. The patient was freed from physical constraint involved in conventional ventricular drainage and an effective program of early rehabilitation was able to be started.

  3. Application of foam-extend on turbulent fluid-structure interaction

    Science.gov (United States)

    Rege, K.; Hjertager, B. H.

    2017-12-01

    Turbulent flow around flexible structures is likely to induce structural vibrations which may eventually lead to fatigue failure. In order to assess the fatigue life of these structures, it is necessary to take the action of the flow on the structure into account, but also the influence of the vibrating structure on the fluid flow. This is achieved by performing fluid-structure interaction (FSI) simulations. In this work, we have investigated the capability of a FSI toolkit for the finite volume computational fluid dynamics software foam-extend to simulate turbulence-induced vibrations of a flexible structure. A large-eddy simulation (LES) turbulence model has been implemented to a basic FSI problem of a flexible wall which is placed in a confined, turbulent flow. This problem was simulated for 2.32 seconds. This short simulation required over 200 computation hours, using 20 processor cores. Thereby, it has been shown that the simulation of FSI with LES is possible, but also computationally demanding. In order to make turbulent FSI simulations with foam-extend more applicable, more sophisticated turbulence models and/or faster FSI iteration schemes should be applied.

  4. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  5. Mathematical investigation of one-way transform matrix options

    International Nuclear Information System (INIS)

    Cooper, James Arlin

    2006-01-01

    One-way transforms have been used in weapon systems processors since the mid- to late-1970s in order to help recognize insertion of correct pre-arm information while maintaining abnormal-environment safety. Level-One, Level-Two, and Level-Three transforms have been designed. The Level-One and Level-Two transforms have been implemented in weapon systems, and both of these transforms are equivalent to matrix multiplication applied to the inserted information. The Level-Two transform, utilizing a 6 x 6 matrix, provided the basis for the ''System 2'' interface definition for Unique-Signal digital communication between aircraft and attached weapons. The investigation described in this report was carried out to find out if there were other size matrices that would be equivalent to the 6 x 6 Level-Two matrix. One reason for the investigation was to find out whether or not other dimensions were possible, and if so, to derive implementation options. Another important reason was to more fully explore the potential for inadvertent inversion. The results were that additional implementation methods were discovered, but no inversion weaknesses were revealed

  6. Observation of one-way Einstein-Podolsky-Rosen steering

    Science.gov (United States)

    Händchen, Vitus; Eberle, Tobias; Steinlechner, Sebastian; Samblowski, Aiko; Franz, Torsten; Werner, Reinhard F.; Schnabel, Roman

    2012-09-01

    The distinctive non-classical features of quantum physics were first discussed in the seminal paper by A. Einstein, B. Podolsky and N. Rosen (EPR) in 1935. In his immediate response, E. Schrödinger introduced the notion of entanglement, now seen as the essential resource in quantum information as well as in quantum metrology. Furthermore, he showed that at the core of the EPR argument is a phenomenon that he called steering. In contrast to entanglement and violations of Bell's inequalities, steering implies a direction between the parties involved. Recent theoretical works have precisely defined this property, but the question arose as to whether there are bipartite states showing steering only in one direction. Here, we present an experimental realization of two entangled Gaussian modes of light that in fact shows the steering effect in one direction but not in the other. The generated one-way steering gives a new insight into quantum physics and may open a new field of applications in quantum information.

  7. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  8. Instability of the time splitting scheme for the one-dimensional and relativistic Vlasov-Maxwell system

    CERN Document Server

    Huot, F; Bertrand, P; Sonnendrücker, E; Coulaud, O

    2003-01-01

    The Time Splitting Scheme (TSS) has been examined within the context of the one-dimensional (1D) relativistic Vlasov-Maxwell model. In the strongly relativistic regime of the laser-plasma interaction, the TSS cannot be applied to solve the Vlasov equation. We propose a new semi-Lagrangian scheme based on a full 2D advection and study its advantages over the classical Splitting procedure. Details of the underlying integration of the Vlasov equation appear to be important in achieving accurate plasma simulations. Examples are given which are related to the relativistic modulational instability and the self-induced transparency of an ultra-intense electromagnetic pulse in the relativistic regime.

  9. One Way to Holland’

    DEFF Research Database (Denmark)

    Marselis, Randi; Schütze, Laura Maria

    2013-01-01

    museums, but is also relevant to ongoing collection practices. An important theme in relation to source communities is ownership and repatriation of cultural objects. Furthermore, working with source communities implies a two-way information process through which groups are given access to memory...

  10. Experimental realization of a quantum game on a one-way quantum computer

    International Nuclear Information System (INIS)

    Prevedel, Robert; Stefanov, Andre; Walther, Philip; Zeilinger, Anton

    2007-01-01

    We report the first demonstration of a quantum game on an all-optical one-way quantum computer. Following a recent theoretical proposal we implement a quantum version of Prisoner's Dilemma, where the quantum circuit is realized by a four-qubit box-cluster configuration and the player's local strategies by measurements performed on the physical qubits of the cluster. This demonstration underlines the strength and versatility of the one-way model and we expect that this will trigger further interest in designing quantum protocols and algorithms to be tested in state-of-the-art cluster resources

  11. Meal box schemes a convenient way to avoid convenience food? Uses and understandings of meal box schemes among Danish consumers.

    Science.gov (United States)

    Hertz, Frej Daniel; Halkier, Bente

    2017-07-01

    The term convenience food is subject to diversification, lack of clarity and moral ambiguity. In this paper we address these issues and critically discuss convenience food by using empirical findings from a Danish study that deals with practitioners' uses of meal box schemes. The methodological design consists of thirteen individual interviews, four focus groups and some observations of cooking practices. We combine the empirical findings with a particular definition of convenience food by Brunner et al. (2010) and selected practice theoretical concepts. This particular combination enables us to categorize meal box schemes as a new form of convenience food called convenient food. In addition, results suggest that meal box schemes reduce leftovers from dinner. Meal boxes also influence dinner related activities such as planning ahead in time and grocery shopping, which require less physical and mental effort. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. True amplitude wave equation migration arising from true amplitude one-way wave equations

    Science.gov (United States)

    Zhang, Yu; Zhang, Guanquan; Bleistein, Norman

    2003-10-01

    One-way wave operators are powerful tools for use in forward modelling and inversion. Their implementation, however, involves introduction of the square root of an operator as a pseudo-differential operator. Furthermore, a simple factoring of the wave operator produces one-way wave equations that yield the same travel times as the full wave equation, but do not yield accurate amplitudes except for homogeneous media and for almost all points in heterogeneous media. Here, we present augmented one-way wave equations. We show that these equations yield solutions for which the leading order asymptotic amplitude as well as the travel time satisfy the same differential equations as the corresponding functions for the full wave equation. Exact representations of the square-root operator appearing in these differential equations are elusive, except in cases in which the heterogeneity of the medium is independent of the transverse spatial variables. Here, we address the fully heterogeneous case. Singling out depth as the preferred direction of propagation, we introduce a representation of the square-root operator as an integral in which a rational function of the transverse Laplacian appears in the integrand. This allows us to carry out explicit asymptotic analysis of the resulting one-way wave equations. To do this, we introduce an auxiliary function that satisfies a lower dimensional wave equation in transverse spatial variables only. We prove that ray theory for these one-way wave equations leads to one-way eikonal equations and the correct leading order transport equation for the full wave equation. We then introduce appropriate boundary conditions at z = 0 to generate waves at depth whose quotient leads to a reflector map and an estimate of the ray theoretical reflection coefficient on the reflector. Thus, these true amplitude one-way wave equations lead to a 'true amplitude wave equation migration' (WEM) method. In fact, we prove that applying the WEM imaging condition

  13. On the experimental determination of the one-way speed of light

    International Nuclear Information System (INIS)

    Perez, Israel

    2011-01-01

    In this paper the question of the isotropy of the one-way speed of light is addressed from an experimental perspective. In particular, we analyse two experimental methods commonly used in its determination. The analysis is aimed at clarifying the view that the one-way speed of light cannot be determined by techniques in which physical entities close paths. The procedure employed here will provide epistemological tools so that physicists understand that a direct measurement of the speed not only of light but of any physical entity is by no means trivial. Our results shed light on the physics behind the experiments which may be of interest for both physicists with an elemental knowledge in special relativity and philosophers of science.

  14. On the experimental determination of the one-way speed of light

    Energy Technology Data Exchange (ETDEWEB)

    Perez, Israel, E-mail: cooguion@yahoo.com, E-mail: iperez@cicese.mx [Department of Applied Physics, Optics Division, CICESE, Carretera Ensena da-Tijuana 3918, Zona Playitas, CP 22860, Ensenada, Baja California (Mexico)

    2011-07-15

    In this paper the question of the isotropy of the one-way speed of light is addressed from an experimental perspective. In particular, we analyse two experimental methods commonly used in its determination. The analysis is aimed at clarifying the view that the one-way speed of light cannot be determined by techniques in which physical entities close paths. The procedure employed here will provide epistemological tools so that physicists understand that a direct measurement of the speed not only of light but of any physical entity is by no means trivial. Our results shed light on the physics behind the experiments which may be of interest for both physicists with an elemental knowledge in special relativity and philosophers of science.

  15. One-way optical transmission in silicon photonic crystal heterojunction with circular and square scatterers

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Dan, E-mail: liudanhu725@126.com [School of Physics and Mechanical & Electrical Engineering, Hubei University of Education, Wuhan, 430205 (China); Hu, Sen [School of Physics and Mechanical & Electrical Engineering, Hubei University of Education, Wuhan, 430205 (China); Gao, Yihua [Wuhan National Laboratory for Optoelectronics (WNLO), School of Physics, Huazhong University of Science and Technology (HUST), Wuhan, 430074 (China)

    2017-07-12

    A 2D orthogonal square-lattice photonic crystal (PC) heterojunction consisting of circular and square air holes in silicon is presented. Band structures are calculated using the plane wave expansion method, and the transmission properties are investigated by the finite-different time-domain simulations. Thanks to the higher diffraction orders excited when the circular and square holes are interlaced along the interface, one-way transmission phenomena can exist within wide frequency regions. The higher order diffraction is further enhanced through two different interface optimization designs proposed by modifying the PC structure of the hetero-interface. An orthogonal PC heterojunction for wide-band and efficient one-way transmission is constructed, and the maximum transmissivity is up to 78%. - Highlights: • Photonic crystal heterojunction with circular and square scatterers is first studied. • One-way transmission efficiency is closely related to the hetero-interface. • Wide-band and efficient one-way transmission is realized.

  16. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  17. Study of the one-way speed of light anisotropy with particle beams

    Energy Technology Data Exchange (ETDEWEB)

    Wojtsekhowski, Bogdan B. [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States)

    2017-04-01

    Concepts of high precision studies of the one-way speed of light anisotropy are discussed. The high energy particle beam allows measurement of a one-way speed of light anisotropy (SOLA) via analysis of the beam momentum variation with sidereal phase without the use of synchronized clocks. High precision beam position monitors could provide accurate monitoring of the beam orbit and determination of the particle beam momentum with relative accuracy on the level of 10^-10, which corresponds to a limit on SOLA of 10^-18 with existing storage rings. A few additional versions of the experiment are also presented.

  18. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  19. Improvement of two-way continuous variable quantum cryptography by using additional noise

    International Nuclear Information System (INIS)

    Wang Minjie; Pan Wei

    2010-01-01

    The performance of quantum key distribution such as one-way continuous variable protocols, can be increased by adding some noise on the reference side of error correction in the error-correction phase. For this reason, we here study this possibility in the case of two-way continuous variable system. Finally, the numerical results show that the using of additional noise gives two-way schemes better security performance in terms of secret key rates and resistance to channel excess noise.

  20. Privacy preserving cloud computation using Domingo-Ferrer scheme

    Directory of Open Access Journals (Sweden)

    Abdulatif Alabdulatif

    2016-01-01

    Full Text Available Homomorphic encryption system (HES schemes are anticipated to play a significant role in cloud-based applications. Moving to cloud-based storage and analytic services securely are two of the most important advantages of HES. Several HES schemes have been recently proposed. However, the majority of them either have limited capabilities or are impractical in real-world applications. Various HES schemes provide the ability to perform computations for statistical analysis (e.g. average, mean and variance on encrypted data. Domingo-Ferrer is one scheme that has privacy homomorphism properties to perform the basic mathematical operations (addition, subtraction and multiplication in a convenient and secure way. However, it works only in the positive numbers’ range which is considered as a limitation because several applications require both positive and negative ranges in which to work, especially those that have to implement analytical services in cloud computing. In this paper, we extend Domingo-Ferrer’s scheme to be able to perform arithmetic operations for both positive and negative numbers. We also propose using a lightweight data aggregation function to compute both maximum and minimum values of the aggregated data that works for both positive and negative numbers.

  1. Non-reciprocity and topology in optics: one-way road for light via surface magnon polariton.

    Science.gov (United States)

    Ochiai, Tetsuyuki

    2015-02-01

    We show how non-reciprocity and topology are used to construct an optical one-way waveguide in the Voigt geometry. First, we present a traditional approach of the one-way waveguide of light using surface polaritons under a static magnetic field. Second, we explain a recent discovery of a topological approach using photonic crystals with the magneto-optical coupling. Third, we present a combination of the two approaches, toward a broadband one-way waveguide in the microwave range.

  2. Non-reciprocity and topology in optics: one-way road for light via surface magnon polariton

    Science.gov (United States)

    Ochiai, Tetsuyuki

    2015-01-01

    We show how non-reciprocity and topology are used to construct an optical one-way waveguide in the Voigt geometry. First, we present a traditional approach of the one-way waveguide of light using surface polaritons under a static magnetic field. Second, we explain a recent discovery of a topological approach using photonic crystals with the magneto-optical coupling. Third, we present a combination of the two approaches, toward a broadband one-way waveguide in the microwave range. PMID:27877739

  3. CFD and FEM modeling of PPOOLEX experiments

    Energy Technology Data Exchange (ETDEWEB)

    Paettikangas, T.; Niemi, J.; Timperi, A. (VTT Technical Research Centre of Finland (Finland))

    2011-01-15

    Large-break LOCA experiment performed with the PPOOLEX experimental facility is analysed with CFD calculations. Simulation of the first 100 seconds of the experiment is performed by using the Euler-Euler two-phase model of FLUENT 6.3. In wall condensation, the condensing water forms a film layer on the wall surface, which is modelled by mass transfer from the gas phase to the liquid water phase in the near-wall grid cell. The direct-contact condensation in the wetwell is modelled with simple correlations. The wall condensation and direct-contact condensation models are implemented with user-defined functions in FLUENT. Fluid-Structure Interaction (FSI) calculations of the PPOOLEX experiments and of a realistic BWR containment are also presented. Two-way coupled FSI calculations of the experiments have been numerically unstable with explicit coupling. A linear perturbation method is therefore used for preventing the numerical instability. The method is first validated against numerical data and against the PPOOLEX experiments. Preliminary FSI calculations are then performed for a realistic BWR containment by modeling a sector of the containment and one blowdown pipe. For the BWR containment, one- and two-way coupled calculations as well as calculations with LPM are carried out. (Author)

  4. A Dynamic Reallocation Based Window Access Scheme for Enhancing QoS of Vehicular Ad-hoc Networks (VANETs

    Directory of Open Access Journals (Sweden)

    Md. Amirul Islam

    2018-01-01

    Full Text Available This article proposes a new MAC scheme for Vehicle-to-Infrastructure (V2I communications that dynamically reallocates unused TDMA slots. By maintaining a balanced waiting time, the proposed TDMA based scheduling scheme allocates TDMA slots in a rational way to minimize merging and one-hop neighboring collision. The proposed scheme ensures dynamic reallocation of unused slots by using “time slot reassignment” mechanism. The scheme has been simulated in VEINS framework of OMNET++ network simulator and its performance has been compared with other conventional protocols. Experimental results show that our scheme performs better than existing schemes in terms of successfully transmitted data packets.

  5. S2 synthetic acceleration scheme for the one-dimensional S/sub n/ equations

    International Nuclear Information System (INIS)

    Lorence, L.J. Jr.; Larsen, E.W.; Morel, J.E.

    1986-01-01

    The authors have developed an S 2 synthetic acceleration method for the one-dimensional S/sub n/ equations with linear-discontinuous (LD) spatial differencing, and implemented it in a new version of the ONETRAN code. As in the diffusion-synthetic acceleration (DSA) of Morel, both the zeroth and first moments of the scattering source are accelerated. This is done by using the S 2 equations with Gauss quadrature rather than the diffusion equation as the low-order operator in the synthetic acceleration scheme

  6. Numerical schemes for one-point closure turbulence models

    International Nuclear Information System (INIS)

    Larcher, Aurelien

    2010-01-01

    First-order Reynolds Averaged Navier-Stokes (RANS) turbulence models are studied in this thesis. These latter consist of the Navier-Stokes equations, supplemented with a system of balance equations describing the evolution of characteristic scalar quantities called 'turbulent scales'. In so doing, the contribution of the turbulent agitation to the momentum can be determined by adding a diffusive coefficient (called 'turbulent viscosity') in the Navier-Stokes equations, such that it is defined as a function of the turbulent scales. The numerical analysis problems, which are studied in this dissertation, are treated in the frame of a fractional step algorithm, consisting of an approximation on regular meshes of the Navier-Stokes equations by the nonconforming Crouzeix-Raviart finite elements, and a set of scalar convection-diffusion balance equations discretized by the standard finite volume method. A monotone numerical scheme based on the standard finite volume method is proposed so as to ensure that the turbulent scales, like the turbulent kinetic energy (k) and its dissipation rate (ε), remain positive in the case of the standard k - ε model, as well as the k - ε RNG and the extended k - ε - ν 2 models. The convergence of the proposed numerical scheme is then studied on a system composed of the incompressible Stokes equations and a steady convection-diffusion equation, which are both coupled by the viscosities and the turbulent production term. This reduced model allows to deal with the main difficulty encountered in the analysis of such problems: the definition of the turbulent production term leads to consider a class of convection-diffusion problems with an irregular right-hand side belonging to L 1 . Finally, to step towards the unsteady problem, the convergence of the finite volume scheme for a model convection-diffusion equation with L 1 data is proved. The a priori estimates on the solution and on its time derivative are obtained in discrete norms, for

  7. A perturbative study of two four-quark operators in finite volume renormalization schemes

    CERN Document Server

    Palombi, Filippo; Sint, S

    2006-01-01

    Starting from the QCD Schroedinger functional (SF), we define a family of renormalization schemes for two four-quark operators, which are, in the chiral limit, protected against mixing with other operators. With the appropriate flavour assignments these operators can be interpreted as part of either the $\\Delta F=1$ or $\\Delta F=2$ effective weak Hamiltonians. In view of lattice QCD with Wilson-type quarks, we focus on the parity odd components of the operators, since these are multiplicatively renormalized both on the lattice and in continuum schemes. We consider 9 different SF schemes and relate them to commonly used continuum schemes at one-loop order of perturbation theory. In this way the two-loop anomalous dimensions in the SF schemes can be inferred. As a by-product of our calculation we also obtain the one-loop cutoff effects in the step-scaling functions of the respective renormalization constants, for both O(a) improved and unimproved Wilson quarks. Our results will be needed in a separate study of ...

  8. Quantum noise in laser-interferometer gravitational-wave detectors with a heterodyne readout scheme

    International Nuclear Information System (INIS)

    Buonanno, Alessandra; Chen Yanbei; Mavalvala, Nergis

    2003-01-01

    We analyze and discuss the quantum noise in signal-recycled laser interferometer gravitational-wave detectors, such as Advanced LIGO, using a heterodyne readout scheme and taking into account the optomechanical dynamics. Contrary to homodyne detection, a heterodyne readout scheme can simultaneously measure more than one quadrature of the output field, providing an additional way of optimizing the interferometer sensitivity, but at the price of additional noise. Our analysis provides the framework needed to evaluate whether a homodyne or heterodyne readout scheme is more optimal for second generation interferometers from an astrophysical point of view. As a more theoretical outcome of our analysis, we show that as a consequence of the Heisenberg uncertainty principle the heterodyne scheme cannot convert conventional interferometers into (broadband) quantum non-demolition interferometers

  9. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  10. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  11. Delay or anticipatory synchronization in one-way coupled systems ...

    Indian Academy of Sciences (India)

    1Department of Physics, Indian Institute of Science Education and Research, Pune 411 ... Synchronization; variable time delay; time delay systems; secure communication. .... scheme can be defined as y(t − τ2) = x(t − τ1) or y(t) = x(t − τ1 + τ2).

  12. A Secure Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2014-01-01

    Full Text Available Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior.

  13. Performance Comparison of Reservation Based and Instant Access One-Way Car Sharing Service through Discrete Event Simulation

    Directory of Open Access Journals (Sweden)

    Ganjar Alfian

    2015-09-01

    Full Text Available A car sharing service has been highlighted as a new urban transport alternative for an environmentally friendly economy. As the demand for the service from customers increases, car sharing operators need to introduce a new service such as a one-way option that will allow customers to return the car to different stations. Due to the complexity of the one-way system, it needs to be managed and optimized for real cases. This paper focuses on developing a simulation model in order to help operators evaluate the performance of the one-way service. In addition, this research demonstrates a strategy for an open one-way service that can increase revenue and customer satisfaction. A real case dataset is used for investigation to find the best result from the simulation. The result showed that the total number of cars, number of one-way reservations and station size have an impact on one-way performance. Thus, company profit and customer satisfaction can be maximized by optimizing these factors.

  14. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  15. A novel image encryption scheme based on the ergodicity of baker map

    Science.gov (United States)

    Ye, Ruisong; Chen, Yonghong

    2012-01-01

    Thanks to the exceptionally good properties in chaotic systems, such as sensitivity to initial conditions and control parameters, pseudo-randomness and ergodicity, chaos-based image encryption algorithms have been widely studied and developed in recent years. A novel digital image encryption scheme based on the chaotic ergodicity of Baker map is proposed in this paper. Different from traditional encryption schemes based on Baker map, we permute the pixel positions by their corresponding order numbers deriving from the approximating points in one chaotic orbit. To enhance the resistance to statistical and differential attacks, a diffusion process is suggested as well in the proposed scheme. The proposed scheme enlarges the key space significantly to resist brute-force attack. Additionally, the distribution of gray values in the cipher-image has a random-like behavior to resist statistical analysis. The proposed scheme is robust against cropping, tampering and noising attacks as well. It therefore suggests a high secure and efficient way for real-time image encryption and transmission in practice.

  16. Two-way against one-way nesting for climate downscaling in Europe and the Mediterranean region using LMDZ4

    Science.gov (United States)

    Li, Shan; Li, Laurent; Le Treut, Hervé

    2016-04-01

    In the 21st century, the estimated surface temperature warming projected by General Circulation Models (GCMs) is between 0.3 and 4.8 °C, depending on the scenario considered. GCMs exhibit a good representation of climate on a global scale, but they are not able to reproduce regional climate processes with the same level of accuracy. Society and policymakers need model projections to define climate change adaptation and mitigation policies on a global, regional and local scale. Climate downscaling is mostly conducted with a regional model nested into the outputs of a global model. This one-way nesting approach is generally used in the climate community without feedbacks from Regional Climate Models (RCMs) to GCMs. This lack of interaction between the two models may affect regional modes of variability, in particular those with a boundary conflict. The objective of this study is to evaluate a two-way nesting configuration that makes an interactive coupling between the RCM and the GCM, an approach against the traditional configuration of one-way nesting system. An additional aim of this work is to examine if the two-way nesting system can improve the RCM performance. The atmospheric component of the IPSL integrated climate model (LMDZ) is configured at both regional (LMDZ-regional) and global (LMDZ-global) scales. The two models have the same configuration for the dynamical framework and the physical forcings. The climatology values of sea surface temperature (SST) are prescribed for the two models. The stretched-grid of LMDZ-global is applied to a region defined by Europe, the Mediterranean, North Africa and Western North Atlantic. To ensure a good statistical significance of results, all simulations last at least 80 years. The nesting process of models is performed by a relaxation procedure of a time scale of 90 minutes. In the case of two-way nesting, the exchange between the two models is every two hours. The relaxation procedure induces a boundary conflict

  17. Behavior of one-way reinforced concrete slabs subjected to fire

    Directory of Open Access Journals (Sweden)

    Said M. Allam

    2013-12-01

    Full Text Available A finite difference analysis was performed to investigate the behavior of one-way reinforced concrete slabs exposed to fire. The objective of the study was to investigate the fire resistance and the fire risk after extinguishing the fire. Firstly, the fire resistance was obtained using the ISO834 standard fire without cooling phase. Secondly, the ISO834 parametric fire with cooling phase was applied to study the effect of cooling time. Accordingly, the critical time for cooling was identified and the corresponding failure time was calculated. Moreover, the maximum risk time which is the time between the fire extinguishing and the collapse of slab was obtained. Sixteen one-way reinforced concrete slabs were considered to study the effect of important parameters namely: the concrete cover thickness; the plaster; and the live load ratio. Equations for heat transfer through the slab thickness were used in the fire resistance calculations. Studying the cooling time revealed that the slabs are still prone to collapse although they were cooled before their fire resistance. Moreover, increasing the concrete cover thickness and the presence of plaster led to an increase in the maximum risk time. However, the variation in the live load ratio has almost no effect on such time.

  18. Analyses of resource reservation schemes for optical burst switching networks

    Science.gov (United States)

    Solanska, Michaela; Scholtz, Lubomir; Ladanyi, Libor; Mullerova, Jarmila

    2017-12-01

    With growing demands of Internet Protocol services for transmission capacity and speed, the Optical Burst Switching presents the solution for future high-speed optical networks. Optical Burst Switching is a technology for transmitting large amounts of data bursts through a transparent optical switching network. To successfully transmit bursts over OBS network and reach the destination node, resource reservation schemes have to be implemented to allocate resources and configure optical switches for that burst at each node. The one-way resource reservation schemes and the performance evaluation of reservation schemes are presented. The OBS network model is performed using OMNeT++ simulation environment. During the reservation of network resources, the optical cross-connect based on semiconductor optical amplifier is used as the core node. Optical switches based on semiconductor optical amplifiers are a promising technology for high-speed optical communication networks.

  19. Time-dependent internal density functional theory formalism and Kohn-Sham scheme for self-bound systems

    International Nuclear Information System (INIS)

    Messud, Jeremie

    2009-01-01

    The stationary internal density functional theory (DFT) formalism and Kohn-Sham scheme are generalized to the time-dependent case. It is proven that, in the time-dependent case, the internal properties of a self-bound system (such as an atomic nuclei or a helium droplet) are all defined by the internal one-body density and the initial state. A time-dependent internal Kohn-Sham scheme is set up as a practical way to compute the internal density. The main difference from the traditional DFT formalism and Kohn-Sham scheme is the inclusion of the center-of-mass correlations in the functional.

  20. Numerical simulations with a FSI-calibrated actuator disk model of wind turbines operating in stratified ABLs

    Science.gov (United States)

    Gohari, S. M. Iman; Sarkar, Sutanu; Korobenko, Artem; Bazilevs, Yuri

    2017-11-01

    Numerical simulations of wind turbines operating under different regimes of stability are performed using LES. A reduced model, based on the generalized actuator disk model (ADM), is implemented to represent the wind turbines within the ABL. Data from the fluid-solid interaction (FSI) simulations of wind turbines have been used to calibrate and validate the reduced model. The computational cost of this method to include wind turbines is affordable and incurs an overhead as low as 1.45%. Using this reduced model, we study the coupling of unsteady turbulent flow with the wind turbine under different ABL conditions: (i) A neutral ABL with zero heat-flux and inversion layer at 350m, in which the incoming wind has the maximum mean shear between the heights of upper-tip and lower-tip; (2) A shallow ABL with surface cooling rate of -1 K/hr wherein the low level jet occurs at the wind turbine hub height. We will discuss how the differences in the unsteady flow between the two ABL regimes impact the wind turbine performance.

  1. An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication

    International Nuclear Information System (INIS)

    Wen-Jie, Liu; Han-Wu, Chen; Zhi-Qiang, Li; Zhi-Hao, Liu; Wen-Bo, Hu; Ting-Huai, Ma

    2009-01-01

    A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer. (general)

  2. Modeling of digestive processes in the stomach as a Fluid-Structure Interaction (FSI) phenomenon

    Science.gov (United States)

    Acharya, Shashank; Kou, Wenjun; Kahrilas, Peter J.; Pandolfino, John E.; Patankar, Neelesh A.

    2017-11-01

    The process of digestion in the gastro-intestinal (GI) tract is a complex mechanical and chemical process. Digestion in the stomach involves substantial mixing and breakup of food into smaller particles by muscular activity. In this work, we have developed a fully resolved model of the stomach (along with the esophagus) and its various muscle groups that deform the wall to agitate the contents inside. We use the Immersed Boundary finite-element method to model this FSI problem. From the resulting simulations, the mixing intensity is analyzed as a function of muscle deformation. As muscle deformation is controlled by changing the intensity of the neural signal, the material properties of the stomach wall will have a significant effect on the resultant kinematics. Thus, the model is then used to identify the source of common GI tract motility pathologies by replicating irregular motions as a consequence of varying the mechanical properties of the wall and the related activation signal patterns. This approach gives us an in-silico framework that can be used to study the effect of tissue properties & muscle activity on the mechanical response of the stomach wall. This work is supported by NIH Grant 5R01DK079902-09.

  3. Efficient Atomic One-Qubit Phase Gate Realized by a Cavity QED and Identical Atoms System

    International Nuclear Information System (INIS)

    He Yong; Jiang Nianquan

    2010-01-01

    We present a scheme to implement a one-qubit phase gate with a two-level atom crossing an optical cavity in which some identical atoms are trapped. One can conveniently acquire an arbitrary phase shift of the gate by properly choosing the number of atoms trapped in the cavity and the velocity of the atom crossing the cavity. The present scheme provides a very simple and efficient way for implementing one-qubit phase gate. (general)

  4. A stable penalty method for the compressible Navier-Stokes equations: II: One-dimensional domain decomposition schemes

    DEFF Research Database (Denmark)

    Hesthaven, Jan

    1997-01-01

    This paper presents asymptotically stable schemes for patching of nonoverlapping subdomains when approximating the compressible Navier-Stokes equations given on conservation form. The scheme is a natural extension of a previously proposed scheme for enforcing open boundary conditions and as a res......This paper presents asymptotically stable schemes for patching of nonoverlapping subdomains when approximating the compressible Navier-Stokes equations given on conservation form. The scheme is a natural extension of a previously proposed scheme for enforcing open boundary conditions...... and as a result the patching of subdomains is local in space. The scheme is studied in detail for Burgers's equation and developed for the compressible Navier-Stokes equations in general curvilinear coordinates. The versatility of the proposed scheme for the compressible Navier-Stokes equations is illustrated...

  5. A Truncation Scheme for the BBGKY2 Equation

    Directory of Open Access Journals (Sweden)

    Gregor Chliamovitch

    2015-10-01

    Full Text Available In recent years, the maximum entropy principle has been applied to a wide range of different fields, often successfully. While these works are usually focussed on cross-disciplinary applications, the point of this letter is instead to reconsider a fundamental point of kinetic theory. Namely, we shall re-examine the Stosszahlansatz leading to the irreversible Boltzmann equation at the light of the MaxEnt principle. We assert that this way of thinking allows to move one step further than the factorization hypothesis and provides a coherent—though implicit—closure scheme for the two-particle distribution function. Such higher-order dependences are believed to open the way to a deeper understanding of fluctuating phenomena.

  6. One Way Forward to Beat the Newtonian Habit with a Complexity Perspective on Organisational Change

    Directory of Open Access Journals (Sweden)

    Josie McLean

    2013-10-01

    Full Text Available We face a global crisis of un-sustainability—we need to change trajectory, but have so far displayed a collective inability to do so. This article suggests that one reason for this is our entrenched approach to change, which has inappropriately applied mechanistic Newtonian assumptions to “living” systems. Applying what has been learned about the behaviour of complex adaptive systems, we develop a pragmatic model for students of sustainability, who want to facilitate profound organizational and community change towards sustainability on the ground. Our model, “one way forward”, does not purport to be the only way but one possibility, grounded in a different understanding of the nature and dynamic of change as seen through the lens of complexity. In this way, it challenges more conventional change management practices. One way forward is a model facilitating evolutionary change in a social ecology—one possible expression of a “culture of community self-design” as expressed by Banathy. Its theoretical foundations and its practical application (it is designed for practice both have their source in a systemic view and in the principles that reflect the paradigm of complexity. Four central components of this new model—envisioning, core messages (values, indicators of progress, and experimentation—are explored in more detail.

  7. Semi-device-independent security of one-way quantum key distribution

    OpenAIRE

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being 'device-independent'. Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are non-characterized, but t...

  8. Constructing a one-way hash function based on the unified chaotic system

    International Nuclear Information System (INIS)

    Long Min; Peng Fei; Chen Guanrong

    2008-01-01

    A new one-way hash function based on the unified chaotic system is constructed. With different values of a key parameter, the unified chaotic system represents different chaotic systems, based on which the one-way hash function algorithm is constructed with three round operations and an initial vector on an input message. In each round operation, the parameters are processed by three different chaotic systems generated from the unified chaotic system. Feed-forwards are used at the end of each round operation and at the end of each element of the message processing. Meanwhile, in each round operation, parameter-exchanging operations are implemented. Then, the hash value of length 160 bits is obtained from the last six parameters. Simulation and analysis both demonstrate that the algorithm has great flexibility, satisfactory hash performance, weak collision property, and high security. (general)

  9. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  10. Plasma simulation with the Differential Algebraic Cubic Interpolated Propagation scheme

    Energy Technology Data Exchange (ETDEWEB)

    Utsumi, Takayuki [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1998-03-01

    A computer code based on the Differential Algebraic Cubic Interpolated Propagation scheme has been developed for the numerical solution of the Boltzmann equation for a one-dimensional plasma with immobile ions. The scheme advects the distribution function and its first derivatives in the phase space for one time step by using a numerical integration method for ordinary differential equations, and reconstructs the profile in phase space by using a cubic polynomial within a grid cell. The method gives stable and accurate results, and is efficient. It is successfully applied to a number of equations; the Vlasov equation, the Boltzmann equation with the Fokker-Planck or the Bhatnagar-Gross-Krook (BGK) collision term and the relativistic Vlasov equation. The method can be generalized in a straightforward way to treat cases such as problems with nonperiodic boundary conditions and higher dimensional problems. (author)

  11. Estimation of the common cause failure probabilities on the component group with mixed testing scheme

    International Nuclear Information System (INIS)

    Hwang, Meejeong; Kang, Dae Il

    2011-01-01

    Highlights: ► This paper presents a method to estimate the common cause failure probabilities on the common cause component group with mixed testing schemes. ► The CCF probabilities are dependent on the testing schemes such as staggered testing or non-staggered testing. ► There are many CCCGs with specific mixed testing schemes in real plant operation. ► Therefore, a general formula which is applicable to both alternate periodic testing scheme and train level mixed testing scheme was derived. - Abstract: This paper presents a method to estimate the common cause failure (CCF) probabilities on the common cause component group (CCCG) with mixed testing schemes such as the train level mixed testing scheme or the alternate periodic testing scheme. In the train level mixed testing scheme, the components are tested in a non-staggered way within the same train, but the components are tested in a staggered way between the trains. The alternate periodic testing scheme indicates that all components in the same CCCG are tested in a non-staggered way during the planned maintenance period, but they are tested in a staggered way during normal plant operation. Since the CCF probabilities are dependent on the testing schemes such as staggered testing or non-staggered testing, CCF estimators have two kinds of formulas in accordance with the testing schemes. Thus, there are general formulas to estimate the CCF probability on the staggered testing scheme and non-staggered testing scheme. However, in real plant operation, there are many CCCGs with specific mixed testing schemes. Recently, Barros () and Kang () proposed a CCF factor estimation method to reflect the alternate periodic testing scheme and the train level mixed testing scheme. In this paper, a general formula which is applicable to both the alternate periodic testing scheme and the train level mixed testing scheme was derived.

  12. SCHEME ANALYSIS TREE DIMENSIONS AND TOLERANCES PROCESSING

    Directory of Open Access Journals (Sweden)

    Constanta RADULESCU

    2011-07-01

    Full Text Available This paper presents one of the steps that help us to determine the optimal tolerances depending on thetechnological capability of processing equipment. To determine the tolerances in this way is necessary to takethe study and to represent schematically the operations are used in technological process of making a piece.Also in this phase will make the tree diagram of the dimensions and machining tolerances, dimensions andtolerances shown that the design execution. Determination processes, and operations of the dimensions andtolerances tree scheme will make for a machined piece is both indoor and outdoor.

  13. Student Teachers' Ways of Thinking and Ways of Understanding Digestion and the Digestive System in Biology

    Science.gov (United States)

    Çimer, Sabiha Odabasi; Ursavas, Nazihan

    2012-01-01

    The purpose of this study was to identify the ways in which student teachers understand digestion and the digestive system and, subsequently, their ways of thinking, as reflected in their problem solving approaches and the justification schemes that they used to validate their claims. For this purpose, clinical interviews were conducted with 10…

  14. Developing and Rewarding Excellent Teachers: The Scottish Chartered Teacher Scheme

    Science.gov (United States)

    Ingvarson, Lawrence

    2009-01-01

    The Scottish Chartered Teacher Scheme was designed to recognise and reward teachers who attained high standards of practice. The scheme emerged in 2001 as part of an agreement between government, local employing authorities and teacher organisations. Policies such as the chartered teacher scheme aim to benefit students in two main ways: by…

  15. Politics, Administration and Performance: A continuing search, but no one best way?

    NARCIS (Netherlands)

    Ch. Pollitt (Christopher)

    2012-01-01

    textabstractIntroduction: I have been tasked with the following question: how do relations between politics and administration shift when performance-improving reforms are introduced? As always, there is more than one way of interpreting the question, and of trying to answer. There are also strong

  16. Novel Schemes for Measurement-Based Quantum Computation

    International Nuclear Information System (INIS)

    Gross, D.; Eisert, J.

    2007-01-01

    We establish a framework which allows one to construct novel schemes for measurement-based quantum computation. The technique develops tools from many-body physics--based on finitely correlated or projected entangled pair states--to go beyond the cluster-state based one-way computer. We identify resource states radically different from the cluster state, in that they exhibit nonvanishing correlations, can be prepared using nonmaximally entangling gates, or have very different local entanglement properties. In the computational models, randomness is compensated in a different manner. It is shown that there exist resource states which are locally arbitrarily close to a pure state. We comment on the possibility of tailoring computational models to specific physical systems

  17. Novel schemes for measurement-based quantum computation.

    Science.gov (United States)

    Gross, D; Eisert, J

    2007-06-01

    We establish a framework which allows one to construct novel schemes for measurement-based quantum computation. The technique develops tools from many-body physics-based on finitely correlated or projected entangled pair states-to go beyond the cluster-state based one-way computer. We identify resource states radically different from the cluster state, in that they exhibit nonvanishing correlations, can be prepared using nonmaximally entangling gates, or have very different local entanglement properties. In the computational models, randomness is compensated in a different manner. It is shown that there exist resource states which are locally arbitrarily close to a pure state. We comment on the possibility of tailoring computational models to specific physical systems.

  18. One-way spatial integration of Navier-Stokes equations: stability of wall-bounded flows

    Science.gov (United States)

    Rigas, Georgios; Colonius, Tim; Towne, Aaron; Beyar, Michael

    2016-11-01

    For three-dimensional flows, questions of stability, receptivity, secondary flows, and coherent structures require the solution of large partial-derivative eigenvalue problems. Reduced-order approximations are thus required for engineering prediction since these problems are often computationally intractable or prohibitively expensive. For spatially slowly evolving flows, such as jets and boundary layers, a regularization of the equations of motion sometimes permits a fast spatial marching procedure that results in a huge reduction in computational cost. Recently, a novel one-way spatial marching algorithm has been developed by Towne & Colonius. The new method overcomes the principle flaw observed in Parabolized Stability Equations (PSE), namely the ad hoc regularization that removes upstream propagating modes. The one-way method correctly parabolizes the flow equations based on estimating, in a computationally efficient way, the local spectrum in each cross-stream plane and an efficient spectral filter eliminates modes with upstream group velocity. Results from the application of the method to wall-bounded flows will be presented and compared with predictions from the full linearized compressible Navier-Stokes equations and PSE.

  19. Numerical simulation of the solitary wave interacting with an elastic structure using MPS-FEM coupled method

    Science.gov (United States)

    Rao, Chengping; Zhang, Youlin; Wan, Decheng

    2017-12-01

    Fluid-Structure Interaction (FSI) caused by fluid impacting onto a flexible structure commonly occurs in naval architecture and ocean engineering. Research on the problem of wave-structure interaction is important to ensure the safety of offshore structures. This paper presents the Moving Particle Semi-implicit and Finite Element Coupled Method (MPS-FEM) to simulate FSI problems. The Moving Particle Semi-implicit (MPS) method is used to calculate the fluid domain, while the Finite Element Method (FEM) is used to address the structure domain. The scheme for the coupling of MPS and FEM is introduced first. Then, numerical validation and convergent study are performed to verify the accuracy of the solver for solitary wave generation and FSI problems. The interaction between the solitary wave and an elastic structure is investigated by using the MPS-FEM coupled method.

  20. Experimental realization of a one-way quantum computer algorithm solving Simon's problem.

    Science.gov (United States)

    Tame, M S; Bell, B A; Di Franco, C; Wadsworth, W J; Rarity, J G

    2014-11-14

    We report an experimental demonstration of a one-way implementation of a quantum algorithm solving Simon's problem-a black-box period-finding problem that has an exponential gap between the classical and quantum runtime. Using an all-optical setup and modifying the bases of single-qubit measurements on a five-qubit cluster state, key representative functions of the logical two-qubit version's black box can be queried and solved. To the best of our knowledge, this work represents the first experimental realization of the quantum algorithm solving Simon's problem. The experimental results are in excellent agreement with the theoretical model, demonstrating the successful performance of the algorithm. With a view to scaling up to larger numbers of qubits, we analyze the resource requirements for an n-qubit version. This work helps highlight how one-way quantum computing provides a practical route to experimentally investigating the quantum-classical gap in the query complexity model.

  1. A matrix-free, implicit, incompressible fractional-step algorithm for fluid–structure interaction applications

    CSIR Research Space (South Africa)

    Oxtoby, Oliver F

    2012-05-01

    Full Text Available In this paper we detail a fast, fully-coupled, partitioned fluid–structure interaction (FSI) scheme. For the incompressible fluid, new fractional-step algorithms are proposed which make possible the fully implicit, but matrixfree, parallel solution...

  2. A New Pricing Scheme for Controlling Energy Storage Devices in Future Smart Grid

    Directory of Open Access Journals (Sweden)

    Jingwei Zhu

    2014-01-01

    Full Text Available Improvement of the overall efficiency of energy infrastructure is one of the main anticipated benefits of the deployment of smart grid technology. Advancement in energy storage technology and two-way communication in the electric network are indispensable components to achieve such a vision, while efficient pricing schemes and appropriate storage management are also essential. In this paper, we propose a universal pricing scheme which permits one to indirectly control the energy storage devices in the grid to achieve a more desirable aggregate demand profile that meets a particular target of the grid operator such as energy generation cost minimization and carbon emission reduction. Such a pricing scheme can potentially be applied to control the behavior of energy storage devices installed for integration of intermittent renewable energy sources that have permission to grid connection and will have broader applications as an increasing number of novel and low-cost energy storage technologies emerge.

  3. Security analysis of a one-way hash function based on spatiotemporal chaos

    International Nuclear Information System (INIS)

    Wang Shi-Hong; Shan Peng-Yang

    2011-01-01

    The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated. Analysis and simulation results indicate that collisions exist in the original algorithm and, therefore, the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions. (general)

  4. Can the one-way speed of light be used for detection of violations of the relativity principle?

    International Nuclear Information System (INIS)

    Spavieri, Gianfranco; Quintero, Jesús; Unnikrishnan, C.S.; Gillies, George T.; Cavalleri, Giancarlo; Tonni, Ernesto; Bosi, Leonardo

    2012-01-01

    Experimental attempts at measurement of the one-way speed of light are considered within the framework of relativistic theories. We show that if the effect of clock transport is taken into account, the observations from this class of experiment do not actually lead to either measurement of the one-way speed of light or determination of the absolute velocity of the preferred frame (even if, for non-entrained ether theories, such a frame were to exist). -- Highlights: ► We consider preferred frame theories that agree with experiments that support SR. ► Measurements of the one-way speed of light is discussed. ► The effect of clock transport is taken into account. ► These experiments do not lead to measurement of the one-way speed of light. ► The absolute velocity of the preferred frame cannot be detected.

  5. Is the Milky Way an interacting galaxy?

    International Nuclear Information System (INIS)

    Verschuur, G.L.

    1988-01-01

    The Milky Way Galaxy is an interacting galaxy, according to radio astronomers. The disk of stars we live in is linked to the Magellanic Clouds, our Galaxy's satellites, by an enormous arc of neutral hydrogen called the Magellanic Stream. These startling facts have recently been established by piecing together many seemingly unrelated bits of evidence into a new picture of our Milky Way Galaxy. The discoveries that led up to this grand picture of the Milky Way's interaction data back over fifty years to create one of the best detective stories in modern astronomy. The realization that ours is an interacting galaxy is only the latest result of an intensive effort to map the Milky Way. Since the 1930s, astronomers have tried to discover just how our Galaxy is built. Charting the Milky Way hasn't been easy, because we are inside it and our view of the Milky Way is obscured by cosmic dust. This dust creates a region called the zone of avoidance, a band centered along the galactic plane that blocks visible light from objects beyond nearby objects in the Galaxy. Thus radio astronomers have become the Milky Way mappers because cosmic radio waves penetrate the dust and reveal the grand scheme of our Galaxy

  6. One-way versus two-way text messaging on improving medication adherence: meta-analysis of randomized trials.

    Science.gov (United States)

    Wald, David S; Butt, Shahena; Bestwick, Jonathan P

    2015-10-01

    Mobile telephone text messaging is a simple potential solution to the failure to take medications as directed. There is uncertainty over the effectiveness of 1-way text messaging (sending text message reminders only) compared with 2-way text messaging (sending reminders and receiving replies confirming whether medication has been taken) as a means of improving medication adherence. A meta-analysis of 8 randomized trials (1994 patients) that tested the effectiveness of text messaging on medication adherence was performed. The trials were divided into 2 groups: trials using 1-way text messaging versus no text messaging and trials using 2-way text messaging versus no text messaging. The summary estimates of the effect of the 2 methods of text messaging (1-way or 2-way) were compared. The summary relative risk estimate was 1.04 (95% confidence interval, 0.97-1.11) for 1-way text messaging and 1.23 (95% confidence interval, 1.13-1.35) for 2-way text messaging. The difference in effect between the 2 methods was statistically significant (P = .007). Two-way text messaging is associated with substantially improved medication adherence compared with 1-way text messaging. This has important implications in the provision of mobile-based messaging in the management of patients taking medication for the prevention of chronic disease. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. Assessment of shear stress related parameters in the carotid bifurcation using mouse-specific FSI simulations.

    Science.gov (United States)

    De Wilde, David; Trachet, Bram; Debusschere, Nic; Iannaccone, Francesco; Swillens, Abigail; Degroote, Joris; Vierendeels, Jan; De Meyer, Guido R Y; Segers, Patrick

    2016-07-26

    The ApoE(-)(/)(-) mouse is a common small animal model to study atherosclerosis, an inflammatory disease of the large and medium sized arteries such as the carotid artery. It is generally accepted that the wall shear stress, induced by the blood flow, plays a key role in the onset of this disease. Wall shear stress, however, is difficult to derive from direct in vivo measurements, particularly in mice. In this study, we integrated in vivo imaging (micro-Computed Tomography-µCT and ultrasound) and fluid-structure interaction (FSI) modeling for the mouse-specific assessment of carotid hemodynamics and wall shear stress. Results were provided for 8 carotid bifurcations of 4 ApoE(-)(/)(-) mice. We demonstrated that accounting for the carotid elasticity leads to more realistic flow waveforms over the complete domain of the model due to volume buffering capacity in systole. The 8 simulated cases showed fairly consistent spatial distribution maps of time-averaged wall shear stress (TAWSS) and relative residence time (RRT). Zones with reduced TAWSS and elevated RRT, potential indicators of atherosclerosis-prone regions, were located mainly at the outer sinus of the external carotid artery. In contrast to human carotid hemodynamics, no flow recirculation could be observed in the carotid bifurcation region. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. An evaluation of a collaborative bibliotherapy scheme delivered via a library service.

    Science.gov (United States)

    Macdonald, J; Vallance, D; McGrath, M

    2013-12-01

    This paper reports on the evaluation of a bibliotherapy scheme delivered via a local library service, in conjunction with General Practice (GP) practices, local social welfare agencies and through self-referral. The Read Yourself Well (RYW) scheme was based on principles established from other similar schemes and as a way of delivering support for adults experiencing mild to moderate mental health problems for whom clinical treatments are not appropriate. The intervention consisted of initial referral and evaluation by the scheme bibliotherapist, a one-hour session at the beginning and end of the intervention where a purpose-designed questionnaire and two mental health assessments were carried out (the General Health Questionnaire and the Clinical Outcomes in Routine Evaluation questionnaire). Contact and support from the bibliotherapist was provided during the intervention period. One hundred and fifty-seven participants were recruited to the evaluation of whom 114 provided full data. Statistical analyses of the mental health scores showed significant improvements post treatment, for, both male and female participants, for all three referral routes, and for participants who were previously library users, and those who joined the library service to participate in the RYW scheme. The results of this large sample evaluation support the proposal that library-based bibliotherapy can be effective in the treatment of mental health problems. © 2012 John Wiley & Sons Ltd.

  9. Outcome-based health equity across different social health insurance schemes for the elderly in China.

    Science.gov (United States)

    Liu, Xiaoting; Wong, Hung; Liu, Kai

    2016-01-14

    Against the achievement of nearly universal coverage for social health insurance for the elderly in China, a problem of inequity among different insurance schemes on health outcomes is still a big challenge for the health care system. Whether various health insurance schemes have divergent effects on health outcome is still a puzzle. Empirical evidence will be investigated in this study. This study employs a nationally representative survey database, the National Survey of the Aged Population in Urban/Rural China, to compare the changes of health outcomes among the elderly before and after the reform. A one-way ANOVA is utilized to detect disparities in health care expenditures and health status among different health insurance schemes. Multiple Linear Regression is applied later to examine the further effects of different insurance plans on health outcomes while controlling for other social determinants. The one-way ANOVA result illustrates that although the gaps in insurance reimbursements between the Urban Employee Basic Medical Insurance (UEBMI) and the other schemes, the New Rural Cooperative Medical Scheme (NCMS) and Urban Residents Basic Medical Insurance (URBMI) decreased, out-of-pocket spending accounts for a larger proportion of total health care expenditures, and the disparities among different insurances enlarged. Results of the Multiple Linear Regression suggest that UEBMI participants have better self-reported health status, physical functions and psychological wellbeing than URBMI and NCMS participants, and those uninsured. URBMI participants report better self-reported health than NCMS ones and uninsured people, while having worse psychological wellbeing compared with their NCMS counterparts. This research contributes to a transformation in health insurance studies from an emphasis on the opportunity-oriented health equity measured by coverage and healthcare accessibility to concern with outcome-based equity composed of health expenditure and health

  10. Assessing Fan Flutter Stability in Presence of Inlet Distortion Using One-Way and Two-Way Coupled Methods

    Science.gov (United States)

    Herrick, Gregory P.

    2014-01-01

    Concerns regarding noise, propulsive efficiency, and fuel burn are inspiring aircraft designs wherein the propulsive turbomachines are partially (or fully) embedded within the airframe; such designs present serious concerns with regard to aerodynamic and aeromechanic performance of the compression system in response to inlet distortion. Previously, a preliminary design of a forward-swept high-speed fan exhibited flutter concerns in clean-inlet flows, and the present author then studied this fan further in the presence of off-design distorted in-flows. Continuing this research, a three-dimensional, unsteady, Navier-Stokes computational fluid dynamics code is again applied to analyze and corroborate fan performance with clean inlet flow and now with a simplified, sinusoidal distortion of total pressure at the aerodynamic interface plane. This code, already validated in its application to assess aerodynamic damping of vibrating blades at various flow conditions using a one-way coupled energy-exchange approach, is modified to include a two-way coupled timemarching aeroelastic simulation capability. The two coupling methods are compared in their evaluation of flutter stability in the presence of distorted in-flows.

  11. 3D, parallel fluid-structure interaction code

    CSIR Research Space (South Africa)

    Oxtoby, Oliver F

    2011-01-01

    Full Text Available The authors describe the development of a 3D parallel Fluid–Structure–Interaction (FSI) solver and its application to benchmark problems. Fluid and solid domains are discretised using and edge-based finite-volume scheme for efficient parallel...

  12. Characteristics of reverse overwrite process in shingled recording scheme at ultra-high track density

    Energy Technology Data Exchange (ETDEWEB)

    Li Shaoping, E-mail: shaoping_li_2000@yahoo.com [Western Digital Inc. 1250 Reliance Way, Fremont, CA 94539 (United States); Mendez, Hector; Terrill, Dave; Liu Feng; Bai, Daniel; Mao Sining [Western Digital Inc. 1250 Reliance Way, Fremont, CA 94539 (United States)

    2012-02-15

    A systematic experimental study of the reverse overwrite (ReOVW) process in the shingled recording scheme has been conducted in conjunction with characterization of corresponding recording performances from recording heads with different geometries. It was found that there is no ReOVW reduction as the track density increases in a strict shingled recording fashion. Nonetheless, ReOVW is indeed slightly decreased from 300 to 700 kpi in a so-called one write shingled recording process. Overall our obtained data suggest that conventional magnetic recording technology might be able to extend all the way beyond an areal density of one Tbit/in{sup 2} by using the shingled recording scheme. - Research Highlights: > This paper discusses the most advanced recording scheme, e.g., shingled recording process, for next generation magnetic data storage devices. > The paper shows that the write-ability of magnetic recording is sufficient in the shingled recording scheme even when the areal density is beyond 1.0 Tb/in{sup 2}. > Our results also shows that the writer's edge write-ability is essential for reducing noise during the write process in shingled recording scheme. > The paper also demonstrates that a multiple and sequential write process ensures the normal erasure-ability in shingled recording scheme. > Our results also indicate that the noise nature in the write process still could be attributed to the hard-easy transition and imprint effect.

  13. Characteristics of reverse overwrite process in shingled recording scheme at ultra-high track density

    International Nuclear Information System (INIS)

    Li Shaoping; Mendez, Hector; Terrill, Dave; Liu Feng; Bai, Daniel; Mao Sining

    2012-01-01

    A systematic experimental study of the reverse overwrite (ReOVW) process in the shingled recording scheme has been conducted in conjunction with characterization of corresponding recording performances from recording heads with different geometries. It was found that there is no ReOVW reduction as the track density increases in a strict shingled recording fashion. Nonetheless, ReOVW is indeed slightly decreased from 300 to 700 kpi in a so-called one write shingled recording process. Overall our obtained data suggest that conventional magnetic recording technology might be able to extend all the way beyond an areal density of one Tbit/in 2 by using the shingled recording scheme. - Research highlights: → This paper discusses the most advanced recording scheme, e.g., shingled recording process, for next generation magnetic data storage devices. → The paper shows that the write-ability of magnetic recording is sufficient in the shingled recording scheme even when the areal density is beyond 1.0 Tb/in 2 . → Our results also shows that the writer's edge write-ability is essential for reducing noise during the write process in shingled recording scheme. → The paper also demonstrates that a multiple and sequential write process ensures the normal erasure-ability in shingled recording scheme. → Our results also indicate that the noise nature in the write process still could be attributed to the hard-easy transition and imprint effect.

  14. Application of one-way ANOVA in completely randomized experiments

    Science.gov (United States)

    Wahid, Zaharah; Izwan Latiff, Ahmad; Ahmad, Kartini

    2017-12-01

    This paper describes an application of a statistical technique one-way ANOVA in completely randomized experiments with three replicates. This technique was employed to a single factor with four levels and multiple observations at each level. The aim of this study is to investigate the relationship between chemical oxygen demand index and location on-sites. Two different approaches are employed for the analyses; critical value and p-value. It also presents key assumptions of the technique to be satisfied by the data in order to obtain valid results. Pairwise comparisons by Turkey method are also considered and discussed to determine where the significant differences among the means is after the ANOVA has been performed. The results revealed that there are statistically significant relationship exist between the chemical oxygen demand index and the location on-sites.

  15. A new 3D immersed boundary method for non-Newtonian fluid-structure-interaction with application

    Science.gov (United States)

    Zhu, Luoding

    2017-11-01

    Motivated by fluid-structure-interaction (FSI) phenomena in life sciences (e.g., motions of sperm and cytoskeleton in complex fluids), we introduce a new immersed boundary method for FSI problems involving non-Newtonian fluids in three dimensions. The non-Newtonian fluids are modelled by the FENE-P model (including the Oldroyd-B model as an especial case) and numerically solved by a lattice Boltzmann scheme (the D3Q7 model). The fluid flow is modelled by the lattice Boltzmann equations and numerically solved by the D3Q19 model. The deformable structure and the fluid-structure-interaction are handled by the immersed boundary method. As an application, we study a FSI toy problem - interaction of an elastic plate (flapped at its leading edge and restricted nowhere else) with a non-Newtonian fluid in a 3D flow. Thanks to the support of NSF-DMS support under research Grant 1522554.

  16. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  17. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  18. Quantum Distributed Ballot Scheme Based on Greenberger-Home-Zeilinger State

    International Nuclear Information System (INIS)

    Shi Ronghua; Wu Ying; Guo Ying; Zeng Guihua

    2010-01-01

    Motivated by the complementary relations of the Greenherger-Horne-Zeilinger (GHZ) entangled triplet-particle states, a novel way of realizing quantum distributed ballot scheme is proposed. The ballot information is encoded by local operations performed on the particles of entangled GHZ triplet states, which ensures the security of the present scheme. In order to guarantee the security of this scheme, the checking phase is designed in detail on the basis of the entangled GHZ triplet state. The analysis shows the security of the proposed scheme. (general)

  19. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  20. Verifying atom entanglement schemes by testing Bell's inequality

    International Nuclear Information System (INIS)

    Angelakis, D.G.; Knight, P.L.; Tregenna, B.; Munro, W.J.

    2001-01-01

    Recent experiments to test Bell's inequality using entangled photons and ions aimed at tests of basic quantum mechanical principles. Interesting results have been obtained and many loopholes could be closed. In this paper we want to point out that tests of Bell's inequality also play an important role in verifying atom entanglement schemes. We describe as an example a scheme to prepare arbitrary entangled states of N two-level atoms using a leaky optical cavity and a scheme to entangle atoms inside a photonic crystal. During the state preparation no photons are emitted, and observing a violation of Bell's inequality is the only way to test whether a scheme works with a high precision or not. (orig.)

  1. On the Derivation of Highest-Order Compact Finite Difference Schemes for the One- and Two-Dimensional Poisson Equation with Dirichlet Boundary Conditions

    KAUST Repository

    Settle, Sean O.

    2013-01-01

    The primary aim of this paper is to answer the question, What are the highest-order five- or nine-point compact finite difference schemes? To answer this question, we present several simple derivations of finite difference schemes for the one- and two-dimensional Poisson equation on uniform, quasi-uniform, and nonuniform face-to-face hyperrectangular grids and directly prove the existence or nonexistence of their highest-order local accuracies. Our derivations are unique in that we do not make any initial assumptions on stencil symmetries or weights. For the one-dimensional problem, the derivation using the three-point stencil on both uniform and nonuniform grids yields a scheme with arbitrarily high-order local accuracy. However, for the two-dimensional problem, the derivation using the corresponding five-point stencil on uniform and quasi-uniform grids yields a scheme with at most second-order local accuracy, and on nonuniform grids yields at most first-order local accuracy. When expanding the five-point stencil to the nine-point stencil, the derivation using the nine-point stencil on uniform grids yields at most sixth-order local accuracy, but on quasi- and nonuniform grids yields at most fourth- and third-order local accuracy, respectively. © 2013 Society for Industrial and Applied Mathematics.

  2. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  3. Swedish-Norwegian tradable green certificates: Scheme design flaws and perceived investment barriers

    International Nuclear Information System (INIS)

    Linnerud, Kristin; Simonsen, Morten

    2017-01-01

    The EU Commission recommends using market-based support schemes for renewable-electricity projects. One example is the Swedish-Norwegian tradable green certificate scheme. We examine whether design features in the Norwegian part of this scheme, specifically, the scheme's short duration and the way it is to be abruptly terminated, contribute to investors' perceptions of barriers. We apply econometric techniques on primary data collected in two surveys of Norwegian investors in hydropower, and we use real options theory to predict and interpret investors' responses. We show that: (1) immediately after the scheme was introduced, investors are eager to lock in future subsidies by investing immediately and concerned with factors that may delay the completion of their projects; (2) as the certificate deadline neared, investors have become increasingly pessimistic and concerned with economic and risk barriers. Investors in big hydropower plants with regulation reservoirs are particularly concerned with the risk of not completing their projects in time to gain the right to sell certificates. These findings are consistent with the predicted responses to the scheme design derived from real options theory. In contrast to earlier studies, we find no difference in responses to the scheme design across investor types. - Highlights: • The Swedish-Norwegian tradable green certificate scheme is intended to promote cost-efficiency. • We examine the optimism about and barriers against investing in new hydropower projects in Norway. • We find that scheme design may have contributed to barriers against Norwegian hydropower projects. • Thus, scheme design flaws may have prevented the scheme from working as intended. • These findings are consistent with real options theory predictions.

  4. Building fast well-balanced two-stage numerical schemes for a model of two-phase flows

    Science.gov (United States)

    Thanh, Mai Duc

    2014-06-01

    We present a set of well-balanced two-stage schemes for an isentropic model of two-phase flows arisen from the modeling of deflagration-to-detonation transition in granular materials. The first stage is to absorb the source term in nonconservative form into equilibria. Then in the second stage, these equilibria will be composed into a numerical flux formed by using a convex combination of the numerical flux of a stable Lax-Friedrichs-type scheme and the one of a higher-order Richtmyer-type scheme. Numerical schemes constructed in such a way are expected to get the interesting property: they are fast and stable. Tests show that the method works out until the parameter takes on the value CFL, and so any value of the parameter between zero and this value is expected to work as well. All the schemes in this family are shown to capture stationary waves and preserves the positivity of the volume fractions. The special values of the parameter 0,1/2,1/(1+CFL), and CFL in this family define the Lax-Friedrichs-type, FAST1, FAST2, and FAST3 schemes, respectively. These schemes are shown to give a desirable accuracy. The errors and the CPU time of these schemes and the Roe-type scheme are calculated and compared. The constructed schemes are shown to be well-balanced and faster than the Roe-type scheme.

  5. Children's schemes for anticipating the validity of nets for solids

    Science.gov (United States)

    Wright, Vince; Smith, Ken

    2017-09-01

    There is growing acknowledgement of the importance of spatial abilities to student achievement across a broad range of domains and disciplines. Nets are one way to connect three-dimensional shapes and their two-dimensional representations and are a common focus of geometry curricula. Thirty-four students at year 6 (upper primary school) were interviewed on two occasions about their anticipation of whether or not given nets for the cube- and square-based pyramid would fold to form the target solid. Vergnaud's ( Journal of Mathematical Behavior, 17(2), 167-181, 1998, Human Development, 52, 83-94, 2009) four characteristics of schemes were used as a theoretical lens to analyse the data. Successful schemes depended on the interaction of operational invariants, such as strategic choice of the base, rules for action, particularly rotation of shapes, and anticipations of composites of polygons in the net forming arrangements of faces in the solid. Inferences were rare. These data suggest that students need teacher support to make inferences, in order to create transferable schemes.

  6. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  7. A Novel Read Scheme for Large Size One-Resistor Resistive Random Access Memory Array.

    Science.gov (United States)

    Zackriya, Mohammed; Kittur, Harish M; Chin, Albert

    2017-02-10

    The major issue of RRAM is the uneven sneak path that limits the array size. For the first time record large One-Resistor (1R) RRAM array of 128x128 is realized, and the array cells at the worst case still have good Low-/High-Resistive State (LRS/HRS) current difference of 378 nA/16 nA, even without using the selector device. This array has extremely low read current of 9.7 μA due to both low-current RRAM device and circuit interaction, where a novel and simple scheme of a reference point by half selected cell and a differential amplifier (DA) were implemented in the circuit design.

  8. Understanding the types of fraud in claims to South African medical schemes.

    Science.gov (United States)

    Legotlo, T G; Mutezo, A

    2018-03-28

    Medical schemes play a significant role in funding private healthcare in South Africa (SA). However, the sector is negatively affected by the high rate of fraudulent claims. To identify the types of fraudulent activities committed in SA medical scheme claims. A cross-sectional qualitative study was conducted, adopting a case study strategy. A sample of 15 employees was purposively selected from a single medical scheme administration company in SA. Semi-structured interviews were conducted to collect data from study participants. A thematic analysis of the data was done using ATLAS.ti software (ATLAS.ti Scientific Software Development, Germany). The study population comprised the 17 companies that administer medical schemes in SA. Data were collected from 15 study participants, who were selected from the medical scheme administrator chosen as a case study. The study found that medical schemes were defrauded in numerous ways. The perpetrators of this type of fraud include healthcare service providers, medical scheme members, employees, brokers and syndicates. Medical schemes are mostly defrauded by the submission of false claims by service providers and syndicates. Fraud committed by medical scheme members encompasses the sharing of medical scheme benefits with non-members (card farming) and non-disclosure of pre-existing conditions at the application stage. The study concluded that perpetrators of fraud have found several ways of defrauding SA medical schemes regarding claims. Understanding and identifying the types of fraud events facing medical schemes is the initial step towards establishing methods to mitigate this risk. Future studies should examine strategies to manage fraudulent medical scheme claims.

  9. Ants can learn to forage on one-way trails.

    Directory of Open Access Journals (Sweden)

    Pedro Leite Ribeiro

    Full Text Available The trails formed by many ant species between nest and food source are two-way roads on which outgoing and returning workers meet and touch each other all along. The way to get back home, after grasping a food load, is to take the same route on which they have arrived from the nest. In many species such trails are chemically marked by pheromones providing orientation cues for the ants to find their way. Other species rely on their vision and use landmarks as cues. We have developed a method to stop foraging ants from shuttling on two-way trails. The only way to forage is to take two separate roads, as they cannot go back on their steps after arriving at the food or at the nest. The condition qualifies as a problem because all their orientation cues -- chemical, visual or any other -- are disrupted, as all of them cannot but lead the ants back to the route on which they arrived. We have found that workers of the leaf-cutting ant Atta sexdens rubropilosa can solve the problem. They could not only find the alternative way, but also used the unidirectional traffic system to forage effectively. We suggest that their ability is an evolutionary consequence of the need to deal with environmental irregularities that cannot be negotiated by means of excessively stereotyped behavior, and that it is but an example of a widespread phenomenon. We also suggest that our method can be adapted to other species, invertebrate and vertebrate, in the study of orientation, memory, perception, learning and communication.

  10. One-Way Nested Large-Eddy Simulation over the Askervein Hill

    Directory of Open Access Journals (Sweden)

    James D. Doyle

    2009-07-01

    Full Text Available Large-eddy simulation (LES models have been used extensively to study atmospheric boundary layer turbulence over flat surfaces; however, LES applications over topography are less common. We evaluate the ability of an existing model – COAMPS®-LES – to simulate flow over terrain using data from the Askervein Hill Project. A new approach is suggested for the treatment of the lateral boundaries using one-way grid nesting. LES wind profile and speed-up are compared with observations at various locations around the hill. The COAMPS-LES model performs generally well. This case could serve as a useful benchmark for evaluating LES models for applications over topography.

  11. Acoustic topological insulator and robust one-way sound transport

    Science.gov (United States)

    He, Cheng; Ni, Xu; Ge, Hao; Sun, Xiao-Chen; Chen, Yan-Bin; Lu, Ming-Hui; Liu, Xiao-Ping; Chen, Yan-Feng

    2016-12-01

    Topological design of materials enables topological symmetries and facilitates unique backscattering-immune wave transport. In airborne acoustics, however, the intrinsic longitudinal nature of sound polarization makes the use of the conventional spin-orbital interaction mechanism impossible for achieving band inversion. The topological gauge flux is then typically introduced with a moving background in theoretical models. Its practical implementation is a serious challenge, though, due to inherent dynamic instabilities and noise. Here we realize the inversion of acoustic energy bands at a double Dirac cone and provide an experimental demonstration of an acoustic topological insulator. By manipulating the hopping interaction of neighbouring ’atoms’ in this new topological material, we successfully demonstrate the acoustic quantum spin Hall effect, characterized by robust pseudospin-dependent one-way edge sound transport. Our results are promising for the exploration of new routes for experimentally studying topological phenomena and related applications, for example, sound-noise reduction.

  12. Cogeneration: One way to use biomass efficiently

    International Nuclear Information System (INIS)

    Gustavsson, L.; Johansson, B.

    1993-01-01

    Cogeneration in district heating systems is the most energy-efficient way to convert biomass into heat and electricity with current or nearly commercial technologies. Methanol produced from biomass and used in vehicles instead of petrol or diesel could reduce carbon dioxide emissions nearly as much per unit of biomass as if the biomass were used to replace natural gas for cogeneration, but at some higher cost per unit of carbon dioxide reduction. The most energy-efficient way to use biomass for cogeneration appears to be combined cycle technology, and the world's first demonstration plant is now being built. Potentially, this technology can be used for electricity production in Swedish district heating systems to provide nearly 20% of current Swedish electricity production, while simultaneously reducing carbon dioxide emissions from the district heating systems by some 55%. The heat costs from cogeneration with biomass are higher than the heat costs from fossil fuel plants at current fuel prices. Biomass can only compete with fossil fuel if other advantages, for example a lower environmental impact are considered. (au) (35 refs.)

  13. Implicit unified gas-kinetic scheme for steady state solutions in all flow regimes

    Science.gov (United States)

    Zhu, Yajun; Zhong, Chengwen; Xu, Kun

    2016-06-01

    This paper presents an implicit unified gas-kinetic scheme (UGKS) for non-equilibrium steady state flow computation. The UGKS is a direct modeling method for flow simulation in all regimes with the updates of both macroscopic flow variables and microscopic gas distribution function. By solving the macroscopic equations implicitly, a predicted equilibrium state can be obtained first through iterations. With the newly predicted equilibrium state, the evolution equation of the gas distribution function and the corresponding collision term can be discretized in a fully implicit way for fast convergence through iterations as well. The lower-upper symmetric Gauss-Seidel (LU-SGS) factorization method is implemented to solve both macroscopic and microscopic equations, which improves the efficiency of the scheme. Since the UGKS is a direct modeling method and its physical solution depends on the mesh resolution and the local time step, a physical time step needs to be fixed before using an implicit iterative technique with a pseudo-time marching step. Therefore, the physical time step in the current implicit scheme is determined by the same way as that in the explicit UGKS for capturing the physical solution in all flow regimes, but the convergence to a steady state speeds up through the adoption of a numerical time step with large CFL number. Many numerical test cases in different flow regimes from low speed to hypersonic ones, such as the Couette flow, cavity flow, and the flow passing over a cylinder, are computed to validate the current implicit method. The overall efficiency of the implicit UGKS can be improved by one or two orders of magnitude in comparison with the explicit one.

  14. Radial distribution of power starting from the reactivity using nodal schemes of second and third order

    International Nuclear Information System (INIS)

    Delfin L, A.; Alonso V, G.; Valle G, E. del

    2003-01-01

    In this work two nodal schemes of finite element are presented, one of second and the other of third order of accurate that allow to determine the radial distribution of power starting from the corresponding reactivities.The schemes here developed were obtained taking as starting point the equation developed by Driscoll et al, the one which is based on the diffusion approach of 1-1/2 energy groups. This equation relates the power fraction of an assemble with their reactivity and with the power fractions and reactivities of the assemblies that its surround it. Driscoll and collaborators they solve in form approximate such equation supposing that the reactivity of each assemble it is but a lineal function of the burnt one of the fuel. The spatial approach carries out it with the classic technique of finite differences centered in mesh. Nevertheless that the algebraic system to which its arrive it can be solved without more considerations introduce some additional suppositions and adjustment parameters that it allows them to predict results comparable to those contributed by three dimensions analysis and this way to reduce the one obtained error when its compare their results with those of a production code like CASMO. Also in the two schemes that here are presented the same approaches of Driscoll were used being obtained errors of the one 10% and of 5% for the second schemes and third order respectively for a test case that it was built starting from data of the Cycle 1 of the Unit 1 of the Laguna Verde Nucleo electric plant. These errors its were obtained when comparing with a computer program based on the matrix response method. It is sought to have this way a quick and efficient tool for the multicycle analysis in the fuel management. However, this model presents problems in the appropriate prediction of the average burnt of the nucleus and of the burnt one by lot. (Author)

  15. The Laguerre finite difference one-way equation solver

    Science.gov (United States)

    Terekhov, Andrew V.

    2017-05-01

    This paper presents a new finite difference algorithm for solving the 2D one-way wave equation with a preliminary approximation of a pseudo-differential operator by a system of partial differential equations. As opposed to the existing approaches, the integral Laguerre transform instead of Fourier transform is used. After carrying out the approximation of spatial variables it is possible to obtain systems of linear algebraic equations with better computing properties and to reduce computer costs for their solution. High accuracy of calculations is attained at the expense of employing finite difference approximations of higher accuracy order that are based on the dispersion-relationship-preserving method and the Richardson extrapolation in the downward continuation direction. The numerical experiments have verified that as compared to the spectral difference method based on Fourier transform, the new algorithm allows one to calculate wave fields with a higher degree of accuracy and a lower level of numerical noise and artifacts including those for non-smooth velocity models. In the context of solving the geophysical problem the post-stack migration for velocity models of the types Syncline and Sigsbee2A has been carried out. It is shown that the images obtained contain lesser noise and are considerably better focused as compared to those obtained by the known Fourier Finite Difference and Phase-Shift Plus Interpolation methods. There is an opinion that purely finite difference approaches do not allow carrying out the seismic migration procedure with sufficient accuracy, however the results obtained disprove this statement. For the supercomputer implementation it is proposed to use the parallel dichotomy algorithm when solving systems of linear algebraic equations with block-tridiagonal matrices.

  16. Seismic Imaging, One-Way Wave Equations, Pseudodifferential Operators, Path Integrals, and all that Jazz

    Science.gov (United States)

    Artoun, Ojenie; David-Rus, Diana; Emmett, Matthew; Fishman, Lou; Fital, Sandra; Hogan, Chad; Lim, Jisun; Lushi, Enkeleida; Marinov, Vesselin

    2006-05-01

    In this report we summarize an extension of Fourier analysis for the solution of the wave equation with a non-constant coefficient corresponding to an inhomogeneous medium. The underlying physics of the problem is exploited to link pseudodifferential operators and phase space path integrals to obtain a marching algorithm that incorporates the backward scattering into the evolution of the wave. This allows us to successfully apply single-sweep, one-way marching methods in inherently two-way environments, which was not achieved before through other methods for this problem.

  17. On the performance of two-way multiuser mixed RF/FSO relay networks with opportunistic scheduling & asymmetric channel gains

    KAUST Repository

    Al-Eryani, Yasser F.; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim

    2017-01-01

    In this paper, the performance of two-way relaying (TWR) multiuser mixed radio frequency/free space optical (RF/FSO) relay networks with opportunistic user scheduling and asymmetric channel fading is studied. First, closed-form expressions for the exact outage probability, asymptotic (high signal-to-noise ration (SNR)) outage probability, and average ergodic channel capacity are derived assuming heterodyne detection (HD) scheme. Additionally, impacts of several system parameters including number of users, pointing errors, and atmospheric turbulence conditions on the overall network performance are investigated. All the theoretical results are validated by Monte-Carlo simulations. The results show that the TWR scheme almost doubles the network ergodic capacity compared to that of one-way relaying (OWR) scheme with the same outage performance. Additionally, the overall diversity order of the network is shown to be affected not only by the number of users, but it is also a function of the pointing error and atmospheric turbulence conditions.

  18. On the performance of two-way multiuser mixed RF/FSO relay networks with opportunistic scheduling & asymmetric channel gains

    KAUST Repository

    Al-Eryani, Yasser F.

    2017-07-20

    In this paper, the performance of two-way relaying (TWR) multiuser mixed radio frequency/free space optical (RF/FSO) relay networks with opportunistic user scheduling and asymmetric channel fading is studied. First, closed-form expressions for the exact outage probability, asymptotic (high signal-to-noise ration (SNR)) outage probability, and average ergodic channel capacity are derived assuming heterodyne detection (HD) scheme. Additionally, impacts of several system parameters including number of users, pointing errors, and atmospheric turbulence conditions on the overall network performance are investigated. All the theoretical results are validated by Monte-Carlo simulations. The results show that the TWR scheme almost doubles the network ergodic capacity compared to that of one-way relaying (OWR) scheme with the same outage performance. Additionally, the overall diversity order of the network is shown to be affected not only by the number of users, but it is also a function of the pointing error and atmospheric turbulence conditions.

  19. Fast-shock ignition: a new approach to inertial confinement fusion

    Directory of Open Access Journals (Sweden)

    AH Farahbod

    2013-03-01

    Full Text Available  A new concept for inertial confinement fusion called fast-shock ignition (FSI is introduced as a credible scheme in order to obtain high target gain. In the proposed model, the separation of fuel ignition into two successive steps, under the suitable conditions, reduces required ignitor energy for the fuel ignition. The main procedure in FSI concept is compressing the fuel up to stagnation. Then, two high intensity short pulse laser spikes with energy and power lower than those required for shock ignition (SI and fast ignition (FI with a proper delay time are launched at the fuel which increases the central hot-spot temperature and completes the ignition of the precompressed fuel. The introduced semi-analytical model indicates that with fast-shock ignition, the total required energy for compressing and igniting the fuel can be slightly reduced in comparison to pure shock ignition. Furthermore, for fuel mass greater than , the target energy gain increases up to 15 percent and the contribution of fast ignitor under the proper conditions could be decreased about 20 percent compared with pure fast ignition. The FSI scheme is beneficial from technological considerations for the construction of short pulse high power laser drivers. The general advantages of fast-shock ignition over pure shock ignition in terms of figure of merit can be more than 1.3.

  20. One-particle reducibility in effective scattering theory

    International Nuclear Information System (INIS)

    Vereshagin, V.

    2016-01-01

    To construct the reasonable renormalization scheme suitable for the effective theories one needs to resolve the “problem of couplings” because the number of free parameters in a theory should be finite. Otherwise the theory would loose its predictive power. In the case of effective theory already the first step on this way shows the necessity to solve the above-mentioned problem for the 1-loop 2-leg function traditionally called self energy. In contrast to the customary renormalizable models the corresponding Feynman graph demonstrates divergencies that require introducing of an infinite number of prescriptions. In the recent paper [1] it has been shown that the way out of this difficulty requires the revision of the notion of one-particle reducibility. The point is that in effective scattering theory one can introduce two different notions: the graphic reducibility and the analytic one. Below we explain the main ideas of the paper [1] and recall some notions and definitions introduced earlier in [2] and [3

  1. Accuracy & Computational Considerations for Wide--Angle One--way Seismic Propagators and Multiple Scattering by Invariant Embedding

    Science.gov (United States)

    Thomson, C. J.

    2004-12-01

    Pseudodifferential operators (PSDOs) yield in principle exact one--way seismic wave equations, which are attractive both conceptually and for their promise of computational efficiency. The one--way operators can be extended to include multiple--scattering effects, again in principle exactly. In practice approximations must be made and, as an example, the variable--wavespeed Helmholtz equation for scalar waves in two space dimensions is here factorized to give the one--way wave equation. This simple case permits clear identification of a sequence of physically reasonable approximations to be used when the mathematically exact PSDO one--way equation is implemented on a computer. As intuition suggests, these approximations hinge on the medium gradients in the direction transverse to the main propagation direction. A key point is that narrow--angle approximations are to be avoided in the interests of accuracy. Another key consideration stems from the fact that the so--called ``standard--ordering'' PSDO indicates how lateral interpolation of the velocity structure can significantly reduce computational costs associated with the Fourier or plane--wave synthesis lying at the heart of the calculations. The decision on whether a slow or a fast Fourier transform code should be used rests upon how many lateral model parameters are truly distinct. A third important point is that the PSDO theory shows what approximations are necessary in order to generate an exponential one--way propagator for the laterally varying case, representing the intuitive extension of classical integral--transform solutions for a laterally homogeneous medium. This exponential propagator suggests the use of larger discrete step sizes, and it can also be used to approach phase--screen like approximations (though the latter are not the main interest here). Numerical comparisons with finite--difference solutions will be presented in order to assess the approximations being made and to gain an understanding

  2. One-Stage and Two-Stage Schemes of High Performance Synchronous PWM with Smooth Pulses-Ratio Changing

    DEFF Research Database (Denmark)

    Oleschuk, V.; Blaabjerg, Frede

    2002-01-01

    This paper presents detailed description of one-stage and two-stage schemes of a novel method of synchronous, pulsewidth modulation (PWM) for voltage source inverters for ac drive application. The proposed control functions provide accurate realization of different versions of voltage space vector...... modulation with synchronization of the voltage waveform of the inverter and with smooth pulse-ratio changing. Voltage spectra do not contain even harmonic and sub-harmonics (combined harmonics) during the whole control range including the zone of overmodulation. Examples of determination of the basic control...

  3. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  4. Degrees-of-Freedom of the MIMO Three-Way Channel with Node-Intermittency

    KAUST Repository

    Neu, Joachim

    2017-08-28

    The characterization of fundamental performance bounds of many-to-many communication systems in which participating nodes are active in an intermittent way is one of the major challenges in communication theory. In order to address this issue, we introduce the multiple-input multiple-output (MIMO) three-way channel (3WC) with an intermittent node and study its degrees-of-freedom (DoF) region and sum-DoF. We devise a non-adaptive encoding scheme based on zero-forcing, interference alignment and erasure coding, and show its DoF region (and thus sum-DoF) optimality for non-intermittent 3WCs and its sum-DoF optimality for (node-)intermittent 3WCs. However, we show by example that in general some DoF tuples in the intermittent 3WC can only be achieved by adaptive schemes, such as multi-hop or decode-forward relaying. This shows that non-adaptive encoding is sufficient for the non-intermittent 3WC and for the sum-DoF of intermittent 3WCs, but adaptive encoding is necessary for the DoF region of intermittent 3WCs. Our work contributes to a better understanding of the fundamental limits of multi-way communication systems with intermittency and the impact of adaptation therein.

  5. Constraining Stochastic Parametrisation Schemes Using High-Resolution Model Simulations

    Science.gov (United States)

    Christensen, H. M.; Dawson, A.; Palmer, T.

    2017-12-01

    Stochastic parametrisations are used in weather and climate models as a physically motivated way to represent model error due to unresolved processes. Designing new stochastic schemes has been the target of much innovative research over the last decade. While a focus has been on developing physically motivated approaches, many successful stochastic parametrisation schemes are very simple, such as the European Centre for Medium-Range Weather Forecasts (ECMWF) multiplicative scheme `Stochastically Perturbed Parametrisation Tendencies' (SPPT). The SPPT scheme improves the skill of probabilistic weather and seasonal forecasts, and so is widely used. However, little work has focused on assessing the physical basis of the SPPT scheme. We address this matter by using high-resolution model simulations to explicitly measure the `error' in the parametrised tendency that SPPT seeks to represent. The high resolution simulations are first coarse-grained to the desired forecast model resolution before they are used to produce initial conditions and forcing data needed to drive the ECMWF Single Column Model (SCM). By comparing SCM forecast tendencies with the evolution of the high resolution model, we can measure the `error' in the forecast tendencies. In this way, we provide justification for the multiplicative nature of SPPT, and for the temporal and spatial scales of the stochastic perturbations. However, we also identify issues with the SPPT scheme. It is therefore hoped these measurements will improve both holistic and process based approaches to stochastic parametrisation. Figure caption: Instantaneous snapshot of the optimal SPPT stochastic perturbation, derived by comparing high-resolution simulations with a low resolution forecast model.

  6. Comparison of hydro-environmental impacts for ebb-only and two-way generation for a Severn Barrage

    Science.gov (United States)

    Ahmadian, Reza; Falconer, Roger A.; Bockelmann-Evans, Bettina

    2014-10-01

    Marine renewable energy is playing an increasing significant role in many parts of the world, mainly due to a rise in the awareness of climate change, and its detrimental effects, and the increasing cost of natural resources. The Severn Estuary, located between South West England and South Wales, has a tidal range of up to 14 m which makes it the second highest tidal range in the world. There are a number of barrage proposals amongst various marine renewable energy schemes proposed to be built in the estuary. The Cardiff-Weston STPG (Severn Tidal Power Group) Barrage, which would be one of the world's largest tidal renewable energy schemes if built, is one of the most publicised schemes to-date. This barrage would generate about 17 TWh/annum of power, which is approximately 5% of the UK's electricity consumption, whilst causing significant hydro-environmental and ecological impact on the estuary. This study mainly focuses on investigating the hydro-environmental impacts of the STPG barrage for the option of two-way generation, and compares this with the commonly investigated option of ebb-only generation. The impacts of the barrage were modelled by implementing a linked 1-D/2-D hydro-environmental model, with the capability of modelling several key environmental processes. The model predictions show that the hydro-environmental impacts of the barrage on the Severn Estuary and Bristol Channel, such as changes in the maximum velocity and reduction in suspended sediment and bacteria levels, were less significant for the two-way generation scheme when compared with the corresponding impacts for ebb-only generation.

  7. Spin- and valley-polarized one-way Klein tunneling in photonic topological insulators.

    Science.gov (United States)

    Ni, Xiang; Purtseladze, David; Smirnova, Daria A; Slobozhanyuk, Alexey; Alù, Andrea; Khanikaev, Alexander B

    2018-05-01

    Recent advances in condensed matter physics have shown that the spin degree of freedom of electrons can be efficiently exploited in the emergent field of spintronics, offering unique opportunities for efficient data transfer, computing, and storage ( 1 - 3 ). These concepts have been inspiring analogous approaches in photonics, where the manipulation of an artificially engineered pseudospin degree of freedom can be enabled by synthetic gauge fields acting on light ( 4 - 6 ). The ability to control these degrees of freedom significantly expands the landscape of available optical responses, which may revolutionize optical computing and the basic means of controlling light in photonic devices across the entire electromagnetic spectrum. We demonstrate a new class of photonic systems, described by effective Hamiltonians in which competing synthetic gauge fields, engineered in pseudospin, chirality/sublattice, and valley subspaces, result in bandgap opening at one of the valleys, whereas the other valley exhibits Dirac-like conical dispersion. We show that this effective response has marked implications on photon transport, among which are as follows: (i) a robust pseudospin- and valley-polarized one-way Klein tunneling and (ii) topological edge states that coexist within the Dirac continuum for opposite valley and pseudospin polarizations. These phenomena offer new ways to control light in photonics, in particular, for on-chip optical isolation, filtering, and wave-division multiplexing by selective action on their pseudospin and valley degrees of freedom.

  8. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  9. Beamforming-Based Physical Layer Network Coding for Non-Regenerative Multi-Way Relaying

    Directory of Open Access Journals (Sweden)

    Klein Anja

    2010-01-01

    Full Text Available We propose non-regenerative multi-way relaying where a half-duplex multi-antenna relay station (RS assists multiple single-antenna nodes to communicate with each other. The required number of communication phases is equal to the number of the nodes, N. There are only one multiple-access phase, where the nodes transmit simultaneously to the RS, and broadcast (BC phases. Two transmission methods for the BC phases are proposed, namely, multiplexing transmission and analog network coded transmission. The latter is a cooperation method between the RS and the nodes to manage the interference in the network. Assuming that perfect channel state information is available, the RS performs transceive beamforming to the received signals and transmits simultaneously to all nodes in each BC phase. We address the optimum transceive beamforming maximising the sum rate of non-regenerative multi-way relaying. Due to the nonconvexity of the optimization problem, we propose suboptimum but practical signal processing schemes. For multiplexing transmission, we propose suboptimum schemes based on zero forcing, minimising the mean square error, and maximising the signal to noise ratio. For analog network coded transmission, we propose suboptimum schemes based on matched filtering and semidefinite relaxation of maximising the minimum signal to noise ratio. It is shown that analog network coded transmission outperforms multiplexing transmission.

  10. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  11. Edge state preparation in a one-dimensional lattice by quantum Lyapunov control

    International Nuclear Information System (INIS)

    Zhao, X L; Shi, Z C; Qin, M; Yi, X X

    2017-01-01

    Quantum Lyapunov control uses a feedback control methodology to determine control fields applied to control quantum systems in an open-loop way. In this work, we employ two Lyapunov control schemes to prepare an edge state for a fermionic chain consisting of cold atoms loaded in an optical lattice. Such a chain can be described by the Harper model. Corresponding to the two schemes, two types of quantum Lyapunov functions are considered. The results show that both the schemes are effective at preparing the edge state within a wide range of parameters. We found that the edge state can be prepared with high fidelity even if there are moderate fluctuations of on-site or hopping potentials. Both control schemes can be extended to similar chains (3 m + d , d = 2) of different lengths. Since a regular amplitude control field is easier to apply in practice, an amplitude-modulated control field is used to replace the unmodulated one. Such control approaches provide tools to explore the edge states of one-dimensional topological materials. (paper)

  12. Anonymous authentication and location privacy preserving schemes for LTE-A networks

    Directory of Open Access Journals (Sweden)

    Zaher Jabr Haddad

    2017-11-01

    Full Text Available Long Term Evaluation Advanced (LTE-A is the third generation partnership project for cellular network that allows subscribers to roam into networks (i.e., the Internet and wireless connections using spacial purpose base-stations, such as wireless access points and home node B. In such LTE-A based networks, neither base-stations, nor the Internet and wireless connections are trusted because base-stations are operated by un-trusted subscribers. Attackers may exploit these vulnerabilities to violate the privacy of the LTE-A subscribers. On the other hand, the tradeoff between privacy and authentication is another challenge in such networks. Therefore, in this paper, we propose two anonymous authentication schemes based on one-time pseudonymes and Schnorr Zero Knowledge Protocols. Instead of the international mobile subscriber identity, these schemes enable the user equipment, base-stations and mobility management entity to mutually authenticate each others and update the location of the user equipment without evolving the home subscriber server. The security analysis demonstrate that the proposed schemes thwart security and privacy attacks, such as malicious, international mobile subscriber identity catching, and tracking attacks. Additionally, our proposed schemes preserve the location privacy of user equipment since no entity except the mobility management entity and Gate-Way Mobile Location Center can link between the pseudonymes and the international mobile subscriber identity. Also attackers have no knowledge about international mobile subscriber identity. Hence, the proposed schemes achieve backward/forward secrecy. Furthermore, the performance evaluation shows that the proposed handover schemes impose a small overhead on the mobile nodes and it has smaller computation and communication overheads than those in other schemes.

  13. Halley comet position in structure of the comet origin general scheme

    International Nuclear Information System (INIS)

    Davydov, V.D.

    1988-01-01

    Attempt to explain data on the Halley comet nucleus figure by photographes received from space probes in 1986 was undertaken. Peanut-like nucleus might be formed from two bodies former system under specific conditions. This hypothesis preliminary development is made; solution way for the problem about quantitative characteristics of collision and destruction is found. Quantitative assessments confirm retention possibility of two space icebergs original form after their ''docking'' within relative velocity range up to a few meters per second. Then complex with visible saddle point between two jointed fragments is formed. The hypothesis suggested is well inscribed in the origin general scheme of comets with nucleus different types, and from general scheme one may draw up the most important details to this hypothesis (for example, power mechanism of binary system formation and reasons of its destabilization)

  14. Feasible Teleportation Schemes with Five-Atom Entangled State

    Institute of Scientific and Technical Information of China (English)

    XUE Zheng-Yuan; YI You-Min; CAO Zhuo-Liang

    2006-01-01

    Teleportation schemes with a five-atom entangled state are investigated. In the teleportation scheme Bell state measurements (BSMs) are difficult for physical realization, so we investigate another strategy using separate measurements instead of BSM based on cavity quantum electrodynamics techniques. The scheme of two-atom entangled state teleportation is a controlled and probabilistic one. For the teleportation of the three-atom entangled state, the scheme is a probabilistic one. The fidelity and the probability of the successful teleportation are also obtained.

  15. One-way hash function based on hyper-chaotic cellular neural network

    International Nuclear Information System (INIS)

    Yang Qunting; Gao Tiegang

    2008-01-01

    The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge–Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corresponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability. (general)

  16. System Protection Schemes in Eastern Denmark

    DEFF Research Database (Denmark)

    Rasmussen, Joana

    outages in the southern part of the 132-kV system introduce further stress in the power system, eventually leading to a voltage collapse. The local System Protection Scheme against voltage collapse is designed as a response-based scheme, which is dependent on local indication of reactive and active power...... effective measures, because they are associated with large reactive power losses in the transmission system. Ordered reduction of wind generation is considered an effective measure to maintain voltage stability in the system. Reactive power in the system is released due to tripping of a significant amount...... system. In that way, the power system capability could be extended beyond normal limits....

  17. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  18. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  19. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  20. Regional climate modeling: Should one attempt improving on the large scales? Lateral boundary condition scheme: Any impact?

    Energy Technology Data Exchange (ETDEWEB)

    Veljovic, Katarina; Rajkovic, Borivoj [Belgrade Univ. (RS). Inst. of Meteorology; Fennessy, Michael J.; Altshuler, Eric L. [Center for Ocean-Land-Atmosphere Studies, Calverton, MD (United States); Mesinger, Fedor [Maryland Univ., College Park (United States). Earth System Science Interdisciplinary Center; Serbian Academy of Science and Arts, Belgrade (RS)

    2010-06-15

    A considerable number of authors presented experiments in which degradation of large scale circulation occurred in regional climate integrations when large-scale nudging was not used (e.g., von Storch et al., 2000; Biner et al., 2000; Rockel et al., 2008; Sanchez-Gomez et al., 2008; Alexandru et al., 2009; among others). We here show an earlier 9-member ensemble result of the June-August precipitation difference over the contiguous United States between the ''flood year'' of 1993 and the ''drought year'' of 1988, in which the Eta model nested in the COLA AGCM gave a rather accurate depiction of the analyzed difference, even though the driver AGCM failed in doing so to the extent of having a minimum in the area where the maximum ought to be. It is suggested that this could hardly have been possible without an RCM's improvement in the large scales of the driver AGCM. We further revisit the issue by comparing the large scale skill of the Eta RCM against that of a global ECMWF 32-day ensemble forecast used as its driver. Another issue we are looking into is that of the lateral boundary condition (LBC) scheme. The question we ask is whether the almost universally used but somewhat costly relaxation scheme is necessary for a desirable RCM performance? We address this by running the Eta in two versions differing in the lateral boundary scheme used. One of these is the traditional relaxation scheme and the other is the Eta model scheme in which information is used at the outermost boundary only and not all variables are prescribed at the outflow boundary. The skills of these two sets of RCM forecasts are compared against each other and also against that of their driver. A novelty in our experiments is the verification used. In order to test the large scale skill we are looking at the forecast position accuracy of the strongest winds at the jet stream level, which we have taken as 250 hPa. We do this by calculating bias adjusted

  1. Investigation of effective thermal conductivity for pebble beds by one-way coupled CFD-DEM method for CFETR WCCB

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Lei [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); University of Science and Technology of China, Hefei, Anhui 230027 (China); Chen, Youhua [University of Science and Technology of China, Hefei, Anhui 230027 (China); Huang, Kai [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); Liu, Songlin, E-mail: slliu@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); University of Science and Technology of China, Hefei, Anhui 230027 (China)

    2016-05-15

    Highlights: • A CFD-DEM coupled numerical model is built based on the prototypical blanket pebble bed. • The numerical model can be applied to simulate heat transfer of a pebble bed and estimate effective thermal conductivity. • The numerical model agrees well with the theoretical SZB model. • Effective thermal conductivity of pebble beds for WCCB is estimated by the current model. - Abstract: The mono-sized beryllium pebble bed and the multi-sized Li{sub 2}TiO{sub 3}/Be{sub 12}Ti mixed pebble bed are the main schemes for the Water-cooled ceramic breeder blanket (WCCB) of China Fusion Engineering Test Reactor (CFETR). And the effective thermal conductivity (k{sub eff}) of the pebble beds is important to characterize the thermal performance of WCCB. In this study, a one-way coupled CFD-DEM method was employed to simulate heat transfer and estimate k{sub eff}. The geometric topology of a prototypical blanket pebble bed was produced by the discrete element method (DEM). Based on the geometric topology, the temperature distribution and the k{sub eff} were obtained by the computational fluid dynamics (CFD) analysis. The current numerical model presented a good performance to calculate k{sub eff} of the beryllium pebble bed, and according to the modeling of the Li{sub 2}TiO{sub 3}/Be{sub 12}Ti mixed pebble bed, k{sub eff} was estimated with values ranged between 2.0 and 4.0 W/(m∙K).

  2. An Efficient V2I Authentication Scheme for VANETs

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2018-01-01

    Full Text Available The advent of intelligent transportation system has a crucial impact on the traffic safety and efficiency. To cope with security issues such as spoofing attack and forgery attack, many authentication schemes for vehicular ad hoc networks (VANETs have been developed, which are based on the hypothesis that secret keys are kept perfectly secure. However, key exposure is inevitable on account of the openness of VANET environment. To address this problem, key insulation is introduced in our proposed scheme. With a helper device, vehicles could periodically update their own secret keys. In this way, the forward and backward secrecy has been achieved. In addition, the elliptic curve operations have been integrated to improve the performance. The random oracle model is adopted to prove the security of the proposed scheme, and the experiment has been conducted to demonstrate the comparison between our scheme and the existing similar schemes.

  3. Analysis and design of a nuclear boiler control scheme

    International Nuclear Information System (INIS)

    Hughes, F.M.

    1982-01-01

    The steam raising plant of a British designed nuclear power station for which the installed control scheme has given rise to performance and stability problems is considered. The lecture is based on studies carried out for the plant which illustrate the way in which multivariable frequency response methods can be used to analyse and identify the source of control problems and further enable alternative control schemes, having improved performance, to be designed. (author)

  4. A New Adaptive Hungarian Mating Scheme in Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chanju Jung

    2016-01-01

    Full Text Available In genetic algorithms, selection or mating scheme is one of the important operations. In this paper, we suggest an adaptive mating scheme using previously suggested Hungarian mating schemes. Hungarian mating schemes consist of maximizing the sum of mating distances, minimizing the sum, and random matching. We propose an algorithm to elect one of these Hungarian mating schemes. Every mated pair of solutions has to vote for the next generation mating scheme. The distance between parents and the distance between parent and offspring are considered when they vote. Well-known combinatorial optimization problems, the traveling salesperson problem, and the graph bisection problem are used for the test bed of our method. Our adaptive strategy showed better results than not only pure and previous hybrid schemes but also existing distance-based mating schemes.

  5. Spin- and valley-polarized one-way Klein tunneling in photonic topological insulators

    Science.gov (United States)

    Slobozhanyuk, Alexey

    2018-01-01

    Recent advances in condensed matter physics have shown that the spin degree of freedom of electrons can be efficiently exploited in the emergent field of spintronics, offering unique opportunities for efficient data transfer, computing, and storage (1–3). These concepts have been inspiring analogous approaches in photonics, where the manipulation of an artificially engineered pseudospin degree of freedom can be enabled by synthetic gauge fields acting on light (4–6). The ability to control these degrees of freedom significantly expands the landscape of available optical responses, which may revolutionize optical computing and the basic means of controlling light in photonic devices across the entire electromagnetic spectrum. We demonstrate a new class of photonic systems, described by effective Hamiltonians in which competing synthetic gauge fields, engineered in pseudospin, chirality/sublattice, and valley subspaces, result in bandgap opening at one of the valleys, whereas the other valley exhibits Dirac-like conical dispersion. We show that this effective response has marked implications on photon transport, among which are as follows: (i) a robust pseudospin- and valley-polarized one-way Klein tunneling and (ii) topological edge states that coexist within the Dirac continuum for opposite valley and pseudospin polarizations. These phenomena offer new ways to control light in photonics, in particular, for on-chip optical isolation, filtering, and wave-division multiplexing by selective action on their pseudospin and valley degrees of freedom. PMID:29756032

  6. structural behavior of fibrous reinforced concrete hollowcore one-way slabs strengthening by C.F.R.P

    Directory of Open Access Journals (Sweden)

    wassif khudair majeed

    2016-02-01

    Full Text Available Abstract A reinforced concrete hollow core one-way slab is one of the types of slabs used widely around the world in residential and industrial buildings to take advantage of them Economic and thermal insulation as well as to reduce the self weight of the construction . The aim of the present study is to examine the structural behavior of the reinforced concrete hollow core one-way slabs  reduce failure using the normal concrete and fibrous concrete and then strengthened using carbon fiber(CFRP This study include molding of ( 6 specimens differ in terms of the voids volume (Vv , volumetric percentage of steel fibers ( , and then strengthened by using fibers of carbon , with the aim of rehabilitation by fibers, carbon polymer (CFRP is to find out how efficient element structural when treated after the occurrence of the failure and the validity of its use in the event of a failure has occurred entirely or partly in the roof, and re- examined using the same method and conditions that were examined ceilings is affected through it, knowing that these ceilings have been addressed and strengthened in the same way , the results of the tests of the models that have been rehabilitated using carbon fiber (CFRP, compared with the same models before strengthening and examined reduce failure, increased very high susceptibility endurance extreme , with the increase ranging from (51.6% to ( 96.2% , as has been observed decrease in deflection value of models after strengthening by (CFRP. It is concluded through this study the possibility of using its concrete hollow core one-way slab as a roofing system for buildings also proved the highly efficient for this slab after rehabilitation using carbon fiber (CFRP .

  7. The generalized scheme-independent Crewther relation in QCD

    Science.gov (United States)

    Shen, Jian-Ming; Wu, Xing-Gang; Ma, Yang; Brodsky, Stanley J.

    2017-07-01

    The Principle of Maximal Conformality (PMC) provides a systematic way to set the renormalization scales order-by-order for any perturbative QCD calculable processes. The resulting predictions are independent of the choice of renormalization scheme, a requirement of renormalization group invariance. The Crewther relation, which was originally derived as a consequence of conformally invariant field theory, provides a remarkable connection between two observables when the β function vanishes: one can show that the product of the Bjorken sum rule for spin-dependent deep inelastic lepton-nucleon scattering times the Adler function, defined from the cross section for electron-positron annihilation into hadrons, has no pQCD radiative corrections. The ;Generalized Crewther Relation; relates these two observables for physical QCD with nonzero β function; specifically, it connects the non-singlet Adler function (Dns) to the Bjorken sum rule coefficient for polarized deep-inelastic electron scattering (CBjp) at leading twist. A scheme-dependent ΔCSB-term appears in the analysis in order to compensate for the conformal symmetry breaking (CSB) terms from perturbative QCD. In conventional analyses, this normally leads to unphysical dependence in both the choice of the renormalization scheme and the choice of the initial scale at any finite order. However, by applying PMC scale-setting, we can fix the scales of the QCD coupling unambiguously at every order of pQCD. The result is that both Dns and the inverse coefficient CBjp-1 have identical pQCD coefficients, which also exactly match the coefficients of the corresponding conformal theory. Thus one obtains a new generalized Crewther relation for QCD which connects two effective charges, αˆd (Q) =∑i≥1 αˆg1 i (Qi), at their respective physical scales. This identity is independent of the choice of the renormalization scheme at any finite order, and the dependence on the choice of the initial scale is negligible. Similar

  8. Remote automatic control scheme for plasma arc cutting of contaminated waste

    International Nuclear Information System (INIS)

    Dudar, A.M.; Ward, C.R.; Kriikku, E.M.

    1993-01-01

    The Robotics Development Group at the Savannah River Technology Center has developed and implemented a scheme to perform automatic cutting of metallic contaminated waste. The scheme employs a plasma arc cutter in conjunction with a laser ranging sensor attached to a robotic manipulator called the Telerobot. A software algorithm using proportional control is then used to perturb the robot's trajectory in such a way as to regulate the plasma arc standoff and the robot's speed in order to achieve automatic plasma arc cuts. The scheme has been successfully tested on simulated waste materials and the results have been very favorable. This report details the development and testing of the scheme

  9. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...

  10. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  11. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  12. Electromagnetic transitions of heavy quarkonia in the boosted LS-coupling scheme

    International Nuclear Information System (INIS)

    Ishida, Shin; Morikawa, Akiyoshi; Oda, Masuho

    1998-01-01

    Radiative transitions among heavy quarkonium systems are investigated in a general framework of the boosted LS-coupling (BLS) scheme, where mesons are treated in a manifestly covariant way and conserved effective currents are explicitly given. As a result it is shown that our theory reproduces the qualitative features of experiments remarkably well, giving evidence for the validity of the BLS scheme. (author)

  13. One-way hash function construction based on the spatiotemporal chaotic system

    International Nuclear Information System (INIS)

    Luo Yu-Ling; Du Ming-Hui

    2012-01-01

    Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the hash compression function in parallel. The hash compression is constructed based on the spatiotemporal chaos. In each message block, the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function. The final hash value is generated by further compressing the mixed result of all the hash compression values. Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key, good statistical properties, and strong collision resistance. (general)

  14. Iterative scheme for electronic systems: using one-electron Green's functions

    International Nuclear Information System (INIS)

    Hyslop, J.; Rees, D.

    1976-01-01

    An iterative generalization of the minimum principle proposed for electronic systems by Hall, Hyslop, and Rees is investigated. It is shown that this generalization still retains the advantage of using members of a larger class of trial wave functions, for example those with discontinuities, as initial approximations to the wave functions. This scheme has the advantage that, at each stage of iteration, an upper bound is obtained which is at least as good as that obtained previously. The theory is first applied to the hydrogen atom. It is then adapted to estimate the Hartree--Fock energy of the helium atom, the Hartree--Fock limit being obtained after a relatively small number of iterations

  15. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  16. Unsplit schemes for hyperbolic conservation laws with source terms in one space dimension

    International Nuclear Information System (INIS)

    Papalexandris, M.V.; Leonard, A.; Dimotakis, P.E.

    1997-01-01

    The present work is concerned with an application of the theory of characteristics to conservation laws with source terms in one space dimension, such as the Euler equations for reacting flows. Space-time paths are introduced on which the flow/chemistry equations decouple to a characteristic set of ODE's for the corresponding homogeneous laws, thus allowing the introduction of functions analogous to the Riemann invariants in classical theory. The geometry of these paths depends on the spatial gradients of the solution. This particular decomposition can be used in the design of efficient unsplit algorithms for the numerical integration of the equations. As a first step, these ideas are implemented for the case of a scalar conservation law with a nonlinear source term. The resulting algorithm belongs to the class of MUSCL-type, shock-capturing schemes. Its accuracy and robustness are checked through a series of tests. The stiffness of the source term is also studied. Then, the algorithm is generalized for a system of hyperbolic equations, namely the Euler equations for reacting flows. A numerical study of unstable detonations is performed. 57 refs

  17. On the degrees-of-freedom of the MIMO three-way channel with intermittent connectivity

    KAUST Repository

    Chaaban, Anas

    2017-08-29

    The degrees-of-freedom (DoF) of the multi-antenna three-way channel (3WC) with an intermittent node is studied. Special attention is given to the impact of adaptation when the intermittent node has the largest number of antennas. A non-adaptive transmission scheme based on interference alignment, zero-forcing, and erasure-channel treatment is proposed, and its corresponding DoF region is derived. Then, it is shown that this scheme achieves the sum-DoF of the intermittent channel, in addition to the DoF region of the nonintermittent one. Thus, adaptation is not necessary from those perspectives. To the contrary, it is shown that adaptation is necessary for achieving the DoF region of the intermittent case. This is shown by deriving an outer bound for the intermittent channel with nonadaptive encoding, and proposing an adaptive scheme which achieves DoF tuples outside this bound. This highlights the importance of cooperation in this intermittent network.

  18. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism

    Science.gov (United States)

    Ye, Ruisong

    2011-10-01

    This paper proposes a novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, in which permuting the positions of image pixels incorporates with changing the gray values of image pixels to confuse the relationship between cipher-image and plain-image. In the permutation process, a generalized Arnold map is utilized to generate one chaotic orbit used to get two index order sequences for the permutation of image pixel positions; in the diffusion process, a generalized Arnold map and a generalized Bernoulli shift map are employed to yield two pseudo-random gray value sequences for a two-way diffusion of gray values. The yielded gray value sequences are not only sensitive to the control parameters and initial conditions of the considered chaotic maps, but also strongly depend on the plain-image processed, therefore the proposed scheme can resist statistical attack, differential attack, known-plaintext as well as chosen-plaintext attack. Experimental results are carried out with detailed analysis to demonstrate that the proposed image encryption scheme possesses large key space to resist brute-force attack as well.

  19. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  20. Vibration analysis of pipes conveying fluid by transfer matrix method

    International Nuclear Information System (INIS)

    Li, Shuai-jun; Liu, Gong-min; Kong, Wei-tao

    2014-01-01

    Highlights: • A theoretical study on vibration analysis of pipes with FSI is presented. • Pipelines with high fluid pressure and velocity can be solved by developed method. • Several pipeline schemes are discussed to illustrate the application of the method. • The proposed method is easier to apply compared to most existing procedures. • Influence laws of structural and fluid parameters on FSI of pipe are analyzed. -- Abstract: Considering the effects of pipe wall thickness, fluid pressure and velocity, a developed 14-equation model is presented, which describes the fluid–structure interaction behavior of pipelines. The transfer matrix method has been used for numerical modeling of both hydraulic and structural equations. Based on these models and algorithms, several pipeline schemes are presented to illustrate the application of the proposed method. Furthermore, the influence laws of supports, structural properties and fluid parameters on the dynamic response and natural frequencies of pipeline are analyzed, which shows using the optimal supports and structural properties is beneficial to reduce vibration of pipelines

  1. Balance in Representation - More Than One Way to Tip the Scales

    Science.gov (United States)

    Rowell, D. S.; Carlis, D. L.

    2017-12-01

    Too often diversity balance is seen as purely a numbers issue - one of influx and totals. And thus recruiting and retention being two sides of the same valuable coin. However, balance is not just numbers. There is more than one means to add diversity value to an organization. Numbers is one, but power is another. `Balance' is also reached through empowerment and voice. Whereas recruiting and retention can be seen as hard currency buying balanced demographics, empowerment is an investment that takes various forms and yields various dividends. Empowerment includes investment in people, and training, and systems, and pays dividends in performance, and voice, and careers, and service. In this way space is created for the benefits of diversity even where numbers and composition is statically unyielding. Equilibrium comes from tipping the scales with involvement, impact and affect. And finally in coming back full circle, empowerment has a bonus direct effect on the numbers, as it does improve diverse recruiting and retention. This presentation places a focus on balance in terms of gender efficacy. It will highlight the requirements to grow and mature gender empowerment investments and show how these investments have diversity dividends. And finally the presentation will note how NWS is taking a multi-faceted approach to diversity to achieve `balance' through empowerment, involvement, (gender) mainstreaming, training, etc…, and of course recruiting and retention.

  2. An experiment to measure the one-way velocity of propagation of electromagnetic radiation

    Science.gov (United States)

    Kolen, P.; Torr, D. G.

    1982-01-01

    An experiment involving commercially available instrumentation to measure the velocity of the earth with respect to absolute space is described. The experiment involves the measurement of the one-way propagation velocity of electromagnetic radiation down a high-quality coaxial cable. It is demonstrated that the experiment is both physically meaningful and exceedingly simple in concept and in implementation. It is shown that with currently available commercial equipment one might expect to detect a threshold value for the component of velocity of the earth's motion with respect to absolute space in the equatorial plane of approximately 10 km/s, which greatly exceeds the velocity resolution required to detect the motion of the solar system with respect to the center of the galaxy.

  3. High-Order Hyperbolic Residual-Distribution Schemes on Arbitrary Triangular Grids

    Science.gov (United States)

    Mazaheri, Alireza; Nishikawa, Hiroaki

    2015-01-01

    In this paper, we construct high-order hyperbolic residual-distribution schemes for general advection-diffusion problems on arbitrary triangular grids. We demonstrate that the second-order accuracy of the hyperbolic schemes can be greatly improved by requiring the scheme to preserve exact quadratic solutions. We also show that the improved second-order scheme can be easily extended to third-order by further requiring the exactness for cubic solutions. We construct these schemes based on the LDA and the SUPG methodology formulated in the framework of the residual-distribution method. For both second- and third-order-schemes, we construct a fully implicit solver by the exact residual Jacobian of the second-order scheme, and demonstrate rapid convergence of 10-15 iterations to reduce the residuals by 10 orders of magnitude. We demonstrate also that these schemes can be constructed based on a separate treatment of the advective and diffusive terms, which paves the way for the construction of hyperbolic residual-distribution schemes for the compressible Navier-Stokes equations. Numerical results show that these schemes produce exceptionally accurate and smooth solution gradients on highly skewed and anisotropic triangular grids, including curved boundary problems, using linear elements. We also present Fourier analysis performed on the constructed linear system and show that an under-relaxation parameter is needed for stabilization of Gauss-Seidel relaxation.

  4. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  5. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  6. A Comparison of Angular Difference Schemes for One-Dimensional Spherical Geometry SN Equations

    International Nuclear Information System (INIS)

    Lathrop, K.D.

    2000-01-01

    To investigate errors caused by angular differencing in approximating the streaming terms of the transport equation, five different approximations are evaluated for three test problems in one-dimensional spherical geometry. The following schemes are compared: diamond, special truncation error minimizing weighted diamond, linear continuous (the original S N scheme), linear discontinuous, and new quadratic continuous. To isolate errors caused by angular differencing, the approximations are derived from the transport equation without spatial differencing, and the resulting coupled ordinary differential equations (ODEs) are solved with an ODE solver. Results from the approximations are compared with analytic solutions derived for two-region purely absorbing spheres. Most of the approximations are derived by taking moments of the conservation form of the transport equation. The quadratic continuous approximation is derived taking the zeroth moment of both the transport equation and the first angular derivative of the transport equation. The advantages of this approach are described. In all of the approximations, the desirability is shown of using an initializing computation of the μ = -1 angular flux to correctly compute the central flux and of having a difference approximation that ensures this central flux is the same for all directions. The behavior of the standard discrete ordinates equations in the diffusion limit is reviewed, and the linear and quadratic continuous approximations are shown to have the correct diffusion limit if an equal interval discrete quadrature is used.In all three test problems, the weighted diamond difference approximation has smaller maximum and average relative flux errors than the diamond or the linear continuous difference approximations. The quadratic continuous approximation and the linear discontinuous approximation are both more accurate than the other approximations, and the quadratic continuous approximation has a decided edge

  7. A comparison of angular difference schemes for one-dimensional spherical geometry SN equations

    International Nuclear Information System (INIS)

    Lathrop, K.D.

    2000-01-01

    To investigate errors caused by angular differencing in approximating the streaming terms of the transport equation, five different approximations are evaluated for three test problems in one-dimensional spherical geometry. The following schemes are compared: diamond, special truncation error minimizing weighted diamond, linear continuous (the original S N scheme), linear discontinuous, and new quadratic continuous. To isolate errors caused by angular differencing, the approximations are derived from the transport equation without spatial differencing, and the resulting coupled ordinary differential equations (ODEs) are solved with an ODE solver. Results from the approximations are compared with analytic solutions derived for two-region purely absorbing spheres. Most of the approximations are derived by taking moments of the conservation form of the transport equation. The quadratic continuous approximation is derived taking the zeroth moment of both the transport equation and the first angular derivative of the transport equation. The advantages of this approach are described, In all of the approximations, the desirability is shown of using an initializing computation of the μ = -1 angular flux to correctly compute the central flux and of having a difference approximation that ensures this central flux is the same for all directions. The behavior of the standard discrete ordinates equations in the diffusion limit is reviewed, and the linear and quadratic continuous approximations are shown to have the correct diffusion limit if an equal interval discrete quadrature is used. In all three test problems, the weighted diamond difference approximation has smaller maximum and average relative flux errors than the diamond or the linear continuous difference approximations. The quadratic continuous approximation and the linear discontinuous approximation are both more accurate than the other approximations, and the quadratic continuous approximation has a decided edge

  8. New Course Design: Classification Schemes and Information Architecture.

    Science.gov (United States)

    Weinberg, Bella Hass

    2002-01-01

    Describes a course developed at St. John's University (New York) in the Division of Library and Information Science that relates traditional classification schemes to information architecture and Web sites. Highlights include functional aspects of information architecture, that is, the way content is structured; assignments; student reactions; and…

  9. High-efficiency one-dimensional atom localization via two parallel standing-wave fields

    International Nuclear Information System (INIS)

    Wang, Zhiping; Wu, Xuqiang; Lu, Liang; Yu, Benli

    2014-01-01

    We present a new scheme of high-efficiency one-dimensional (1D) atom localization via measurement of upper state population or the probe absorption in a four-level N-type atomic system. By applying two classical standing-wave fields, the localization peak position and number, as well as the conditional position probability, can be easily controlled by the system parameters, and the sub-half-wavelength atom localization is also observed. More importantly, there is 100% detecting probability of the atom in the subwavelength domain when the corresponding conditions are satisfied. The proposed scheme may open up a promising way to achieve high-precision and high-efficiency 1D atom localization. (paper)

  10. Structural Behavior of Fibrous Reinforced Concrete Hollow Core One-Way Slabs Strengthening by C.F.R.P

    Directory of Open Access Journals (Sweden)

    وصيف مجيد

    2016-02-01

    Full Text Available A reinforced concrete hollow core one-way slab is one of the types of slabs used widely around the world in residential and industrial buildings to take advantage of them Economic and thermal insulation as well as to reduce the self-weight of the construction. The aim of the present study is to examine the structural behavior of the reinforced concrete hollow core one-way slabs reduce failure using the normal concrete and fibrous concrete and then strengthened using carbon fiber(CFRPThis study include molding of ( 6 specimens differ in terms of the voids volume (Vv , volumetric percentage of steel fibers (ا, and then strengthened by using fibers of carbon , with the aim of rehabilitation by fibers, carbon polymer (CFRP is to find out how efficient element structural when treated after the occurrence of the failure and the validity of its use in the event of a failure has occurred entirely or partly in the roof, and re- examined using the same method and conditions that were examined ceilings is affected through it, knowing that these ceilings have been addressed and strengthened in the same way , the results of the tests of the models that have been rehabilitated using carbon fiber (CFRP, compared with the same models before strengthening and examined reduce failure, increased very high susceptibility endurance extreme , with the increase ranging from (51.6% to (96.2%, as has been observed decrease in deflection value of models after strengthening by (CFRP.It is concluded through this study the possibility of using its concrete hollow core one-way slab as a roofing system for buildings also proved the highly efficient for this slab after rehabilitation using carbon fiber (CFRP.

  11. Investigation and Control of VIVs with Multi-Lock-in Regions on Wide Flat Box Girders

    Directory of Open Access Journals (Sweden)

    Bo Wu

    2017-01-01

    Full Text Available On the preliminary designing of a wide flat box girder with the slenderness ratio 12, vertical and torsional vortex-induced vibrations (VIV are observed in wind tunnel tests. More than one lock-in region, which are defined as “multi-lock-in regions,” are recorded. Therefore, suspicions should be aroused regarding the viewpoint that wide box girders are aerodynamic friendly. As the three nascent vortexes originating at the pedestrian guardrails and inspection rails shed to near-wake through different pathways with different frequencies, the mechanisms of VIVs and multi-lock-in regions are analyzed to be determined by the inappropriate subsidiary structures. A hybrid method combining Large Eddy Simulation (LES with experimental results is introduced to study the flow-structure interactions (FSI when undergoing VIVs; the vortex mode of torsional VIV on wide flat box girders is defined as “4/2S,” which is different from any other known ones. Based on the mechanism of VIV, a new approach by increasing ventilation rate of the pedestrian guardrails is proved to be effective in suppressing vertical and torsional VIVs, and it is more feasible than other control schemes. Then, the control mechanisms are deeper investigated by analyzing the evolution of vortex mode and FSI using Hybrid-LES method.

  12. Green rooms - schemes, feasible ways and aims concerning the improvement of the quality of life in residential buildings

    Energy Technology Data Exchange (ETDEWEB)

    Roehrbein, R.

    1986-06-01

    Both an improvement of environs and an improvement of the quality of buildings contribute to checking the economic, social and psychological motives of the migration from urban to rural areas. An introductory survey describes the constructional schemes (e.g. Le Corbusier) the relevant efforts are based on. The author stresses the trend towards more roominess and freedom of movement. A brief description of the development since 1945 is followed by a detailed discussion exemplifying the rehabilitation of urban areas. Along with cost calculations and regulatory aspects (planning, building ordinance, attached greenhouses) the author presents a four-room maisonnette model with one of its rooms designed as a 'green room'. The zone verte of the latter (5x5 m) proved to be ideally suited for various most attractive uses. (HWJ).

  13. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  14. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  15. On doublet composite schemes of leptons and quarks

    International Nuclear Information System (INIS)

    Pirogov, Yu.F.

    1981-01-01

    All simplest doublet composite schemes are classified. Four different doublet schemes are shown to be available. A new scheme with charge doublet Q=(2/3, -1/3) rather advantageous as compared with the previous ones is being considered. Some difficulties in interpreting the colour as an effective symmetry are pointed out [ru

  16. Two-way quantum key distribution at telecommunication wavelength

    International Nuclear Information System (INIS)

    Kumar, Rupesh; Lucamarini, Marco; Di Giuseppe, Giovanni; Natali, Riccardo; Mancini, Giorgio; Tombesi, Paolo

    2008-01-01

    We report on a quantum key distribution effected with a two-way deterministic protocol over a standard telecommunication fiber. Despite the common belief of a prohibitive loss rate for such a scheme, our results show its feasibility on distances of few tenths of kilometers

  17. Pseudospin Dependent One-Way Transmission in Graphene-Based Topological Plasmonic Crystals

    Science.gov (United States)

    Qiu, Pingping; Qiu, Weibin; Ren, Junbo; Lin, Zhili; Wang, Zeyu; Wang, Jia-Xian; Kan, Qiang; Pan, Jiao-Qing

    2018-04-01

    Originating from the investigation of condensed matter states, the concept of quantum Hall effect and quantum spin Hall effect (QSHE) has recently been expanded to other field of physics and engineering, e.g., photonics and phononics, giving rise to strikingly unconventional edge modes immune to scattering. Here, we present the plasmonic analog of QSHE in graphene plasmonic crystal (GPC) in mid-infrared frequencies. The band inversion occurs when deforming the honeycomb lattice GPCs, which further leads to the topological band gaps and pseudospin features of the edge states. By overlapping the band gaps with different topologies, we numerically simulated the pseudospin-dependent one-way propagation of edge states. The designed GPC may find potential applications in the fields of topological plasmonics and trigger the exploration of the technique of the pseudospin multiplexing in high-density nanophotonic integrated circuits.

  18. Fluid-structure interaction simulation of floating structures interacting with complex, large-scale ocean waves and atmospheric turbulence with application to floating offshore wind turbines

    Science.gov (United States)

    Calderer, Antoni; Guo, Xin; Shen, Lian; Sotiropoulos, Fotis

    2018-02-01

    We develop a numerical method for simulating coupled interactions of complex floating structures with large-scale ocean waves and atmospheric turbulence. We employ an efficient large-scale model to develop offshore wind and wave environmental conditions, which are then incorporated into a high resolution two-phase flow solver with fluid-structure interaction (FSI). The large-scale wind-wave interaction model is based on a two-fluid dynamically-coupled approach that employs a high-order spectral method for simulating the water motion and a viscous solver with undulatory boundaries for the air motion. The two-phase flow FSI solver is based on the level set method and is capable of simulating the coupled dynamic interaction of arbitrarily complex bodies with airflow and waves. The large-scale wave field solver is coupled with the near-field FSI solver with a one-way coupling approach by feeding into the latter waves via a pressure-forcing method combined with the level set method. We validate the model for both simple wave trains and three-dimensional directional waves and compare the results with experimental and theoretical solutions. Finally, we demonstrate the capabilities of the new computational framework by carrying out large-eddy simulation of a floating offshore wind turbine interacting with realistic ocean wind and waves.

  19. A Latent Class Multidimensional Scaling Model for Two-Way One-Mode Continuous Rating Dissimilarity Data

    Science.gov (United States)

    Vera, J. Fernando; Macias, Rodrigo; Heiser, Willem J.

    2009-01-01

    In this paper, we propose a cluster-MDS model for two-way one-mode continuous rating dissimilarity data. The model aims at partitioning the objects into classes and simultaneously representing the cluster centers in a low-dimensional space. Under the normal distribution assumption, a latent class model is developed in terms of the set of…

  20. Exact Markov chain and approximate diffusion solution for haploid genetic drift with one-way mutation.

    Science.gov (United States)

    Hössjer, Ola; Tyvand, Peder A; Miloh, Touvia

    2016-02-01

    The classical Kimura solution of the diffusion equation is investigated for a haploid random mating (Wright-Fisher) model, with one-way mutations and initial-value specified by the founder population. The validity of the transient diffusion solution is checked by exact Markov chain computations, using a Jordan decomposition of the transition matrix. The conclusion is that the one-way diffusion model mostly works well, although the rate of convergence depends on the initial allele frequency and the mutation rate. The diffusion approximation is poor for mutation rates so low that the non-fixation boundary is regular. When this happens we perturb the diffusion solution around the non-fixation boundary and obtain a more accurate approximation that takes quasi-fixation of the mutant allele into account. The main application is to quantify how fast a specific genetic variant of the infinite alleles model is lost. We also discuss extensions of the quasi-fixation approach to other models with small mutation rates. Copyright © 2015 Elsevier Inc. All rights reserved.

  1. Self-biased broadband magnet-free linear isolator based on one-way space-time coherency

    Science.gov (United States)

    Taravati, Sajjad

    2017-12-01

    This paper introduces a self-biased broadband magnet-free and linear isolator based on one-way space-time coherency. The incident wave and the space-time-modulated medium share the same temporal frequency and are hence temporally coherent. However, thanks to the unidirectionally of the space-time modulation, the space-time-modulated medium and the incident wave are spatially coherent only in the forward direction and not in the opposite direction. As a consequence, the energy of the medium strongly couples to the propagating wave in the forward direction, while it conflicts with the propagating wave in the opposite direction, yielding strong isolation. We first derive a closed-form solution for the wave scattering from a spatiotemporally coherent medium and then show that a perfectly coherent space-time-modulated medium provides a moderate isolation level which is also subject to one-way transmission gain. To overcome this issue, we next investigate the effect of space-coherency imperfection between the medium and the wave, while they are still perfectly temporally coherent. Leveraging the spatial-coherency imperfection, the medium exhibits a quasiarbitrary and strong nonreciprocal transmission. Finally, we present the experimental demonstration of the self-biased version of the proposed broadband isolator, exhibiting more than 122 % fractional operation bandwidth.

  2. Update schemes of multi-velocity floor field cellular automaton for pedestrian dynamics

    Science.gov (United States)

    Luo, Lin; Fu, Zhijian; Cheng, Han; Yang, Lizhong

    2018-02-01

    Modeling pedestrian movement is an interesting problem both in statistical physics and in computational physics. Update schemes of cellular automaton (CA) models for pedestrian dynamics govern the schedule of pedestrian movement. Usually, different update schemes make the models behave in different ways, which should be carefully recalibrated. Thus, in this paper, we investigated the influence of four different update schemes, namely parallel/synchronous scheme, random scheme, order-sequential scheme and shuffled scheme, on pedestrian dynamics. The multi-velocity floor field cellular automaton (FFCA) considering the changes of pedestrians' moving properties along walking paths and heterogeneity of pedestrians' walking abilities was used. As for parallel scheme only, the collisions detection and resolution should be considered, resulting in a great difference from any other update schemes. For pedestrian evacuation, the evacuation time is enlarged, and the difference in pedestrians' walking abilities is better reflected, under parallel scheme. In face of a bottleneck, for example a exit, using a parallel scheme leads to a longer congestion period and a more dispersive density distribution. The exit flow and the space-time distribution of density and velocity have significant discrepancies under four different update schemes when we simulate pedestrian flow with high desired velocity. Update schemes may have no influence on pedestrians in simulation to create tendency to follow others, but sequential and shuffled update scheme may enhance the effect of pedestrians' familiarity with environments.

  3. Challenging the One-Way Paradigm for More Effective Science Communication: A Critical Review of Two Public Campaigns Addressing Contentious Environmental Issues

    Science.gov (United States)

    McEntee, Marie; Mortimer, Claire

    2013-01-01

    This article examines two large-scale public communication campaigns to explore the appropriateness and effectiveness of using one-way communication in contentious environmental issues. The findings show while one-way communication can be successfully employed in contentious issues, it is not appropriate for all contexts and may contribute to…

  4. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  5. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.

    Science.gov (United States)

    Wang, Shangping; Zhao, Duqiao; Zhang, Yaling

    2017-01-01

    Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme with attribute revocation in cloud storage, the keyword search in our scheme is attribute based with access control, when the search succeeds, the cloud server returns the corresponding cipher text to user and the user can decrypt the cipher text definitely. Besides, our scheme supports multiple keywords search, which makes the scheme more practical. Under the assumption of decisional bilinear Diffie-Hellman exponent (q-BDHE) and decisional Diffie-Hellman (DDH) in the selective security model, we prove that our scheme is secure.

  6. Heat-electrical regeneration way to intensive energy saving in an electric arc furnaces

    Science.gov (United States)

    Kartavtcev, S.; Matveev, S.; Neshporenko, E.

    2018-03-01

    Energy saving in steel production is of great significance for its large economical scale of 1500 mil t/year and high-energy consumption. Steady trend of last years is an increase of steel production in electric arc furnaces (EAF) with a very high consumption of electricity up to 750 kWh/ton. The intention to reduce so much energy consumption they can reach by many ways. One of such way is a transforming heat energy of liquid steel to electricity and destine it to steel electric arc process. Under certain conditions, it may lead to “zero” consumption of electric power in the process. The development of these conditions leads to the formation of energy-efficient heat schemes, with a minimum electricity consumption from the external network.

  7. A new hybrid numerical scheme for modelling elastodynamics in unbounded media with near-source heterogeneities

    Science.gov (United States)

    Hajarolasvadi, Setare; Elbanna, Ahmed E.

    2017-11-01

    The finite difference (FD) and the spectral boundary integral (SBI) methods have been used extensively to model spontaneously-propagating shear cracks in a variety of engineering and geophysical applications. In this paper, we propose a new modelling approach in which these two methods are combined through consistent exchange of boundary tractions and displacements. Benefiting from the flexibility of FD and the efficiency of SBI methods, the proposed hybrid scheme will solve a wide range of problems in a computationally efficient way. We demonstrate the validity of the approach using two examples for dynamic rupture propagation: one in the presence of a low-velocity layer and the other in which off-fault plasticity is permitted. We discuss possible potential uses of the hybrid scheme in earthquake cycle simulations as well as an exact absorbing boundary condition.

  8. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  9. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  10. WENO schemes for balance laws with spatially varying flux

    International Nuclear Information System (INIS)

    Vukovic, Senka; Crnjaric-Zic, Nelida; Sopta, Luka

    2004-01-01

    In this paper we construct numerical schemes of high order of accuracy for hyperbolic balance law systems with spatially variable flux function and a source term of the geometrical type. We start with the original finite difference characteristicwise weighted essentially nonoscillatory (WENO) schemes and then we create new schemes by modifying the flux formulations (locally Lax-Friedrichs and Roe with entropy fix) in order to account for the spatially variable flux, and by decomposing the source term in order to obtain balance between numerical approximations of the flux gradient and of the source term. We apply so extended WENO schemes to the one-dimensional open channel flow equations and to the one-dimensional elastic wave equations. In particular, we prove that in these applications the new schemes are exactly consistent with steady-state solutions from an appropriately chosen subset. Experimentally obtained orders of accuracy of the extended and original WENO schemes are almost identical on a convergence test. Other presented test problems illustrate the improvement of the proposed schemes relative to the original WENO schemes combined with the pointwise source term evaluation. As expected, the increase in the formal order of accuracy of applied WENO reconstructions in all the tests causes visible increase in the high resolution properties of the schemes

  11. Brillouin-zone integration schemes: an efficiency study for the phonon frequency moments of the harmonic, solid, one-component plasma

    International Nuclear Information System (INIS)

    Albers, R.C.; Gubernatis, J.E.

    1981-01-01

    The efficiency of four different Brillouin-zone integration schemes including the uniform mesh, special point method, special directions method, and Holas method are compared for calculating moments of the harmonic phonon frequencies of the solid one-component plasma. Very accurate values for the moments are also presented. The Holas method for which weights and integration points can easily be generated has roughly the same efficiency as the special directions method, which is much superior to the uniform mesh and special point methods for this problem

  12. A Fuzzy Commitment Scheme with McEliece's Cipher

    Directory of Open Access Journals (Sweden)

    Deo Brat Ojha

    2010-04-01

    Full Text Available In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. This scheme is one of the interesting candidates for post quantum cryptography. Hence our interest to deal with this system with fuzzy commitment scheme. The concept itself is illustrated with the help of a simple situation and the validation of mathematical experimental verification is provided.

  13. Investigation of schemes for incorporating generator Q limits in the ...

    Indian Academy of Sciences (India)

    Handling generator Q limits is one such important feature needed in any practical load flow method. This paper presents a comprehensive investigation of two classes of schemes intended to handle this aspect i.e. the bus type switching scheme and the sensitivity scheme. We propose two new sensitivity based schemes ...

  14. Redundancy scheme for multi-layered accelerator control system

    International Nuclear Information System (INIS)

    Chauhan, Amit; Fatnani, Pravin

    2009-01-01

    The control system for SRS Indus-2 has three-layered architecture. There are VMEbus based stations at the lower two layers that are controlled by their respective CPU board. The 'Profibus' fieldbus standard is used for communication between these VME stations distributed in the field. There is a Profibus controller board at each station to implement the communication protocol. The mode of communication is master-slave (command-response) type. This paper proposes a scheme to implement redundancy at the lower two layers namely Layer-2 (Supervisory Layer / Profibus-master) and Layer-3 (Equipment Unit Interface Layer / Profibus-slave). The redundancy is for both the CPU and the communication board. The scheme uses two CPU boards and two Profi controller boards at each L-3 station. This helps in decreasing any downtime resulting either from CPU faults or communication board faults that are placed in the field area. Redundancy of Profi boards provides two active communication channels between the stations that can be used in different ways thereby increasing the availability on a communication link. Redundancy of CPU boards provides certain level of auto fault-recovery as one CPU remains active and the other CPU remains in standby mode, which takes over the control of VMEbus in case of any fault in the main CPU. (author)

  15. Physics-preserving averaging scheme based on Grunwald-Letnikov formula for gas flow in fractured media

    KAUST Repository

    Amir, Sahar Z.

    2018-01-02

    The heterogeneous natures of rock fabrics, due to the existence of multi-scale fractures and geological formations, led to the deviations from unity in the flux-equations fractional-exponent magnitudes. In this paper, the resulting non-Newtonian non-Darcy fractional-derivatives flux equations are solved using physics-preserving averaging schemes that incorporates both, original and shifted, Grunwald-Letnikov (GL) approximation formulas preserving the physics, by reducing the shifting effects, while maintaining the stability of the system, by keeping one shifted expansion. The proposed way of using the GL expansions also generate symmetrical coefficient matrices that significantly reduces the discretization complexities appearing with all shifted cases from literature, and help considerably in 2D and 3D systems. Systems equations derivations and discretization details are discussed. Then, the physics-preserving averaging scheme is explained and illustrated. Finally, results are presented and reviewed. Edge-based original GL expansions are unstable as also illustrated in literatures. Shifted GL expansions are stable but add a lot of additional weights to both discretization sides affecting the physical accuracy. In comparison, the physics-preserving averaging scheme balances the physical accuracy and stability requirements leading to a more physically conservative scheme that is more stable than the original GL approximation but might be slightly less stable than the shifted GL approximations. It is a locally conservative Single-Continuum averaging scheme that applies a finite-volume viewpoint.

  16. Physics-preserving averaging scheme based on Grunwald-Letnikov formula for gas flow in fractured media

    KAUST Repository

    Amir, Sahar Z.; Sun, Shuyu

    2018-01-01

    The heterogeneous natures of rock fabrics, due to the existence of multi-scale fractures and geological formations, led to the deviations from unity in the flux-equations fractional-exponent magnitudes. In this paper, the resulting non-Newtonian non-Darcy fractional-derivatives flux equations are solved using physics-preserving averaging schemes that incorporates both, original and shifted, Grunwald-Letnikov (GL) approximation formulas preserving the physics, by reducing the shifting effects, while maintaining the stability of the system, by keeping one shifted expansion. The proposed way of using the GL expansions also generate symmetrical coefficient matrices that significantly reduces the discretization complexities appearing with all shifted cases from literature, and help considerably in 2D and 3D systems. Systems equations derivations and discretization details are discussed. Then, the physics-preserving averaging scheme is explained and illustrated. Finally, results are presented and reviewed. Edge-based original GL expansions are unstable as also illustrated in literatures. Shifted GL expansions are stable but add a lot of additional weights to both discretization sides affecting the physical accuracy. In comparison, the physics-preserving averaging scheme balances the physical accuracy and stability requirements leading to a more physically conservative scheme that is more stable than the original GL approximation but might be slightly less stable than the shifted GL approximations. It is a locally conservative Single-Continuum averaging scheme that applies a finite-volume viewpoint.

  17. Counting dementia: There is no one "best" way.

    Science.gov (United States)

    Launer, Lenore J

    2011-01-01

    The growing societal and individual burden of dementia means that counting the cases of dementia is critical. There are several approaches and methods that can be used to identify dementia cases. The ascertainment can range from very detailed characterization of the individual (deep) to a brief standardized assessment (wide) that emphasizes individual functioning. The choice of going deep or wide depends on the goal of the ascertainment. These goals are discussed, as well as the emerging issues that may change the way dementia cases are classified. Published by Elsevier Inc.

  18. The effect of a dynamic background albedo scheme on Sahel/Sahara precipitation during the mid-Holocene

    Directory of Open Access Journals (Sweden)

    F. S. E. Vamborg

    2011-02-01

    Full Text Available We have implemented a new albedo scheme that takes the dynamic behaviour of the surface below the canopy into account, into the land-surface scheme of the MPI-ESM. The standard (static scheme calculates the seasonal canopy albedo as a function of leaf area index, whereas the background albedo is a gridbox constant derived from satellite measurements. The new (dynamic scheme additionally models the background albedo as a slowly changing function of organic matter in the ground and of litter and standing dead biomass covering the ground. We use the two schemes to investigate the interactions between vegetation, albedo and precipitation in the Sahel/Sahara for two time-slices: pre-industrial and mid-Holocene. The dynamic scheme represents the seasonal cycle of albedo and the correspondence between annual mean albedo and vegetation cover in a more consistent way than the static scheme. It thus gives a better estimate of albedo change between the two time periods. With the introduction of the dynamic scheme, precipitation is increased by 30 mm yr−1 for the pre-industrial simulation and by about 80 mm yr−1 for the mid-Holocene simulation. The present-day dry bias in the Sahel of standard ECHAM5 is thus reduced and the sensitivity of precipitation to mid-Holocene external forcing is increased by around one third. The locations of mid-Holocene lakes, as estimated from reconstructions, lie south of the modelled desert border in both mid-Holocene simulations. The magnitude of simulated rainfall in this area is too low to fully sustain lakes, however it is captured better with the dynamic scheme. The dynamic scheme leads to increased vegetation variability in the remaining desert region, indicating a higher frequency of green spells, thus reaching a better agreement with the vegetation distribution as derived from pollen records.

  19. Design of a polynomial ring based symmetric homomorphic encryption scheme

    Directory of Open Access Journals (Sweden)

    Smaranika Dasgupta

    2016-09-01

    Full Text Available Security of data, especially in clouds, has become immensely essential for present-day applications. Fully homomorphic encryption (FHE is a great way to secure data which is used and manipulated by untrusted applications or systems. In this paper, we propose a symmetric FHE scheme based on polynomial over ring of integers. This scheme is somewhat homomorphic due to accumulation of noise after few operations, which is made fully homomorphic using a refresh procedure. After certain amount of homomorphic computations, large ciphertexts are refreshed for proper decryption. The hardness of the scheme is based on the difficulty of factorizing large integers. Also, it requires polynomial addition which is computationally cost effective. Experimental results are shown to support our claim.

  20. One-way membrane trafficking of SOS in receptor-triggered Ras activation.

    Science.gov (United States)

    Christensen, Sune M; Tu, Hsiung-Lin; Jun, Jesse E; Alvarez, Steven; Triplet, Meredith G; Iwig, Jeffrey S; Yadav, Kamlesh K; Bar-Sagi, Dafna; Roose, Jeroen P; Groves, Jay T

    2016-09-01

    SOS is a key activator of the small GTPase Ras. In cells, SOS-Ras signaling is thought to be initiated predominantly by membrane recruitment of SOS via the adaptor Grb2 and balanced by rapidly reversible Grb2-SOS binding kinetics. However, SOS has multiple protein and lipid interactions that provide linkage to the membrane. In reconstituted-membrane experiments, these Grb2-independent interactions were sufficient to retain human SOS on the membrane for many minutes, during which a single SOS molecule could processively activate thousands of Ras molecules. These observations raised questions concerning how receptors maintain control of SOS in cells and how membrane-recruited SOS is ultimately released. We addressed these questions in quantitative assays of reconstituted SOS-deficient chicken B-cell signaling systems combined with single-molecule measurements in supported membranes. These studies revealed an essentially one-way trafficking process in which membrane-recruited SOS remains trapped on the membrane and continuously activates Ras until being actively removed via endocytosis.

  1. Decentralising Zimbabwe’s water management: The case of Guyu-Chelesa irrigation scheme

    Science.gov (United States)

    Tambudzai, Rashirayi; Everisto, Mapedza; Gideon, Zhou

    Smallholder irrigation schemes are largely supply driven such that they exclude the beneficiaries on the management decisions and the choice of the irrigation schemes that would best suit their local needs. It is against this background that the decentralisation framework and the Dublin Principles on Integrated Water Resource Management (IWRM) emphasise the need for a participatory approach to water management. The Zimbabwean government has gone a step further in decentralising the management of irrigation schemes, that is promoting farmer managed irrigation schemes so as to ensure effective management of scarce community based land and water resources. The study set to investigate the way in which the Guyu-Chelesa irrigation scheme is managed with specific emphasis on the role of the Irrigation Management Committee (IMC), the level of accountability and the powers devolved to the IMC. Merrey’s 2008 critique of IWRM also informs this study which views irrigation as going beyond infrastructure by looking at how institutions and decision making processes play out at various levels including at the irrigation scheme level. The study was positioned on the hypothesis that ‘decentralised or autonomous irrigation management enhances the sustainability and effectiveness of irrigation schemes’. To validate or falsify the stated hypothesis, data was gathered using desk research in the form of reviewing articles, documents from within the scheme and field research in the form of questionnaire surveys, key informant interviews and field observation. The Statistical Package for Social Sciences was used to analyse data quantitatively, whilst content analysis was utilised to analyse qualitative data whereby data was analysed thematically. Comparative analysis was carried out as Guyu-Chelesa irrigation scheme was compared with other smallholder irrigation scheme’s experiences within Zimbabwe and the Sub Saharan African region at large. The findings were that whilst the

  2. Heteroscedastic Tests Statistics for One-Way Analysis of Variance: The Trimmed Means and Hall's Transformation Conjunction

    Science.gov (United States)

    Luh, Wei-Ming; Guo, Jiin-Huarng

    2005-01-01

    To deal with nonnormal and heterogeneous data for the one-way fixed effect analysis of variance model, the authors adopted a trimmed means method in conjunction with Hall's invertible transformation into a heteroscedastic test statistic (Alexander-Govern test or Welch test). The results of simulation experiments showed that the proposed technique…

  3. Central upwind scheme for a compressible two-phase flow model.

    Science.gov (United States)

    Ahmed, Munshoor; Saleem, M Rehan; Zia, Saqib; Qamar, Shamsul

    2015-01-01

    In this article, a compressible two-phase reduced five-equation flow model is numerically investigated. The model is non-conservative and the governing equations consist of two equations describing the conservation of mass, one for overall momentum and one for total energy. The fifth equation is the energy equation for one of the two phases and it includes source term on the right-hand side which represents the energy exchange between two fluids in the form of mechanical and thermodynamical work. For the numerical approximation of the model a high resolution central upwind scheme is implemented. This is a non-oscillatory upwind biased finite volume scheme which does not require a Riemann solver at each time step. Few numerical case studies of two-phase flows are presented. For validation and comparison, the same model is also solved by using kinetic flux-vector splitting (KFVS) and staggered central schemes. It was found that central upwind scheme produces comparable results to the KFVS scheme.

  4. Central upwind scheme for a compressible two-phase flow model.

    Directory of Open Access Journals (Sweden)

    Munshoor Ahmed

    Full Text Available In this article, a compressible two-phase reduced five-equation flow model is numerically investigated. The model is non-conservative and the governing equations consist of two equations describing the conservation of mass, one for overall momentum and one for total energy. The fifth equation is the energy equation for one of the two phases and it includes source term on the right-hand side which represents the energy exchange between two fluids in the form of mechanical and thermodynamical work. For the numerical approximation of the model a high resolution central upwind scheme is implemented. This is a non-oscillatory upwind biased finite volume scheme which does not require a Riemann solver at each time step. Few numerical case studies of two-phase flows are presented. For validation and comparison, the same model is also solved by using kinetic flux-vector splitting (KFVS and staggered central schemes. It was found that central upwind scheme produces comparable results to the KFVS scheme.

  5. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    Directory of Open Access Journals (Sweden)

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  6. Trinary signed-digit arithmetic using an efficient encoding scheme

    Science.gov (United States)

    Salim, W. Y.; Alam, M. S.; Fyath, R. S.; Ali, S. A.

    2000-09-01

    The trinary signed-digit (TSD) number system is of interest for ultrafast optoelectronic computing systems since it permits parallel carry-free addition and borrow-free subtraction of two arbitrary length numbers in constant time. In this paper, a simple coding scheme is proposed to encode the decimal number directly into the TSD form. The coding scheme enables one to perform parallel one-step TSD arithmetic operation. The proposed coding scheme uses only a 5-combination coding table instead of the 625-combination table reported recently for recoded TSD arithmetic technique.

  7. Improved two-way six-state protocol for quantum key distribution

    International Nuclear Information System (INIS)

    Shaari, J.S.; Bahari, Asma' Ahmad

    2012-01-01

    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels. -- Highlights: ► Modification for efficient generalized two-way QKD is proposed. ► Calculations include secure key rates in noisy and lossy channels for selected attack scenario. ► Resulting proposal provides for higher secure key rate in selected attack scheme.

  8. Improved two-way six-state protocol for quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Shaari, J.S., E-mail: jesni_shamsul@yahoo.com [Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, Bandar Indera Mahkota, 25200 Kuantan, Pahang (Malaysia); Bahari, Asma' Ahmad [Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, Bandar Indera Mahkota, 25200 Kuantan, Pahang (Malaysia)

    2012-10-01

    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels. -- Highlights: ► Modification for efficient generalized two-way QKD is proposed. ► Calculations include secure key rates in noisy and lossy channels for selected attack scenario. ► Resulting proposal provides for higher secure key rate in selected attack scheme.

  9. Two-Way Multi-Antenna Relaying with Simultaneous Wireless Information and Power Transfer

    Directory of Open Access Journals (Sweden)

    Thanaphat Srivantana

    2017-03-01

    Full Text Available In this paper, we propose various kinds of two-way multi-antenna relaying with simultaneous wireless information and power transfer (SWIPT and investigate their performance. Specifically, we first consider a two-way relay network where two single-antenna end nodes communicate with each other through a multi-antenna relay node that is energy constrained. This relay node harvests energy from the two end nodes and use the harvested energy for forwarding their information. Six relaying schemes that support the considered network then build on the power splitting-based relaying and time switching-based relaying protocols. The average bit error rates of these schemes are evaluated and compared by computer simulations considering several network parameters, including the number of relay antennas, power splitting ratio, and energy harvesting time. Such evaluation and comparison provide useful insights into the performance of SWIPT-based two-way multi-antenna relaying.

  10. Overlay cognitive radio systems with adaptive two-way relaying

    KAUST Repository

    Hyadi, Amal

    2013-12-01

    In this paper, we propose a spectrum sharing mechanism with a two-phase two-way relaying protocol for an overlay cognitive network. The system comprises two primary users (PUs) and two secondary users (SUs). One of the SUs acts as a relay for the PUs and gains spectrum sharing as long as he respects outage probability constraints of the primary system. Moreover, we consider that the relaying node performs an optimal power allocation scheme that minimizes the outage performance of the secondary receiver. Closed form expressions for the outage probability are derived for the cases of Decode-and-Forward (DF), Amplify-and-Forward (AF), and adaptive relaying. Numerical simulations are presented to illustrate and compare the obtained results. © 2013 IEEE.

  11. Health worker preferences for performance-based payment schemes in a rural health district in Burkina Faso

    Directory of Open Access Journals (Sweden)

    Maurice Yé

    2016-01-01

    Full Text Available Background: One promising way to improve the motivation of healthcare providers and the quality of healthcare services is performance-based incentives (PBIs also referred as performance-based financing. Our study aims to explore healthcare providers’ preferences for an incentive scheme based on local resources, which aimed at improving the quality of maternal and child health care in the Nouna Health District. Design: A qualitative and quantitative survey was carried out in 2010 involving 94 healthcare providers within 34 health facilities. In addition, in-depth interviews involving a total of 33 key informants were conducted at health facility levels. Results: Overall, 85% of health workers were in favour of an incentive scheme based on the health district's own financial resources (95% CI: [71.91; 88.08]. Most health workers (95 and 96% expressed a preference for financial incentives (95% CI: [66.64; 85.36] and team-based incentives (95% CI: [67.78; 86.22], respectively. The suggested performance indicators were those linked to antenatal care services, prevention of mother-to-child human immunodeficiency virus transmission, neonatal care, and immunization. Conclusions: The early involvement of health workers and other stakeholders in designing an incentive scheme proved to be valuable. It ensured their effective participation in the process and overall acceptance of the scheme at the end. This study is an important contribution towards the designing of effective PBI schemes.

  12. Community wind power ownership schemes in Europe and their relevance to the United States

    Energy Technology Data Exchange (ETDEWEB)

    Bolinger, Mark

    2001-05-15

    With varying success, the United States and Europe have followed a more or less parallel path of policies to support wind development over the past twenty years. Feed-in laws and tax incentives first popularized in California in the early 1980s and greatly expanded upon in Europe during the 1990s are gradually giving way to market-based support mechanisms such as renewable portfolio standards, which are being implemented in one form or another in ten US states and at least three European nations. At the same time, electricity markets are being liberalized in both the US and Europe, and many electricity consumers are being given the choice to support the development of renewable energy through higher tariffs, both in traditionally regulated and newly competitive markets. One notable area in which wind development in Europe and United States has not evolved in common, however, is with respect to the level of community ownership of wind turbines or clusters. While community ownership of wind projects is unheard of in the United States, in Europe, local wind cooperatives or other participatory business schemes have been responsible for a large share of total wind development. In Denmark, for example, approximately 80% of all wind turbines are either individually or cooperatively owned, and a similar pattern holds in Germany, the world leader in installed wind capacity. Sweden also has a strong wind cooperative base, and the UK has recently made forays into community wind ownership. Why is it that wind development has evolved this way in Europe, but not in the United States? What incremental effect have community-owned wind schemes had on European wind development? Have community-owned wind schemes driven development in Europe, or are they merely a vehicle through which the fundamental driving institutions have been channeled? Is there value to having community wind ownership in the US? Is there reason to believe that such schemes would succeed in the US? If so, which

  13. Proper use of colour schemes for image data visualization

    Science.gov (United States)

    Vozenilek, Vit; Vondrakova, Alena

    2018-04-01

    With the development of information and communication technologies, new technologies are leading to an exponential increase in the volume and types of data available. At this time of the information society, data is one of the most important arguments for policy making, crisis management, research and education, and many other fields. An essential task for experts is to share high-quality data providing the right information at the right time. Designing of data presentation can largely influence the user perception and the cognitive aspects of data interpretation. Significant amounts of data can be visualised in some way. One image can thus replace a considerable number of numeric tables and texts. The paper focuses on the accurate visualisation of data from the point of view of used colour schemes. Bad choose of colours can easily confuse the user and lead to the data misinterpretation. On the contrary, correctly created visualisations can make information transfer much simpler and more efficient.

  14. An Efficient Explicit Finite-Difference Scheme for Simulating Coupled Biomass Growth on Nutritive Substrates

    Directory of Open Access Journals (Sweden)

    G. F. Sun

    2015-01-01

    Full Text Available A novel explicit finite-difference (FD method is presented to simulate the positive and bounded development process of a microbial colony subjected to a substrate of nutrients, which is governed by a nonlinear parabolic partial differential equations (PDE system. Our explicit FD scheme is uniquely designed in such a way that it transfers the nonlinear terms in the original PDE into discrete sets of linear ones in the algebraic equation system that can be solved very efficiently, while ensuring the stability and the boundedness of the solution. This is achieved through (1 a proper design of intertwined FD approximations for the diffusion function term in both time and spatial variations and (2 the control of the time-step through establishing theoretical stability criteria. A detailed theoretical stability analysis is conducted to reveal that our FD method is indeed stable. Our examples verified the fact that the numerical solution can be ensured nonnegative and bounded to simulate the actual physics. Numerical examples have also been presented to demonstrate the efficiency of the proposed scheme. The present scheme is applicable for solving similar systems of PDEs in the investigation of the dynamics of biological films.

  15. An overview of the EU Member States support schemes for the promotion of renewable energy sources

    Energy Technology Data Exchange (ETDEWEB)

    Poullikkas, Andreas; Kourtis, George; Hadjipaschalis, Ioannis [Electricity Authority of Cyprus, P.O. Box 24506, 1399 Nicosia (Cyprus)

    2012-07-01

    In this work, an overview of the European Union (EU) Member States support schemes for the promotion of renewable energy sources (RES) is provided. In particular, the status of the electricity generation capacity as well as the RES mixture in the Member States is described. Moreover, the different support schemes such as, investment support, feed-in tariffs (FiTs), tradable green certificates, and fiscal and financial measures which the Member States have adopted for the promotion of RES technologies are discussed in detail. Some Member States are implementing a single support scheme for the promotion of RES for power generation (RES-E), e.g., seven Member States use FiTs, or implement a hybrid support scheme by combining all or some of the four categories of the RES-E supporting schemes. Although, these support schemes have increased the penetration of the RES-E technologies in the Member States, still there is a long way in order to achieve the 2020 target. The reason for this may be that the way these schemes have been used so far, i.e., either as single support schemes or in combination of FiTs or tradable green certificates with investment support and fiscal and financial measures, has been ineffective. A more effective combination could be a hybrid scheme consisting of FiTs with tradable green certificates measures, as in the case of Italy and United Kingdom, that will increase the RES-E penetration and eliminate the possible technical problems which will arise from this increased penetration and have an effect in the stability of the power system.

  16. One-way propagation of bulk states and robust edge states in photonic crystals with broken inversion and time-reversal symmetries

    Science.gov (United States)

    Lu, Jin-Cheng; Chen, Xiao-Dong; Deng, Wei-Min; Chen, Min; Dong, Jian-Wen

    2018-07-01

    The valley is a flexible degree of freedom for light manipulation in photonic systems. In this work, we introduce the valley concept in magnetic photonic crystals with broken inversion symmetry. One-way propagation of bulk states is demonstrated by exploiting the pseudo-gap where bulk states only exist at one single valley. In addition, the transition between Hall and valley-Hall nontrivial topological phases is also studied in terms of the competition between the broken inversion and time-reversal symmetries. At the photonic boundary between two topologically distinct photonic crystals, we illustrate the one-way propagation of edge states and demonstrate their robustness against defects.

  17. Distributed multi-agent scheme for reactive power management with renewable energy

    International Nuclear Information System (INIS)

    Rahman, M.S.; Mahmud, M.A.; Pota, H.R.; Hossain, M.J.

    2014-01-01

    Highlights: • A distributed multi-agent scheme is proposed to enhance the dynamic voltage stability. • A control agent is designed where control actions are performed through PI controller. • Proposed scheme is compared with the conventional approach with DSTATCOM. • Proposed scheme adapts the capability of estimation and control under various operating conditions. - Abstract: This paper presents a new distributed multi-agent scheme for reactive power management in smart coordinated distribution networks with renewable energy sources (RESs) to enhance the dynamic voltage stability, which is mainly based on controlling distributed static synchronous compensators (DSTATCOMs). The proposed control scheme is incorporated in a multi-agent framework where the intelligent agents simultaneously coordinate with each other and represent various physical models to provide information and energy flow among different physical processes. The reactive power is estimated from the topology of distribution networks and with this information, necessary control actions are performed through the proposed proportional integral (PI) controller. The performance of the proposed scheme is evaluated on a 8-bus distribution network under various operating conditions. The performance of the proposed scheme is validated through simulation results and these results are compared to that of conventional PI-based DSTATCOM control scheme. From simulation results, it is found that the distributed MAS provides excellence performance for improving voltage profiles by managing reactive power in a smarter way

  18. Performance analysis of a handoff scheme for two-tier cellular CDMA networks

    Directory of Open Access Journals (Sweden)

    Ahmed Hamad

    2011-07-01

    Full Text Available A two-tier model is used in cellular networks to improve the Quality of Service (QoS, namely to reduce the blocking probability of new calls and the forced termination probability of ongoing calls. One tier, the microcells, is used for slow or stationary users, and the other, the macrocell, is used for high speed users. In Code-Division Multiple-Access (CDMA cellular systems, soft handoffs are supported, which provides ways for further QoS improvement. In this paper, we introduce such a way; namely, a channel borrowing scheme used in conjunction with a First-In-First-Out (FIFO queue in the macrocell tier. A multidimensional Markov chain to model the resulting system is established, and an iterative technique to find the steady-state probability distribution is utilized. This distribution is then used to find the performance measures of interest: new call blocking probability, and forced termination probability.

  19. BOT schemes as financial model of hydro power projects

    International Nuclear Information System (INIS)

    Grausam, A.

    1997-01-01

    Build-operate-transfer (BOT) schemes are the latest methods adopted in the developing infrastructure projects. This paper outlines the project financing through BOT schemes and briefly focuses on the factors particularly relevant to hydro power projects. Hydro power development provides not only the best way to produce electricity, it can also solve problems in different fields, such as navigation problems in case of run-of-the river plants, ground water management systems and flood control etc. This makes HPP projects not cheaper, but hydro energy is a clean and renewable energy and the hydro potential worldwide will play a major role to meet the increased demand in future. 5 figs

  20. Mimicking Natural Photosynthesis: Solar to Renewable H2 Fuel Synthesis by Z-Scheme Water Splitting Systems.

    Science.gov (United States)

    Wang, Yiou; Suzuki, Hajime; Xie, Jijia; Tomita, Osamu; Martin, David James; Higashi, Masanobu; Kong, Dan; Abe, Ryu; Tang, Junwang

    2018-05-23

    Visible light-driven water splitting using cheap and robust photocatalysts is one of the most exciting ways to produce clean and renewable energy for future generations. Cutting edge research within the field focuses on so-called "Z-scheme" systems, which are inspired by the photosystem II-photosystem I (PSII/PSI) coupling from natural photosynthesis. A Z-scheme system comprises two photocatalysts and generates two sets of charge carriers, splitting water into its constituent parts, hydrogen and oxygen, at separate locations. This is not only more efficient than using a single photocatalyst, but practically it could also be safer. Researchers within the field are constantly aiming to bring systems toward industrial level efficiencies by maximizing light absorption of the materials, engineering more stable redox couples, and also searching for new hydrogen and oxygen evolution cocatalysts. This review provides an in-depth survey of relevant Z-schemes from past to present, with particular focus on mechanistic breakthroughs, and highlights current state of the art systems which are at the forefront of the field.

  1. Discretisation Schemes for Level Sets of Planar Gaussian Fields

    Science.gov (United States)

    Beliaev, D.; Muirhead, S.

    2018-01-01

    Smooth random Gaussian functions play an important role in mathematical physics, a main example being the random plane wave model conjectured by Berry to give a universal description of high-energy eigenfunctions of the Laplacian on generic compact manifolds. Our work is motivated by questions about the geometry of such random functions, in particular relating to the structure of their nodal and level sets. We study four discretisation schemes that extract information about level sets of planar Gaussian fields. Each scheme recovers information up to a different level of precision, and each requires a maximum mesh-size in order to be valid with high probability. The first two schemes are generalisations and enhancements of similar schemes that have appeared in the literature (Beffara and Gayet in Publ Math IHES, 2017. https://doi.org/10.1007/s10240-017-0093-0; Mischaikow and Wanner in Ann Appl Probab 17:980-1018, 2007); these give complete topological information about the level sets on either a local or global scale. As an application, we improve the results in Beffara and Gayet (2017) on Russo-Seymour-Welsh estimates for the nodal set of positively-correlated planar Gaussian fields. The third and fourth schemes are, to the best of our knowledge, completely new. The third scheme is specific to the nodal set of the random plane wave, and provides global topological information about the nodal set up to `visible ambiguities'. The fourth scheme gives a way to approximate the mean number of excursion domains of planar Gaussian fields.

  2. Reduction schemes for one-loop tensor integrals

    International Nuclear Information System (INIS)

    Denner, A.; Dittmaier, S.

    2006-01-01

    We present new methods for the evaluation of one-loop tensor integrals which have been used in the calculation of the complete electroweak one-loop corrections to e + e - ->4 fermions. The described methods for 3-point and 4-point integrals are, in particular, applicable in the case where the conventional Passarino-Veltman reduction breaks down owing to the appearance of Gram determinants in the denominator. One method consists of different variants for expanding tensor coefficients about limits of vanishing Gram determinants or other kinematical determinants, thereby reducing all tensor coefficients to the usual scalar integrals. In a second method a specific tensor coefficient with a logarithmic integrand is evaluated numerically, and the remaining coefficients as well as the standard scalar integral are algebraically derived from this coefficient. For 5-point tensor integrals, we give explicit formulas that reduce the corresponding tensor coefficients to coefficients of 4-point integrals with tensor rank reduced by one. Similar formulas are provided for 6-point functions, and the generalization to functions with more internal propagators is straightforward. All the presented methods are also applicable if infrared (soft or collinear) divergences are treated in dimensional regularization or if mass parameters (for unstable particles) become complex

  3. A blind video watermarking scheme resistant to rotation and collusion attacks

    Directory of Open Access Journals (Sweden)

    Amlan Karmakar

    2016-04-01

    Full Text Available In this paper, Discrete Cosine Transform (DCT based blind video watermarking algorithm is proposed, which is perceptually invisible and robust against rotation and collusion attacks. To make the scheme resistant against rotation, watermark is embedded within the square blocks, placed on the middle position of every luminance channel. Then Zernike moments of those square blocks are calculated. The rotation invariance property of the Complex Zernike moments is exploited to predict the rotation angle of the video at the time of extraction of watermark bits. To make the scheme robust against collusion, design of the scheme is done in such a way that the embedding blocks will vary for the successive frames of the video. A Pseudo Random Number (PRN generator and a permutation vector are used to achieve the goal. The experimental results show that the scheme is robust against conventional video attacks, rotation attack and collusion attacks.

  4. Advanced Entry Adult Apprenticeship Training Scheme: A Case Study

    Science.gov (United States)

    Sparks, Alan; Ingram, Hadyn; Phillips, Sunny

    2009-01-01

    Purpose: The purpose of this paper is to evaluate an innovative way to train adult apprentices for the construction industry. Design/methodology/approach: The paper emphasizes that, in order to address skills shortages for international construction, training methods must be improved. It looks at the example of an adult apprenticeship scheme in…

  5. An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Xiuxiu Jiang

    2017-05-01

    Full Text Available Symmetric searchable encryption for cloud storage enables users to retrieve the documents they want in a privacy-preserving way, which has become a hotspot of research. In this paper, we propose an efficient keyword search scheme over encrypted cloud data. We firstly adopt a structure named as inverted matrix (IM to build search index. The IM is consisted of index vectors, each of which is associated with a keyword. Then we map a keyword to an address used to locate the corresponding index vector. Finally, we mask index vectors with pseudo-random bits to obtain an encrypted enlarged inverted matrix (EEIM. Through the security analysis and experimental evaluation, we demonstrate the privacy and efficiency of our scheme respectively. In addition, we further consider two extended practical search situations, i.e., occurrence queries and dynamic user management, and then give two relevant schemes.

  6. An Orbit And Dispersion Correction Scheme for the PEP II

    International Nuclear Information System (INIS)

    Cai, Y.; Donald, M.; Shoaee, H.; White, G.; Yasukawa, L.A.

    2011-01-01

    To achieve optimum luminosity in a storage ring it is vital to control the residual vertical dispersion. In the original PEP storage ring, a scheme to control the residual dispersion function was implemented using the ring orbit as the controlling element. The 'best' orbit not necessarily giving the lowest vertical dispersion. A similar scheme has been implemented in both the on-line control code and in the simulation code LEGO. The method involves finding the response matrices (sensitivity of orbit/dispersion at each Beam-Position-Monitor (BPM) to each orbit corrector) and solving in a least squares sense for minimum orbit, dispersion function or both. The optimum solution is usually a subset of the full least squares solution. A scheme of simultaneously correcting the orbits and dispersion has been implemented in the simulation code and on-line control system for PEP-II. The scheme is based on the eigenvector decomposition method. An important ingredient of the scheme is to choose the optimum eigenvectors that minimize the orbit, dispersion and corrector strength. Simulations indicate this to be a very effective way to control the vertical residual dispersion.

  7. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  8. Investigation of optimal photoionization schemes for Sm by multi-step resonance ionization

    International Nuclear Information System (INIS)

    Cha, H.; Song, K.; Lee, J.

    1997-01-01

    Excited states of Sm atoms are investigated by using multi-color resonance enhanced multiphoton ionization spectroscopy. Among the ionization signals one observed at 577.86 nm is regarded as the most efficient excited state if an 1-color 3-photon scheme is applied. Meanwhile an observed level located at 587.42 nm is regarded as the most efficient state if one uses a 2-color scheme. For 2-color scheme a level located at 573.50 nm from this first excited state is one of the best second excited state for the optimal photoionization scheme. Based on this ionization scheme various concentrations of standard solutions for samarium are determined. The minimum amount of sample which can be detected by a 2-color scheme is determined as 200 fg. The detection sensitivity is limited mainly due to the pollution of the graphite atomizer. copyright 1997 American Institute of Physics

  9. Corrected simulations for one-dimensional diffusion processes with naturally occurring boundaries.

    Science.gov (United States)

    Shafiey, Hassan; Gan, Xinjun; Waxman, David

    2017-11-01

    To simulate a diffusion process, a usual approach is to discretize the time in the associated stochastic differential equation. This is the approach used in the Euler method. In the present work we consider a one-dimensional diffusion process where the terms occurring, within the stochastic differential equation, prevent the process entering a region. The outcome is a naturally occurring boundary (which may be absorbing or reflecting). A complication occurs in a simulation of this situation. The term involving a random variable, within the discretized stochastic differential equation, may take a trajectory across the boundary into a "forbidden region." The naive way of dealing with this problem, which we refer to as the "standard" approach, is simply to reset the trajectory to the boundary, based on the argument that crossing the boundary actually signifies achieving the boundary. In this work we show, within the framework of the Euler method, that such resetting introduces a spurious force into the original diffusion process. This force may have a significant influence on trajectories that come close to a boundary. We propose a corrected numerical scheme, for simulating one-dimensional diffusion processes with naturally occurring boundaries. This involves correcting the standard approach, so that an exact property of the diffusion process is precisely respected. As a consequence, the proposed scheme does not introduce a spurious force into the dynamics. We present numerical test cases, based on exactly soluble one-dimensional problems with one or two boundaries, which suggest that, for a given value of the discrete time step, the proposed scheme leads to substantially more accurate results than the standard approach. Alternatively, the standard approach needs considerably more computation time to obtain a comparable level of accuracy to the proposed scheme, because the standard approach requires a significantly smaller time step.

  10. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  11. Diversity-Multiplexing Trade-off for Coordinated Direct and Relay Schemes

    DEFF Research Database (Denmark)

    Thai, Chan; Popovski, Petar; De Carvalho, Elisabeth

    2013-01-01

    The recent years have brought a significant body of research on wireless Two-Way Relaying (TWR), where the use of network coding brings an evident advantage in terms of data rates. Yet, TWR scenarios represent only a special case and it is of interest to devise similar techniques in more general...... Direct/Relay (CDR) schemes, which involve two flows, of a direct and a relayed user. In this paper we characterize a CDR scheme by deriving/bounding the Diversity-Multiplexing Trade-off (DMT) function. Two cases are considered. In the first case a transmitter knows the Channel State Information (CSI...

  12. Lectures on Hilbert schemes of points on surfaces

    CERN Document Server

    Nakajima, Hiraku

    1999-01-01

    This beautifully written book deals with one shining example: the Hilbert schemes of points on algebraic surfaces ... The topics are carefully and tastefully chosen ... The young person will profit from reading this book. --Mathematical Reviews The Hilbert scheme of a surface X describes collections of n (not necessarily distinct) points on X. More precisely, it is the moduli space for 0-dimensional subschemes of X of length n. Recently it was realized that Hilbert schemes originally studied in algebraic geometry are closely related to several branches of mathematics, such as singularities, symplectic geometry, representation theory--even theoretical physics. The discussion in the book reflects this feature of Hilbert schemes. One example of the modern, broader interest in the subject is a construction of the representation of the infinite-dimensional Heisenberg algebra, i.e., Fock space. This representation has been studied extensively in the literature in connection with affine Lie algebras, conformal field...

  13. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    Science.gov (United States)

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  14. A Price-Based Demand Response Scheme for Discrete Manufacturing in Smart Grids

    Directory of Open Access Journals (Sweden)

    Zhe Luo

    2016-08-01

    Full Text Available Demand response (DR is a key technique in smart grid (SG technologies for reducing energy costs and maintaining the stability of electrical grids. Since manufacturing is one of the major consumers of electrical energy, implementing DR in factory energy management systems (FEMSs provides an effective way to manage energy in manufacturing processes. Although previous studies have investigated DR applications in process manufacturing, they were not conducted for discrete manufacturing. In this study, the state-task network (STN model is implemented to represent a discrete manufacturing system. On this basis, a DR scheme with a specific DR algorithm is applied to a typical discrete manufacturing—automobile manufacturing—and operational scenarios are established for the stamping process of the automobile production line. The DR scheme determines the optimal operating points for the stamping process using mixed integer linear programming (MILP. The results show that parts of the electricity demand can be shifted from peak to off-peak periods, reducing a significant overall energy costs without degrading production processes.

  15. From war service to domestic service: ex-servicewomen and the Free Passage Scheme 1919-22.

    Science.gov (United States)

    Noakes, Lucy

    2011-01-01

    At the end of the First World War, the British government put into operation a Free Passage Scheme for ex-servicemen, ex-servicewomen and their dependants to emigrate to the colonies and dominions of the Empire. This scheme was driven by a complex network of interlinked beliefs and policies concerning both the relationship between the metropole and the Empire, and the perceived necessity for social stability in Britain and in the dominions and colonies. This article examines the Free Passage Scheme, paying particular attention to the ways in which it was envisaged as a means of restoring a gendered balance of the population in Britain, where young women outnumbered young men at the end of the war, and in the dominions, where men outnumbered women, and was also seen as a way of emigrating women whose wartime work experiences were understood to be in conflict with gendered identities in the post-war period. The article argues that the Free Passage Scheme needs to be understood as gendered, as it envisaged the transformation of female members of the auxiliary wartime services into domestic servants for the Dominions. The scheme's failure, it is argued, prefigures the failure of the far larger Empire Settlement Act of 1922 to emigrate large numbers of British women as domestic servants.

  16. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  17. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Directory of Open Access Journals (Sweden)

    Hakjun Lee

    Full Text Available With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  18. Fluid-structure interaction with pipe-wall viscoelasticity during water hammer

    Science.gov (United States)

    Keramat, A.; Tijsseling, A. S.; Hou, Q.; Ahmadi, A.

    2012-01-01

    Fluid-structure interaction (FSI) due to water hammer in a pipeline which has viscoelastic wall behaviour is studied. Appropriate governing equations are derived and numerically solved. In the numerical implementation of the hydraulic and structural equations, viscoelasticity is incorporated using the Kelvin-Voigt mechanical model. The equations are solved by two different approaches, namely the Method of Characteristics-Finite Element Method (MOC-FEM) and full MOC. In both approaches two important effects of FSI in fluid-filled pipes, namely Poisson and junction coupling, are taken into account. The study proposes a more comprehensive model for studying fluid transients in pipelines as compared to previous works, which take into account either FSI or viscoelasticity. To verify the proposed mathematical model and its numerical solutions, the following problems are investigated: axial vibration of a viscoelastic bar subjected to a step uniaxial loading, FSI in an elastic pipe, and hydraulic transients in a pressurised polyethylene pipe without FSI. The results of each case are checked with available exact and experimental results. Then, to study the simultaneous effects of FSI and viscoelasticity, which is the new element of the present research, one problem is solved by the two different numerical approaches. Both numerical methods give the same results, thus confirming the correctness of the solutions.

  19. Compatible discrete operator schemes on polyhedral meshes for elliptic and Stokes equations

    International Nuclear Information System (INIS)

    Bonelle, Jerome

    2014-01-01

    This thesis presents a new class of spatial discretization schemes on polyhedral meshes, called Compatible Discrete Operator (CDO) schemes and their application to elliptic and Stokes equations In CDO schemes, preserving the structural properties of the continuous equations is the leading principle to design the discrete operators. De Rham maps define the degrees of freedom according to the physical nature of fields to discretize. CDO schemes operate a clear separation between topological relations (balance equations) and constitutive relations (closure laws). Topological relations are related to discrete differential operators, and constitutive relations to discrete Hodge operators. A feature of CDO schemes is the explicit use of a second mesh, called dual mesh, to build the discrete Hodge operator. Two families of CDO schemes are considered: vertex-based schemes where the potential is located at (primal) mesh vertices, and cell-based schemes where the potential is located at dual mesh vertices (dual vertices being in one-to-one correspondence with primal cells). The CDO schemes related to these two families are presented and their convergence is analyzed. A first analysis hinges on an algebraic definition of the discrete Hodge operator and allows one to identify three key properties: symmetry, stability, and P0-consistency. A second analysis hinges on a definition of the discrete Hodge operator using reconstruction operators, and the requirements on these reconstruction operators are identified. In addition, CDO schemes provide a unified vision on a broad class of schemes proposed in the literature (finite element, finite element, mimetic schemes... ). Finally, the reliability and the efficiency of CDO schemes are assessed on various test cases and several polyhedral meshes. (author)

  20. A quantitative study on factors influencing enrolment of dairy farmers in a community health insurance scheme.

    Science.gov (United States)

    Greef, Tineke de Groot-de; Monareng, Lydia V; Roos, Janetta H

    2016-12-09

    Access to affordable and effective health care is a challenge in low- and middle- income countries. Out-of-pocket expenditure for health care is a major cause of impoverishment. One way to facilitate access and overcome catastrophic expenditure is through a health insurance mechanism, whereby risks are shared and financial inputs pooled by way of contributions. This study examined factors that influenced the enrolment status of dairy farmers in Western Kenya to a community health insurance (CHI) scheme. Quantitative, cross-sectional research was used to describe factors influencing the enrolment in the CHI scheme. Quota and convenience sampling was used, recruiting a sample of 135 farmers who supply milk to a dairy cooperation. Data were collected using a structured interview schedule and analysed using Stata SE, Data Analysis and Statistical Software, Version 12. Factors influencing non-enrolment were identified as affordability (40%; n = 47), unfamiliarity with the management of the scheme (37%; n = 44) and a lack of understanding about the scheme (41%; n = 48). An exploratory factor analysis was used to reduce the variables to two factors: information provision and understanding community health insurance (CHI). Logistic regression identified factors associated with enrolment in the Tanykina Community Healthcare Plan (TCHP). Supplies of less than six litres of milk per day (OR: 0.22; 95% CI: 0.06-0.84) and information provision (OR: 8.77; 95% CI: 2.25-34.16) were significantly associated with enrolment in the TCHP. Nearly 30% (29.6%; n = 40) of the respondents remarked that TCHP is expensive and 17% (n = 23) asked for more education on CHI and TCHP in an open-ended question. Recommendations related to marketing strategies, financial approach, information provision and further research were outlined to be made to the management of the TCHP as well as to those involved in public health.

  1. Diagnostics of MCF plasmas using Lyman-α fluorescence excited by one or two photons

    International Nuclear Information System (INIS)

    Voslamber, D.

    1998-11-01

    Laser-induced Lyman-α fluorescence of the hydrogen isotopes is investigated with regard to diagnostic applications in magnetically confined fusion plasmas. A formal analysis is presented for two excitation schemes: one-photon and Doppler-free two-photon excitation. The analysis includes estimates of the expected experimental errors arising from the photon noise and from the sensitivity of the observed fluorescence signals to variations of the plasma and laser parameters. Both excitation schemes are suitable primarily for application in the plasma edge, but even in the plasma bulk of large machines they can still be applied in combination with a diagnostic neutral beam. The two-photon excitation scheme is particularly attractive because it involves absorption spectra that are resolved within the Doppler width. This implies a large diagnostic potential and in particular offers a way to measure the deuterium-tritium fuel mix in fusion reactors. (author)

  2. Navigators’ Behavior in Traffic Separation Schemes

    Directory of Open Access Journals (Sweden)

    Zbigniew Pietrzykowski

    2015-03-01

    Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.

  3. Central-Upwind Schemes for Two-Layer Shallow Water Equations

    KAUST Repository

    Kurganov, Alexander; Petrova, Guergana

    2009-01-01

    We derive a second-order semidiscrete central-upwind scheme for one- and two-dimensional systems of two-layer shallow water equations. We prove that the presented scheme is well-balanced in the sense that stationary steady-state solutions

  4. Energy Efficient Design for Two-Way AF Relay Networks

    Directory of Open Access Journals (Sweden)

    Yong Li

    2014-01-01

    Full Text Available Conventional designs on two-way relay networks mainly focus on the spectral efficiency (SE rather than energy efficiency (EE. In this paper, we consider a system where two source nodes communicate with each other via an amplify-and-forward (AF relay node and study the power allocation schemes to maximize EE while ensuring a certain data rate. We propose an optimal energy-efficient power allocation algorithm based on iterative search technique. In addition, a closed-form suboptimal solution is derived with reduced complexity and negligible performance degradation. Numerical results show that the proposed schemes can achieve considerable EE improvement compared with conventional designs.

  5. Gearbox Fault Features Extraction Using Vibration Measurements and Novel Adaptive Filtering Scheme

    Directory of Open Access Journals (Sweden)

    Ghalib R. Ibrahim

    2012-01-01

    Full Text Available Vibration signals measured from a gearbox are complex multicomponent signals, generated by tooth meshing, gear shaft rotation, gearbox resonance vibration signatures, and a substantial amount of noise. This paper presents a novel scheme for extracting gearbox fault features using adaptive filtering techniques for enhancing condition features, meshing frequency sidebands. A modified least mean square (LMS algorithm is examined and validated using only one accelerometer, instead of using two accelerometers in traditional arrangement, as the main signal and a desired signal is artificially generated from the measured shaft speed and gear meshing frequencies. The proposed scheme is applied to a signal simulated from gearbox frequencies with a numerous values of step size. Findings confirm that 10−5 step size invariably produces more accurate results and there has been a substantial improvement in signal clarity (better signal-to-noise ratio, which makes meshing frequency sidebands more discernible. The developed scheme is validated via a number of experiments carried out using two-stage helical gearbox for a healthy pair of gears and a pair suffering from a tooth breakage with severity fault 1 (25% tooth removal and fault 2 (50% tooth removal under loads (0%, and 80% of the total load. The experimental results show remarkable improvements and enhance gear condition features. This paper illustrates that the new approach offers a more effective way to detect early faults.

  6. An alternative scheme of the Bogolyubov's average method

    International Nuclear Information System (INIS)

    Ortiz Peralta, T.; Ondarza R, R.; Camps C, E.

    1990-01-01

    In this paper the average energy and the magnetic moment conservation laws in the Drift Theory of charged particle motion are obtained in a simple way. The approach starts from the energy and magnetic moment conservation laws and afterwards the average is performed. This scheme is more economic from the standpoint of time and algebraic calculations than the usual procedure of Bogolyubov's method. (Author)

  7. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  8. The implement of Talmud property allocation algorithm based on graphic point-segment way

    Science.gov (United States)

    Cen, Haifeng

    2017-04-01

    Under the guidance of the Talmud allocation scheme's theory, the paper analyzes the algorithm implemented process via the perspective of graphic point-segment way, and designs the point-segment way's Talmud property allocation algorithm. Then it uses Java language to implement the core of allocation algorithm, by using Android programming to build a visual interface.

  9. Multi-way Communications: An Information Theoretic Perspective

    KAUST Repository

    Chaaban, Anas

    2015-09-15

    Multi-way communication is a means to significantly improve the spectral efficiency of wireless networks. For instance, in a bi-directional (or two-way) communication channel, two users can simultaneously use the transmission medium to exchange information, thus achieving up to twice the rate that would be achieved had each user transmitted separately. Multi-way communications provides an overview on the developments in this research area since it has been initiated by Shannon. The basic two-way communication channel is considered first, followed by the two-way relay channel obtained by the deployment of an additional cooperative relay node to improve the overall communication performance. This basic setup is then extended to multi-user systems. For all these setups, fundamental limits on the achievable rates are reviewed, thereby making use of a linear high-SNR deterministic channel model to provide valuable insights which are helpful when discussing the coding schemes for Gaussian channel models in detail. Several tools and communication strategies are used in the process, including (but not limited to) computation, signal-space alignment, and nested-lattice codes. Finally, extensions of multi-way communication channels to multiple antenna settings are discussed. © 2015 A. Chaaban and A. Sezgin.

  10. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  11. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  12. Analysis of fuel sodium interaction in a fast breeder reactor

    International Nuclear Information System (INIS)

    Tezuka, M.; Suzuki, K.; Sasanuma, K.; Nagasima, K.; Kawaguchi, O.

    A code ''SUGAR'' has been developed to evaluate molten Fuel Sodium Interaction (FSI) in a fast breeder reactor. This code computes thermohydrodynamic behavior by heat transfer from fuel to sodium and dynamic deformation of reactor structures simultaneously. It was applied to evaluate FSI in local fuel melting accident in a fuel assembly and in core disassembly accident for the 300MWe fast breeder reactor under development in Japan. The analytical methods of the SUGAR code are mainly shown in the following: 1) the thermal and dynamic model of FSI is mainly based on Cho-Wright's model; 2) the axial and radial expansions of surroundings of FSI region are calculated with one-dimensional and compressive hydrodynamics equation; 3) the structure response is calculated with one-dimensional and dynamic stress equation. Our studies show that mass of fuel interacted with sodium, ratio of fuel mass to sodium mass, fuel particle size, heat transfer coefficient from fuel to sodium, and structure's force have great effect on pressure amplitude and deformation of reactor structures

  13. One-way Hash function construction based on the chaotic map with changeable-parameter

    International Nuclear Information System (INIS)

    Xiao Di; Liao Xiaofeng; Deng Shaojiang

    2005-01-01

    An algorithm for one-way Hash function construction based on the chaotic map with changeable-parameter is proposed in this paper. A piecewise linear chaotic map with changeable-parameter P is chosen, and cipher block chaining mode (CBC) is introduced to ensure that the parameter P in each iteration is dynamically decided by the last-time iteration value and the corresponding message bit in different positions. The final Hash value is obtained by means of the linear transform on the iteration sequence. Theoretical analysis and computer simulation indicate that our algorithm can satisfy all the performance requirements of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce

  14. One-way Hash function construction based on the chaotic map with changeable-parameter

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Di [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China) and College of Mechanical Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xiaodi_cqu@hotmail.com; Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)]. E-mail: xfliao@cqu.edu.cn; Deng Shaojiang [College of Computer Science and Engineering, Chongqing University, Chongqing 400044 (China)

    2005-04-01

    An algorithm for one-way Hash function construction based on the chaotic map with changeable-parameter is proposed in this paper. A piecewise linear chaotic map with changeable-parameter P is chosen, and cipher block chaining mode (CBC) is introduced to ensure that the parameter P in each iteration is dynamically decided by the last-time iteration value and the corresponding message bit in different positions. The final Hash value is obtained by means of the linear transform on the iteration sequence. Theoretical analysis and computer simulation indicate that our algorithm can satisfy all the performance requirements of Hash function in an efficient and flexible manner. It is practicable and reliable, with high potential to be adopted for E-commerce.

  15. One-way quantum computation via manipulation of polarization and momentum qubits in two-photon cluster states

    International Nuclear Information System (INIS)

    Vallone, G; Pomarico, E; De Martini, F; Mataloni, P

    2008-01-01

    Four-qubit cluster states of two photons entangled in polarization and linear momentum have been used to realize a complete set of single qubit rotations and the C-NOT gate for equatorial qubits with high values of fidelity. By the computational equivalence of the two degrees of freedom our result demonstrate the suitability of two photon cluster states for rapid and efficient one-way quantum computing

  16. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  17. Energy efficient design for MIMO two-way AF multiple relay networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2014-04-01

    This paper studies the energy efficient transmission and the power allocation problem for multiple two-way relay networks equipped with multi-input multi-output antennas where each relay employs an amplify-and-forward strategy. The goal is to minimize the total power consumption without degrading the quality of service of the terminals. In our analysis, we start by deriving closed-form expressions of the optimal powers allocated to terminals. We then employ a strong optimization tool based on the particle swarm optimization technique to find the optimal power allocated at each relay antenna. Our numerical results illustrate the performance of the proposed scheme and show that it achieves a sub-optimal solution very close to the optimal one.

  18. Fluid-structure interaction and biomedical applications

    CERN Document Server

    Galdi, Giovanni; Nečasová, Šárka

    2014-01-01

    This book presents, in a methodical way, updated and comprehensive descriptions and analyses of some of the most relevant problems in the context of fluid-structure interaction (FSI). Generally speaking, FSI is among the most popular and intriguing problems in applied sciences and includes industrial as well as biological applications. Various fundamental aspects of FSI are addressed from different perspectives, with a focus on biomedical applications. More specifically, the book presents a mathematical analysis of basic questions like the well-posedness of the relevant initial and boundary value problems, as well as the modeling and the numerical simulation of a number of fundamental phenomena related to human biology. These latter research topics include blood flow in arteries and veins, blood coagulation and speech modeling. We believe that the variety of the topics discussed, along with the different approaches used to address and solve the corresponding problems, will help readers to develop a more holis...

  19. Fluid-structure coupling effects on periodically transient flow of a single-blade sewage centrifugal pump

    International Nuclear Information System (INIS)

    Pei, Ji; Yuan, Shouqi; Yuan, Jianping

    2013-01-01

    A partitioned fluid-structure interaction (FSI) solving strategy that depends on problem characteristics is applied to quantitatively obtain the coupling effects of a fluid-structure system in a single-blade centrifugal pump on the unsteady flow. A two-way coupling method is employed to realize strong FSI effects in the calculation procedure. The successful impeller oscillation measurement using two proximity sensors validated the FSI simulation accuracy in a complicated and practical fluid-structure system having a rotating component. The results show that the hydrodynamic force deviation can be observed in the results for the coupled versus uncoupled cases. Additionally, the coupled unsteady pressure is larger than the uncoupled value for every monitoring point at every impeller rotation position. Comparison results for different monitoring points under an overload condition and partial-load condition display the same regularities. To some extent, this interaction mechanism would affect the accuracy and reliability of the unsteady flow and rotor deflection analysis.

  20. EFFECTIVE SCHEMES OF FINANCING MERGERS AND ACQUISITIONS OF INTERNATIONAL CORPORATIONS

    Directory of Open Access Journals (Sweden)

    Vladimir Momot

    2013-10-01

    Full Text Available The article considers the question of a choice of the optimum scheme of financing mergers and acquisitions (M&As in the environment of international corporations. Methods and ways of financing integration transactions are considered and key factors and system processes of realization of these transactions are defined.

  1. Quadratically convergent MCSCF scheme using Fock operators

    International Nuclear Information System (INIS)

    Das, G.

    1981-01-01

    A quadratically convergent formulation of the MCSCF method using Fock operators is presented. Among its advantages the present formulation is quadratically convergent unlike the earlier ones based on Fock operators. In contrast to other quadratically convergent schemes as well as the one based on generalized Brillouin's theorem, this method leads easily to a hybrid scheme where the weakly coupled orbitals (such as the core) are handled purely by Fock equations, while the rest of the orbitals are treated by a quadratically convergent approach with a truncated virtual space obtained by the use of the corresponding Fock equations

  2. An Intelligent Method of Product Scheme Design Based on Product Gene

    Directory of Open Access Journals (Sweden)

    Qing Song Ai

    2013-01-01

    Full Text Available Nowadays, in order to have some featured products, many customers tend to buy customized products instead of buying common ones in supermarket. The manufacturing enterprises, with the purpose of improving their competitiveness, are focusing on providing customized products with high quality and low cost as well. At present, how to produce customized products rapidly and cheaply has been the key challenge to manufacturing enterprises. In this paper, an intelligent modeling approach applied to supporting the modeling of customized products is proposed, which may improve the efficiency during the product design process. Specifically, the product gene (PG method, which is an analogy of biological evolution in engineering area, is employed to model products in a new way. Based on product gene, we focus on the intelligent modeling method to generate product schemes rapidly and automatically. The process of our research includes three steps: (1 develop a product gene model for customized products; (2 find the obtainment and storage method for product gene; and (3 propose a specific genetic algorithm used for calculating the solution of customized product and generating new product schemes. Finally, a case study is applied to test the usefulness of our study.

  3. A data seamless interaction scheme between electric power secondary business systems

    Science.gov (United States)

    Ai, Wenkai; Qian, Feng

    2018-03-01

    At present, the data interaction of electric power secondary business systems is very high, and it is not universal to develop programs when data interaction is carried out by different manufacturers' electric power secondary business systems. There are different interaction schemes for electric power secondary business systems with different manufacturers, which lead to high development cost, low reusability and high maintenance difficulty. This paper introduces a new data seamless interaction scheme between electric power secondary business systems. The scheme adopts the international common Java message service protocol as the transmission protocol, adopts the common JavaScript object symbol format as the data interactive format, unified electric power secondary business systems data interactive way, improve reusability, reduce complexity, monitor the operation of the electric power secondary business systems construction has laid a solid foundation.

  4. A Three Factor Remote User Authentication Scheme Using Collision Resist Fuzzy Extractor in Single Server Environment

    Directory of Open Access Journals (Sweden)

    Giri Debasis

    2017-01-01

    Full Text Available Due to rapid growth of online applications, it is needed to provide such a facility by which communicators can get the services by applying the applications in a secure way. As communications are done through an insecure channel like Internet, any adversary can trap and modify the communication messages. Only authentication procedure can overcome the aforementioned problem. Many researchers have proposed so many authentication schemes in this literature. But, this paper has shown that many of them are not usable in real world application scenarios because, the existing schemes cannot resist all the possible attacks. Therefore, this paper has proposed a three factor authentication scheme using hash function and fuzzy extractor. This paper has further analyzed the security of the proposed scheme using random oracle model. The analysis shows that the proposed scheme can resist all the possible attacks. Furthermore, comparison between proposed scheme and related existing schemes shows that the proposed scheme has better trade-off among storage, computational and communication costs.

  5. Effect of Occlusal Scheme on the Pressure Distribution of Complete Denture Supporting Tissues: An In Vitro Study.

    Science.gov (United States)

    Madalli, Poornima; Murali, C R; Subhas, Sambit; Garg, Surbhi; Shahi, Prinka; Parasher, Pragati

    2015-01-01

    The complete denture teeth arrangement that gives maximum denture stability, comfort, esthetics, and function have been studied since several years. Many occlusal schemes have been advised in which the lingualized occlusion, balanced occlusion, and monoplane occlusion are advocated most popularly. The purpose of this study was to compare the pressure values on the supporting tissue using three diff erent posterior occlusal schemes: Balanced occlusion, lingualized occlusion, and monoplane occlusion in simulated dentures. The simulators used in this study, composed of the maxillary, and mandibular clear heat cure acrylic resin edentulous models. Pressures on the supporting structure under the complete denture were measured using eight strain gauges placed on the model surface on the buccal and lingual slopes of the ridges on the molar and pre-molar region. Pressure on the supporting structure was measured and signals from the sensors were amplifi ed and recorded by the multi-channel electronic strain indicator. The mean pressure which was obtained at each measurement point was compared by one-way ANOVA test. Overall monoplane occlusion had lesser pressure values compared to completely balanced and lingualized occlusal scheme. Lingualized occlusal scheme was found to transfer stresses from working side to non-working side to stabilize the mandibular denture.

  6. A Spatiotemporal-Chaos-Based Cryptosystem Taking Advantage of Both Synchronous and Self-Synchronizing Schemes

    Science.gov (United States)

    Lü, Hua-Ping; Wang, Shi-Hong; Li, Xiao-Wen; Tang, Guo-Ning; Kuang, Jin-Yu; Ye, Wei-Ping; Hu, Gang

    2004-06-01

    Two-dimensional one-way coupled map lattices are used for cryptography where multiple space units produce chaotic outputs in parallel. One of the outputs plays the role of driving for synchronization of the decryption system while the others perform the function of information encoding. With this separation of functions the receiver can establish a self-checking and self-correction mechanism, and enjoys the advantages of both synchronous and self-synchronizing schemes. A comparison between the present system with the system of advanced encryption standard (AES) is presented in the aspect of channel noise influence. Numerical investigations show that our system is much stronger than AES against channel noise perturbations, and thus can be better used for secure communications with large channel noise.

  7. Monotonicity Conditions for Multirate and Partitioned Explicit Runge-Kutta Schemes

    KAUST Repository

    Hundsdorfer, Willem

    2013-01-01

    Multirate schemes for conservation laws or convection-dominated problems seem to come in two flavors: schemes that are locally inconsistent, and schemes that lack mass-conservation. In this paper these two defects are discussed for one-dimensional conservation laws. Particular attention will be given to monotonicity properties of the multirate schemes, such as maximum principles and the total variation diminishing (TVD) property. The study of these properties will be done within the framework of partitioned Runge-Kutta methods. It will also be seen that the incompatibility of consistency and mass-conservation holds for ‘genuine’ multirate schemes, but not for general partitioned methods.

  8. Eavesdropping on the two-way quantum communication protocols with invisible photons

    Energy Technology Data Exchange (ETDEWEB)

    Cai Qingyu [State Key Laboratory of Magnetics Resonance and Atomic and Molecular Physics, Wuhan Institution of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)]. E-mail: qycai@wipm.ac.cn

    2006-02-20

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed00.

  9. Eavesdropping on the two-way quantum communication protocols with invisible photons

    International Nuclear Information System (INIS)

    Cai Qingyu

    2006-01-01

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed

  10. Alternative Scheme for Teleportation of Two-Atom Entangled State in Cavity QED

    Institute of Scientific and Technical Information of China (English)

    YANG Zhen-Biao

    2006-01-01

    We have proposed an alternative scheme for teleportation of two-atom entangled state in cavity QED. It is based on the degenerate Raman interaction of a single-mode cavity field with a ∧-type three-level atom. The prominent feature of the scheme is that only one cavity is required, which is prior to the previous one. Moreover, the atoms need to be detected are reduced compared with the previous scheme. The experimental feasibility of the scheme is discussed.The scheme can easily be generalized for teleportation of N-atom GHZ entangled states. The number of the atoms needed to be detected does not increase as the number of the atoms in GHZ state increases.

  11. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  12. An improved anonymous authentication scheme for roaming in ubiquitous networks

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  13. On CSM classes via Chern-Fulton classes of f-schemes

    OpenAIRE

    Fullwood, James; Wang, Dongxu

    2015-01-01

    The Chern-Fulton class is a generalization of Chern class to the realm of arbitrary embeddable schemes. While Chern-Fulton classes are sensitive to non-reduced scheme structure, they are not sensitive to possible singularities of the underlying support, thus at first glance are not interesting from a singularity theory viewpoint. However, we introduce a class of formal objects which we think of as `fractional schemes', or f-schemes for short, and then show that when one broadens the domain of...

  14. Validating a Written Instrument for Assessing Students' Fractions Schemes and

    Science.gov (United States)

    Wilkins, Jesse L. M.; Norton, Anderson; Boyce, Steven J.

    2013-01-01

    Previous research has documented schemes and operations that undergird students' understanding of fractions. This prior research was based, in large part, on small-group teaching experiments. However, written assessments are needed in order for teachers and researchers to assess students' ways of operating on a whole-class scale. In this study,…

  15. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  16. Adaptive Image Transmission Scheme over Wavelet-Based OFDM System

    Institute of Scientific and Technical Information of China (English)

    GAOXinying; YUANDongfeng; ZHANGHaixia

    2005-01-01

    In this paper an adaptive image transmission scheme is proposed over Wavelet-based OFDM (WOFDM) system with Unequal error protection (UEP) by the design of non-uniform signal constellation in MLC. Two different data division schemes: byte-based and bitbased, are analyzed and compared. Different bits are protected unequally according to their different contribution to the image quality in bit-based data division scheme, which causes UEP combined with this scheme more powerful than that with byte-based scheme. Simulation results demonstrate that image transmission by UEP with bit-based data division scheme presents much higher PSNR values and surprisingly better image quality. Furthermore, by considering the tradeoff of complexity and BER performance, Haar wavelet with the shortest compactly supported filter length is the most suitable one among orthogonal Daubechies wavelet series in our proposed system.

  17. An efficient quantum scheme for Private Set Intersection

    Science.gov (United States)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very suitable for big data services in Cloud or large-scale client-server networks.

  18. A progressive diagonalization scheme for the Rabi Hamiltonian

    International Nuclear Information System (INIS)

    Pan, Feng; Guan, Xin; Wang, Yin; Draayer, J P

    2010-01-01

    A diagonalization scheme for the Rabi Hamiltonian, which describes a qubit interacting with a single-mode radiation field via a dipole interaction, is proposed. It is shown that the Rabi Hamiltonian can be solved almost exactly using a progressive scheme that involves a finite set of one variable polynomial equations. The scheme is especially efficient for the lower part of the spectrum. Some low-lying energy levels of the model with several sets of parameters are calculated and compared to those provided by the recently proposed generalized rotating-wave approximation and a full matrix diagonalization.

  19. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  20. On the performance of spectrum sharing systems with two-way relaying and multiuser diversity

    KAUST Repository

    Yang, Liang

    2012-08-01

    In this letter, we consider a spectrum sharing network with two-way relaying and multi-user diversity. More specifically, one secondary transmitter with the best channel quality is selected and splits its partial power to relay its received signals to the primary users by using the amplify-and-forward relaying protocol. We derive a tight approximation for the resulting outage probability. Based on this formula, the performance of the spectral sharing region and the cell coverage are analyzed. Numerical results are given to verify our analysis and are discussed to illustrate the advantages of our newly proposed scheme. © 1997-2012 IEEE.

  1. Partners in Recovery: paving the way for the National Disability Insurance Scheme.

    Science.gov (United States)

    Stewart, Victoria; Slattery, Maddy; Roennfeldt, Helena; Wheeler, Amanda J

    2018-04-06

    Australians experiencing severe and persistent mental illness and who require services from multiple agencies, experience a fragmented service delivery system. In 2014, the Commonwealth Government introduced the Partners in Recovery (PIR) service, which provides service coordination and flexible funding to improve outcomes for this group of people. This study presents qualitative findings from a research project that aimed to understand the experiences of PIR participants, including aspects of the planning process and the effectiveness of the PIR program in meeting their needs from the perspective of the participant, their carer or family member and other support people within their lives. Semi-structured interviews were conducted with 31 stakeholders involved in the PIR program, of which 14 were participants, 17 were members of the participant's support network and three were members of a consumer and carer advisory group. Overall participation in the PIR program had a positive effect on the participant's lives. Relationships with the support facilitators were seen as an important element of the process, along with a focus on recovery-oriented goals and advocacy and linking to other agencies. These findings are important for informing the roll-out of the National Disability Insurance Scheme in Australia, which will replace PIR.

  2. MIMO transmit scheme based on morphological perceptron with competitive learning.

    Science.gov (United States)

    Valente, Raul Ambrozio; Abrão, Taufik

    2016-08-01

    This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Two Schemes for Generation of Entanglement for Vibronic Collective States of Multiple Trapped Ions

    International Nuclear Information System (INIS)

    Yang Wenxing; Li Jiahua; Zheng Anshou

    2007-01-01

    We propose two schemes to prepare entanglement for the vibronic collective states of multiple trapped ions. The first scheme aims to generating multipartite entanglement for vibrational modes of trapped ions, which only requires a single laser beam tuned to the ionic carrier frequency. Our scheme works in the mediated excitation regime, in which the corresponding Rabi frequency is equal to the trap frequency. Beyond their fundamental importance, these states may be of interest for experimental studies on decoherence since the present scheme operates in a fast way. The second scheme aims to preparing the continuous variable multimode maximally Greenberger-Horne-Zeilinger state. The distinct advantage is that the operation time is only limited by the available laser intensity, not by the inherent mechanisms such as off-resonant excitations. This makes it promising to obtain entanglement of multiple coherent and squeezing states with desired amplitudes in a reasonable time.

  4. A comparative study of upwind and MacCormack schemes for CAA benchmark problems

    Science.gov (United States)

    Viswanathan, K.; Sankar, L. N.

    1995-01-01

    In this study, upwind schemes and MacCormack schemes are evaluated as to their suitability for aeroacoustic applications. The governing equations are cast in a curvilinear coordinate system and discretized using finite volume concepts. A flux splitting procedure is used for the upwind schemes, where the signals crossing the cell faces are grouped into two categories: signals that bring information from outside into the cell, and signals that leave the cell. These signals may be computed in several ways, with the desired spatial and temporal accuracy achieved by choosing appropriate interpolating polynomials. The classical MacCormack schemes employed here are fourth order accurate in time and space. Results for categories 1, 4, and 6 of the workshop's benchmark problems are presented. Comparisons are also made with the exact solutions, where available. The main conclusions of this study are finally presented.

  5. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  6. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    Science.gov (United States)

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  7. A scheme of hidden-structure attribute-based encryption with multiple authorities

    Science.gov (United States)

    Ling, J.; Weng, A. X.

    2018-05-01

    In the most of the CP-ABE schemes with hidden access structure, both all the user attributes and the key generation are managed by only one authority. The key generation efficiency will decrease as the number of user increases, and the data will encounter security issues as the only authority is attacked. We proposed a scheme of hidden-structure attribute-based encryption with multiple authorities, which introduces multiple semi-trusted attribute authorities, avoiding the threat even though one or more authorities are attacked. We also realized user revocation by managing a revocation list. Based on DBDH assumption, we proved that our scheme is of IND-CMA security. The analysis shows that our scheme improves the key generation efficiency.

  8. Ionization of colliding atoms the hard way and the easy way

    International Nuclear Information System (INIS)

    Jong, M.A.M. de.

    1989-01-01

    The photoionization of the He(2 1 , 3 S)/He collision system at thermic collision energy has been studied by measurement of the energy distribution of the photoelectrons and comparison of this with the one from spontaneous ionization, in particular transfer ionization during collisions between He ++ ions and Xenon atoms. (h;w). 119 refs.; 44 figs.; 78 schemes; 1 tab

  9. Inter-hospital communications and transport: turning one-way funnels into two-way networks.

    Science.gov (United States)

    Rokos, Ivan C; Sanddal, Nels D; Pancioli, Arthur M; Wolff, Catherine; Gaieski, David F

    2010-12-01

    The Inter-hospital Communications and Transport workgroup was charged with exploring the current status, barriers, and data necessary to optimize the initial destination and subsequent transfer of patients between and among acute care settings. The subtitle, "Turning Funnels Into Two-way Networks," is descriptive of the approach that the workgroup took by exploring how and when smaller facilities in suburban, rural, and frontier areas can contribute to the daily business of caring for emergency patients across the lower-acuity spectrum-in some instances with consultant support from academic medical centers. It also focused on the need to identify high-acuity patients and expedite triage and transfer of those patients to facilities with specialty resources. Draft research recommendations were developed through an iterative writing process and presented to a breakout session of Academic Emergency Medicine's 2010 consensus conference, "Beyond Regionalization: Integrated Networks of Emergency Care." Priority research areas were determined by informal consensus of the breakout group. A subsequent iterative writing process was undertaken to complete this article. A number of broad research questions are presented. 2010 by the Society for Academic Emergency Medicine.

  10. An Elgamal Encryption Scheme of Fibonacci Q-Matrix and Finite State Machine

    Directory of Open Access Journals (Sweden)

    B. Ravi Kumar

    2015-12-01

    Full Text Available Cryptography is the science of writing messages in unknown form using mathematical models. In Cryptography, several ciphers were introduced for the encryption schemes. Recent research focusing on designing various mathematical models in such a way that tracing the inverse of the designed mathematical models is infeasible for the eve droppers. In the present work, the ELGamal encryption scheme is executed using the generator of a cyclic group formed by the points on choosing elliptic curve, finite state machines and key matrices obtained from the Fibonacci sequences.

  11. An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean Queries.

    Science.gov (United States)

    Jiang, Han; Li, Xue; Xu, Qiuliang

    2016-12-01

    The migration of e-health systems to the cloud computing brings huge benefits, as same as some security risks. Searchable Encryption(SE) is a cryptography encryption scheme that can protect the confidentiality of data and utilize the encrypted data at the same time. The SE scheme proposed by Cash et al. in Crypto2013 and its follow-up work in CCS2013 are most practical SE Scheme that support Boolean queries at present. In their scheme, the data user has to generate the search tokens by the counter number one by one and interact with server repeatedly, until he meets the correct one, or goes through plenty of tokens to illustrate that there is no search result. In this paper, we make an improvement to their scheme. We allow server to send back some information and help the user to generate exact search token in the search phase. In our scheme, there are only two round interaction between server and user, and the search token has [Formula: see text] elements, where n is the keywords number in query expression, and [Formula: see text] is the minimum documents number that contains one of keyword in query expression, and the computation cost of server is [Formula: see text] modular exponentiation operation.

  12. Linear source approximation scheme for method of characteristics

    International Nuclear Information System (INIS)

    Tang Chuntao

    2011-01-01

    Method of characteristics (MOC) for solving neutron transport equation based on unstructured mesh has already become one of the fundamental methods for lattice calculation of nuclear design code system. However, most of MOC codes are developed with flat source approximation called step characteristics (SC) scheme, which is another basic assumption for MOC. A linear source (LS) characteristics scheme and its corresponding modification for negative source distribution were proposed. The OECD/NEA C5G7-MOX 2D benchmark and a self-defined BWR mini-core problem were employed to validate the new LS module of PEACH code. Numerical results indicate that the proposed LS scheme employs less memory and computational time compared with SC scheme at the same accuracy. (authors)

  13. An early separation scheme for the LHC luminosity upgrade

    CERN Document Server

    Sterbini, G

    2010-01-01

    The present document is organized in five chapters. In the first chapter the framework of the study is described, developing the motivations, the goals and the requirements for the LHC Luminosity Upgrade. We analyze the need for the crossing angle and its impact on the peak luminosity of the collider. After having introduced the Early Separation Scheme, we explain how it may overcome some limitations of the present machine. We compare the nominal LHC crossing scheme with the proposed one underlining its potential in terms of performance and its issues with respect to the integration in the detectors. An analysis of the integrated magnetic field required is given. In the second chapter we introduce one of the most powerful aspect of the scheme: the luminosity leveling. After the description of the physical model adopted, we compare the results of its analytical and numerical solutions. All the potential improvement due to the Early Separation Scheme are shown on the luminosity plane (peak luminosity versus int...

  14. Fourier analysis of finite element preconditioned collocation schemes

    Science.gov (United States)

    Deville, Michel O.; Mund, Ernest H.

    1990-01-01

    The spectrum of the iteration operator of some finite element preconditioned Fourier collocation schemes is investigated. The first part of the paper analyses one-dimensional elliptic and hyperbolic model problems and the advection-diffusion equation. Analytical expressions of the eigenvalues are obtained with use of symbolic computation. The second part of the paper considers the set of one-dimensional differential equations resulting from Fourier analysis (in the tranverse direction) of the 2-D Stokes problem. All results agree with previous conclusions on the numerical efficiency of finite element preconditioning schemes.

  15. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  16. In search of new relationship in NpNn scheme

    International Nuclear Information System (INIS)

    Kumar, Pradeep; Singh, M.; Gupta, K.K.; Singh, Y.; Bihari, Chhail; Varshney, A.K.; Gupta, D.K.

    2013-01-01

    It is well understood now that the use of quantity N p N n as a variable to gauge the structure of a given nucleus, and to track the evolution of structure, is called the N p N n scheme. In recent years, effort have been made for minimizing the uncertainties in Grodzins Rule introducing asymmetry in the even symmetric nuclei of medium mass range and to provide new relationship on moment of inertia in N p N n . This new relationship need to be tested in broader way also. Presented here are Ru, Xe, Ba, and Hf isotopic chain covering medium and heavy mass of nuclear chart in N p N n scheme, where the above view point is clearly verified in wider sense

  17. EVALUATION OF THERMAL EFFICIENCY OF THE TECHNOLOGICAL SCHEME OF APPLE CHIPS AND DRIED FRUITS PRODUCTION

    Directory of Open Access Journals (Sweden)

    G. V. Kalashnikov

    2014-01-01

    Full Text Available The estimation of thermodynamic perfection of separate technological processes is executed at heat-moisture of handling of fruit and a line of manufacture of fruit apple chips and dried fruits. The technological scheme of a line of processing of fruits and manufactures of fruit chips on the basis of convection and the microwave-dryings suggested resource-saving. The technique is made and results of calculation of thermal expenses for various schemes of manufacture of apple chips are resulted. For the offered scheme material, thermal and power streams on the basis of balance parities of technological processes are certain. The comparative thermal production efficiency of apple chips for a base foreign variant and the offered technological scheme with the closed cycle of use of the heat-carrier and the combined convection-microwave-drying is shown. In this paper we define the thermal and energy flows for the processes of convective drying, pre-microwave drying, hydrothermal treatment and final microwave drying plant material, which are one of the main stages of the production of all kinds of fruit and vegetable concentrates, including fruit apple chips. Resource-saving ways moisture-heat of handling (hydration, blanching, drying, etc. produce raw materials in the production of food concentrates suggested a reduced water flow with a high degree of use of its potential power and microwave sources. To assess the thermal efficiency of the various processes and production schemes used as indicators of thermal efficiency and proposed value of specific heat (kJ / kg given mass productivity per unit of feedstock and translational moisture. The values of the mass fraction of the heat of material flows for the base and the proposed resource-saving production scheme fruit chips, for example, apple, based on a combination of convection-microwave drying each control surface.

  18. Developing and modifying behavioral coding schemes in pediatric psychology: a practical guide.

    Science.gov (United States)

    Chorney, Jill MacLaren; McMurtry, C Meghan; Chambers, Christine T; Bakeman, Roger

    2015-01-01

    To provide a concise and practical guide to the development, modification, and use of behavioral coding schemes for observational data in pediatric psychology. This article provides a review of relevant literature and experience in developing and refining behavioral coding schemes. A step-by-step guide to developing and/or modifying behavioral coding schemes is provided. Major steps include refining a research question, developing or refining the coding manual, piloting and refining the coding manual, and implementing the coding scheme. Major tasks within each step are discussed, and pediatric psychology examples are provided throughout. Behavioral coding can be a complex and time-intensive process, but the approach is invaluable in allowing researchers to address clinically relevant research questions in ways that would not otherwise be possible. © The Author 2014. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  19. Theory and Practice of a Leakage Resilient Masking Scheme

    DEFF Research Database (Denmark)

    Balasch, Josep; Faust, Sebastian; Gierlichs, Benedikt

    2012-01-01

    A recent trend in cryptography is to formally prove the leakage resilience of cryptographic implementations – that is, one formally shows that a scheme remains provably secure even in the presence of side channel leakage. Although many of the proposed schemes are secure in a surprisingly strong m...

  20. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  1. Non Standard Finite Difference Scheme for Mutualistic Interaction Description

    OpenAIRE

    Gabbriellini, Gianluca

    2012-01-01

    One of the more interesting themes of the mathematical ecology is the description of the mutualistic interaction between two interacting species. Based on continuous-time model developed by Holland and DeAngelis 2009 for consumer-resource mutualism description, this work deals with the application of the Mickens Non Standard Finite Difference method to transform the continuous-time scheme into a discrete-time one. It has been proved that the Mickens scheme is dynamically consistent with the o...

  2. Arbitrary Dimension Convection-Diffusion Schemes for Space-Time Discretizations

    Energy Technology Data Exchange (ETDEWEB)

    Bank, Randolph E. [Univ. of California, San Diego, CA (United States); Vassilevski, Panayot S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Zikatanov, Ludmil T. [Bulgarian Academy of Sciences, Sofia (Bulgaria)

    2016-01-20

    This note proposes embedding a time dependent PDE into a convection-diffusion type PDE (in one space dimension higher) with singularity, for which two discretization schemes, the classical streamline-diffusion and the EAFE (edge average finite element) one, are investigated in terms of stability and error analysis. The EAFE scheme, in particular, is extended to be arbitrary order which is of interest on its own. Numerical results, in combined space-time domain demonstrate the feasibility of the proposed approach.

  3. Four-level conservative finite-difference schemes for Boussinesq paradigm equation

    Science.gov (United States)

    Kolkovska, N.

    2013-10-01

    In this paper a two-parametric family of four level conservative finite difference schemes is constructed for the multidimensional Boussinesq paradigm equation. The schemes are explicit in the sense that no inner iterations are needed for evaluation of the numerical solution. The preservation of the discrete energy with this method is proved. The schemes have been numerically tested on one soliton propagation model and two solitons interaction model. The numerical experiments demonstrate that the proposed family of schemes has second order of convergence in space and time steps in the discrete maximal norm.

  4. Evolution system study of a generalized scheme of relativistic magnetohydrodynamic

    International Nuclear Information System (INIS)

    Mahjoub, Bechir.

    1977-01-01

    A generalized scheme of relativistic magnetohydrodynamics is studied with a thermodynamical differential relation proposed by Fokker; this scheme takes account of interaction between the fluid and the magnetic field. Taking account of an integrability condition of this relation, the evolution system corresponding to this scheme is identical to the one corresponding to the usual scheme; it has the same characteristics; it is non-strictly hyperbolic with the same hypothesis of compressibility and it has, with respect to the Cauchy problem, an unique solution in a Gevrey class of index α=3/2 [fr

  5. Track reconstruction of normal muon decays in the LAMPF TPC: one working scheme

    International Nuclear Information System (INIS)

    McKee, R.J.

    1983-01-01

    A working scheme for track reconstruction of normal muon decays in the LAMPF TPC is here outlined. Muon tracks stopping in the TPC and helical electron tracks from muon decay are both identified and fitted for complete event reconstruction. Because of certain geometrical characteristics of the TPC, novel techniques are deployed to find the tracks. Normal road tracing methods do not work reliably; they are replaced by, among other things, a random search technique that locates the helix's planar projection and a carefully worked-out method for correctly putting each coordinate on its proper turn in the helix

  6. Comparison of reactivity estimation performance between two extended Kalman filtering schemes

    International Nuclear Information System (INIS)

    Peng, Xingjie; Cai, Yun; Li, Qing; Wang, Kan

    2016-01-01

    Highlights: • The performances of two EKF schemes using different Jacobian matrices are compared. • Numerical simulations are used for the validation and comparison of these two EKF schemes. • The simulation results show that the EKF scheme adopted by this paper performs better than the one adopted by previous literatures. - Abstract: The extended Kalman filtering (EKF) technique has been utilized in the estimation of reactivity which is a significantly important parameter to indicate the status of the nuclear reactor. In this paper, the performances of two EKF schemes using different Jacobian matrices are compared. Numerical simulations are used for the validation and comparison of these two EKF schemes, and the results show that the Jacobian matrix obtained directly from the discrete-time state model performs better than the one which is the discretization form of the Jacobian matrix obtained from the continuous-time state model.

  7. Achieving bifunctional cloak via combination of passive and active schemes

    Science.gov (United States)

    Lan, Chuwen; Bi, Ke; Gao, Zehua; Li, Bo; Zhou, Ji

    2016-11-01

    In this study, a simple and delicate approach to realizing manipulation of multi-physics field simultaneously through combination of passive and active schemes is proposed. In the design, one physical field is manipulated with passive scheme while the other with active scheme. As a proof of this concept, a bifunctional device is designed and fabricated to behave as electric and thermal invisibility cloak simultaneously. It is found that the experimental results are consistent with the simulated ones well, confirming the feasibility of our method. Furthermore, the proposed method could also be extended to other multi-physics fields, which might lead to potential applications in thermal, electric, and acoustic areas.

  8. Numeric Analysis for Relationship-Aware Scalable Streaming Scheme

    Directory of Open Access Journals (Sweden)

    Heung Ki Lee

    2014-01-01

    Full Text Available Frequent packet loss of media data is a critical problem that degrades the quality of streaming services over mobile networks. Packet loss invalidates frames containing lost packets and other related frames at the same time. Indirect loss caused by losing packets decreases the quality of streaming. A scalable streaming service can decrease the amount of dropped multimedia resulting from a single packet loss. Content providers typically divide one large media stream into several layers through a scalable streaming service and then provide each scalable layer to the user depending on the mobile network. Also, a scalable streaming service makes it possible to decode partial multimedia data depending on the relationship between frames and layers. Therefore, a scalable streaming service provides a way to decrease the wasted multimedia data when one packet is lost. However, the hierarchical structure between frames and layers of scalable streams determines the service quality of the scalable streaming service. Even if whole packets of layers are transmitted successfully, they cannot be decoded as a result of the absence of reference frames and layers. Therefore, the complicated relationship between frames and layers in a scalable stream increases the volume of abandoned layers. For providing a high-quality scalable streaming service, we choose a proper relationship between scalable layers as well as the amount of transmitted multimedia data depending on the network situation. We prove that a simple scalable scheme outperforms a complicated scheme in an error-prone network. We suggest an adaptive set-top box (AdaptiveSTB to lower the dependency between scalable layers in a scalable stream. Also, we provide a numerical model to obtain the indirect loss of multimedia data and apply it to various multimedia streams. Our AdaptiveSTB enhances the quality of a scalable streaming service by removing indirect loss.

  9. A Modified Computational Scheme for the Stochastic Perturbation Finite Element Method

    Directory of Open Access Journals (Sweden)

    Feng Wu

    Full Text Available Abstract A modified computational scheme of the stochastic perturbation finite element method (SPFEM is developed for structures with low-level uncertainties. The proposed scheme can provide second-order estimates of the mean and variance without differentiating the system matrices with respect to the random variables. When the proposed scheme is used, it involves finite analyses of deterministic systems. In the case of one random variable with a symmetric probability density function, the proposed computational scheme can even provide a result with fifth-order accuracy. Compared with the traditional computational scheme of SPFEM, the proposed scheme is more convenient for numerical implementation. Four numerical examples demonstrate that the proposed scheme can be used in linear or nonlinear structures with correlated or uncorrelated random variables.

  10. Optimal relay selection and power allocation for cognitive two-way relaying networks

    KAUST Repository

    Pandarakkottilil, Ubaidulla; Aï ssa, Sonia

    2012-01-01

    In this paper, we present an optimal scheme for power allocation and relay selection in a cognitive radio network where a pair of cognitive (or secondary) transceiver nodes communicate with each other assisted by a set of cognitive two-way relays

  11. Towards Efficient Wireless Body Area Network Using Two-Way Relay Cooperation.

    Science.gov (United States)

    Waheed, Maham; Ahmad, Rizwan; Ahmed, Waqas; Drieberg, Micheal; Alam, Muhammad Mahtab

    2018-02-13

    The fabrication of lightweight, ultra-thin, low power and intelligent body-borne sensors leads to novel advances in wireless body area networks (WBANs). Depending on the placement of the nodes, it is characterized as in/on body WBAN; thus, the channel is largely affected by body posture, clothing, muscle movement, body temperature and climatic conditions. The energy resources are limited and it is not feasible to replace the sensor's battery frequently. In order to keep the sensor in working condition, the channel resources should be reserved. The lifetime of the sensor is very crucial and it highly depends on transmission among sensor nodes and energy consumption. The reliability and energy efficiency in WBAN applications play a vital role. In this paper, the analytical expressions for energy efficiency (EE) and packet error rate (PER) are formulated for two-way relay cooperative communication. The results depict better reliability and efficiency compared to direct and one-way relay communication. The effective performance range of direct vs. cooperative communication is separated by a threshold distance. Based on EE calculations, an optimal packet size is observed that provides maximum efficiency over a certain link length. A smart and energy efficient system is articulated that utilizes all three communication modes, namely direct, one-way relay and two-way relay, as the direct link performs better for a certain range, but the cooperative communication gives better results for increased distance in terms of EE. The efficacy of the proposed hybrid scheme is also demonstrated over a practical quasi-static channel. Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link.

  12. Towards Efficient Wireless Body Area Network Using Two-Way Relay Cooperation

    Directory of Open Access Journals (Sweden)

    Maham Waheed

    2018-02-01

    Full Text Available The fabrication of lightweight, ultra-thin, low power and intelligent body-borne sensors leads to novel advances in wireless body area networks (WBANs. Depending on the placement of the nodes, it is characterized as in/on body WBAN; thus, the channel is largely affected by body posture, clothing, muscle movement, body temperature and climatic conditions. The energy resources are limited and it is not feasible to replace the sensor’s battery frequently. In order to keep the sensor in working condition, the channel resources should be reserved. The lifetime of the sensor is very crucial and it highly depends on transmission among sensor nodes and energy consumption. The reliability and energy efficiency in WBAN applications play a vital role. In this paper, the analytical expressions for energy efficiency (EE and packet error rate (PER are formulated for two-way relay cooperative communication. The results depict better reliability and efficiency compared to direct and one-way relay communication. The effective performance range of direct vs. cooperative communication is separated by a threshold distance. Based on EE calculations, an optimal packet size is observed that provides maximum efficiency over a certain link length. A smart and energy efficient system is articulated that utilizes all three communication modes, namely direct, one-way relay and two-way relay, as the direct link performs better for a certain range, but the cooperative communication gives better results for increased distance in terms of EE. The efficacy of the proposed hybrid scheme is also demonstrated over a practical quasi-static channel. Furthermore, link length extension and diversity is achieved by joint network-channel (JNC coding the cooperative link.

  13. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  14. Developing a Coding Scheme to Analyse Creativity in Highly-constrained Design Activities

    DEFF Research Database (Denmark)

    Dekoninck, Elies; Yue, Huang; Howard, Thomas J.

    2010-01-01

    This work is part of a larger project which aims to investigate the nature of creativity and the effectiveness of creativity tools in highly-constrained design tasks. This paper presents the research where a coding scheme was developed and tested with a designer-researcher who conducted two rounds...... of design and analysis on a highly constrained design task. This paper shows how design changes can be coded using a scheme based on creative ‘modes of change’. The coding scheme can show the way a designer moves around the design space, and particularly the strategies that are used by a creative designer...... larger study with more designers working on different types of highly-constrained design task is needed, in order to draw conclusions on the modes of change and their relationship to creativity....

  15. A Scheme for "The Window of Taiwan National Park"

    Science.gov (United States)

    Tang, E. Y.-F.

    2015-08-01

    There are nine distinguished national parks in Taiwan. Each one has its own wild variety of natural inhabitants and cultural resources. However, due to the geographical inaccessibility, partially closed by natural disaster, or under the restrict protection by the authority, most of the places are difficult to reach for the public, not to mention for the disabled people. Therefore, a scheme, with the cutting edge technology, comprising the essences of all nine national parks in a space located in one of the national parks which is more convenient with public transportation system is presented. The idea is to open a window in the hope to offer a platform for better and easy understanding the features of all national parks, to increase the accessibility for disabled people, and to provide advanced services for the public. Recently, the progressing of digital image technology becomes more and more promising. Using mutual interactive ways and game-liked formation to promote the participation of visitors to gain learning experiences is now becoming a mainstream for exhibition in visitor centers and museums around the world. The method of the motion-sensing interactive exhibition has personalized feature which is programmed to store visitor's behaviors and become smarter in response with visitor in order to make each person feel that they are playing in a game. It involves scenarios, concepts and visitors' participation in the exhibition design to form an interactive flow among human, exhibits, and space. It is highly attractive and low barrier for young, senior and disabled people, and for the case of no physical objects to exhibit, visual technology is a way of solution. This paper presents the features and difficulties of national parks in Taiwan. Visitors' behavior and several cases have been investigated and analysed to find a suitable way for combining all the features of national parks in an exhibition. However, it should be noticed that this is not an alternative

  16. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  17. "No one says 'No' to money" - a mixed methods approach for evaluating conditional cash transfer schemes to improve girl children's status in Haryana, India.

    Science.gov (United States)

    Krishnan, Anand; Amarchand, Ritvik; Byass, Peter; Pandav, Chandrakant; Ng, Nawi

    2014-01-31

    Haryana was the first state in India to launch a conditional cash transfer (CCT) scheme in 1994. Initially it targeted all disadvantaged girls but was revised in 2005 to restrict it to second girl children of all groups. The benefit which accrued at girl attaining 18 years and subject to conditionalities of being fully immunized, studying till class 10 and remaining unmarried, was increased from about US$ 500 to US$ 2000. Using a mixed methods approach, we evaluated the implementation and possible impact of these two schemes. A survey was conducted among 200 randomly selected respondents of Ballabgarh Block in Haryana to assess their perceptions of girl children and related schemes. A cohort of births during this period was assembled from population database of 28 villages in this block and changes in sex ratio at birth and in immunization coverage at one year of age among boys and girls was measured. Education levels and mean age at marriage of daughters were compared with daughters-in-law from outside Haryana. In-depth interviews were conducted among district level implementers of these schemes to assess their perceptions of programs' implementation and impact. These were analyzed using a thematic approach. The perceptions of girls as a liability and poor (9% to 15%) awareness of the schemes was noted. The cohort analysis showed that while there has been an improvement in the indicators studied, these were similar to those seen among the control groups. Qualitative analysis identified a "conspiracy of silence" - an underplaying of the pervasiveness of the problem coupled with a passive implementation of the program and a clash between political culture of giving subsidies and a bureaucratic approach that imposed many conditionalities and documentary needs for availing of benefits. The apparent lack of impact on the societal mindset calls for a revision in the current approach of addressing a social issue by a purely conditional cash transfer program.

  18. Impact of renewables on electricity markets – Do support schemes matter?

    International Nuclear Information System (INIS)

    Winkler, Jenny; Gaio, Alberto; Pfluger, Benjamin; Ragwitz, Mario

    2016-01-01

    Rising renewable shares influence electricity markets in several ways: among others, average market prices are reduced and price volatility increases. Therefore, the “missing money problem” in energy-only electricity markets is more likely to occur in systems with high renewable shares. Nevertheless, renewables are supported in many countries due to their expected benefits. The kind of support instrument can however influence the degree to which renewables influence the market. While fixed feed-in tariffs lead to higher market impacts, more market-oriented support schemes such as market premiums, quota systems and capacity-based payments decrease the extent to which markets are affected. This paper analyzes the market impacts of different support schemes. For this purpose, a new module is added to an existing bottom-up simulation model of the electricity market. In addition, different degrees of flexibility in the electricity system are considered. A case study for Germany is used to derive policy recommendations regarding the choice of support scheme. - Highlights: •Renewable support schemes matter regarding the impact on electricity markets. •Market-oriented support schemes reduce the impact on electricity markets. •More flexible electricity systems reduce the need for market participation. •Sliding premiums combine market integration with a productive risk allocation.

  19. An improved weighted essentially non-oscillatory scheme for hyperbolic conservation laws

    Science.gov (United States)

    Borges, Rafael; Carmona, Monique; Costa, Bruno; Don, Wai Sun

    2008-03-01

    In this article we develop an improved version of the classical fifth-order weighted essentially non-oscillatory finite difference scheme of [G.S. Jiang, C.W. Shu, Efficient implementation of weighted ENO schemes, J. Comput. Phys. 126 (1996) 202-228] (WENO-JS) for hyperbolic conservation laws. Through the novel use of a linear combination of the low order smoothness indicators already present in the framework of WENO-JS, a new smoothness indicator of higher order is devised and new non-oscillatory weights are built, providing a new WENO scheme (WENO-Z) with less dissipation and higher resolution than the classical WENO. This new scheme generates solutions that are sharp as the ones of the mapped WENO scheme (WENO-M) of Henrick et al. [A.K. Henrick, T.D. Aslam, J.M. Powers, Mapped weighted essentially non-oscillatory schemes: achieving optimal order near critical points, J. Comput. Phys. 207 (2005) 542-567], however with a 25% reduction in CPU costs, since no mapping is necessary. We also provide a detailed analysis of the convergence of the WENO-Z scheme at critical points of smooth solutions and show that the solution enhancements of WENO-Z and WENO-M at problems with shocks comes from their ability to assign substantially larger weights to discontinuous stencils than the WENO-JS scheme, not from their superior order of convergence at critical points. Numerical solutions of the linear advection of discontinuous functions and nonlinear hyperbolic conservation laws as the one dimensional Euler equations with Riemann initial value problems, the Mach 3 shock-density wave interaction and the blastwave problems are compared with the ones generated by the WENO-JS and WENO-M schemes. The good performance of the WENO-Z scheme is also demonstrated in the simulation of two dimensional problems as the shock-vortex interaction and a Mach 4.46 Richtmyer-Meshkov Instability (RMI) modeled via the two dimensional Euler equations.

  20. Cryptanalysis of Two Fault Countermeasure Schemes

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey

    2015-01-01

    function with some additional randomness and computes the value of the function. The second called the unmasking function, is computed securely using a different register and undoes the effect of the masking with random bits. We will show that there exists a weakness in the way in which both these schemes...... is meant for the protection of block ciphers like AES. The second countermeasure was proposed in IEEE-HOST 2015 and protects the Grain-128 stream cipher. The design divides the output function used in Grain-128 into two components. The first called the masking function, masks the input bits to the output...

  1. Effectiveness of the Swiss agri-environment scheme in promoting biodiversity

    NARCIS (Netherlands)

    Knop, E.; Kleijn, D.; Herzog, F.; Schmid, B.

    2006-01-01

    1. Increasing concern over the loss of biodiversity in agricultural landscapes was one of the reasons for the introduction of agri-environment schemes in Europe. These schemes compensate farmers financially for any loss of income associated with measures aimed to benefit biodiversity. Nevertheless,

  2. Large Scale Skill in Regional Climate Modeling and the Lateral Boundary Condition Scheme

    Science.gov (United States)

    Veljović, K.; Rajković, B.; Mesinger, F.

    2009-04-01

    Several points are made concerning the somewhat controversial issue of regional climate modeling: should a regional climate model (RCM) be expected to maintain the large scale skill of the driver global model that is supplying its lateral boundary condition (LBC)? Given that this is normally desired, is it able to do so without help via the fairly popular large scale nudging? Specifically, without such nudging, will the RCM kinetic energy necessarily decrease with time compared to that of the driver model or analysis data as suggested by a study using the Regional Atmospheric Modeling System (RAMS)? Finally, can the lateral boundary condition scheme make a difference: is the almost universally used but somewhat costly relaxation scheme necessary for a desirable RCM performance? Experiments are made to explore these questions running the Eta model in two versions differing in the lateral boundary scheme used. One of these schemes is the traditional relaxation scheme, and the other the Eta model scheme in which information is used at the outermost boundary only, and not all variables are prescribed at the outflow boundary. Forecast lateral boundary conditions are used, and results are verified against the analyses. Thus, skill of the two RCM forecasts can be and is compared not only against each other but also against that of the driver global forecast. A novel verification method is used in the manner of customary precipitation verification in that forecast spatial wind speed distribution is verified against analyses by calculating bias adjusted equitable threat scores and bias scores for wind speeds greater than chosen wind speed thresholds. In this way, focusing on a high wind speed value in the upper troposphere, verification of large scale features we suggest can be done in a manner that may be more physically meaningful than verifications via spectral decomposition that are a standard RCM verification method. The results we have at this point are somewhat

  3. An Analysis of Reactor Structural Response to Fuel Sodium Interaction in a Hypothetical Core Disruptive Accident

    International Nuclear Information System (INIS)

    Suzuki, K.; Tashiro, M.; Sasanuma, K.; Nagashima, K.

    1976-01-01

    This study shows the effect of constraints around FSI zone on FSI phenomena and deformations of reactor structures. SUGAR-PISCES code system has been developed to evaluate the phenomena of FSI and the response of reactor structure. SUGAR calculates the phenomena of FSI. PISCES, developed by Physics International Company in U.S.A, calculates the dynamic response of reactor structure in two-dimensional, time-dependent finite-difference Lagrangian model. The results show that the peak pressure and energy by FSI and the deformation of reactor structures are about twice in case of FSI zone surrounding by blanket than by coolant. The FSI phenomena highly depend on the reactor structure and the realistic configuration around core must be considered for analyzing hypothetical core disruptive accident. In conclusion: FSI phenomena depend highly on constraints around FSI zone, so that the constraints must be dealt with realistically in analytical models. Although a two-dimensional model is superior to a quasi-two-dimensional model. The former needs long calculation time, so it is very expensive using in parametric study. Therefore, it is desirable that the two-dimensional model is used in the final study of reactor design and the quasi-two-dimensional model is used in parametric study. The blanket affects on the acoustic pressure and the deformations of radial structures, but affects scarcely on the upper vessel deformation. The blanket also affects on the mechanical work largely. The core barrel gives scarcely the effects on pressure in single phase but gives highly the effects on pressure in two-phase and deformation of reactor structures in this study. For studying the more realistic phenomena of FSI in the reactor design, the following works should be needed. (i) Spatial Distribution of FSI Region Spatial and time-dependent distribution of fuel temperature and molten fuel fraction must be taken in realistic simulation of accident condition. To this purpose, the code will

  4. A novel chemical scheme for flotation of rutile from eclogite tailing

    Directory of Open Access Journals (Sweden)

    Bo Xu

    Full Text Available A novel chemical scheme for the flotation of rutile from eclogite tailings has been developed in this work. It consists of lead ion as the activator, sodium fluorosilicate (SF as the depressant, and styryl phosphonic acid (SPA and n-octyl alcohol (OCT as the collector. By using the proposed scheme to treat a feed ore of 4.5% TiO2, a rougher concentrate of grade 84.47% TiO2 was achieved with the recovery of 61.5%. Also, the scheme made a high flotation rate for rutile. The scheme was applied to closed-circuit flotation (one-stage rougher flotation, two-stage scavenger flotation and two-stage cleaner flotation, produced a concentrate of 92% TiO2 with the recovery of 70%. It is shown that the new chemical scheme would be a potential one for the effective separation of rutile from eclogite ores. Keywords: Rutile, Flotation, Reagents, Eclogite tailings

  5. Analysis of Intercarrier Interference Cancellation Scheme in OFDM Systems

    Directory of Open Access Journals (Sweden)

    Nasir Salh Almisbah

    2012-06-01

    Full Text Available Abstract: Orthogonal Frequency Division Multiplexing (OFDM is an emerging multi-carrier modulation scheme, which has been adopted for several wireless standards such as IEEE 802.11a and HiperLAN2. In OFDM systems, the performance is very sensitive to subcarrier frequency errors (offset. This paper shows the analysis and derivations of intercarrier interference (ICI complex gain that used in self-cancellation scheme and its dependence on subcarrier frequency offset. Simulation shows that better improvement in performance is achieved for systems that use this cancellation scheme. Moreover, analysis and simulation show that theoretical carrier-to-interference ratio (CIR for OFDM with cancellation scheme is greater than conventional one by more than 14dB.

  6. Improving multivariate Horner schemes with Monte Carlo tree search

    Science.gov (United States)

    Kuipers, J.; Plaat, A.; Vermaseren, J. A. M.; van den Herik, H. J.

    2013-11-01

    Optimizing the cost of evaluating a polynomial is a classic problem in computer science. For polynomials in one variable, Horner's method provides a scheme for producing a computationally efficient form. For multivariate polynomials it is possible to generalize Horner's method, but this leaves freedom in the order of the variables. Traditionally, greedy schemes like most-occurring variable first are used. This simple textbook algorithm has given remarkably efficient results. Finding better algorithms has proved difficult. In trying to improve upon the greedy scheme we have implemented Monte Carlo tree search, a recent search method from the field of artificial intelligence. This results in better Horner schemes and reduces the cost of evaluating polynomials, sometimes by factors up to two.

  7. Optimized difference schemes for multidimensional hyperbolic partial differential equations

    Directory of Open Access Journals (Sweden)

    Adrian Sescu

    2009-04-01

    Full Text Available In numerical solutions to hyperbolic partial differential equations in multidimensions, in addition to dispersion and dissipation errors, there is a grid-related error (referred to as isotropy error or numerical anisotropy that affects the directional dependence of the wave propagation. Difference schemes are mostly analyzed and optimized in one dimension, wherein the anisotropy correction may not be effective enough. In this work, optimized multidimensional difference schemes with arbitrary order of accuracy are designed to have improved isotropy compared to conventional schemes. The derivation is performed based on Taylor series expansion and Fourier analysis. The schemes are restricted to equally-spaced Cartesian grids, so the generalized curvilinear transformation method and Cartesian grid methods are good candidates.

  8. Machine protection schemes for the SLC

    International Nuclear Information System (INIS)

    Ross, M.C.

    1991-01-01

    The beamline components of a linear collider must be protected from high power beams in a way that is both reliable and has a minimum impact on integrated luminosity. When an upstream accelerator component fault occurs, the machine protection system suppresses the appropriate beam pulses and restores them when the fault clears or is compensated for. If an unacceptable localized beam loss is detected, without an accompanying component fault that is a likely cause of the loss, the system must provide identical, lower rate (lower average power), beam pulses to be used for diagnosis. This must not be done at the expense of any upstream beam stabilization system since fault diagnosis and recovery may take some time. Since the SLC beam pulse sequence is a regenerative one, i.e. correct function on a given pulse requires that several preceding pulses have been successfully completed, beam pulse repetition rate limiting is not trivial. Smooth, rapid, recovery from this type of fault is very important and can have a significant impact on luminosity. This paper provides an overview of the beam suppression and repetition rate limiting schemes used at the SLC

  9. A single multilocus sequence typing (MLST) scheme for seven pathogenic Leptospira species

    NARCIS (Netherlands)

    Boonsilp, Siriphan; Thaipadungpanit, Janjira; Amornchai, Premjit; Wuthiekanun, Vanaporn; Bailey, Mark S.; Holden, Matthew T. G.; Zhang, Cuicai; Jiang, Xiugao; Koizumi, Nobuo; Taylor, Kyle; Galloway, Renee; Hoffmaster, Alex R.; Craig, Scott; Smythe, Lee D.; Hartskeerl, Rudy A.; Day, Nicholas P.; Chantratita, Narisara; Feil, Edward J.; Aanensen, David M.; Spratt, Brian G.; Peacock, Sharon J.

    2013-01-01

    The available Leptospira multilocus sequence typing (MLST) scheme supported by a MLST website is limited to L. interrogans and L. kirschneri. Our aim was to broaden the utility of this scheme to incorporate a total of seven pathogenic species. We modified the existing scheme by replacing one of the

  10. [Occlusal schemes of complete dentures--a review of the literature].

    Science.gov (United States)

    Tarazi, E; Ticotsky-Zadok, N

    2007-01-01

    movements). Linear occlusion scheme occludes cuspless teeth with anatomic teeth that have been modified (bladed teeth) in order to achieve linear occlusal contacts. Linear contacts are the pin-point contacts of the tips of the cusps of the bladed teeth against cuspless teeth that create a plane. The specific design of positioning upper modified teeth on the upper denture and non anatomic teeth on the lower one is called lingualized occlusion. It is characterized by contacts of only the lingual (palatinal, to be more accurate) cusps of the upper teeth with the lower teeth. The lingualized occlusal scheme provides better aesthetics than the monoplane occlusion scheme, and better stability (in the case of resorbed residual ridges) than bilateral occlusion scheme of anatomic teeth. The results of studies that compared different occlusal schemes may well be summarized as inconclusive. However, it does seem that patients preferred anatomic or semi-anatomic (modified) teeth, and that chewing efficiency with anatomic and modified teeth was better than with non anatomic teeth. Similar results were found in studies of occlusal schemes of implant-supported lower dentures opposed by complete upper dentures. There isn't one occlusal scheme that fits all patients in need of complete dentures, in fact, in many cases more than one occlusal scheme might be adequate. Selection of an occlusal scheme for a patient should include correlation of the characteristics of the patient with those of the various occlusal schemes. The characteristics of the patient include: height and width of the residual ridge, aesthetic demands of the patient, skeletal relations (class I/II/III), neuromuscular control, and tendency for para-functional activity. The multiple characteristics of the occlusal schemes were reviewed in this article. Considering all of those factors in relation to a specific patient, the dentist should be able to decide on the most suitable occlusal scheme for the case.

  11. Utility of Online Communities – Ways One Can Benefit From One’s Online Life

    Directory of Open Access Journals (Sweden)

    Ioana Cărtărescu

    2010-10-01

    Full Text Available As many of today’s social scientists (such as Beck, Giddens, Howard, Vlăsceanu etc have remarked, the modern age has brought with itself a great series of fast-paced changes in the average man’s lifestyle. Nothing is safe or can be taken for granted anymore. Families disintegrate, traditions become obsolete and professional re-qualifications are necessary every few years just to keep upwith the younger, tougher competition on the labour market. Forced to constantly changed ones place of residence, ones entourage, work and habits leads to a feeling of loneliness, of not really being a part of modern society and its communities, of being left out to fend for yourself. Luckily, modernity has also brought with itself a never seen before technological boom which instantly permitted not only the improvement of one’s biological life, but also provided society with the opportunity to bridge the gap between people. One of the most significant of these innovations is the Internet, a non-geographical space that people, in just a few short years, have colonized andmade their own, projected their identities into and created solid and durable communities that, which were less subjected to being torn apart by distance and time. This paper’s object is to show how and why being part of an online community is a great way for one to get a stronger feeling of social integration and be part of a somewhat more fair, less prejudiced world.

  12. An equilibrium-conserving taxation scheme for income from capital

    Science.gov (United States)

    Tempere, Jacques

    2018-02-01

    Under conditions of market equilibrium, the distribution of capital income follows a Pareto power law, with an exponent that characterizes the given equilibrium. Here, a simple taxation scheme is proposed such that the post-tax capital income distribution remains an equilibrium distribution, albeit with a different exponent. This taxation scheme is shown to be progressive, and its parameters can be simply derived from (i) the total amount of tax that will be levied, (ii) the threshold selected above which capital income will be taxed and (iii) the total amount of capital income. The latter can be obtained either by using Piketty's estimates of the capital/labor income ratio or by fitting the initial Pareto exponent. Both ways moreover provide a check on the amount of declared income from capital.

  13. Scheme for the generation of three-atom Greenberger-Horne-Zeilinger states and teleportation of entangled atomic states

    International Nuclear Information System (INIS)

    Ye Liu; Guo Guangcan

    2003-01-01

    A scheme is proposed for the preparation of Greenberger-Horne-Zeilinger states for three atoms and for teleportation of an entangled atom pair by use of the triplet in cavity QED. The cavity is only virtually excited, and thus the scheme is insensitive to the cavity field states and the cavity decay. The preparation and teleportation can be achieved in a simple way

  14. Accuracy of spectral and finite difference schemes in 2D advection problems

    DEFF Research Database (Denmark)

    Naulin, V.; Nielsen, A.H.

    2003-01-01

    In this paper we investigate the accuracy of two numerical procedures commonly used to solve 2D advection problems: spectral and finite difference (FD) schemes. These schemes are widely used, simulating, e.g., neutral and plasma flows. FD schemes have long been considered fast, relatively easy...... that the accuracy of FD schemes can be significantly improved if one is careful in choosing an appropriate FD scheme that reflects conservation properties of the nonlinear terms and in setting up the grid in accordance with the problem....

  15. Dropping out of Ethiopia’s Community Based Health Insurance scheme

    NARCIS (Netherlands)

    A.D. Mebratie (Anagaw); R.A. Sparrow (Robert); Z.Y. Debebe (Zelalem); G. Alemu (Getnet ); A.S. Bedi (Arjun Singh)

    2014-01-01

    textabstractLow contract renewal rates have been identified as one of the challenges facing the development of community based health insurance schemes (CBHI). This paper uses longitudinal household survey data to examine dropout in the case of Ethiopia’s pilot CBHI scheme, which saw enrolment

  16. Sources of funding for community schemes

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-11-01

    There is an increasing level of interest amongst community groups in the UK to become involved in the development of renewable energy schemes. Often however these community groups have only limited funds of their own, so any additional funds that can be identified to help fund their renewable energy scheme can be very useful. There are a range of funding sources available that provide grants or loans for which community groups are eligible to apply. Few of these funding sources are targeted towards renewable energy specifically, nevertheless the funds may be applicable to renewable energy schemes under appropriate circumstances. To date, however, few of these funds have been accessed by community groups for renewable energy initiatives. One of the reasons for this low take-up of funds on offer could be that the funding sources may be difficult and time-consuming to identify, especially where the energy component of the fund is not readily apparent. This directory draws together details about many of the principal funding sources available in the UK that may consider providing funds to community groups wanting to develop a renewable energy scheme. (author)

  17. A novel quantum steganography scheme for color images

    Science.gov (United States)

    Li, Panchi; Liu, Xiande

    In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.

  18. Resource cost results for one-way entanglement distillation and state merging of compound and arbitrarily varying quantum sources

    International Nuclear Information System (INIS)

    Boche, H.; Janßen, G.

    2014-01-01

    We consider one-way quantum state merging and entanglement distillation under compound and arbitrarily varying source models. Regarding quantum compound sources, where the source is memoryless, but the source state an unknown member of a certain set of density matrices, we continue investigations begun in the work of Bjelaković et al. [“Universal quantum state merging,” J. Math. Phys. 54, 032204 (2013)] and determine the classical as well as entanglement cost of state merging. We further investigate quantum state merging and entanglement distillation protocols for arbitrarily varying quantum sources (AVQS). In the AVQS model, the source state is assumed to vary in an arbitrary manner for each source output due to environmental fluctuations or adversarial manipulation. We determine the one-way entanglement distillation capacity for AVQS, where we invoke the famous robustification and elimination techniques introduced by Ahlswede. Regarding quantum state merging for AVQS we show by example that the robustification and elimination based approach generally leads to suboptimal entanglement as well as classical communication rates

  19. Unwanted pregnancy: The outer boundary of "treatment injury" in the New Zealand accident compensation scheme.

    Science.gov (United States)

    Tobin, Rosemary

    2015-09-01

    The New Zealand accident compensation scheme has undergone many changes over the years and these changes are reflected in the way unwanted pregnancy claims have been dealt with under the regime. The New Zealand Supreme Court has now confirmed that pregnancy as a result of medical misadventure can be classified as a personal injury under the scheme with the result that the woman patient is entitled to the benefits of the scheme and may not pursue a common law claim against the medical practitioner. This article analyses two recent decisions in the context of consideration of the changing fortunes of the unwanted pregnancy claims.

  20. Novel communication scheme based on chaotic Roessler circuits

    International Nuclear Information System (INIS)

    GarcIa-Lopez, J H; Jaimes-Reategui, R; Pisarchik, A N; MurguIa-Hernandez, A; Medina-Gutierrez, C; Valdivia-Hernadez, R; Villafana-Rauda, E

    2005-01-01

    We present a novel synchronization scheme for secure communication with two chaotic unidirectionally coupled Roessler circuits. The circuits are synchronized via one of the variables, while a signal is transmitted through another variable. We show that this scheme allows more stable communications. The system dynamics is studied numerically and experimentally in a wide range of a control parameter. The possibility of secure communications with an audio signal is demonstrated

  1. On the integration scheme along a trajectory for the characteristics method

    International Nuclear Information System (INIS)

    Le Tellier, Romain; Hebert, Alain

    2006-01-01

    The issue of the integration scheme along a trajectory which appears for all tracking-based transport methods is discussed from the point of view of the method of characteristics. The analogy with the discrete ordinates method in slab geometry is highlighted along with the practical limitation in transposing high-order S N schemes to a trajectory-based method. We derived an example of such a transposition starting from the linear characteristic scheme. This new scheme is compared with the standard flat-source approximation of the step characteristic scheme and with the diamond differencing scheme. The numerical study covers a 1D analytical case, 2D one-group critical and fixed-source benchmarks and finally a realistic multigroup calculation on a BWR-MOX assembly

  2. Fluid-structure interaction of submerged structures

    International Nuclear Information System (INIS)

    Tang, H.T.; Becker, E.B.; Taylor, L.M.

    1979-01-01

    The purpose of the paper is to investigate fluid-structure interaction (FSI) of submerged structures in a confined fluid-structure system. Our particular interest is the load experienced by a rigid submerged structure subject to a pressure excitation in a fluid domain bounded by a structure which is either flexible or rigid. The objective is to see whether the load experienced by the submerged structure will be influenced by its confinement conditions. This investigation is intended to provide insight into the characteristics of FSI and answer the question as to whether one can obtain FSI independent data by constructing a small scale rigid submerged structure inside a flexible fluid-structure system. (orig.)

  3. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  4. A Model-Free Scheme for Meme Ranking in Social Media.

    Science.gov (United States)

    He, Saike; Zheng, Xiaolong; Zeng, Daniel

    2016-01-01

    The prevalence of social media has greatly catalyzed the dissemination and proliferation of online memes (e.g., ideas, topics, melodies, tags, etc.). However, this information abundance is exceeding the capability of online users to consume it. Ranking memes based on their popularities could promote online advertisement and content distribution. Despite such importance, few existing work can solve this problem well. They are either daunted by unpractical assumptions or incapability of characterizing dynamic information. As such, in this paper, we elaborate a model-free scheme to rank online memes in the context of social media. This scheme is capable to characterize the nonlinear interactions of online users, which mark the process of meme diffusion. Empirical studies on two large-scale, real-world datasets (one in English and one in Chinese) demonstrate the effectiveness and robustness of the proposed scheme. In addition, due to its fine-grained modeling of user dynamics, this ranking scheme can also be utilized to explain meme popularity through the lens of social influence.

  5. Performance tuning Weather Research and Forecasting (WRF) Goddard longwave radiative transfer scheme on Intel Xeon Phi

    Science.gov (United States)

    Mielikainen, Jarno; Huang, Bormin; Huang, Allen H.

    2015-10-01

    Next-generation mesoscale numerical weather prediction system, the Weather Research and Forecasting (WRF) model, is a designed for dual use for forecasting and research. WRF offers multiple physics options that can be combined in any way. One of the physics options is radiance computation. The major source for energy for the earth's climate is solar radiation. Thus, it is imperative to accurately model horizontal and vertical distribution of the heating. Goddard solar radiative transfer model includes the absorption duo to water vapor,ozone, ozygen, carbon dioxide, clouds and aerosols. The model computes the interactions among the absorption and scattering by clouds, aerosols, molecules and surface. Finally, fluxes are integrated over the entire longwave spectrum.In this paper, we present our results of optimizing the Goddard longwave radiative transfer scheme on Intel Many Integrated Core Architecture (MIC) hardware. The Intel Xeon Phi coprocessor is the first product based on Intel MIC architecture, and it consists of up to 61 cores connected by a high performance on-die bidirectional interconnect. The coprocessor supports all important Intel development tools. Thus, the development environment is familiar one to a vast number of CPU developers. Although, getting a maximum performance out of MICs will require using some novel optimization techniques. Those optimization techniques are discusses in this paper. The optimizations improved the performance of the original Goddard longwave radiative transfer scheme on Xeon Phi 7120P by a factor of 2.2x. Furthermore, the same optimizations improved the performance of the Goddard longwave radiative transfer scheme on a dual socket configuration of eight core Intel Xeon E5-2670 CPUs by a factor of 2.1x compared to the original Goddard longwave radiative transfer scheme code.

  6. An Implicit Scheme of Lattice Boltzmann Method for Sine-Gordon Equation

    International Nuclear Information System (INIS)

    Hui-Lin, Lai; Chang-Feng, Ma

    2008-01-01

    We establish an implicit scheme of lattice Boltzmann method for simulating the sine-Gordon equation, which can be transformed into the explicit one, so the computation of the scheme is simple. Moreover, the parameter θ of the implicit scheme is independent of the relaxation time, which makes the model more flexible. The numerical results show that this method is very effective. (fundamental areas of phenomenology (including applications))

  7. One-step deterministic multipartite entanglement purification with linear optics

    Energy Technology Data Exchange (ETDEWEB)

    Sheng, Yu-Bo [Department of Physics, Tsinghua University, Beijing 100084 (China); Long, Gui Lu, E-mail: gllong@tsinghua.edu.cn [Department of Physics, Tsinghua University, Beijing 100084 (China); Center for Atomic and Molecular NanoSciences, Tsinghua University, Beijing 100084 (China); Key Laboratory for Quantum Information and Measurements, Beijing 100084 (China); Deng, Fu-Guo [Department of Physics, Applied Optics Beijing Area Major Laboratory, Beijing Normal University, Beijing 100875 (China)

    2012-01-09

    We present a one-step deterministic multipartite entanglement purification scheme for an N-photon system in a Greenberger–Horne–Zeilinger state with linear optical elements. The parties in quantum communication can in principle obtain a maximally entangled state from each N-photon system with a success probability of 100%. That is, it does not consume the less-entangled photon systems largely, which is far different from other multipartite entanglement purification schemes. This feature maybe make this scheme more feasible in practical applications. -- Highlights: ► We proposed a deterministic entanglement purification scheme for GHZ states. ► The scheme uses only linear optical elements and has a success probability of 100%. ► The scheme gives a purified GHZ state in just one-step.

  8. Towards the ultimate variance-conserving convection scheme

    International Nuclear Information System (INIS)

    Os, J.J.A.M. van; Uittenbogaard, R.E.

    2004-01-01

    In the past various arguments have been used for applying kinetic energy-conserving advection schemes in numerical simulations of incompressible fluid flows. One argument is obeying the programmed dissipation by viscous stresses or by sub-grid stresses in Direct Numerical Simulation and Large Eddy Simulation, see e.g. [Phys. Fluids A 3 (7) (1991) 1766]. Another argument is that, according to e.g. [J. Comput. Phys. 6 (1970) 392; 1 (1966) 119], energy-conserving convection schemes are more stable i.e. by prohibiting a spurious blow-up of volume-integrated energy in a closed volume without external energy sources. In the above-mentioned references it is stated that nonlinear instability is due to spatial truncation rather than to time truncation and therefore these papers are mainly concerned with the spatial integration. In this paper we demonstrate that discretized temporal integration of a spatially variance-conserving convection scheme can induce non-energy conserving solutions. In this paper the conservation of the variance of a scalar property is taken as a simple model for the conservation of kinetic energy. In addition, the derivation and testing of a variance-conserving scheme allows for a clear definition of kinetic energy-conserving advection schemes for solving the Navier-Stokes equations. Consequently, we first derive and test a strictly variance-conserving space-time discretization for the convection term in the convection-diffusion equation. Our starting point is the variance-conserving spatial discretization of the convection operator presented by Piacsek and Williams [J. Comput. Phys. 6 (1970) 392]. In terms of its conservation properties, our variance-conserving scheme is compared to other spatially variance-conserving schemes as well as with the non-variance-conserving schemes applied in our shallow-water solver, see e.g. [Direct and Large-eddy Simulation Workshop IV, ERCOFTAC Series, Kluwer Academic Publishers, 2001, pp. 409-287

  9. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users

    Directory of Open Access Journals (Sweden)

    Fenghua Li

    2018-02-01

    Full Text Available With the development of online social networks (OSNs and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme. Keywords: Impression management, Relational privacy, Photo sharing, Policy recommendation, Proxemics

  10. Guns and Fear: A One-Way Street?

    Science.gov (United States)

    Hauser, Will; Kleck, Gary

    2013-01-01

    Surveys show that more than one half of gun owners report owning their firearm for self-protection. Although research has examined the effect of fear of crime on gun ownership, the issue of reciprocity and temporal order has been largely ignored. Furthermore, the effect of firearm acquisition and relinquishment on fear has not been evaluated…

  11. Application of Intel Many Integrated Core (MIC) accelerators to the Pleim-Xiu land surface scheme

    Science.gov (United States)

    Huang, Melin; Huang, Bormin; Huang, Allen H.

    2015-10-01

    The land-surface model (LSM) is one physics process in the weather research and forecast (WRF) model. The LSM includes atmospheric information from the surface layer scheme, radiative forcing from the radiation scheme, and precipitation forcing from the microphysics and convective schemes, together with internal information on the land's state variables and land-surface properties. The LSM is to provide heat and moisture fluxes over land points and sea-ice points. The Pleim-Xiu (PX) scheme is one LSM. The PX LSM features three pathways for moisture fluxes: evapotranspiration, soil evaporation, and evaporation from wet canopies. To accelerate the computation process of this scheme, we employ Intel Xeon Phi Many Integrated Core (MIC) Architecture as it is a multiprocessor computer structure with merits of efficient parallelization and vectorization essentials. Our results show that the MIC-based optimization of this scheme running on Xeon Phi coprocessor 7120P improves the performance by 2.3x and 11.7x as compared to the original code respectively running on one CPU socket (eight cores) and on one CPU core with Intel Xeon E5-2670.

  12. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  13. A fully distributed geo-routing scheme for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2013-12-01

    When marrying randomized distributed space-time coding (RDSTC) to beaconless geo-routing, new performance horizons can be created. In order to reach those horizons, however, beaconless geo-routing protocols must evolve to operate in a fully distributed fashion. In this letter, we expose a technique to construct a fully distributed geo-routing scheme in conjunction with RDSTC. We then demonstrate the performance gains of this novel scheme by comparing it to one of the prominent classical schemes. © 2013 IEEE.

  14. A fully distributed geo-routing scheme for wireless sensor networks

    KAUST Repository

    Bader, Ahmed; Abed-Meraim, Karim; Alouini, Mohamed-Slim

    2013-01-01

    When marrying randomized distributed space-time coding (RDSTC) to beaconless geo-routing, new performance horizons can be created. In order to reach those horizons, however, beaconless geo-routing protocols must evolve to operate in a fully distributed fashion. In this letter, we expose a technique to construct a fully distributed geo-routing scheme in conjunction with RDSTC. We then demonstrate the performance gains of this novel scheme by comparing it to one of the prominent classical schemes. © 2013 IEEE.

  15. Quantum Watermarking Scheme Based on INEQR

    Science.gov (United States)

    Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou

    2018-04-01

    Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.

  16. Pitfalls in MR morphology of the sterno-costo-clavicular region using whole-body MRI

    International Nuclear Information System (INIS)

    Jurik, A.G.; Zejden, A.; Lambert, R.G.W.; Rufibach, K.; Hodler, J.; Maksymowych, W.P.; Duewell, S.; Kissling, R.O.; Weber, U.

    2013-01-01

    Aim: To analyse the imaging findings at the sterno-costo-clavicular (SCC) joint region using whole-body (WB) magnetic resonance imaging (MRI) in healthy individuals to minimize misinterpretation as changes due to spondyloarthritis (SpA). Materials and methods: As part of a cross-sectional study of 122 SpA patients, 75 healthy individuals (42/33 males/females; median age 30.3 years; range 17.7–63.8 years) were scanned using sagittal and coronal WB short tau inversion recovery (STIR) and T1-weighted MRI sequences. The SCC region was analysed independently by seven readers for bone marrow oedema (BMO), erosions, subchondral fat signal intensity (FSI), and joint fluid accumulation. Results: SCC changes simulating inflammation were reported by four or more of the seven readers in 15 (20%) healthy individuals (12 male/three female; median age 32.1 years; range 20.2–48 years). Thirteen individuals (17%) had changes at the manubriosternal joint (MSJ); five had BMO, one BMO + erosion, four erosion, two erosion + FSI, and one FSI only. Changes at the sternoclavicular joint occurred in three individuals (4%) encompassing erosion, erosion + FSI + BMO, and joint fluid accumulation, respectively. One patient had both MSJ and sternoclavicular joint changes. Conclusions: Findings mimicking inflammatory changes occurred in healthy individuals, particularly in the MSJ. Awareness of this is important in recognition of SCC inflammation in SpA

  17. Equity and service innovation: the implementation of a bibliotherapy scheme in Wales.

    Science.gov (United States)

    Porter, Alison; Peconi, Julie; Evans, Angela; Snooks, Helen; Lloyd, Keith; Russell, Ian

    2008-04-01

    Book Prescription Wales (BPW) is a pilot bibiliotherapy scheme launched in July 2005 as a primary care treatment option for people with mild to moderate mental health problems. In an innovative model, patients are prescribed self-help books from a list, to borrow from local libraries. Our objective was to evaluate its implementation, focusing on the issue of equity of service delivery. Data were gathered from Welsh Assembly Government concerning project set-up and borrowing rates. Mailed questionnaires were completed by 21/22 (95.4%) Local Health Boards and 44/64 (68.8%) Community Mental Health Teams. In addition, 327 out of 497 (66%) primary care practices were surveyed by telephone, 20 prescribers took part in in-depth telephone interviews and three focus groups were conducted with library staff. From July 2005-March 2006, books were borrowed 15,236 times. There was a 10-fold variation in borrowing rates across local authorities (1.07 to 10.18 loans/1000 people). The priority which Local Health Board staff reported giving to the scheme varied. Uptake among prescribers was mixed: in 35% of general practices (n = 116) no-one participated. Prescribers reported different ways of using the bibliotherapy scheme. Library staff reported issues of patchy uptake. Variation in usage of bibliotherapy raises questions about equity; it is unlikely to reflect the distribution of people who could potentially benefit. Factors influencing variation existed all along the implementation chain. It is not always possibly to separate demand-side and supply-side factors when considering equity and service innovation in health care.

  18. A genetic algorithm for multiple relay selection in two-way relaying cognitive radio networks

    KAUST Repository

    Alsharoa, Ahmad M.; Ghazzai, Hakim; Alouini, Mohamed-Slim

    2013-01-01

    In this paper, we investigate a multiple relay selection scheme for two-way relaying cognitive radio networks where primary users and secondary users operate on the same frequency band. More specifically, cooperative relays using Amplifyand- Forward

  19. An efficient numerical scheme for the simulation of parallel-plate active magnetic regenerators

    DEFF Research Database (Denmark)

    Torregrosa-Jaime, Bárbara; Corberán, José M.; Payá, Jorge

    2015-01-01

    A one-dimensional model of a parallel-plate active magnetic regenerator (AMR) is presented in this work. The model is based on an efficient numerical scheme which has been developed after analysing the heat transfer mechanisms in the regenerator bed. The new finite difference scheme optimally com...... to the fully implicit scheme, the proposed scheme achieves more accurate results, prevents numerical errors and requires less computational effort. In AMR simulations the new scheme can reduce the computational time by 88%....

  20. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  1. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    Science.gov (United States)

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  2. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    Science.gov (United States)

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  3. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-11-01

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000. Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC, and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure schemes.

  4. Multi-state Quantum Teleportation via One Entanglement State

    International Nuclear Information System (INIS)

    Guo Ying; Zeng Guihua; Lee, Moon Ho

    2008-01-01

    A multi-sender-controlled quantum teleportation scheme is proposed to teleport several secret quantum states from different senders to a distance receiver based on only one Einstein-Podolsky-Rosen (EPR) pair with controlled-NOT (CNOT) gates. In the present scheme, several secret single-qubit quantum states are encoded into a multi-qubit entangled quantum state. Two communication modes, i.e., the detecting mode and the message mode, are employed so that the eavesdropping can be detected easily and the teleported message may be recovered efficiently. It has an advantage over teleporting several different quantum states for one scheme run with more efficiency than the previous quantum teleportation schemes

  5. Variable-flavor-number scheme in analysis of heavy-quark electro-production data

    International Nuclear Information System (INIS)

    Alekhin, S.; Bluemlein, J.; Klein, S.; Moch, S.

    2009-08-01

    We check the impact of the factorization scheme employed in the calculation of the heavy-quark deep-inelastic scattering (DIS) electro-production on the PDFs determined in the NNLO QCD analysis of the world inclusive neutral-current DIS data combined with the ones on the neutrino-nucleon DIS di-muon production and the fixed-target Drell-Yan process. The charm-quark DIS contribution is calculated in the general-mass variable-flavor-number (GMVFN) scheme: At asymptotically large values of the momentum transfer Q it is given by the zero-mass 4-flavor scheme and at the value of Q equal to the charm-quark mass it is smoothly matched with the 3-flavor scheme using the Buza-Matiounine-Smith-van Neerven prescription. The PDFs obtained in this variant of the fit are very similar to the ones obtained in the fit with a 3-flavor scheme employed. Our 5-flavor PDFs derived from the 3-flavor ones using the NNLO matching conditions are used to calculate the rates of W ± /Z and t anti t production at the Tevatron collider and the LHC at NNLO. (orig.)

  6. Numerical solution of one-dimensional transient, two-phase flows with temporal fully implicit high order schemes: Subcooled boiling in pipes

    Energy Technology Data Exchange (ETDEWEB)

    López, R., E-mail: ralope1@ing.uc3m.es; Lecuona, A., E-mail: lecuona@ing.uc3m.es; Nogueira, J., E-mail: goriba@ing.uc3m.es; Vereda, C., E-mail: cvereda@ing.uc3m.es

    2017-03-15

    Highlights: • A two-phase flows numerical algorithm with high order temporal schemes is proposed. • Transient solutions route depends on the temporal high order scheme employed. • ESDIRK scheme for two-phase flows events exhibits high computational performance. • Computational implementation of the ESDIRK scheme can be done in a very easy manner. - Abstract: An extension for 1-D transient two-phase flows of the SIMPLE-ESDIRK method, initially developed for incompressible viscous flows by Ijaz is presented. This extension is motivated by the high temporal order of accuracy demanded to cope with fast phase change events. This methodology is suitable for boiling heat exchangers, solar thermal receivers, etc. The methodology of the solution consist in a finite volume staggered grid discretization of the governing equations in which the transient terms are treated with the explicit first stage singly diagonally implicit Runge-Kutta (ESDIRK) method. It is suitable for stiff differential equations, present in instant boiling or condensation processes. It is combined with the semi-implicit pressure linked equations algorithm (SIMPLE) for the calculation of the pressure field. The case of study consists of the numerical reproduction of the Bartolomei upward boiling pipe flow experiment. The steady-state validation of the numerical algorithm is made against these experimental results and well known numerical results for that experiment. In addition, a detailed study reveals the benefits over the first order Euler Backward method when applying 3rd and 4th order schemes, making emphasis in the behaviour when the system is subjected to periodic square wave wall heat function disturbances, concluding that the use of the ESDIRK method in two-phase calculations presents remarkable accuracy and computational advantages.

  7. Intel Xeon Phi accelerated Weather Research and Forecasting (WRF) Goddard microphysics scheme

    Science.gov (United States)

    Mielikainen, J.; Huang, B.; Huang, A. H.-L.

    2014-12-01

    The Weather Research and Forecasting (WRF) model is a numerical weather prediction system designed to serve both atmospheric research and operational forecasting needs. The WRF development is a done in collaboration around the globe. Furthermore, the WRF is used by academic atmospheric scientists, weather forecasters at the operational centers and so on. The WRF contains several physics components. The most time consuming one is the microphysics. One microphysics scheme is the Goddard cloud microphysics scheme. It is a sophisticated cloud microphysics scheme in the Weather Research and Forecasting (WRF) model. The Goddard microphysics scheme is very suitable for massively parallel computation as there are no interactions among horizontal grid points. Compared to the earlier microphysics schemes, the Goddard scheme incorporates a large number of improvements. Thus, we have optimized the Goddard scheme code. In this paper, we present our results of optimizing the Goddard microphysics scheme on Intel Many Integrated Core Architecture (MIC) hardware. The Intel Xeon Phi coprocessor is the first product based on Intel MIC architecture, and it consists of up to 61 cores connected by a high performance on-die bidirectional interconnect. The Intel MIC is capable of executing a full operating system and entire programs rather than just kernels as the GPU does. The MIC coprocessor supports all important Intel development tools. Thus, the development environment is one familiar to a vast number of CPU developers. Although, getting a maximum performance out of MICs will require using some novel optimization techniques. Those optimization techniques are discussed in this paper. The results show that the optimizations improved performance of Goddard microphysics scheme on Xeon Phi 7120P by a factor of 4.7×. In addition, the optimizations reduced the Goddard microphysics scheme's share of the total WRF processing time from 20.0 to 7.5%. Furthermore, the same optimizations

  8. Nonstandard approximation schemes for lower dimensional quantum field theories

    International Nuclear Information System (INIS)

    Fitzpatrick, D.A.

    1981-01-01

    The purpose of this thesis has been to apply two different nonstandard approximation schemes to a variety of lower-dimensional schemes. In doing this, we show their applicability where (e.g., Feynman or Rayleigh-Schroedinger) approximation schemes are inapplicable. We have applied the well-known mean-field approximation scheme by Guralnik et al. to general lower dimensional theories - the phi 4 field theory in one dimension, and the massive and massless Thirring models in two dimensions. In each case, we derive a bound-state propagator and then expand the theory in terms of the original and bound-state propagators. The results obtained can be compared with previously known results thereby show, in general, reasonably good convergence. In the second half of the thesis, we develop a self-consistent quantum mechanical approximation scheme. This can be applied to any monotonic polynomial potential. It has been applied in detail to the anharmonic oscillator, and the results in several analytical domains are very good, including extensive tables of numerical results

  9. A New Proxy Electronic Voting Scheme Achieved by Six-Particle Entangled States

    Science.gov (United States)

    Cao, Hai-Jing; Ding, Li-Yuan; Jiang, Xiu-Li; Li, Peng-Fei

    2018-03-01

    In this paper, we use quantum proxy signature to construct a new secret electronic voting scheme. In our scheme, six particles entangled states function as quantum channels. The voter Alice, the Vote Management Center Bob, the scrutineer Charlie only perform two particles measurements on the Bell bases to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. We use quantum key distribution and one-time pad to guarantee its unconditional security. The significant advantage of our scheme is that transmitted information capacity is twice as much as the capacity of other schemes.

  10. A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching

    Science.gov (United States)

    Chen, Zhigang; Wang, Jian; Song, Xinxia

    2014-01-01

    A critical challenge in a fully homomorphic encryption (FHE) scheme is to manage noise. Modulus switching technique is currently the most efficient noise management technique. When using the modulus switching technique to design and implement a FHE scheme, how to choose concrete parameters is an important step, but to our best knowledge, this step has drawn very little attention to the existing FHE researches in the literature. The contributions of this paper are twofold. On one hand, we propose a function of the lower bound of dimension value in the switching techniques depending on the LWE specific security levels. On the other hand, as a case study, we modify the Brakerski FHE scheme (in Crypto 2012) by using the modulus switching technique. We recommend concrete parameter values of our proposed scheme and provide security analysis. Our result shows that the modified FHE scheme is more efficient than the original Brakerski scheme in the same security level. PMID:25093212

  11. Discontinuous nodal schemes applied to the bidimensional neutron transport equation

    International Nuclear Information System (INIS)

    Delfin L, A.; Valle G, E. Del; Hennart B, J.P.

    1996-01-01

    In this paper several strong discontinuous nodal schemes are described, starting from the one that has only two interpolation parameters per cell to the one having ten. Their application to the spatial discretization of the neutron transport equation in X-Y geometry is also described, giving, for each one of the nodal schemes, the approximation for the angular neutron flux that includes the set of interpolation parameters and the corresponding polynomial space. Numerical results were obtained for several test problems presenting here the problem with the highest degree of difficulty and their comparison with published results 1,2 . (Author)

  12. Evolution of the Z-scheme of photosynthesis: a perspective.

    Science.gov (United States)

    Govindjee; Shevela, Dmitriy; Björn, Lars Olof

    2017-09-01

    The concept of the Z-scheme of oxygenic photosynthesis is in all the textbooks. However, its evolution is not. We focus here mainly on some of the history of its biophysical aspects. We have arbitrarily divided here the 1941-2016 period into three sub-periods: (a) Origin of the concept of two light reactions: first hinted at, in 1941, by James Franck and Karl Herzfeld; described and explained, in 1945, by Eugene Rabinowitch; and a clear hypothesis, given in 1956 by Rabinowitch, of the then available cytochrome experiments: one light oxidizing it and another reducing it; (b) Experimental discovery of the two light reactions and two pigment systems and the Z-scheme of photosynthesis: Robert Emerson's discovery, in 1957, of enhancement in photosynthesis when two light beams (one in the far-red region, and the other of shorter wavelengths) are given together than when given separately; and the 1960 scheme of Robin Hill & Fay Bendall; and (c) Evolution of the many versions of the Z-Scheme: Louis Duysens and Jan Amesz's 1961 experiments on oxidation and reduction of cytochrome f by two different wavelengths of light, followed by the work of many others for more than 50 years.

  13. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  14. Comparison of actinides and fission products recycling scheme with the normal plutonium recycling scheme in fast reactors

    Directory of Open Access Journals (Sweden)

    Salahuddin Asif

    2013-01-01

    Full Text Available Multiple recycling of actinides and non-volatile fission products in fast reactors through the dry re-fabrication/reprocessing atomics international reduction oxidation process has been studied as a possible way to reduce the long-term potential hazard of nuclear waste compared to that resulting from reprocessing in a wet PUREX process. Calculations have been made to compare the actinides and fission products recycling scheme with the normal plutonium recycling scheme in a fast reactor. For this purpose, the Karlsruhe version of isotope generation and depletion code, KORIGEN, has been modified accordingly. An entirely novel fission product yields library for fast reactors has been created which has replaced the old KORIGEN fission products library. For the purposes of this study, the standard 26 groups data set, KFKINR, developed at Forschungszentrum Karlsruhe, Germany, has been extended by the addition of the cross-sections of 13 important actinides and 68 most important fission products. It has been confirmed that these 68 fission products constitute about 95% of the total fission products yield and about 99.5% of the total absorption due to fission products in fast reactors. The amount of fissile material required to guarantee the criticality of the reactor during recycling schemes has also been investigated. Cumulative high active waste per ton of initial heavy metal is also calculated. Results show that the recycling of actinides and fission products in fast reactors through the atomics international reduction oxidation process results in a reduction of the potential hazard of radioactive waste.

  15. Take part in the Commute-Another-Way Challenge!

    CERN Multimedia

    CERN Bulletin

    2015-01-01

    Ring the changes on Thursday, 4 June by commuting another way! CERN has signed up for the 5th “challenge mobilité Rhône-Alpes”, the aim of which is to encourage people to use modes of transport other than their car to get to work. Are you up for the challenge?   Join in the challenge! Sign up using the dedicated CERN form. "Commute another way!" is an initiative launched by the Rhône-Alpes regional authorities and the French environment agency ADEME (l’Agence de l’environnement et de la maîtrise de l’énergie française) to promote alternative ways of travelling to work than the car (excluding carpooling), in private and public-sector organisations across the region. We love this idea and CERN has been signed up to a similar scheme - Bike to Work - for several years. That’s why we’ve decided that CERN should join the Commute-A...

  16. Family-based prevention of mental health problems in children affected by HIV and AIDS: an open trial.

    Science.gov (United States)

    Betancourt, Theresa S; Ng, Lauren C; Kirk, Catherine M; Munyanah, Morris; Mushashi, Christina; Ingabire, Charles; Teta, Sharon; Beardslee, William R; Brennan, Robert T; Zahn, Ista; Stulac, Sara; Cyamatare, Felix R; Sezibera, Vincent

    2014-07-01

    The objective of this study is to assess the feasibility and acceptability of an intervention to reduce mental health problems and bolster resilience among children living in households affected by caregiver HIV in Rwanda. Pre-post design, including 6-month follow-up. The Family Strengthening Intervention (FSI) aims to reduce mental health problems among HIV-affected children through improved child-caregiver relationships, family communication and parenting skills, HIV psychoeducation and connections to resources. Twenty families (N = 39 children) with at least one HIV-positive caregiver and one child 7-17 years old were enrolled in the FSI. Children and caregivers were administered locally adapted and validated measures of child mental health problems, as well as measures of protective processes and parenting. Assessments were administered at pre and postintervention, and 6-month follow-up. Multilevel models accounting for clustering by family tested changes in outcomes of interest. Qualitative interviews were completed to understand acceptability, feasibility and satisfaction with the FSI. Families reported high satisfaction with the FSI. Caregiver-reported improvements in family connectedness, good parenting, social support and children's pro-social behaviour (P self-esteem, depression, anxiety and irritability were seen at follow-up (P < .05). Significant decreases in child-reported harsh punishment were observed at postintervention and follow-up, and decreases in caregiver reported harsh punishment were also recorded on follow-up (P < 0.05). The FSI is a feasible and acceptable intervention that shows promise for improving mental health symptoms and strengthening protective factors among children and families affected by HIV in low-resource settings.

  17. Outage performance of two-way DF relaying systems with a new relay selection metric

    KAUST Repository

    Hyadi, Amal; Benjillali, Mustapha; Alouini, Mohamed-Slim

    2012-01-01

    This paper investigates a new constrained relay selection scheme for two-way relaying systems where two end terminals communicate simultaneously via a relay. The introduced technique is based on the maximization of the weighted sum rate of both

  18. An analysis of reactor structural response to fuel sodium interaction in a hypothetical core disruptive accident

    International Nuclear Information System (INIS)

    Suzuki, K.; Tashiro, M.; Sasanuma, K.; Nagashima, K.

    1976-01-01

    This study shows the effect of constraints around FSI zone on FSI phenomena and deformations of reactor structures. SUGAR-PISCES code system has been developed to evaluate the phenomena of FSI and the response of reactor structure. SUGAR calculates the phenomena of FSI. PISCES, developed by Physics International Company in U.S.A., calculates the dynamic response of reactor structure in two-dimensional, time-dependent finite-difference Lagrangian model. The results show that the peak pressure and energy by FSI and the deformation of reactor structures are about twice in case of FSI zone surrounding by blanket than by coolant. The FSI phenomena highly depend on the reactor structure and the realistic configuration around core must be considered for analyzing hypothetical core disruptive accident. This work was supported by a grant from Power Reactor and Nuclear Fuel Development Corporation. (auth.)

  19. An assessment of innovative pricing schemes for the communication of value: is price discrimination and two-part pricing a way forward?

    Science.gov (United States)

    Hertzman, Peter; Miller, Paul; Tolley, Keith

    2018-02-01

    With the introduction of new expensive medicines, traditional pricing schemes based on constructs such as price per pill/vial have been challenged. Potential innovative schemes could be either financial-based or performance-based. Within financial-based schemes the use of price discrimination is an emerging option, which we explore in this assessment. Areas covered: In the short term the price per indication approach is likely to become more prevalent for high cost, high benefit new pharmaceuticals, such as those emerging in oncology (e.g. new combination immunotherapies). 'Two-Part Pricing' (2PP) is a frequently used payment method in other industries, which consists of an Entry Fee, giving the buyer the right to use the product, and a Usage Price charged every time the product is purchased. Introducing 2PP into biopharma could have cross-stakeholder benefits including broader patient access, and improvement in budget/revenue predictability. A concern however is the potential complexity of the negotiation between manufacturer and payer. Expert commentary: We believe 'price discrimination' and 2PP in particular can be relevant for some new, expensive specialist medicines. A recommended first step would be to initiate pilots to test to what degree the 2PP approach meets stakeholder objectives and is practical to implement within specialty care.

  20. One-way ticket” Romanian Migration at the beginning of the 20th century

    Directory of Open Access Journals (Sweden)

    Silvia Bocancea

    2011-12-01

    Full Text Available Unlike the new age of migration that we are experiencing now, the social mobility specific to the end of the 19th century and the beginning of the 20th century may be defined by the expression “one way ticket”; the immigrant, usually a man, used to leave his country of origin and settle for good in his host-country (he did not look for his happiness from state to state, as it happens now. The Romanian migration of that time was directed mainly towards the New World (particularly to the USA, and less to Canada. This paper is an attempt to sketch the image of Romanian emigration by taking into account the peculiarities determined by: emigration causes, geographical predominance, social composition, occupational options in the host-country, and the structure of Romanian immigrant communities.

  1. Trigeneration: A new way for landfill gas utilization and its feasibility in Hong Kong

    International Nuclear Information System (INIS)

    Hao Xiaoli; Yang Hongxing; Zhang Guoqiang

    2008-01-01

    Application of landfill gas (LFG) means a synergy between environmental protection and energy production. This paper presents a review of the status of LFG application. To more efficiently utilize the LFG in Hong Kong, a trigeneration scheme is proposed as a new way of LFG utilization. The feasibility of LFG trigeneration in Hong Kong is evaluated from the views of primary energy-saving and greenhouse gas (GHG) emission reduction as well as economic benefit. The proposed scenario is compared with the conventional scenarios of LFG treatment and utilization. It is shown that LFG for trigeneration has a higher energy saving and GHG emission reduction potentials. The new scheme is also more economical than the conventional way of LFG utilization. Some policy recommendations are also given to promote the biomass energy utilization from waste landfills in Hong Kong

  2. Balanced Central Schemes for the Shallow Water Equations on Unstructured Grids

    Science.gov (United States)

    Bryson, Steve; Levy, Doron

    2004-01-01

    We present a two-dimensional, well-balanced, central-upwind scheme for approximating solutions of the shallow water equations in the presence of a stationary bottom topography on triangular meshes. Our starting point is the recent central scheme of Kurganov and Petrova (KP) for approximating solutions of conservation laws on triangular meshes. In order to extend this scheme from systems of conservation laws to systems of balance laws one has to find an appropriate discretization of the source terms. We first show that for general triangulations there is no discretization of the source terms that corresponds to a well-balanced form of the KP scheme. We then derive a new variant of a central scheme that can be balanced on triangular meshes. We note in passing that it is straightforward to extend the KP scheme to general unstructured conformal meshes. This extension allows us to recover our previous well-balanced scheme on Cartesian grids. We conclude with several simulations, verifying the second-order accuracy of our scheme as well as its well-balanced properties.

  3. A simple, robust and efficient high-order accurate shock-capturing scheme for compressible flows: Towards minimalism

    Science.gov (United States)

    Ohwada, Taku; Shibata, Yuki; Kato, Takuma; Nakamura, Taichi

    2018-06-01

    Developed is a high-order accurate shock-capturing scheme for the compressible Euler/Navier-Stokes equations; the formal accuracy is 5th order in space and 4th order in time. The performance and efficiency of the scheme are validated in various numerical tests. The main ingredients of the scheme are nothing special; they are variants of the standard numerical flux, MUSCL, the usual Lagrange's polynomial and the conventional Runge-Kutta method. The scheme can compute a boundary layer accurately with a rational resolution and capture a stationary contact discontinuity sharply without inner points. And yet it is endowed with high resistance against shock anomalies (carbuncle phenomenon, post-shock oscillations, etc.). A good balance between high robustness and low dissipation is achieved by blending three types of numerical fluxes according to physical situation in an intuitively easy-to-understand way. The performance of the scheme is largely comparable to that of WENO5-Rusanov, while its computational cost is 30-40% less than of that of the advanced scheme.

  4. A linear construction of perfect secret sharing schemes

    NARCIS (Netherlands)

    Dijk, van M.; Santis, De A.

    1995-01-01

    In this paper, we generalize the vector space construction due to Brickell [5]. This generalization, introduced by Bertilsson [1], leads to perfect secret sharing schemes with rational information rates in which the secret can be computed efficiently by each qualified group. A one to one

  5. A Model-Free Scheme for Meme Ranking in Social Media

    Science.gov (United States)

    He, Saike; Zheng, Xiaolong; Zeng, Daniel

    2015-01-01

    The prevalence of social media has greatly catalyzed the dissemination and proliferation of online memes (e.g., ideas, topics, melodies, tags, etc.). However, this information abundance is exceeding the capability of online users to consume it. Ranking memes based on their popularities could promote online advertisement and content distribution. Despite such importance, few existing work can solve this problem well. They are either daunted by unpractical assumptions or incapability of characterizing dynamic information. As such, in this paper, we elaborate a model-free scheme to rank online memes in the context of social media. This scheme is capable to characterize the nonlinear interactions of online users, which mark the process of meme diffusion. Empirical studies on two large-scale, real-world datasets (one in English and one in Chinese) demonstrate the effectiveness and robustness of the proposed scheme. In addition, due to its fine-grained modeling of user dynamics, this ranking scheme can also be utilized to explain meme popularity through the lens of social influence. PMID:26823638

  6. Stochastic spin-one massive field

    International Nuclear Information System (INIS)

    Lim, S.C.

    1984-01-01

    Stochastic quantization schemes of Nelson and Parisi and Wu are applied to a spin-one massive field. Unlike the scalar case Nelson's stochastic spin-one massive field cannot be identified with the corresponding euclidean field even if the fourth component of the euclidean coordinate is taken as equal to the real physical time. In the Parisi-Wu quantization scheme the stochastic Proca vector field has a similar property as the scalar field; which has an asymptotically stationary part and a transient part. The large equal-time limit of the expectation values of the stochastic Proca field are equal to the expectation values of the corresponding euclidean field. In the Stueckelberg formalism the Parisi-Wu scheme gives rise to a stochastic vector field which differs from the massless gauge field in that the gauge cannot be fixed by the choice of boundary condition. (orig.)

  7. BPHZL-subtraction scheme and axial gauges

    Energy Technology Data Exchange (ETDEWEB)

    Kreuzer, M.; Rebhan, A.; Schweda, M.; Piguet, O.

    1986-03-27

    The application of the BPHZL subtraction scheme to Yang-Mills theories in axial gauges is presented. In the auxillary mass formulation we show the validity of the convergence theorems for subtracted momentum space integrals, and we give the integral formulae necessary for one-loop calculations. (orig.).

  8. A Rate Adaptation Scheme According to Channel Conditions in Wireless LANs

    Science.gov (United States)

    Numoto, Daisuke; Inai, Hiroshi

    Rate adaptation in wireless LANs is to select the most suitable transmission rate automatically according to channel condition. If the channel condition is good, a station can choose a higher transmission rate, otherwise, it should choose a lower but noise-resistant transmission rate. Since IEEE 802.11 does not specify any rate adaptation scheme, several schemes have been proposed. However those schemes provide low throughput or unfair transmission opportunities among stations especially when the number of stations increases. In this paper, we propose a rate adaptation scheme under which the transmission rate quickly closes and then stays around an optimum rate even in the presence of a large number of stations. Via simulation, our scheme provides higher throughput than existing ones and almost equal fairness.

  9. IMPROVED ENTROPY-ULTRA-BEE SCHEME FOR THE EULER SYSTEM OF GAS DYNAMICS

    Institute of Scientific and Technical Information of China (English)

    Rongsan Chen; Dekang Mao

    2017-01-01

    The Entropy-Ultra-Bee scheme was developed for the linear advection equation and extended to the Euler system of gas dynamics in [13].It was expected that the technology be applied only to the second characteristic field of the system and the computation in the other two nonlinear fields be implemented by the Godunov scheme.However,the numerical experiments in [13] showed that the scheme,though having improved the wave resolution in the second field,produced numerical oscillations in the other two nonlinear fields.Sophisticated entropy increaser was designed to suppress the spurious oscillations by increasing the entropy when there are waves in the two nonlinear fields presented.However,the scheme is then not efficient neither robust with problem-related parameters.The purpose of this paper is to fix this problem.To this end,we first study a 3 × 3 linear system and apply the technology precisely to its second characteristic field while maintaining the computation in the other two fields be implemented by the Godunov scheme.We then follow the discussion for the linear system to apply the Entropy-Ultra-Bee technology to the second characteristic field of the Euler system in a linearlized field-byfield fashion to develop a modified Entropy-Ultra-Bee scheme for the system.Meanwhile a remark is given to explain the problem of the previous Entropy-Ultra-Bee scheme in [13].A reference solution is constructed for computing the numerical entropy,which maintains the feature of the density and flats the velocity and pressure to constants.The numerical entropy is then computed as the entropy cell-average of the reference solution.Several limitations are adopted in the construction of the reference solution to further stabilize the scheme.Designed in such a way,the modified Entropy-Ultra-Bee scheme has a unified form with no problem-related parameters.Numerical experiments show that all the spurious oscillations in smooth regions are gone and the results are better than that

  10. A multigrid algorithm for the cell-centered finite difference scheme

    Science.gov (United States)

    Ewing, Richard E.; Shen, Jian

    1993-01-01

    In this article, we discuss a non-variational V-cycle multigrid algorithm based on the cell-centered finite difference scheme for solving a second-order elliptic problem with discontinuous coefficients. Due to the poor approximation property of piecewise constant spaces and the non-variational nature of our scheme, one step of symmetric linear smoothing in our V-cycle multigrid scheme may fail to be a contraction. Again, because of the simple structure of the piecewise constant spaces, prolongation and restriction are trivial; we save significant computation time with very promising computational results.

  11. Asymptotic analysis of discrete schemes for non-equilibrium radiation diffusion

    International Nuclear Information System (INIS)

    Cui, Xia; Yuan, Guang-wei; Shen, Zhi-jun

    2016-01-01

    Motivated by providing well-behaved fully discrete schemes in practice, this paper extends the asymptotic analysis on time integration methods for non-equilibrium radiation diffusion in [2] to space discretizations. Therein studies were carried out on a two-temperature model with Larsen's flux-limited diffusion operator, both the implicitly balanced (IB) and linearly implicit (LI) methods were shown asymptotic-preserving. In this paper, we focus on asymptotic analysis for space discrete schemes in dimensions one and two. First, in construction of the schemes, in contrast to traditional first-order approximations, asymmetric second-order accurate spatial approximations are devised for flux-limiters on boundary, and discrete schemes with second-order accuracy on global spatial domain are acquired consequently. Then by employing formal asymptotic analysis, the first-order asymptotic-preserving property for these schemes and furthermore for the fully discrete schemes is shown. Finally, with the help of manufactured solutions, numerical tests are performed, which demonstrate quantitatively the fully discrete schemes with IB time evolution indeed have the accuracy and asymptotic convergence as theory predicts, hence are well qualified for both non-equilibrium and equilibrium radiation diffusion. - Highlights: • Provide AP fully discrete schemes for non-equilibrium radiation diffusion. • Propose second order accurate schemes by asymmetric approach for boundary flux-limiter. • Show first order AP property of spatially and fully discrete schemes with IB evolution. • Devise subtle artificial solutions; verify accuracy and AP property quantitatively. • Ideas can be generalized to 3-dimensional problems and higher order implicit schemes.

  12. Radial distribution of power starting from the reactivity using nodal schemes of second and third order; Distribucion radial de potencia a partir de la reactividad usando esquemas nodales de segundo y tercer orden

    Energy Technology Data Exchange (ETDEWEB)

    Delfin L, A.; Alonso V, G. [ININ, Km. 36.5 Carretera Mexico-Toluca, 52045 Ocoyocac, Estado de Mexico (Mexico); Valle G, E. del [IPN-ESFM, 07738 Mexico D.F. (Mexico)]. e-mail: adl@nuclear.inin.mx

    2003-07-01

    In this work two nodal schemes of finite element are presented, one of second and the other of third order of accurate that allow to determine the radial distribution of power starting from the corresponding reactivities.The schemes here developed were obtained taking as starting point the equation developed by Driscoll et al, the one which is based on the diffusion approach of 1-1/2 energy groups. This equation relates the power fraction of an assemble with their reactivity and with the power fractions and reactivities of the assemblies that its surround it. Driscoll and collaborators they solve in form approximate such equation supposing that the reactivity of each assemble it is but a lineal function of the burnt one of the fuel. The spatial approach carries out it with the classic technique of finite differences centered in mesh. Nevertheless that the algebraic system to which its arrive it can be solved without more considerations introduce some additional suppositions and adjustment parameters that it allows them to predict results comparable to those contributed by three dimensions analysis and this way to reduce the one obtained error when its compare their results with those of a production code like CASMO. Also in the two schemes that here are presented the same approaches of Driscoll were used being obtained errors of the one 10% and of 5% for the second schemes and third order respectively for a test case that it was built starting from data of the Cycle 1 of the Unit 1 of the Laguna Verde Nucleo electric plant. These errors its were obtained when comparing with a computer program based on the matrix response method. It is sought to have this way a quick and efficient tool for the multicycle analysis in the fuel management. However, this model presents problems in the appropriate prediction of the average burnt of the nucleus and of the burnt one by lot. (Author)

  13. Hybrid flux splitting schemes for numerical resolution of two-phase flows

    Energy Technology Data Exchange (ETDEWEB)

    Flaatten, Tore

    2003-07-01

    This thesis deals with the construction of numerical schemes for approximating. solutions to a hyperbolic two-phase flow model. Numerical schemes for hyperbolic models are commonly divided in two main classes: Flux Vector Splitting (FVS) schemes which are based on scalar computations and Flux Difference Splitting (FDS) schemes which are based on matrix computations. FVS schemes are more efficient than FDS schemes, but FDS schemes are more accurate. The canonical FDS schemes are the approximate Riemann solvers which are based on a local decomposition of the system into its full wave structure. In this thesis the mathematical structure of the model is exploited to construct a class of hybrid FVS/FDS schemes, denoted as Mixture Flux (MF) schemes. This approach is based on a splitting of the system in two components associated with the pressure and volume fraction variables respectively, and builds upon hybrid FVS/FDS schemes previously developed for one-phase flow models. Through analysis and numerical experiments it is demonstrated that the MF approach provides several desirable features, including (1) Improved efficiency compared to standard approximate Riemann solvers, (2) Robustness under stiff conditions, (3) Accuracy on linear and nonlinear phenomena. In particular it is demonstrated that the framework allows for an efficient weakly implicit implementation, focusing on an accurate resolution of slow transients relevant for the petroleum industry. (author)

  14. A computerized scheme for lung nodule detection in multiprojection chest radiography

    International Nuclear Information System (INIS)

    Guo Wei; Li Qiang; Boyce, Sarah J.; McAdams, H. Page; Shiraishi, Junji; Doi, Kunio; Samei, Ehsan

    2012-01-01

    Purpose: Our previous study indicated that multiprojection chest radiography could significantly improve radiologists' performance for lung nodule detection in clinical practice. In this study, the authors further verify that multiprojection chest radiography can greatly improve the performance of a computer-aided diagnostic (CAD) scheme. Methods: Our database consisted of 59 subjects, including 43 subjects with 45 nodules and 16 subjects without nodules. The 45 nodules included 7 real and 38 simulated ones. The authors developed a conventional CAD scheme and a new fusion CAD scheme to detect lung nodules. The conventional CAD scheme consisted of four steps for (1) identification of initial nodule candidates inside lungs, (2) nodule candidate segmentation based on dynamic programming, (3) extraction of 33 features from nodule candidates, and (4) false positive reduction using a piecewise linear classifier. The conventional CAD scheme processed each of the three projection images of a subject independently and discarded the correlation information between the three images. The fusion CAD scheme included the four steps in the conventional CAD scheme and two additional steps for (5) registration of all candidates in the three images of a subject, and (6) integration of correlation information between the registered candidates in the three images. The integration step retained all candidates detected at least twice in the three images of a subject and removed those detected only once in the three images as false positives. A leave-one-subject-out testing method was used for evaluation of the performance levels of the two CAD schemes. Results: At the sensitivities of 70%, 65%, and 60%, our conventional CAD scheme reported 14.7, 11.3, and 8.6 false positives per image, respectively, whereas our fusion CAD scheme reported 3.9, 1.9, and 1.2 false positives per image, and 5.5, 2.8, and 1.7 false positives per patient, respectively. The low performance of the conventional

  15. Specific features of two diffraction schemes for a widely divergent X-ray beam

    Energy Technology Data Exchange (ETDEWEB)

    Avetyan, K. T.; Levonyan, L. V.; Semerjian, H. S.; Arakelyan, M. M., E-mail: marakelyan@ysu.am; Badalyan, O. M. [Yerevan State University (Armenia)

    2015-03-15

    We investigated the specific features of two diffraction schemes for a widely divergent X-ray beam that use a circular diaphragm 30–50 μm in diameter as a point source of characteristic radiation. In one of the schemes, the diaphragm was set in front of the crystal (the diaphragm-crystal (d-c) scheme); in the other, it was installed behind the crystal (the crystal-diaphragm (c-d) scheme). It was established that the diffraction image in the c-d scheme is a topographic map of the investigated crystal area. In the d-c scheme at L = 2l (l and L are the distances between the crystal and the diaphragm and between the photographic plate and the diaphragm, respectively), the branches of hyperbolas formed in this family of planes (hkl) by the characteristic K{sub α} and K{sub β} radiations, including higher order reflections, converge into one straight line. It is experimentally demonstrated that this convergence is very sensitive to structural inhomogeneities in the crystal under study.

  16. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  17. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  18. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

    Science.gov (United States)

    Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong

    2015-01-01

    Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

  19. Conservative adaptivity and two-way self-nesting using discrete wavelets

    Science.gov (United States)

    Dubos, Thomas

    2010-05-01

    In simulating atmosphere and oceans, multiscale modelling is desirable to track high-intensity weather patterns, to investigate the interactions between the various spatio-temporal scales of the climate system, and to perform assessments of climate change at scales small enough to derive impacts on society and ecosystems. The mainstream approach to multiscale modelling is to nest a fine, limited-area model into a coarse, global model. These models are then coupled, either one-way or two-way, in order to combine the global coverage of the global model and the fine details of the fine model. In the long simulations typical of climate studies, initial conditions are unimportant, except for the few quantities like mass that are exactly conserved. In this context it is crucial that numerical models conserve at least mass exactly at the discrete level. However even with elaborate strategies like adaptive mesh refinement (AMR) conservation is not straightforwardly achieved. Although the continuous wavelet transform has become a standard tool of geophysical data analysis, it is less known that discrete wavelets and the associated transforms provide the basis for spatially adaptive numerical methods. Such methods are now well-developed in the fluid dynamics community. Since they allow spatial adaptivity, they can also be seen as two-way self-nesting methods. However since they are not specifically designed for geophysical purposes they are usually not exactly conservative. I present a fairly general framework in which a wavelet-based layer is added to an existing conservative scheme (finite-volume or finite-difference) to make it spatially adaptive without breaking the exact conservation of linear invariants. Discrete wavelet transforms involve an upscaling operation by which fields are transferred from a fine grid to a coarser grid with half the resolution. The method requires that mass fluxes be upscaled in a way that is consistent with the upscaling of mass. This

  20. The Relationship between Nonconservative Schemes and Initial Values of Nonlinear Evolution Equations

    Institute of Scientific and Technical Information of China (English)

    林万涛

    2004-01-01

    For the nonconservative schemes of the nonlinear evolution equations, taking the one-dimensional shallow water wave equation as an example, the necessary conditions of computational stability are given.Based on numerical tests, the relationship between the nonlinear computational stability and the construction of difference schemes, as well as the form of initial values, is further discussed. It is proved through both theoretical analysis and numerical tests that if the construction of difference schemes is definite, the computational stability of nonconservative schemes is decided by the form of initial values.