WorldWideScience

Sample records for power preservation schemes

  1. EPPRD: An Efficient Privacy-Preserving Power Requirement and Distribution Aggregation Scheme for a Smart Grid.

    Science.gov (United States)

    Zhang, Lei; Zhang, Jing

    2017-08-07

    A Smart Grid (SG) facilitates bidirectional demand-response communication between individual users and power providers with high computation and communication performance but also brings about the risk of leaking users' private information. Therefore, improving the individual power requirement and distribution efficiency to ensure communication reliability while preserving user privacy is a new challenge for SG. Based on this issue, we propose an efficient and privacy-preserving power requirement and distribution aggregation scheme (EPPRD) based on a hierarchical communication architecture. In the proposed scheme, an efficient encryption and authentication mechanism is proposed for better fit to each individual demand-response situation. Through extensive analysis and experiment, we demonstrate how the EPPRD resists various security threats and preserves user privacy while satisfying the individual requirement in a semi-honest model; it involves less communication overhead and computation time than the existing competing schemes.

  2. Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes

    Science.gov (United States)

    Su, Chunhua; Bao, Feng; Zhou, Jianying; Takagi, Tsuyoshi; Sakurai, Kouichi

    Due to the fast development of Internet and the related IT technologies, it becomes more and more easier to access a large amount of data. k-means clustering is a powerful and frequently used technique in data mining. Many research papers about privacy-preserving k-means clustering were published. In this paper, we analyze the existing privacy-preserving k-means clustering schemes based on the cryptographic techniques. We show those schemes will cause the privacy breach and cannot output the correct results due to the faults in the protocol construction. Furthermore, we analyze our proposal as an option to improve such problems but with intermediate information breach during the computation.

  3. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  4. Privacy-Preserving Billing Scheme against Free-Riders for Wireless Charging Electric Vehicles

    Directory of Open Access Journals (Sweden)

    Xingwen Zhao

    2017-01-01

    Full Text Available Recently, scientists in South Korea developed on-line electric vehicle (OLEV, which is a kind of electric vehicle that can be charged wirelessly while it is moving on the road. The battery in the vehicle can absorb electric energy from the power transmitters buried under the road without any contact with them. Several billing schemes have been presented to offer privacy-preserving billing for OLEV owners. However, they did not consider the existence of free-riders. When some vehicles are being charged after showing the tokens, vehicles that are running ahead or behind can switch on their systems and drive closely for a free charging. We describe a billing scheme against free-riders by using several cryptographic tools. Each vehicle should authenticate with a compensation-prepaid token before it can drive on the wireless-charging-enabled road. The service provider can obtain compensation if it can prove that certain vehicle is a free-rider. Our scheme is privacy-preserving so the charging will not disclose the locations and routine routes of each vehicle. In fact, our scheme is a fast authentication scheme that anonymously authenticates each user on accessing a sequence of services. Thus, it can be applied to sequential data delivering services in future 5G systems.

  5. Convexity-preserving Bernstein–Bézier quartic scheme

    Directory of Open Access Journals (Sweden)

    Maria Hussain

    2014-07-01

    Full Text Available A C1 convex surface data interpolation scheme is presented to preserve the shape of scattered data arranged over a triangular grid. Bernstein–Bézier quartic function is used for interpolation. Lower bound of the boundary and inner Bézier ordinates is determined to guarantee convexity of surface. The developed scheme is flexible and involves more relaxed constraints.

  6. Positivity-preserving space-time CE/SE scheme for high speed flows

    KAUST Repository

    Shen, Hua

    2017-03-02

    We develop a space-time conservation element and solution element (CE/SE) scheme using a simple slope limiter to preserve the positivity of the density and pressure in computations of inviscid and viscous high-speed flows. In general, the limiter works with all existing CE/SE schemes. Here, we test the limiter on a central Courant number insensitive (CNI) CE/SE scheme implemented on hybrid unstructured meshes. Numerical examples show that the proposed limiter preserves the positivity of the density and pressure without disrupting the conservation law; it also improves robustness without losing accuracy in solving high-speed flows.

  7. Positivity-preserving space-time CE/SE scheme for high speed flows

    KAUST Repository

    Shen, Hua; Parsani, Matteo

    2017-01-01

    We develop a space-time conservation element and solution element (CE/SE) scheme using a simple slope limiter to preserve the positivity of the density and pressure in computations of inviscid and viscous high-speed flows. In general, the limiter works with all existing CE/SE schemes. Here, we test the limiter on a central Courant number insensitive (CNI) CE/SE scheme implemented on hybrid unstructured meshes. Numerical examples show that the proposed limiter preserves the positivity of the density and pressure without disrupting the conservation law; it also improves robustness without losing accuracy in solving high-speed flows.

  8. Efficient Secure and Privacy-Preserving Route Reporting Scheme for VANETs

    Science.gov (United States)

    Zhang, Yuanfei; Pei, Qianwen; Dai, Feifei; Zhang, Lei

    2017-10-01

    Vehicular ad-hoc network (VANET) is a core component of intelligent traffic management system which could provide various of applications such as accident prediction, route reporting, etc. Due to the problems caused by traffic congestion, route reporting becomes a prospective application which can help a driver to get optimal route to save her travel time. Before enjoying the convenience of route reporting, security and privacy-preserving issues need to be concerned. In this paper, we propose a new secure and privacy-preserving route reporting scheme for VANETs. In our scheme, only an authenticated vehicle can use the route reporting service provided by the traffic management center. Further, a vehicle may receive the response from the traffic management center with low latency and without violating the privacy of the vehicle. Experiment results show that our scheme is much more efficiency than the existing one.

  9. Shape Preserving Interpolatory Subdivision Schemes for Nonuniform Data

    NARCIS (Netherlands)

    Kuijt, F.; van Damme, Rudolf M.J.

    2002-01-01

    This article is concerned with a class of shape preserving four-point subdivision schemes which are stationary and which interpolate nonuniform univariate data {(xi, fi)}. These data are functional data, i.e., xi≠xj if i≠j. Subdivision for the strictly monotone x-values is performed by a subdivision

  10. A Positivity-Preserving Numerical Scheme for Nonlinear Option Pricing Models

    Directory of Open Access Journals (Sweden)

    Shengwu Zhou

    2012-01-01

    Full Text Available A positivity-preserving numerical method for nonlinear Black-Scholes models is developed in this paper. The numerical method is based on a nonstandard approximation of the second partial derivative. The scheme is not only unconditionally stable and positive, but also allows us to solve the discrete equation explicitly. Monotone properties are studied in order to avoid unwanted oscillations of the numerical solution. The numerical results for European put option and European butterfly spread are compared to the standard finite difference scheme. It turns out that the proposed scheme is efficient and reliable.

  11. Energy-preserving H1-Galerkin schemes for shallow water wave equations with peakon solutions

    International Nuclear Information System (INIS)

    Miyatake, Yuto; Matsuo, Takayasu

    2012-01-01

    New energy-preserving Galerkin schemes for the Camassa–Holm and the Degasperis–Procesi equations which model shallow water waves are presented. The schemes can be implemented only with cheap H 1 elements, which is expected to be sufficient to catch the characteristic peakon solutions. The keys of the derivation are the Hamiltonian structures of the equations and an L 2 -projection technique newly employed in the present Letter to mimic the Hamiltonian structures in a discrete setting, so that the desired energy-preserving property rightly follows. Numerical examples confirm the effectiveness of the schemes. -- Highlights: ► Numerical integration of the Camassa–Holm and Degasperis–Procesi equation. ► New energy-preserving Galerkin schemes for these equations are proposed. ► They can be implemented only with P1 elements. ► They well capture the characteristic peakon solutions over long time. ► The keys are the Hamiltonian structures and L 2 -projection technique.

  12. Positivity-preserving CE/SE schemes for solving the compressible Euler and Navier–Stokes equations on hybrid unstructured meshes

    KAUST Repository

    Shen, Hua

    2018-05-28

    We construct positivity-preserving space–time conservation element and solution element (CE/SE) schemes for solving the compressible Euler and Navier–Stokes equations on hybrid unstructured meshes consisting of triangular and rectangular elements. The schemes use an a posteriori limiter to prevent negative densities and pressures based on the premise of preserving optimal accuracy. The limiter enforces a constraint for spatial derivatives and does not change the conservative property of CE/SE schemes. Several numerical examples suggest that the proposed schemes preserve accuracy for smooth flows and strictly preserve positivity of densities and pressures for the problems involving near vacuum and very strong discontinuities.

  13. An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme

    Directory of Open Access Journals (Sweden)

    Lu Ou

    2018-01-01

    Full Text Available Location-based services (LBSs are increasingly popular in today’s society. People reveal their location information to LBS providers to obtain personalized services such as map directions, restaurant recommendations, and taxi reservations. Usually, LBS providers offer user privacy protection statement to assure users that their private location information would not be given away. However, many LBSs run on third-party cloud infrastructures. It is challenging to guarantee user location privacy against curious cloud operators while still permitting users to query their own location information data. In this paper, we propose an efficient privacy-preserving cloud-based LBS query scheme for the multiuser setting. We encrypt LBS data and LBS queries with a hybrid encryption mechanism, which can efficiently implement privacy-preserving search over encrypted LBS data and is very suitable for the multiuser setting with secure and effective user enrollment and user revocation. This paper contains security analysis and performance experiments to demonstrate the privacy-preserving properties and efficiency of our proposed scheme.

  14. Comparative analysis of supercritical CO2 power conversion system control schemes

    International Nuclear Information System (INIS)

    Vilim, R.B.; Moisseytsev, A.

    2008-01-01

    A comparative analysis of control system performance was carried out for the S-CO 2 re-compressing cycle. In this study two control strategies were developed for managing process variables for a change in load at the electrical generator. Both relied on inventory control to reduce power but differed in other significant respects. In inventory control turbomachine mass flow rates are reduced through density change with the goal of preserving velocity triangle similarity and, hence, cycle efficiency. An inventory and low temperature control scheme was operated to maintain a trajectory that avoids close approach to the critical point by controlling the main compressor inlet temperature. Shaft power tracks a setpoint by controlling density. This control scheme may be preferred in plant configurations that use a flow-split. There the rapid density change with pressure near the critical point can lead to flow rate instability. An inventory and turbine bypass control scheme was operated to more closely approach the critical point. Inventory in addition to turbine bypass was used to control shaft power. The first control scheme yielded greater efficiency at reduced power as a result of two factors. First, bypassing coolant around the turbine increases the mass flow rate through the compressors while shaft speed is maintained constant. As a result the compressor velocity triangles are altered from their peak efficiency values. Second, the bypass flow rate results in non-isothermal mixing downstream where the turbine and bypass flow combine which also penalizes efficiency. (authors)

  15. A Hybrid Data Compression Scheme for Power Reduction in Wireless Sensors for IoT.

    Science.gov (United States)

    Deepu, Chacko John; Heng, Chun-Huat; Lian, Yong

    2017-04-01

    This paper presents a novel data compression and transmission scheme for power reduction in Internet-of-Things (IoT) enabled wireless sensors. In the proposed scheme, data is compressed with both lossy and lossless techniques, so as to enable hybrid transmission mode, support adaptive data rate selection and save power in wireless transmission. Applying the method to electrocardiogram (ECG), the data is first compressed using a lossy compression technique with a high compression ratio (CR). The residual error between the original data and the decompressed lossy data is preserved using entropy coding, enabling a lossless restoration of the original data when required. Average CR of 2.1 × and 7.8 × were achieved for lossless and lossy compression respectively with MIT/BIH database. The power reduction is demonstrated using a Bluetooth transceiver and is found to be reduced to 18% for lossy and 53% for lossless transmission respectively. Options for hybrid transmission mode, adaptive rate selection and system level power reduction make the proposed scheme attractive for IoT wireless sensors in healthcare applications.

  16. Physics-preserving averaging scheme based on Grunwald-Letnikov formula for gas flow in fractured media

    KAUST Repository

    Amir, Sahar Z.

    2018-01-02

    The heterogeneous natures of rock fabrics, due to the existence of multi-scale fractures and geological formations, led to the deviations from unity in the flux-equations fractional-exponent magnitudes. In this paper, the resulting non-Newtonian non-Darcy fractional-derivatives flux equations are solved using physics-preserving averaging schemes that incorporates both, original and shifted, Grunwald-Letnikov (GL) approximation formulas preserving the physics, by reducing the shifting effects, while maintaining the stability of the system, by keeping one shifted expansion. The proposed way of using the GL expansions also generate symmetrical coefficient matrices that significantly reduces the discretization complexities appearing with all shifted cases from literature, and help considerably in 2D and 3D systems. Systems equations derivations and discretization details are discussed. Then, the physics-preserving averaging scheme is explained and illustrated. Finally, results are presented and reviewed. Edge-based original GL expansions are unstable as also illustrated in literatures. Shifted GL expansions are stable but add a lot of additional weights to both discretization sides affecting the physical accuracy. In comparison, the physics-preserving averaging scheme balances the physical accuracy and stability requirements leading to a more physically conservative scheme that is more stable than the original GL approximation but might be slightly less stable than the shifted GL approximations. It is a locally conservative Single-Continuum averaging scheme that applies a finite-volume viewpoint.

  17. Physics-preserving averaging scheme based on Grunwald-Letnikov formula for gas flow in fractured media

    KAUST Repository

    Amir, Sahar Z.; Sun, Shuyu

    2018-01-01

    The heterogeneous natures of rock fabrics, due to the existence of multi-scale fractures and geological formations, led to the deviations from unity in the flux-equations fractional-exponent magnitudes. In this paper, the resulting non-Newtonian non-Darcy fractional-derivatives flux equations are solved using physics-preserving averaging schemes that incorporates both, original and shifted, Grunwald-Letnikov (GL) approximation formulas preserving the physics, by reducing the shifting effects, while maintaining the stability of the system, by keeping one shifted expansion. The proposed way of using the GL expansions also generate symmetrical coefficient matrices that significantly reduces the discretization complexities appearing with all shifted cases from literature, and help considerably in 2D and 3D systems. Systems equations derivations and discretization details are discussed. Then, the physics-preserving averaging scheme is explained and illustrated. Finally, results are presented and reviewed. Edge-based original GL expansions are unstable as also illustrated in literatures. Shifted GL expansions are stable but add a lot of additional weights to both discretization sides affecting the physical accuracy. In comparison, the physics-preserving averaging scheme balances the physical accuracy and stability requirements leading to a more physically conservative scheme that is more stable than the original GL approximation but might be slightly less stable than the shifted GL approximations. It is a locally conservative Single-Continuum averaging scheme that applies a finite-volume viewpoint.

  18. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  19. Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2017-01-01

    Full Text Available With the development of Internet, cloud computing has emerged to provide service to data users. But, it is necessary for an auditor on behalf of users to check the integrity of the data stored in the cloud. The cloud server also must ensure the privacy of the data. In a usual public integrity check scheme, the linear combination of data blocks is needed for verification. But, after times of auditing on the same data blocks, based on collected linear combinations, the auditor might derive these blocks. Recently, a number of public auditing schemes with privacy-preserving are proposed. With blinded linear combinations of data blocks, the authors of these schemes believed that the auditor cannot derive any information about the data blocks and claimed that their schemes are provably secure in the random oracle model. In this paper, with detailed security analysis of these schemes, we show that these schemes are vulnerable to an attack from the malicious cloud server who modifies the data blocks and succeeds in forging proof information for data integrity check.

  20. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  1. A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service.

    Science.gov (United States)

    Yang, Xue; Yin, Fan; Tang, Xiaohu

    2017-07-11

    Location-based services (LBS), as one of the most popular location-awareness applications, has been further developed to achieve low-latency with the assistance of fog computing. However, privacy issues remain a research challenge in the context of fog computing. Therefore, in this paper, we present a fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based services, hereafter referred to as FGPQ. In particular, mobile users can obtain the fine-grained searching result satisfying not only the given spatial range but also the searching content. Detailed privacy analysis shows that our proposed scheme indeed achieves the privacy preservation for the LBS provider and mobile users. In addition, extensive performance analyses and experiments demonstrate that the FGPQ scheme can significantly reduce computational and communication overheads and ensure the low-latency, which outperforms existing state-of-the art schemes. Hence, our proposed scheme is more suitable for real-time LBS searching.

  2. Perfectly matched layers in a divergence preserving ADI scheme for electromagnetics

    International Nuclear Information System (INIS)

    Kraus, C.; Adelmann, A.; Arbenz, P.

    2012-01-01

    For numerical simulations of highly relativistic and transversely accelerated charged particles including radiation fast algorithms are needed. While the radiation in particle accelerators has wavelengths in the order of 100 μm the computational domain has dimensions roughly five orders of magnitude larger resulting in very large mesh sizes. The particles are confined to a small area of this domain only. To resolve the smallest scales close to the particles subgrids are envisioned. For reasons of stability the alternating direction implicit (ADI) scheme by Smithe et al. [D.N. Smithe, J.R. Cary, J.A. Carlsson, Divergence preservation in the ADI algorithms for electromagnetics, J. Comput. Phys. 228 (2009) 7289-7299] for Maxwell equations has been adopted. At the boundary of the domain absorbing boundary conditions have to be employed to prevent reflection of the radiation. In this paper we show how the divergence preserving ADI scheme has to be formulated in perfectly matched layers (PML) and compare the performance in several scenarios.

  3. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs

    Science.gov (United States)

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-01-01

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620

  4. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.

    Science.gov (United States)

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-03-24

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.

  5. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-12-08

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.

  6. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-01-01

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792

  7. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2017-12-01

    Full Text Available Vehicle sensor networks (VSNs are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem.

  8. Knowledge preservation strategies for nuclear power plants

    International Nuclear Information System (INIS)

    Koruna, S.; Bachmann, H.

    2004-01-01

    The nuclear industry is currently facing several challenges. An internal threat to the safety and operations of nuclear power plants is the loss of those employees who hold knowledge that is either critical to operations or safety. This report discusses the possibilities to preserve knowledge in nuclear power plants. Dependent on the degree of tacitness two different knowledge preservation strategies can be discerned: personalization and codification. The knowledge preservation activities discussed are valued according to the criteria: cost, immediacy of availability and completeness

  9. Positivity-preserving dual time stepping schemes for gas dynamics

    Science.gov (United States)

    Parent, Bernard

    2018-05-01

    A new approach at discretizing the temporal derivative of the Euler equations is here presented which can be used with dual time stepping. The temporal discretization stencil is derived along the lines of the Cauchy-Kowalevski procedure resulting in cross differences in spacetime but with some novel modifications which ensure the positivity of the discretization coefficients. It is then shown that the so-obtained spacetime cross differences result in changes to the wave speeds and can thus be incorporated within Roe or Steger-Warming schemes (with and without reconstruction-evolution) simply by altering the eigenvalues. The proposed approach is advantaged over alternatives in that it is positivity-preserving for the Euler equations. Further, it yields monotone solutions near discontinuities while exhibiting a truncation error in smooth regions less than the one of the second- or third-order accurate backward-difference-formula (BDF) for either small or large time steps. The high resolution and positivity preservation of the proposed discretization stencils are independent of the convergence acceleration technique which can be set to multigrid, preconditioning, Jacobian-free Newton-Krylov, block-implicit, etc. Thus, the current paper also offers the first implicit integration of the time-accurate Euler equations that is positivity-preserving in the strict sense (that is, the density and temperature are guaranteed to remain positive). This is in contrast to all previous positivity-preserving implicit methods which only guaranteed the positivity of the density, not of the temperature or pressure. Several stringent reacting and inert test cases confirm the positivity-preserving property of the proposed method as well as its higher resolution and higher computational efficiency over other second-order and third-order implicit temporal discretization strategies.

  10. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data

    Directory of Open Access Journals (Sweden)

    Qingqing Xie

    2016-11-01

    Full Text Available With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP can provide location-based service (LBS for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman algorithm and ciphertext policy attribute-based encryption (CP-ABE scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA and efficient enough for practical applications in terms of user side computation overhead.

  11. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.

    Science.gov (United States)

    Xie, Qingqing; Wang, Liangmin

    2016-11-25

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead.

  12. Well-balanced positivity preserving central-upwind scheme on triangular grids for the Saint-Venant system

    KAUST Repository

    Bryson, Steve

    2010-10-11

    We introduce a new second-order central-upwind scheme for the Saint-Venant system of shallow water equations on triangular grids. We prove that the scheme both preserves "lake at rest" steady states and guarantees the positivity of the computed fluid depth. Moreover, it can be applied to models with discontinuous bottom topography and irregular channel widths. We demonstrate these features of the new scheme, as well as its high resolution and robustness in a number of numerical examples. © EDP Sciences, SMAI, 2010.

  13. Well-balanced positivity preserving central-upwind scheme on triangular grids for the Saint-Venant system

    KAUST Repository

    Bryson, Steve; Epshteyn, Yekaterina; Kurganov, Alexander; Petrova, Guergana

    2010-01-01

    We introduce a new second-order central-upwind scheme for the Saint-Venant system of shallow water equations on triangular grids. We prove that the scheme both preserves "lake at rest" steady states and guarantees the positivity of the computed fluid depth. Moreover, it can be applied to models with discontinuous bottom topography and irregular channel widths. We demonstrate these features of the new scheme, as well as its high resolution and robustness in a number of numerical examples. © EDP Sciences, SMAI, 2010.

  14. An asymptotic preserving unified gas kinetic scheme for gray radiative transfer equations

    International Nuclear Information System (INIS)

    Sun, Wenjun; Jiang, Song; Xu, Kun

    2015-01-01

    The solutions of radiative transport equations can cover both optical thin and optical thick regimes due to the large variation of photon's mean-free path and its interaction with the material. In the small mean free path limit, the nonlinear time-dependent radiative transfer equations can converge to an equilibrium diffusion equation due to the intensive interaction between radiation and material. In the optical thin limit, the photon free transport mechanism will emerge. In this paper, we are going to develop an accurate and robust asymptotic preserving unified gas kinetic scheme (AP-UGKS) for the gray radiative transfer equations, where the radiation transport equation is coupled with the material thermal energy equation. The current work is based on the UGKS framework for the rarefied gas dynamics [14], and is an extension of a recent work [12] from a one-dimensional linear radiation transport equation to a nonlinear two-dimensional gray radiative system. The newly developed scheme has the asymptotic preserving (AP) property in the optically thick regime in the capturing of diffusive solution without using a cell size being smaller than the photon's mean free path and time step being less than the photon collision time. Besides the diffusion limit, the scheme can capture the exact solution in the optical thin regime as well. The current scheme is a finite volume method. Due to the direct modeling for the time evolution solution of the interface radiative intensity, a smooth transition of the transport physics from optical thin to optical thick can be accurately recovered. Many numerical examples are included to validate the current approach

  15. Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care.

    Science.gov (United States)

    Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting

    2014-09-01

    Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.

  16. Agent-based power sharing scheme for active hybrid power sources

    Science.gov (United States)

    Jiang, Zhenhua

    The active hybridization technique provides an effective approach to combining the best properties of a heterogeneous set of power sources to achieve higher energy density, power density and fuel efficiency. Active hybrid power sources can be used to power hybrid electric vehicles with selected combinations of internal combustion engines, fuel cells, batteries, and/or supercapacitors. They can be deployed in all-electric ships to build a distributed electric power system. They can also be used in a bulk power system to construct an autonomous distributed energy system. An important aspect in designing an active hybrid power source is to find a suitable control strategy that can manage the active power sharing and take advantage of the inherent scalability and robustness benefits of the hybrid system. This paper presents an agent-based power sharing scheme for active hybrid power sources. To demonstrate the effectiveness of the proposed agent-based power sharing scheme, simulation studies are performed for a hybrid power source that can be used in a solar car as the main propulsion power module. Simulation results clearly indicate that the agent-based control framework is effective to coordinate the various energy sources and manage the power/voltage profiles.

  17. PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems.

    Science.gov (United States)

    Xu, Chang; Lu, Rongxing; Wang, Huaxiong; Zhu, Liehuang; Huang, Cheng

    2017-03-03

    Air pollution has become one of the most pressing environmental issues in recent years. According to a World Health Organization (WHO) report, air pollution has led to the deaths of millions of people worldwide. Accordingly, expensive and complex air-monitoring instruments have been exploited to measure air pollution. Comparatively, a vehicle sensing system (VSS), as it can be effectively used for many purposes and can bring huge financial benefits in reducing high maintenance and repair costs, has received considerable attention. However, the privacy issues of VSS including vehicles' location privacy have not been well addressed. Therefore, in this paper, we propose a new privacy-preserving data aggregation scheme, called PAVS, for VSS. Specifically, PAVS combines privacy-preserving classification and privacy-preserving statistics on both the mean E(·) and variance Var(·), which makes VSS more promising, as, with minimal privacy leakage, more vehicles are willing to participate in sensing. Detailed analysis shows that the proposed PAVS can achieve the properties of privacy preservation, data accuracy and scalability. In addition, the performance evaluations via extensive simulations also demonstrate its efficiency.

  18. Positivity-preserving CE/SE schemes for solving the compressible Euler and Navier–Stokes equations on hybrid unstructured meshes

    KAUST Repository

    Shen, Hua; Parsani, Matteo

    2018-01-01

    . The schemes use an a posteriori limiter to prevent negative densities and pressures based on the premise of preserving optimal accuracy. The limiter enforces a constraint for spatial derivatives and does not change the conservative property of CE/SE schemes

  19. Anonymous authentication and location privacy preserving schemes for LTE-A networks

    Directory of Open Access Journals (Sweden)

    Zaher Jabr Haddad

    2017-11-01

    Full Text Available Long Term Evaluation Advanced (LTE-A is the third generation partnership project for cellular network that allows subscribers to roam into networks (i.e., the Internet and wireless connections using spacial purpose base-stations, such as wireless access points and home node B. In such LTE-A based networks, neither base-stations, nor the Internet and wireless connections are trusted because base-stations are operated by un-trusted subscribers. Attackers may exploit these vulnerabilities to violate the privacy of the LTE-A subscribers. On the other hand, the tradeoff between privacy and authentication is another challenge in such networks. Therefore, in this paper, we propose two anonymous authentication schemes based on one-time pseudonymes and Schnorr Zero Knowledge Protocols. Instead of the international mobile subscriber identity, these schemes enable the user equipment, base-stations and mobility management entity to mutually authenticate each others and update the location of the user equipment without evolving the home subscriber server. The security analysis demonstrate that the proposed schemes thwart security and privacy attacks, such as malicious, international mobile subscriber identity catching, and tracking attacks. Additionally, our proposed schemes preserve the location privacy of user equipment since no entity except the mobility management entity and Gate-Way Mobile Location Center can link between the pseudonymes and the international mobile subscriber identity. Also attackers have no knowledge about international mobile subscriber identity. Hence, the proposed schemes achieve backward/forward secrecy. Furthermore, the performance evaluation shows that the proposed handover schemes impose a small overhead on the mobile nodes and it has smaller computation and communication overheads than those in other schemes.

  20. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data †

    Science.gov (United States)

    Xie, Qingqing; Wang, Liangmin

    2016-01-01

    With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead. PMID:27897984

  1. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  2. Development scheme of the public power transportation network

    International Nuclear Information System (INIS)

    2005-01-01

    Article 14 of the modified law from February 10, 2000 relative to the modernization and development of the electric utility foresees that the development scheme of the public power transportation network is regularly submitted to the approval of the ministry of energy after advice from the energy regulation commission. The development scheme identifies the areas of 'power fragility' with respect to the existing or future constraints susceptible to occur at the short- or medium-term on the French power grid. This document comprises the text of the law 2000-108 from February 10, 2000, and the complete development scheme with its appendixes (regulatory and administrative context relative to network projects, constraints relative to each administrative region). (J.S.)

  3. A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing

    Directory of Open Access Journals (Sweden)

    Xinyue Cao

    2016-01-01

    Full Text Available Cloud storage has been recognized as the popular solution to solve the problems of the rising storage costs of IT enterprises for users. However, outsourcing data to the cloud service providers (CSPs may leak some sensitive privacy information, as the data is out of user’s control. So how to ensure the integrity and privacy of outsourced data has become a big challenge. Encryption and data auditing provide a solution toward the challenge. In this paper, we propose a privacy-preserving and auditing-supporting outsourcing data storage scheme by using encryption and digital watermarking. Logistic map-based chaotic cryptography algorithm is used to preserve the privacy of outsourcing data, which has a fast operation speed and a good effect of encryption. Local histogram shifting digital watermark algorithm is used to protect the data integrity which has high payload and makes the original image restored losslessly if the data is verified to be integrated. Experiments show that our scheme is secure and feasible.

  4. Power corrections in the N-jettiness subtraction scheme

    Energy Technology Data Exchange (ETDEWEB)

    Boughezal, Radja [High Energy Physics Division, Argonne National Laboratory,Argonne, IL 60439 (United States); Liu, Xiaohui [Department of Physics, Beijing Normal University,Beijing, 100875 (China); Center of Advanced Quantum Studies, Beijing Normal University,Beijing, 100875 (China); Center for High-Energy Physics, Peking University,Beijing, 100871 (China); Maryland Center for Fundamental Physics, University of Maryland,College Park, MD 20742 (United States); Petriello, Frank [Department of Physics & Astronomy, Northwestern University,Evanston, IL 60208 (United States); High Energy Physics Division, Argonne National Laboratory,Argonne, IL 60439 (United States)

    2017-03-30

    We discuss the leading-logarithmic power corrections in the N-jettiness subtraction scheme for higher-order perturbative QCD calculations. We compute the next-to-leading order power corrections for an arbitrary N-jet process, and we explicitly calculate the power correction through next-to-next-to-leading order for color-singlet production for both qq̄ and gg initiated processes. Our results are compact and simple to implement numerically. Including the leading power correction in the N-jettiness subtraction scheme substantially improves its numerical efficiency. We discuss what features of our techniques extend to processes containing final-state jets.

  5. Novel powering schemes for pixel and tracking detectors

    CERN Document Server

    Feld, Lutz Werner

    2013-01-01

    Future pixel and tracking systems like the ones foreseen in the upgrade programs of the LHC experiments are very demanding on the power supply systems. An increased amount of power has to be supplied to the front-end electronics at a reduced voltage, through existing cable plants. Novel powering schemes are needed to avoid excessive cable losses. The two schemes under consideration, serial powering and DC-DC conversion, are reviewed. Particular emphasis is put on system integration aspects. As an example, the new CMS pixel system, which will be powered via DC-DC conversion, is presented in more detail. This allows to discuss challenges and solutions for a concrete application while the conclusions should be relevant for other applications as well.

  6. DEP2SA: A Decentralised Efficient Privacy-Preserving and Selective Aggregation Scheme in Advanced Metering Infrastructure

    OpenAIRE

    Mustafa, Mustafa; Zhang, Ning; Kalogridis, Georgios; Fan, Zhong

    2015-01-01

    This paper proposes a novel solution, called a decentralised, efficient, privacy-preserving and selective aggregation (DEP2SA) scheme, designed to support secure and user privacy-preserving data collection in the advanced metering infrastructure. DEP2SA is more efficient and applicable in real-life deployment, as compared with the state of the art, by adopting and adapting a number of key technologies: (1) it uses a multi-recipient system model, making it more applicable to a liberalised elec...

  7. Performance analysis of joint diversity combining, adaptive modulation, and power control schemes

    KAUST Repository

    Qaraqe, Khalid A.

    2011-01-01

    Adaptive modulation and diversity combining represent very important adaptive solutions for future generations of wireless communication systems. Indeed, in order to improve the performance and the efficiency of these systems, these two techniques have been recently used jointly in new schemes named joint adaptive modulation and diversity combining (JAMDC) schemes. Considering the problem of finding low hardware complexity, bandwidth-efficient, and processing-power efficient transmission schemes for a downlink scenario and capitalizing on some of these recently proposed JAMDC schemes, we propose and analyze in this paper three joint adaptive modulation, diversity combining, and power control (JAMDCPC) schemes where a constant-power variable-rate adaptive modulation technique is used with an adaptive diversity combining scheme and a common power control process. More specifically, the modulation constellation size, the number of combined diversity paths, and the needed power level are jointly determined to achieve the highest spectral efficiency with the lowest possible processing power consumption quantified in terms of the average number of combined paths, given the fading channel conditions and the required bit error rate (BER) performance. In this paper, the performance of these three JAMDCPC schemes is analyzed in terms of their spectral efficiency, processing power consumption, and error-rate performance. Selected numerical examples show that these schemes considerably increase the spectral efficiency of the existing JAMDC schemes with a slight increase in the average number of combined paths for the low signal-to-noise ratio range while maintaining compliance with the BER performance and a low radiated power which yields to a substantial decrease in interference to co-existing users and systems. © 2011 IEEE.

  8. A Hybrid Single-Carrier/Multicarrier Transmission Scheme with Power Allocation

    Directory of Open Access Journals (Sweden)

    Luc Féty

    2007-11-01

    Full Text Available We propose a flexible transmission scheme which easily allows to switch between cyclic-prefixed single-carrier (CP-SC and cyclic-prefixed multicarrier (CP-MC transmissions. This scheme takes advantage of the best characteristic of each scheme, namely, the low peak-to-average power ratio (PAPR of the CP-SC scheme and the robustness to channel selectivity of the CP-MC scheme. Moreover, we derive the optimum power allocation for the CP-SC transmission considering a zero-forcing (ZF and a minimum mean-square error (MMSE receiver. By taking the PAPR into account, we are able to make a better analysis of the overall system and the results show the advantage of the CP-SC-MMSE scheme for flat and mild selective channels due to their low PAPR and that the CP-MC scheme is more advantageous for a narrow range of channels with severe selectivity.

  9. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme

    Directory of Open Access Journals (Sweden)

    Hui Zhu

    2016-02-01

    Full Text Available With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users’ personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users’ query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users’ queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs.

  10. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.

    Science.gov (United States)

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-02-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users' personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users' query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users' queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs.

  11. Dynamic droop scheme considering effect of intermittent renewable energy source

    DEFF Research Database (Denmark)

    Wang, Yanbo; Chen, Zhe; Deng, Fujin

    2016-01-01

    This paper presents a dynamic droop control scheme for islanded microgrids dominated by intermittent renewable energy sources, which is able to perform desirable power sharing in the presence of renewable energy source fluctuation. First, allowable maximum power points of wind generator and PV...... flexibility and effectiveness in the presence of the renewable energy sources fluctuation....... controller of each DG unit is activated through local logic variable inferred by wind speed and solar insolation information. Simulation results are given for validating the droop control scheme. The proposed dynamic droop scheme preserves the advantage of conventional droop control method, and provides...

  12. Decentralized Economic Dispatch Scheme With Online Power Reserve for Microgrids

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Wang, P.

    2017-01-01

    Decentralized economic operation schemes have several advantages when compared with the traditional centralized management system for microgrids. Specifically, decentralized schemes are more flexible, less computationally intensive, and easier to implement without relying on communication...... costs, their power ratings, and other necessary constraints, before deciding the DG dispatch priorities and droop characteristics. The proposed scheme also allows online power reserve to be set and regulated within the microgrid. This, together with the generation cost saved, has been verified...... infrastructure. Economic operation of existing decentralized schemes is also usually achieved by either tuning the droop characteristics of distributed generators (DGs) or prioritizing their dispatch order. For the latter, an earlier scheme has tried to prioritize the DG dispatch based on their no...

  13. A novel power swing blocking scheme using adaptive neuro-fuzzy inference system

    Energy Technology Data Exchange (ETDEWEB)

    Zadeh, Hassan Khorashadi; Li, Zuyi [Illinois Institute of Technology, Department of Electrical and Computer Engineering, 3301 S. Dearborn Street, Chicago, IL 60616 (United States)

    2008-07-15

    A power swing may be caused by any sudden change in the configuration or the loading of an electrical network. During a power swing, the impedance locus moves along an impedance circle with possible encroachment into the distance relay zone, which may cause an unnecessary tripping. In order to prevent the distance relay from tripping under such condition, a novel power swing blocking (PSB) scheme is proposed in this paper. The proposed scheme uses an adaptive neuro-fuzzy inference systems (ANFIS) for preventing distance relay from tripping during power swings. The input signals to ANFIS, include the change of positive sequence impedance, positive and negative sequence currents, and power swing center voltage. Extensive tests show that the proposed PSB has two distinct features that are advantageous over existing schemes. The first is that the proposed scheme is able to detect various kinds of power swings thus block distance relays during power swings, even if the power swings are fast or the power swings occur during single pole open conditions. The second distinct feature is that the proposed scheme is able to clear the blocking if faults occur within the relay trip zone during power swings, even if the faults are high resistance faults, or the faults occur at the power swing center, or the faults occur when the power angle is close to 180 . (author)

  14. A DFIG Islanding Detection Scheme Based on Reactive Power Infusion

    Science.gov (United States)

    Wang, M.; Liu, C.; He, G. Q.; Li, G. H.; Feng, K. H.; Sun, W. W.

    2017-07-01

    A lot of research has been done on photovoltaic (the “PV”) power system islanding detection in recent years. As a comparison, much less attention has been paid to islanding in wind turbines. Meanwhile, wind turbines can work in islanding conditions for quite a long period, which can be harmful to equipments and cause safety hazards. This paper presents and examines a double fed introduction generation (the “DFIG”) islanding detection scheme based on feedback of reactive power and frequency and uses a trigger signal of reactive power infusion which can be obtained by dividing the voltage total harmonic distortion (the "THD") by the voltage THD of last cycle to avoid the deterioration of power quality. This DFIG islanding detection scheme uses feedback of reactive power current loop to amplify the frequency differences in islanding and normal conditions. Simulation results show that the DFIG islanding detection scheme is effective.

  15. A data seamless interaction scheme between electric power secondary business systems

    Science.gov (United States)

    Ai, Wenkai; Qian, Feng

    2018-03-01

    At present, the data interaction of electric power secondary business systems is very high, and it is not universal to develop programs when data interaction is carried out by different manufacturers' electric power secondary business systems. There are different interaction schemes for electric power secondary business systems with different manufacturers, which lead to high development cost, low reusability and high maintenance difficulty. This paper introduces a new data seamless interaction scheme between electric power secondary business systems. The scheme adopts the international common Java message service protocol as the transmission protocol, adopts the common JavaScript object symbol format as the data interactive format, unified electric power secondary business systems data interactive way, improve reusability, reduce complexity, monitor the operation of the electric power secondary business systems construction has laid a solid foundation.

  16. A new MV bus transfer scheme for nuclear power plants

    International Nuclear Information System (INIS)

    Chang, C.K.

    2015-01-01

    The auxiliary power system of many generating stations consists of offsite power supply system and onsite power supply system, including emergency diesel generators (EDG) to provide secure power to auxiliary loads. If a normal power supply fails to supply power, then the power source is transferred to a standby power supply. In the case of nuclear power plants (NPP), the unit auxiliary transformer (UAT) and standby auxiliary transformer (SAT) - or station service transformer - are installed and powered from 2 offsite power circuits to meet regulatory requirements. The transfer methods of a motor bus from a normal source to a standby source used in power generating stations are fast bus transfer, in-phase transfer, or residual transfer. Fast bus transfer method is the most popular and residual voltage transfer method that is used as a backup in medium voltage buses in general. The use of the advanced technology like open circuit voltage prediction and digital signal processing algorithms can improve the reliability of fast transfer scheme. However, according to the survey results of the recent operation records in nuclear power plants, there were many instances where the fast transfer scheme has failed. To assure bus transfer in any conditions and circumstances, un-interruptible bus transfer scheme utilizing the state of the art medium voltage UPS (Un-interruptible Power Supply) is discussed and elaborated

  17. Research on a New Control Scheme of Photovoltaic Grid Power Generation System

    Directory of Open Access Journals (Sweden)

    Dong-Hui Li

    2014-01-01

    Full Text Available A new type of photovoltaic grid power generation system control scheme to solve the problems of the conventional photovoltaic grid power generation systems is presented. To aim at the oscillation and misjudgment of traditional perturbation observation method, an improved perturbation observation method comparing to the next moment power is proposed, combining with BOOST step-up circuit to realize the maximum power tracking. To counter the harmonic pollution problem in photovoltaic grid power generation system, the deadbeat control scheme in fundamental wave synchronous frequency rotating coordinate system of power grid is presented. A parameter optimization scheme based on positive feedback of active frequency shift island detection to solve the problems like the nondetection zone due to the import of disturbance in traditional island detection method is proposed. Finally, the results in simulation environment by MATLAB/Simulink simulation and experiment environment verify the validity and superiority of the proposed scheme.

  18. Development of Dalaelven hydro power scheme in Sweden

    International Nuclear Information System (INIS)

    Kokko, Voitto; Hjerthen, Peter; Ingfaelt, Hans; Loewen, Karl-Erik; Sjoegren, Arne

    2015-01-01

    The Dalaelven hydro scheme is located in central Sweden. Fortum has in the scheme 50 dams and 35 hydro power plants producing 4 TWh energy with a capacity of 970 MW. The main reservoirs are Lake Siljan and Traengsletsjoen with Traengslet dam, the highest earth-filled dam in Sweden. Development of the hydro scheme started 1878 with construction of four power plants for industry until 1930. From 1931 to 1974 15 power plants were built for increasing electricity consumption. De-regulation of the energy market in 1990's and EU environmental targets in 2000's resulted in the rehabilitation of ten power plants between 1990 and 2014 with increased annual energy production of 377 GWh (29%) and capacity 124 MW (59%). This energy decreases the annual CO 2 emissions with 125918 tons in comparison to production of the same amount of energy by coal. In several cases the rehabilitation was made in new power houses, allowing the development of the layout and technology of civil structures, and use of state-of-art equipment. Sweden uses the green certificate system, and 235 GWh of the energy received this certificate. Other environmental benefits come from use of the environmentally friendly Kaplan turbines and construction of some new fish pass. There are further plans to increase the spillway capacity of Traengslet dam and to rehabilitate eight power plant units. The possibilities of obtaining the Environmental licences for the rehabilitations has became challenging in the past years and green certificates are nowadays agreed only for increased energy. (authors)

  19. Power Peaking Effect of OTTO Fuel Scheme Pebble Bed Reactor

    Science.gov (United States)

    Setiadipura, T.; Suwoto; Zuhair; Bakhri, S.; Sunaryo, G. R.

    2018-02-01

    Pebble Bed Reactor (PBR) type of Hight Temperature Gas-cooled Reactor (HTGR) is a very interesting nuclear reactor design to fulfill the growing electricity and heat demand with a superior passive safety features. Effort to introduce the PBR design to the market can be strengthen by simplifying its system with the Once-through-then-out (OTTO) cycle PBR in which the pebble fuel only pass the core once. Important challenge in the OTTO fuel scheme is the power peaking effect which limit the maximum nominal power or burnup of the design. Parametric survey is perform in this study to investigate the contribution of different design parameters to power peaking effect of OTTO cycle PBR. PEBBED code is utilized in this study to perform the equilibrium PBR core analysis for different design parameter and fuel scheme. The parameters include its core diameter, height-per-diameter (H/D), power density, and core nominal power. Results of this study show that diameter and H/D effectsare stronger compare to the power density and nominal core power. Results of this study might become an importance guidance for design optimization of OTTO fuel scheme PBR.

  20. Advanced Reactive Power Reserve Management Scheme to Enhance LVRT Capability

    Directory of Open Access Journals (Sweden)

    Hwanik Lee

    2017-10-01

    Full Text Available Abstract: To increase the utilization of wind power in the power system, grid integration standards have been proposed for the stable integration of large-scale wind power plants. In particular, fault-ride-through capability, especially Low-Voltage-Ride-Through (LVRT, has been emphasized, as it is related to tripping in wind farms. Therefore, this paper proposes the Wind power plant applicable-Effective Reactive power Reserve (Wa-ERPR, which combines both wind power plants and conventional generators at the Point of Interconnection (POI. The reactive power capability of the doubly-fed induction generator wind farm was considered to compute the total Wa-ERPR at the POI with reactive power capability of existing generators. By using the Wa-ERPR management algorithm, in case of a violation of the LVRT standards, the amount of reactive power compensation is computed using the Wa-ERPR management scheme. The proposed scheme calculates the Wa-ERPR and computes the required reactive power, reflecting the change of the system topology pre- and post-contingency, to satisfy the LVRT criterion when LVRT regulation is not satisfied at the POI. The static synchronous compensator (STATCOM with the capacity corresponding to calculated amount of reactive power through the Wa-ERPR management scheme is applied to the POI. Therefore, it is confirmed that the wind power plant satisfies the LVRT criteria by securing the appropriate reactive power at the POI, by applying of the proposed algorithm.

  1. (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems.

    Science.gov (United States)

    Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng

    2018-02-14

    The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1  ≥ a 2 , k 2  ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

  2. A Suboptimal Power-Saving Transmission Scheme in Multiple Component Carrier Networks

    Science.gov (United States)

    Chung, Yao-Liang; Tsai, Zsehong

    Power consumption due to transmissions in base stations (BSs) has been a major contributor to communication-related CO2 emissions. A power optimization model is developed in this study with respect to radio resource allocation and activation in a multiple Component Carrier (CC) environment. We formulate and solve the power-minimization problem of the BS transceivers for multiple-CC networks with carrier aggregation, while maintaining the overall system and respective users' utilities above minimum levels. The optimized power consumption based on this model can be viewed as a lower bound of that of other algorithms employed in practice. A suboptimal scheme with low computation complexity is proposed. Numerical results show that the power consumption of our scheme is much better than that of the conventional one in which all CCs are always active, if both schemes maintain the same required utilities.

  3. Distributed multi-agent scheme for reactive power management with renewable energy

    International Nuclear Information System (INIS)

    Rahman, M.S.; Mahmud, M.A.; Pota, H.R.; Hossain, M.J.

    2014-01-01

    Highlights: • A distributed multi-agent scheme is proposed to enhance the dynamic voltage stability. • A control agent is designed where control actions are performed through PI controller. • Proposed scheme is compared with the conventional approach with DSTATCOM. • Proposed scheme adapts the capability of estimation and control under various operating conditions. - Abstract: This paper presents a new distributed multi-agent scheme for reactive power management in smart coordinated distribution networks with renewable energy sources (RESs) to enhance the dynamic voltage stability, which is mainly based on controlling distributed static synchronous compensators (DSTATCOMs). The proposed control scheme is incorporated in a multi-agent framework where the intelligent agents simultaneously coordinate with each other and represent various physical models to provide information and energy flow among different physical processes. The reactive power is estimated from the topology of distribution networks and with this information, necessary control actions are performed through the proposed proportional integral (PI) controller. The performance of the proposed scheme is evaluated on a 8-bus distribution network under various operating conditions. The performance of the proposed scheme is validated through simulation results and these results are compared to that of conventional PI-based DSTATCOM control scheme. From simulation results, it is found that the distributed MAS provides excellence performance for improving voltage profiles by managing reactive power in a smarter way

  4. Asymptotic preserving and all-regime Lagrange-Projection like numerical schemes: application to two-phase flows in low mach regime

    International Nuclear Information System (INIS)

    Girardin, Mathieu

    2014-01-01

    Two-phase flows in Pressurized Water Reactors belong to a wide range of Mach number flows. Computing accurate approximate solutions of those flows may be challenging from a numerical point of view as classical finite volume methods are too diffusive in the low Mach regime. In this thesis, we are interested in designing and studying some robust numerical schemes that are stable for large time steps and accurate even on coarse meshes for a wide range of flow regimes. An important feature is the strategy to construct those schemes. We use a mixed implicit-explicit strategy based on an operator splitting to solve fast and slow phenomena separately. Then, we introduce a modification of a Suliciu type relaxation scheme to improve the accuracy of the numerical scheme in some regime of interest. Two approaches have been used to assess the ability of our numerical schemes to deal with a wide range of flow regimes. The first approach, based on the asymptotic preserving property, has been used for the gas dynamics equations with stiff source terms. The second approach, based on the all-regime property, has been used for the gas dynamics equations and the homogeneous two-phase flows models HRM and HEM in the low Mach regime. We obtained some robustness and stability properties for our numerical schemes. In particular, some discrete entropy inequalities are shown. Numerical evidences, in 1D and in 2D on unstructured meshes, assess the gain in term of accuracy and CPU time of those asymptotic preserving and all-regime numerical schemes in comparison with classical finite volume methods. (author) [fr

  5. Preserving and sharing tacit knowledge in a nuclear power plant

    International Nuclear Information System (INIS)

    Kuronen, T.; Saeaemaenen, K.; Jaervenpaeae, E.; Rintala, N.

    2007-01-01

    Tacit knowledge of nuclear experts is essential for reliable and competent performance of nuclear power plants. This report discusses preserving and sharing tacit knowledge in nuclear power plant context. Tacit knowledge as well as its structure and content in this complex and safety-critical context are described, and the role of tacit knowledge in expertise is discussed. In order to contribute to tacit knowledge preserving the challenges in and prerequisites for tacit knowledge sharing are identified. In addition, based on empirical case studies and literature, good practices and methods for tacit knowledge sharing are described. The report is based on the results of DIAMOND research project conducted in 2004-2006 in Finnish nuclear power plants, tacit knowledge, nuclear power plant, tacit knowledge sharing methods, expertise. (author abstract)

  6. A Power System Emergency Control Scheme in the Presence of High Wind Power Penetration

    DEFF Research Database (Denmark)

    Hoseinzadeh, Bakhtyar

    developed in this project may also constitute the lower level of a hierarchical control strategy, which can be activated in case of losing the communication with the control center. Modern power protection relays often provide several protection schemes inside of one common package. However, they normally...... from distant units to the incidence place. In this thesis, localization of both load-frequency control an load shedding are fulfilled using locally measured voltage drop data in the decentralized control strategy. The proposed load shedding scheme is coordinated with existing plant protection relays......, which are normally installed on the conventional synchronous machines. Considering the frequency-time characteristic of plant protection relays in the load curtailing plan makes the proposed scheme preventive against successive outage of generation units by them, which worsen the stability of power...

  7. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks

    OpenAIRE

    Shi, Binbin; Wei, Wei; Wang, Yihuai; Shu, Wanneng

    2016-01-01

    In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS) based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical d...

  8. Present and future nuclear power financing schemes

    International Nuclear Information System (INIS)

    Diel, R.

    1977-01-01

    The financial requirement for nuclear power plants in the Federal Republic of Germany for the period up until 1985 was estimated to run up to some DM 100 billion already in the Nuclear Energy Study published by the Dresdner Bank in 1974. This figure is not changed in any way by the reduction the nuclear power program has suffered in the meantime, because the lower requirement for investment capital is more than offset by the price increases that have occurred meanwhile. A capital requirement in the order of DM 100 billion raises major problems for the power producing industry and the banks which, however, are not going to hamper the further expansion of nuclear power, because new financing schemes have been specially developed for the nuclear field. They include financing by leasing, the use of funds from real estate credit institutions for long term financing, borrowing of long term funds in the Euro market, and financing through subsidiaries of the utilities. The new financing schemes also apply to the large financial requirement associated with the nuclear fuel cycle, waste management in particular. In this sector the utilities agree to bear the economic risk of the companies implementing the respective projects. Accordingly, financing will not entail any major difficulties. Another area of great importance is export financing. The German-Brazilian nuclear agreement is a model of this instrument. (orig.) [de

  9. BOT schemes as financial model of hydro power projects

    International Nuclear Information System (INIS)

    Grausam, A.

    1997-01-01

    Build-operate-transfer (BOT) schemes are the latest methods adopted in the developing infrastructure projects. This paper outlines the project financing through BOT schemes and briefly focuses on the factors particularly relevant to hydro power projects. Hydro power development provides not only the best way to produce electricity, it can also solve problems in different fields, such as navigation problems in case of run-of-the river plants, ground water management systems and flood control etc. This makes HPP projects not cheaper, but hydro energy is a clean and renewable energy and the hydro potential worldwide will play a major role to meet the increased demand in future. 5 figs

  10. On the asymptotic preserving property of the unified gas kinetic scheme for the diffusion limit of linear kinetic models

    International Nuclear Information System (INIS)

    Mieussens, Luc

    2013-01-01

    The unified gas kinetic scheme (UGKS) of K. Xu et al. (2010) [37], originally developed for multiscale gas dynamics problems, is applied in this paper to a linear kinetic model of radiative transfer theory. While such problems exhibit purely diffusive behavior in the optically thick (or small Knudsen) regime, we prove that UGKS is still asymptotic preserving (AP) in this regime, but for the free transport regime as well. Moreover, this scheme is modified to include a time implicit discretization of the limit diffusion equation, and to correctly capture the solution in case of boundary layers. Contrary to many AP schemes, this method is based on a standard finite volume approach, it does neither use any decomposition of the solution, nor staggered grids. Several numerical tests demonstrate the properties of the scheme

  11. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  12. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  13. A Low-Power WLAN Communication Scheme for IoT WLAN Devices Using Wake-Up Receivers

    Directory of Open Access Journals (Sweden)

    Hanseul Hong

    2018-01-01

    Full Text Available In this paper, we propose a delay- and power-efficient, multi-user, low-power wireless local area network (WLAN communication scheme for Internet of Things (IoT WLAN devices. Extremely low-power operation is one of the key requirements of emerging IoT devices. However, the current duty-cycle-based power saving approach may incur large access delay times owing to the trade-offs between the power consumption and the access delay. In order to reduce this delay and enhance the power-saving performance, wake-up receiver-based schemes have been proposed. However, because wake-up receiver-based schemes do not consider multiuser operation in dense communication environments, large delays are inevitable in the case of multiuser operation. In order to provide extremely low-power operation and under 1-mW standby power with reduced delay, we employed the optimized multiuser transmission scheduling of IEEE 802.11ax in the proposed scheme and proper enhanced distributed channel access (EDCA parameter settings. This is with the aim to reduce the delay caused by long wake-up times, and to avoid collisions caused by simultaneous transmission in uplink multiuser scenario. By using the proposed scheme, simultaneous IoT communication with multiple mobile IoT devices is possible while providing low-power operation. Simulation results verified the outstanding delay performance of the proposed scheme.

  14. Long-term numerical simulation of the interaction between a neutron field and a neutral meson field by a symplectic-preserving scheme

    International Nuclear Information System (INIS)

    Kong Linghua; Hong Jialin; Liu Ruxun

    2008-01-01

    In this paper, we propose a family of symplectic structure-preserving numerical methods for the coupled Klein-Gordon-Schroedinger (KGS) system. The Hamiltonian formulation is constructed for the KGS. We discretize the Hamiltonian system in space first with a family of canonical difference methods which convert an infinite-dimensional Hamiltonian system into a finite-dimensional one. Next, we discretize the finite-dimensional system in time by a midpoint rule which preserves the symplectic structure of the original system. The conservation laws of the schemes are analyzed in succession, including the charge conservation law and the residual of energy conservation law, etc. We analyze the truncation errors and global errors of the numerical solutions for the schemes to end the theoretical analysis. Extensive numerical tests show the accordance between the theoretical and numerical results

  15. Predicting the benefit of binaural cue preservation in bilateral directional processing schemes for listeners with impaired hearing

    DEFF Research Database (Denmark)

    Brand, Thomas; Hauth, Christopher; Wagener, Kirsten C.

    2018-01-01

    Linked pairs of hearing aids offer various possibilities for directional processing providing adjustable trade-off between improving signal-to-noise ratio and preserving binaural listening. The benefit depends on the processing scheme, the acoustic scenario, and the listener’s ability to exploit...... fine structure. BSIM revealed a benefit due to binaural processing in well-performing listeners when processing provided low-frequency interaural timing cues....

  16. Energy law preserving C0 finite element schemes for phase field models in two-phase flow computations

    International Nuclear Information System (INIS)

    Hua Jinsong; Lin Ping; Liu Chun; Wang Qi

    2011-01-01

    Highlights: → We study phase-field models for multi-phase flow computation. → We develop an energy-law preserving C0 FEM. → We show that the energy-law preserving method work better. → We overcome unphysical oscillation associated with the Cahn-Hilliard model. - Abstract: We use the idea in to develop the energy law preserving method and compute the diffusive interface (phase-field) models of Allen-Cahn and Cahn-Hilliard type, respectively, governing the motion of two-phase incompressible flows. We discretize these two models using a C 0 finite element in space and a modified midpoint scheme in time. To increase the stability in the pressure variable we treat the divergence free condition by a penalty formulation, under which the discrete energy law can still be derived for these diffusive interface models. Through an example we demonstrate that the energy law preserving method is beneficial for computing these multi-phase flow models. We also demonstrate that when applying the energy law preserving method to the model of Cahn-Hilliard type, un-physical interfacial oscillations may occur. We examine the source of such oscillations and a remedy is presented to eliminate the oscillations. A few two-phase incompressible flow examples are computed to show the good performance of our method.

  17. LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

    Directory of Open Access Journals (Sweden)

    Ming Chen

    2016-01-01

    Full Text Available Recent years have witnessed the rapid growth of location-based services (LBSs for mobile social network applications. To enable location-based services, mobile users are required to report their location information to the LBS servers and receive answers of location-based queries. Location privacy leak happens when such servers are compromised, which has been a primary concern for information security. To address this issue, we propose the Location Privacy Preservation Scheme (LPPS based on distributed cache pushing. Unlike existing solutions, LPPS deploys distributed cache proxies to cover users mostly visited locations and proactively push cache content to mobile users, which can reduce the risk of leaking users’ location information. The proposed LPPS includes three major process. First, we propose an algorithm to find the optimal deployment of proxies to cover popular locations. Second, we present cache strategies for location-based queries based on the Markov chain model and propose update and replacement strategies for cache content maintenance. Third, we introduce a privacy protection scheme which is proved to achieve k-anonymity guarantee for location-based services. Extensive experiments illustrate that the proposed LPPS achieves decent service coverage ratio and cache hit ratio with lower communication overhead compared to existing solutions.

  18. Funding schemes in OECD countries for future decommissioning of nuclear power

    International Nuclear Information System (INIS)

    Stevens, G.H.; Yasui, M.

    1993-01-01

    This paper provides a brief overview of the funding schemes for decommissioning implemented in selected OECD countries. The scope of this paper includes only the schemes for future decommissioning costs of private company's nuclear power plants. Countries such as Finland, Spain and Sweden have an official funding scheme, in which the government fixes the amount of money to be put aside, specifies a funding scheme and control the fund. In Belgium and Usa, the government do the same but leaves the management of the fund to the facility owners or external organization. In Canada, France, Germany, Italy, Japan, Netherlands and UK, there is no official funding scheme

  19. The role of power in financial statement fraud schemes

    OpenAIRE

    Albrecht, Chad; Holland, Daniel; Malagueño, Ricardo; Dolan, Simon; Tzafrir, Shay

    2015-01-01

    In this paper, we investigate a large-scale financial statement fraud to better understand the process by which individuals are recruited to participate in financial statement fraud schemes. The case reveals that perpetrators often use power to recruit others to participate in fraudulent acts. To illustrate how power is used, we propose a model, based upon the classical French and Raven taxonomy of power, that explains how one individual influences another individual to participate in financi...

  20. ANALYSIS OF SOLAR POWER STATION SCHEMES ON PHOTOELECTRIC MODULES FOR ELECTRIC CARS CHARGING STATIONS

    Directory of Open Access Journals (Sweden)

    A. Hnatov

    2017-12-01

    Full Text Available The analysis of existing schemes for building solar power stations on photoelectric modules with the revealing of their operation principles and functionality has been conducted. The specified technical characteristics of each of the analyzed schemes are given. The structural scheme of the solar charging station for electric cars with determining its functional capabilities and operation features is proposed. The practical application of this scheme will help to reduce the dependence on the general electric power supply network and will create conditions for its total rejection.

  1. A Novel Power-Saving Transmission Scheme for Multiple-Component-Carrier Cellular Systems

    Directory of Open Access Journals (Sweden)

    Yao-Liang Chung

    2016-04-01

    Full Text Available As mobile data traffic levels have increased exponentially, resulting in rising energy costs in recent years, the demand for and development of green communication technologies has resulted in various energy-saving designs for cellular systems. At the same time, recent technological advances have allowed multiple component carriers (CCs to be simultaneously utilized in a base station (BS, a development that has made the energy consumption of BSs a matter of increasing concern. To help address this concern, herein we propose a novel scheme aimed at efficiently minimizing the power consumption of BS transceivers during transmission, while still ensuring good service quality and fairness for users. Specifically, the scheme utilizes the dynamic activation/deactivation of CCs during data transmission to increase power usage efficiency. To test its effectiveness, the proposed scheme was applied to a model consisting of a BS with orthogonal frequency division multiple access-based CCs in a downlink transmission environment. The results indicated that, given periods of relatively light traffic loads, the total power consumption of the proposed scheme is significantly lower than that of schemes in which all the CCs of a BS are constantly activated, suggesting the scheme’s potential for reducing both energy costs and carbon dioxide emissions.

  2. Coordinated Voltage Control Scheme for VSC-HVDC Connected Wind Power Plants

    DEFF Research Database (Denmark)

    Guo, Yifei; Gao, Houlei; Wu, Qiuwei

    2017-01-01

    This paper proposes a coordinated voltage control scheme based on model predictive control (MPC) for voltage source converter‐based high voltage direct current (VSC‐HVDC) connected wind power plants (WPPs). In the proposed scheme, voltage regulation capabilities of VSC and WTGs are fully utilized...... and optimally coordinated. Two control modes, namely operation optimization mode and corrective mode, are designed to coordinate voltage control and economic operation of the system. In the first mode, the control objective includes the bus voltages, power losses and dynamic Var reserves of wind turbine...

  3. Economic Droop Scheme for Decentralized Power Management in DC Microgrids

    Directory of Open Access Journals (Sweden)

    E. Alizadeh

    2016-12-01

    Full Text Available This paper proposes an autonomous and economic droop control scheme for DC microgrid application. In this method, a cost-effective power sharing technique among various types of DG units is properly adopted. The droop settings are determined based on an algorithm to individually manage the power management without any complicated optimization methods commonly applied in the centralized control method. In the proposed scheme, the system retains all the advantages of the traditional droop method while minimizes the generation costs of the DC microgrid. In the proposed method, all DGs are classified in a sorting rule based on their total generation cost and the reference voltage of their droop equations is then determined. The proposed scheme is applied to a typical DC microgrid consisting of four different types of DGs and a controllable load. The simulation results are presented to verify the effectiveness of the proposed method using MATLAB/SIMULINK software.

  4. Comparison and Analysis of the Control Power Between Two Different Perfect Controlled Teleportation Schemes Using Four-particle Cluster State

    Science.gov (United States)

    Jiang, Yu-ting; Mo, Zhi-wen

    2017-10-01

    Control power is used to discuss about the controller's measurable authority. It's a new index to describe the controlled teleportation schemes from the point of view of the controller. In this paper, we introduce two perfect controlled teleportation schemes and calculate the control power under different control particles. In scheme 1, the controller just controls one particle, which is particle 2. And in scheme 2, the controller controls the particles 2 and 3. They both use the cluster state |ψ > _{1234}={1/2}(|0000> +|0011> +|1100> -|1111> )_{1234} as communication channel. By calculating the control power between two schemes, the control power of scheme 1 is 1/3, which is the minimal value of control power. On the contrary, the control power of scheme 2 is maximal, 1/2. Scheme 2 which controls two particles successfully promotes the control power comparing with scheme 1. It's evidently that controlling particle 2 is a necessary condition. And controlling particle 3 can gain the control power but the controller cannot control it solely.

  5. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security

  6. Superconducting synchrotron power supply and quench protection scheme

    International Nuclear Information System (INIS)

    Stiening, R.; Flora, R.; Lauckner, R.; Tool, G.

    1978-01-01

    The power supply and quench protection scheme for the proposed Fermilab 6 km circumference superconducting synchrotron is described. Specifically, the following points are discussed: (1) the 46 MW thyristor power supply; (2) the 3 x 10 8 J emergency energy dump; (3) the distributed microprocessing system for the detection of quenches; (4) the thyristor network for shunting current around quenched magnets; and (5) the heaters internal to the magnets which cause rapid propagation of quenches. Test results on prototype systems are given

  7. Communication and Powering Scheme for Wireless and Battery-Less Measurement

    Directory of Open Access Journals (Sweden)

    A. Boura

    2012-04-01

    Full Text Available The paper presents solution for wireless and battery-less measurement in the enclosed areas. The principle is based on passive RFID, nevertheless this paper is focused on high power-demanding applications such as MEMS accelerometers, gas sensors, piezoresistive strain gauges, etc. Standard FRID communication scheme (sensing the input current change on the primary side cannot be used in this case, because the communication channel is overloaded by the high power load. Paper presents possible solution which is based on the dual frequency scheme – one frequency for powering and other for the communication. This is ensuring capability for measurement up to several centimeters on the frequency bands 125 kHz and 375 kHz. It can be suitable for continual measurement in isolated systems such as the rotating objects, concrete walls, enclosed plastic barrels, high temperature chambers etc.

  8. A maximum power point tracking scheme for a 1kw stand-alone ...

    African Journals Online (AJOL)

    A maximum power point tracking scheme for a 1kw stand-alone solar energy based power supply. ... Nigerian Journal of Technology ... A method for efficiently maximizing the output power of a solar panel supplying a load or battery bus under ...

  9. Investigation of dispersion-relation-preserving scheme and spectral analysis methods for acoustic waves

    Science.gov (United States)

    Vanel, Florence O.; Baysal, Oktay

    1995-01-01

    Important characteristics of the aeroacoustic wave propagation are mostly encoded in their dispersion relations. Hence, a computational aeroacoustic (CAA) algorithm, which reasonably preserves these relations, was investigated. It was derived using an optimization procedure to ensure, that the numerical derivatives preserved the wave number and angular frequency of the differential terms in the linearized, 2-D Euler equations. Then, simulations were performed to validate the scheme and a compatible set of discretized boundary conditions. The computational results were found to agree favorably with the exact solutions. The boundary conditions were transparent to the outgoing waves, except when the disturbance source was close to a boundary. The time-domain data generated by such CAA solutions were often intractable until their spectra was analyzed. Therefore, the relative merits of three different methods were included in the study. For simple, periodic waves, the periodogram method produced better estimates of the steep-sloped spectra than the Blackman-Tukey method. Also, for this problem, the Hanning window was more effective when used with the weighted-overlapped-segment-averaging and Blackman-Tukey methods gave better results than the periodogram method. Finally, it was demonstrated that the representation of time domain-data was significantly dependent on the particular spectral analysis method employed.

  10. Privacy preserving cloud computation using Domingo-Ferrer scheme

    Directory of Open Access Journals (Sweden)

    Abdulatif Alabdulatif

    2016-01-01

    Full Text Available Homomorphic encryption system (HES schemes are anticipated to play a significant role in cloud-based applications. Moving to cloud-based storage and analytic services securely are two of the most important advantages of HES. Several HES schemes have been recently proposed. However, the majority of them either have limited capabilities or are impractical in real-world applications. Various HES schemes provide the ability to perform computations for statistical analysis (e.g. average, mean and variance on encrypted data. Domingo-Ferrer is one scheme that has privacy homomorphism properties to perform the basic mathematical operations (addition, subtraction and multiplication in a convenient and secure way. However, it works only in the positive numbers’ range which is considered as a limitation because several applications require both positive and negative ranges in which to work, especially those that have to implement analytical services in cloud computing. In this paper, we extend Domingo-Ferrer’s scheme to be able to perform arithmetic operations for both positive and negative numbers. We also propose using a lightweight data aggregation function to compute both maximum and minimum values of the aggregated data that works for both positive and negative numbers.

  11. An efficient transmission power control scheme for temperature variation in wireless sensor networks.

    Science.gov (United States)

    Lee, Jungwook; Chung, Kwangsue

    2011-01-01

    Wireless sensor networks collect data from several nodes dispersed at remote sites. Sensor nodes can be installed in harsh environments such as deserts, cities, and indoors, where the link quality changes considerably over time. Particularly, changes in transmission power may be caused by temperature, humidity, and other factors. In order to compensate for link quality changes, existing schemes detect the link quality changes between nodes and control transmission power through a series of feedback processes, but these approaches can cause heavy overhead with the additional control packets needed. In this paper, the change of the link quality according to temperature is examined through empirical experimentation. A new power control scheme combining both temperature-aware link quality compensation and a closed-loop feedback process to adapt to link quality changes is proposed. We prove that the proposed scheme effectively adapts the transmission power to the changing link quality with less control overhead and energy consumption.

  12. An Efficient Transmission Power Control Scheme for Temperature Variation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jungwook Lee

    2011-03-01

    Full Text Available Wireless sensor networks collect data from several nodes dispersed at remote sites. Sensor nodes can be installed in harsh environments such as deserts, cities, and indoors, where the link quality changes considerably over time. Particularly, changes in transmission power may be caused by temperature, humidity, and other factors. In order to compensate for link quality changes, existing schemes detect the link quality changes between nodes and control transmission power through a series of feedback processes, but these approaches can cause heavy overhead with the additional control packets needed. In this paper, the change of the link quality according to temperature is examined through empirical experimentation. A new power control scheme combining both temperature-aware link quality compensation and a closed-loop feedback process to adapt to link quality changes is proposed. We prove that the proposed scheme effectively adapts the transmission power to the changing link quality with less control overhead and energy consumption.

  13. Performance evaluation of time-delay control schemes for uninterruptible power supplies

    DEFF Research Database (Denmark)

    Loh, P.C; Tang, Y.; Blaabjerg, Frede

    2008-01-01

    a more powerful processor. Avoiding these added complexities, this paper presents and compares a number of time-delay control schemes for UPS control, where the main building blocks needed are readily available memory storages and simple transfer functions formulated with either no or at least one......-matching characteristic, the presented control schemes are expected to be more robust and less sensitive to implementation noises. In addition, the presented control schemes are deduced to have fast dynamic response, implying that the supplypsilas output voltage is virtually not influenced by any transient load...

  14. Wavelet-based Encoding Scheme for Controlling Size of Compressed ECG Segments in Telecardiology Systems.

    Science.gov (United States)

    Al-Busaidi, Asiya M; Khriji, Lazhar; Touati, Farid; Rasid, Mohd Fadlee; Mnaouer, Adel Ben

    2017-09-12

    One of the major issues in time-critical medical applications using wireless technology is the size of the payload packet, which is generally designed to be very small to improve the transmission process. Using small packets to transmit continuous ECG data is still costly. Thus, data compression is commonly used to reduce the huge amount of ECG data transmitted through telecardiology devices. In this paper, a new ECG compression scheme is introduced to ensure that the compressed ECG segments fit into the available limited payload packets, while maintaining a fixed CR to preserve the diagnostic information. The scheme automatically divides the ECG block into segments, while maintaining other compression parameters fixed. This scheme adopts discrete wavelet transform (DWT) method to decompose the ECG data, bit-field preserving (BFP) method to preserve the quality of the DWT coefficients, and a modified running-length encoding (RLE) scheme to encode the coefficients. The proposed dynamic compression scheme showed promising results with a percentage packet reduction (PR) of about 85.39% at low percentage root-mean square difference (PRD) values, less than 1%. ECG records from MIT-BIH Arrhythmia Database were used to test the proposed method. The simulation results showed promising performance that satisfies the needs of portable telecardiology systems, like the limited payload size and low power consumption.

  15. Optimal placement of combined heat and power scheme (cogeneration): application to an ethylbenzene plant

    International Nuclear Information System (INIS)

    Zainuddin Abd Manan; Lim Fang Yee

    2001-01-01

    Combined heat and power (CHP) scheme, also known as cogeneration is widely accepted as a highly efficient energy saving measure, particularly in medium to large scale chemical process plants. To date, CHP application is well established in the developed countries. The advantage of a CHP scheme for a chemical plant is two-fold: (i) drastically cut down on the electricity bill from on-site power generation (ii) to save the fuel bills through recovery of the quality waste heat from power generation for process heating. In order to be effective, a CHP scheme must be placed at the right temperature level in the context of the overall process. Failure to do so might render a CHP venture worthless. This paper discusses the procedure for an effective implementation of a CHP scheme. An ethylbenzene process is used as a case study. A key visualization tool known as the grand composite curves is used to provide an overall picture of the process heat source and heat sink profiles. The grand composite curve, which is generated based on the first principles of Pinch Analysis enables the CHP scheme to be optimally placed within the overall process scenario. (Author)

  16. Multidimensional flux-limited advection schemes

    International Nuclear Information System (INIS)

    Thuburn, J.

    1996-01-01

    A general method for building multidimensional shape preserving advection schemes using flux limiters is presented. The method works for advected passive scalars in either compressible or incompressible flow and on arbitrary grids. With a minor modification it can be applied to the equation for fluid density. Schemes using the simplest form of the flux limiter can cause distortion of the advected profile, particularly sideways spreading, depending on the orientation of the flow relative to the grid. This is partly because the simple limiter is too restrictive. However, some straightforward refinements lead to a shape-preserving scheme that gives satisfactory results, with negligible grid-flow angle-dependent distortion

  17. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong

    2015-11-01

    The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.

  18. Efficient coding schemes with power allocation using space-time-frequency spreading

    Institute of Scientific and Technical Information of China (English)

    Jiang Haining; Luo Hanwen; Tian Jifeng; Song Wentao; Liu Xingzhao

    2006-01-01

    An efficient space-time-frequency (STF) coding strategy for multi-input multi-output orthogonal frequency division multiplexing (MIMO-OFDM) systems is presented for high bit rate data transmission over frequency selective fading channels. The proposed scheme is a new approach to space-time-frequency coded OFDM (COFDM) that combines OFDM with space-time coding, linear precoding and adaptive power allocation to provide higher quality of transmission in terms of the bit error rate performance and power efficiency. In addition to exploiting the maximum diversity gain in frequency, time and space, the proposed scheme enjoys high coding advantages and low-complexity decoding. The significant performance improvement of our design is confirmed by corroborating numerical simulations.

  19. Gait-Cycle-Driven Transmission Power Control Scheme for a Wireless Body Area Network.

    Science.gov (United States)

    Zang, Weilin; Li, Ye

    2018-05-01

    In a wireless body area network (WBAN), walking movements can result in rapid channel fluctuations, which severely degrade the performance of transmission power control (TPC) schemes. On the other hand, these channel fluctuations are often periodic and are time-synchronized with the user's gait cycle, since they are all driven from the walking movements. In this paper, we propose a novel gait-cycle-driven transmission power control (G-TPC) for a WBAN. The proposed G-TPC scheme reinforces the existing TPC scheme by exploiting the periodic channel fluctuation in the walking scenario. In the proposed scheme, the user's gait cycle information acquired by an accelerometer is used as beacons for arranging the transmissions at the time points with the ideal channel state. The specific transmission power is then determined by using received signal strength indication (RSSI). An experiment was conducted to evaluate the energy efficiency and reliability of the proposed G-TPC based on a CC2420 platform. The results reveal that compared to the original RSSI/link-quality-indication-based TPC, G-TPC reduces energy consumption by 25% on the sensor node and reduce the packet loss rate by 65%.

  20. Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes

    OpenAIRE

    Ferrag, Mohamed Amine; Maglaras, Leandros; Argyriou, Antonios; Kosmanos, Dimitrios; Janicke, Helge

    2017-01-01

    This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks against privacy, attacks against integrity, attacks against availability, and attacks against authenticat...

  1. Power adaptation for joint switched diversity and adaptive modulation schemes in spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2012-09-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper an adaptive scheme using transmit power adaptation, switched transmit diversity, and adaptive modulation in order to improve the performance of existing switching efficient schemes (SES) and bandwidth efficient schemes (BES). Taking advantage of the channel reciprocity principle, we assume that the channel state information (CSI) of the interference link is available to the secondary transmitter. This information is then used by the secondary transmitter to adapt its transmit power, modulation constellation size, and used transmit branch. The goal of this joint adaptation is to minimize the average number of switched branches and the average system delay given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver. We analyze the proposed scheme in terms of the average number of branch switching, average delay, and we provide a closed-form expression of the average bit error rate (BER). We demonstrate through numerical examples that the proposed scheme provides a compromise between the SES and the BES schemes. © 2012 IEEE.

  2. Power adaptation for joint switched diversity and adaptive modulation schemes in spectrum sharing systems

    KAUST Repository

    Bouida, Zied; Tourki, Kamel; Ghrayeb, Ali A.; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2012-01-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper an adaptive scheme using transmit power adaptation, switched transmit diversity, and adaptive modulation in order to improve the performance of existing switching efficient schemes (SES) and bandwidth efficient schemes (BES). Taking advantage of the channel reciprocity principle, we assume that the channel state information (CSI) of the interference link is available to the secondary transmitter. This information is then used by the secondary transmitter to adapt its transmit power, modulation constellation size, and used transmit branch. The goal of this joint adaptation is to minimize the average number of switched branches and the average system delay given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver. We analyze the proposed scheme in terms of the average number of branch switching, average delay, and we provide a closed-form expression of the average bit error rate (BER). We demonstrate through numerical examples that the proposed scheme provides a compromise between the SES and the BES schemes. © 2012 IEEE.

  3. A rational function based scheme for solving advection equation

    International Nuclear Information System (INIS)

    Xiao, Feng; Yabe, Takashi.

    1995-07-01

    A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author)

  4. An Adaptive Estimation Scheme for Open-Circuit Voltage of Power Lithium-Ion Battery

    Directory of Open Access Journals (Sweden)

    Yun Zhang

    2013-01-01

    Full Text Available Open-circuit voltage (OCV is one of the most important parameters in determining state of charge (SoC of power battery. The direct measurement of it is costly and time consuming. This paper describes an adaptive scheme that can be used to derive OCV of the power battery. The scheme only uses the measurable input (terminal current and the measurable output (terminal voltage signals of the battery system and is simple enough to enable online implement. Firstly an equivalent circuit model is employed to describe the polarization characteristic and the dynamic behavior of the lithium-ion battery; the state-space representation of the electrical performance for the battery is obtained based on the equivalent circuit model. Then the implementation procedure of the adaptive scheme is given; also the asymptotic convergence of the observer error and the boundedness of all the parameter estimates are proven. Finally, experiments are carried out, and the effectiveness of the adaptive estimation scheme is validated by the experimental results.

  5. Coupled map lattice (CML) approach to power reactor dynamics (I) - preservation of normality

    International Nuclear Information System (INIS)

    Konno, H.

    1996-01-01

    An application of coupled map lattice (CML) model for simulating power fluctuations in nuclear power reactors is presented. (1) Preservation of Gaussianity in the point model is studied in a chaotic force driven Langevin equation in conjunction with the Gaussian-white noise driven Langevin equation. (2) Preservation of Guassianity is also studied in the space-dependent model with the use of a CML model near the onset of the Hopf bifurcation point. It is shown that the spatial dimensionality decreases as the maximum eigenvalue of the system increases. The result is consistent with the observation of neutron fluctuation in a BWR. (author)

  6. Computational electrodynamics in material media with constraint-preservation, multidimensional Riemann solvers and sub-cell resolution - Part II, higher order FVTD schemes

    Science.gov (United States)

    Balsara, Dinshaw S.; Garain, Sudip; Taflove, Allen; Montecinos, Gino

    2018-02-01

    The Finite Difference Time Domain (FDTD) scheme has served the computational electrodynamics community very well and part of its success stems from its ability to satisfy the constraints in Maxwell's equations. Even so, in the previous paper of this series we were able to present a second order accurate Godunov scheme for computational electrodynamics (CED) which satisfied all the same constraints and simultaneously retained all the traditional advantages of Godunov schemes. In this paper we extend the Finite Volume Time Domain (FVTD) schemes for CED in material media to better than second order of accuracy. From the FDTD method, we retain a somewhat modified staggering strategy of primal variables which enables a very beneficial constraint-preservation for the electric displacement and magnetic induction vector fields. This is accomplished with constraint-preserving reconstruction methods which are extended in this paper to third and fourth orders of accuracy. The idea of one-dimensional upwinding from Godunov schemes has to be significantly modified to use the multidimensionally upwinded Riemann solvers developed by the first author. In this paper, we show how they can be used within the context of a higher order scheme for CED. We also report on advances in timestepping. We show how Runge-Kutta IMEX schemes can be adapted to CED even in the presence of stiff source terms brought on by large conductivities as well as strong spatial variations in permittivity and permeability. We also formulate very efficient ADER timestepping strategies to endow our method with sub-cell resolving capabilities. As a result, our method can be stiffly-stable and resolve significant sub-cell variation in the material properties within a zone. Moreover, we present ADER schemes that are applicable to all hyperbolic PDEs with stiff source terms and at all orders of accuracy. Our new ADER formulation offers a treatment of stiff source terms that is much more efficient than previous ADER

  7. Power adaptive multi-filter carrierless amplitude and phase access scheme for visible light communication network

    Science.gov (United States)

    Li, Wei; Huang, Zhitong; Li, Haoyue; Ji, Yuefeng

    2018-04-01

    Visible light communication (VLC) is a promising candidate for short-range broadband access due to its integration of advantages for both optical communication and wireless communication, whereas multi-user access is a key problem because of the intra-cell and inter-cell interferences. In addition, the non-flat channel effect results in higher losses for users in high frequency bands, which leads to unfair qualities. To solve those issues, we propose a power adaptive multi-filter carrierless amplitude and phase access (PA-MF-CAPA) scheme, and in the first step of this scheme, the MF-CAPA scheme utilizing multiple filters as different CAP dimensions is used to realize multi-user access. The character of orthogonality among the filters in different dimensions can mitigate the effect of intra-cell and inter-cell interferences. Moreover, the MF-CAPA scheme provides different channels modulated on the same frequency bands, which further increases the transmission rate. Then, the power adaptive procedure based on MF-CAPA scheme is presented to realize quality fairness. As demonstrated in our experiments, the MF-CAPA scheme yields an improved throughput compared with multi-band CAP access scheme, and the PA-MF-CAPA scheme enhances the quality fairness and further improves the throughput compared with the MF-CAPA scheme.

  8. A Robust DC-Split-Capacitor Power Decoupling Scheme for Single-Phase Converter

    DEFF Research Database (Denmark)

    Yao, Wenli; Loh, Poh Chiang; Tang, Yi

    2017-01-01

    Instead of bulky electrolytic capacitors, active power decoupling circuit can be introduced to a single-phase converter for diverting second harmonic ripple away from its dc source or load. One possible circuit consists of a half-bridge and two capacitors in series for forming a dc-split capacitor......, instead of the usual single dc-link capacitor bank. Methods for regulating this power decoupler have earlier been developed, but almost always with equal capacitances assumed for forming the dc-split capacitor, even though it is not realistic in practice. The assumption should, hence, be evaluated more...... thoroughly, especially when it is shown in the paper that even a slight mismatch can render the power decoupling scheme ineffective and the IEEE 1547 standard to be breached. A more robust compensation scheme is, thus, needed for the dc-split capacitor circuit, as proposed and tested experimentally...

  9. Analysis and experimental verification of a control scheme for unified power quality conditioner

    Energy Technology Data Exchange (ETDEWEB)

    Peng Cheng Zhu; Xun Li; Yong Kang; Jian Chen [Huazhong Univ. of Science and Techmnology, Wuhan (China). Dept. of Electrical Engineering

    2005-07-01

    Improving power quality for sensitive load by a Unified Power Quality Conditioner (UPQC) in a distributed generation system is presented in this paper. The power balance of a UPQC, consisting of back-to-back connected series and shunt Active Filters (AF), is analysed. Based on the analysis a novel control scheme is established in a 2-phase Synchronous Rotating d-q Frame (SRF). In this control scheme, the series AF is controlled as a current source and makes the input current sinusoidal, while the shunt AF is controlled as a voltage source and keeps the load voltage in the normal value. With the proposed control strategy, the UPQC is capable of compensating not only harmonic and reactive currents of the load but also grid voltage distortion. There is no harmonic interference between harmonic-producing loads and harmonic-sensitive loads, which are connected on the common bus. The performance of a UPQC with the proposed control scheme under nonlinear load and grid voltage distortion is investigated with simulation as well as experimental works. (Author)

  10. Birkhoffian Symplectic Scheme for a Quantum System

    International Nuclear Information System (INIS)

    Su Hongling

    2010-01-01

    In this paper, a classical system of ordinary differential equations is built to describe a kind of n-dimensional quantum systems. The absorption spectrum and the density of the states for the system are defined from the points of quantum view and classical view. From the Birkhoffian form of the equations, a Birkhoffian symplectic scheme is derived for solving n-dimensional equations by using the generating function method. Besides the Birkhoffian structure-preserving, the new scheme is proven to preserve the discrete local energy conservation law of the system with zero vector f. Some numerical experiments for a 3-dimensional example show that the new scheme can simulate the general Birkhoffian system better than the implicit midpoint scheme, which is well known to be symplectic scheme for Hamiltonian system. (general)

  11. Control scheme for power modulation of a free piston Stirling engine

    Science.gov (United States)

    Dhar, Manmohan

    1989-01-01

    The present invention relates to a control scheme for power modulation of a free-piston Stirling engine-linear alternator power generator system. The present invention includes connecting an autotransformer in series with a tuning capacitance between a linear alternator and a utility grid to maintain a constant displacement to piston stroke ratio and their relative phase angle over a wide range of operating conditions.

  12. Self-powered suspension criterion and energy regeneration implementation scheme of motor-driven active suspension

    Science.gov (United States)

    Yan, Shuai; Sun, Weichao

    2017-09-01

    Active suspension systems have advantages on mitigating the effects of vehicle vibration caused by road roughness, which are one of the most important component parts in influencing the performances of vehicles. However, high amount of energy consumption restricts the application of active suspension systems. From the point of energy saving, this paper presents a self-powered criterion of the active suspension system to judge whether a motor-driven suspension can be self-powered or not, and then a motor parameter condition is developed as a reference to design a self-powered suspension. An energy regeneration implementation scheme is subsequently proposed to make the active suspension which has the potential to be self-powered achieve energy-saving target in the real application. In this implementation scheme, operating electric circuits are designed based on different working status of the actuator and power source and it is realizable to accumulate energy from road vibration and supply energy to the actuator by switching corresponding electric circuits. To apply the self-powered suspension criterion and energy regeneration implementation scheme, an active suspension system is designed with a constrained H∞ controller and calculation results indicate that it has the capability to be self-powered. Simulation results show that the performances of the self-powered active suspension are nearly the same as those of the active suspension with an external energy source and can achieve energy regeneration at the same time.

  13. Time-dependent density functional theory for open systems with a positivity-preserving decomposition scheme for environment spectral functions

    International Nuclear Information System (INIS)

    Wang, RuLin; Zheng, Xiao; Kwok, YanHo; Xie, Hang; Chen, GuanHua; Yam, ChiYung

    2015-01-01

    Understanding electronic dynamics on material surfaces is fundamentally important for applications including nanoelectronics, inhomogeneous catalysis, and photovoltaics. Practical approaches based on time-dependent density functional theory for open systems have been developed to characterize the dissipative dynamics of electrons in bulk materials. The accuracy and reliability of such approaches depend critically on how the electronic structure and memory effects of surrounding material environment are accounted for. In this work, we develop a novel squared-Lorentzian decomposition scheme, which preserves the positive semi-definiteness of the environment spectral matrix. The resulting electronic dynamics is guaranteed to be both accurate and convergent even in the long-time limit. The long-time stability of electronic dynamics simulation is thus greatly improved within the current decomposition scheme. The validity and usefulness of our new approach are exemplified via two prototypical model systems: quasi-one-dimensional atomic chains and two-dimensional bilayer graphene

  14. Time-dependent density functional theory for open systems with a positivity-preserving decomposition scheme for environment spectral functions.

    Science.gov (United States)

    Wang, RuLin; Zheng, Xiao; Kwok, YanHo; Xie, Hang; Chen, GuanHua; Yam, ChiYung

    2015-04-14

    Understanding electronic dynamics on material surfaces is fundamentally important for applications including nanoelectronics, inhomogeneous catalysis, and photovoltaics. Practical approaches based on time-dependent density functional theory for open systems have been developed to characterize the dissipative dynamics of electrons in bulk materials. The accuracy and reliability of such approaches depend critically on how the electronic structure and memory effects of surrounding material environment are accounted for. In this work, we develop a novel squared-Lorentzian decomposition scheme, which preserves the positive semi-definiteness of the environment spectral matrix. The resulting electronic dynamics is guaranteed to be both accurate and convergent even in the long-time limit. The long-time stability of electronic dynamics simulation is thus greatly improved within the current decomposition scheme. The validity and usefulness of our new approach are exemplified via two prototypical model systems: quasi-one-dimensional atomic chains and two-dimensional bilayer graphene.

  15. Possible schemes for solar-powered air-conditioning in 2-storey terrace houses

    International Nuclear Information System (INIS)

    Chu, C.M.; Bono, A.; Prabhakar, A.

    2006-01-01

    Space cooling is required all year round in the tropics, and probably accounts for a considerable proportion of the cost of electricity. Solar radiation can be channeled into cooling by photovoltaic powered systems and through the relatively new adsorption cycle technology. Two-storey terrace housing appear to have the greatest potential of introducing solar-powered cooling to residential homes. There are two schemes to cool a two-storey terrace housing: 1) By spraying water down the roof a tank, circulated by a pump powered by PV panels on the roof or 2) By replacing the roof with solar hot water collectors and use adsorption cooling chillers to produce air-conditioning for the entire block of terrace houses. In scheme number 1, a preliminary, rough technical evaluation showed that it is possible to pump water to the roof to flow down as a thin film and cool the roof by evaporation to about 40 degree C from about 70 degree C if without water evaporation at the highest insolation rate of the day. Scheme number 2, which uses adsorption chilling technology, requires communal sharing of the air-conditioning facility. The effect of collecting solar heat using the roof is two fold: to absorb solar energy for producing hot water and reducing excess heat input to the house. Preliminary costing demonstrates that solar-powered air-conditioning is within reach of commercialisation, bearing in mind that bulk purchases will dramatically lower the price of a product

  16. Power-Smoothing Scheme of a DFIG Using the Adaptive Gain Depending on the Rotor Speed and Frequency Deviation

    DEFF Research Database (Denmark)

    Lee, Hyewon; Hwang, Min; Muljadi, Eduard

    2017-01-01

    In an electric power grid that has a high penetration level of wind, the power fluctuation of a large-scale wind power plant (WPP) caused by varying wind speeds deteriorates the system frequency regulation. This paper proposes a power-smoothing scheme of a doubly-fed induction generator (DFIG...... demonstrate that the proposed scheme significantly lessens the output power fluctuation of a WPP under various scenarios by modifying the gain with the rotor speed and frequency deviation, and thereby it can regulate the frequency deviation within a narrow range.......) that significantly mitigates the system frequency fluctuation while preventing over-deceleration of the rotor speed. The proposed scheme employs an additional control loop relying on the system frequency deviation that operates in combination with the maximum power point tracking control loop. To improve the power...

  17. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    Science.gov (United States)

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  18. Active and reactive power control schemes for distributed generation systems under voltage dips

    NARCIS (Netherlands)

    Wang, F.; Duarte, J.L.; Hendrix, M.A.M.

    2009-01-01

    During voltage dips continuous power delivery from distributed generation systems to the grid is desirable for the purpose of grid support. In order to facilitate the control of distributed generation systems adapted to the expected change of grid requirements, generalized power control schemes

  19. Toward privacy-preserving JPEG image retrieval

    Science.gov (United States)

    Cheng, Hang; Wang, Jingyue; Wang, Meiqing; Zhong, Shangping

    2017-07-01

    This paper proposes a privacy-preserving retrieval scheme for JPEG images based on local variance. Three parties are involved in the scheme: the content owner, the server, and the authorized user. The content owner encrypts JPEG images for privacy protection by jointly using permutation cipher and stream cipher, and then, the encrypted versions are uploaded to the server. With an encrypted query image provided by an authorized user, the server may extract blockwise local variances in different directions without knowing the plaintext content. After that, it can calculate the similarity between the encrypted query image and each encrypted database image by a local variance-based feature comparison mechanism. The authorized user with the encryption key can decrypt the returned encrypted images with plaintext content similar to the query image. The experimental results show that the proposed scheme not only provides effective privacy-preserving retrieval service but also ensures both format compliance and file size preservation for encrypted JPEG images.

  20. An asymptotic preserving unified gas kinetic scheme for frequency-dependent radiative transfer equations

    Energy Technology Data Exchange (ETDEWEB)

    Sun, Wenjun, E-mail: sun_wenjun@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, P.O. Box 8009, Beijing 100088 (China); Jiang, Song, E-mail: jiang@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, P.O. Box 8009, Beijing 100088 (China); Xu, Kun, E-mail: makxu@ust.hk [Department of Mathematics and Department of Mechanical and Aerospace Engineering, Hong Kong University of Science and Technology, Hong Kong (China); Li, Shu, E-mail: li_shu@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, P.O. Box 8009, Beijing 100088 (China)

    2015-12-01

    This paper presents an extension of previous work (Sun et al., 2015 [22]) of the unified gas kinetic scheme (UGKS) for the gray radiative transfer equations to the frequency-dependent (multi-group) radiative transfer system. Different from the gray radiative transfer equations, where the optical opacity is only a function of local material temperature, the simulation of frequency-dependent radiative transfer is associated with additional difficulties from the frequency-dependent opacity. For the multiple frequency radiation, the opacity depends on both the spatial location and the frequency. For example, the opacity is typically a decreasing function of frequency. At the same spatial region the transport physics can be optically thick for the low frequency photons, and optically thin for high frequency ones. Therefore, the optical thickness is not a simple function of space location. In this paper, the UGKS for frequency-dependent radiative system is developed. The UGKS is a finite volume method and the transport physics is modeled according to the ratio of the cell size to the photon's frequency-dependent mean free path. When the cell size is much larger than the photon's mean free path, a diffusion solution for such a frequency radiation will be obtained. On the other hand, when the cell size is much smaller than the photon's mean free path, a free transport mechanism will be recovered. In the regime between the above two limits, with the variation of the ratio between the local cell size and photon's mean free path, the UGKS provides a smooth transition in the physical and frequency space to capture the corresponding transport physics accurately. The seemingly straightforward extension of the UGKS from the gray to multiple frequency radiation system is due to its intrinsic consistent multiple scale transport modeling, but it still involves lots of work to properly discretize the multiple groups in order to design an asymptotic preserving (AP

  1. Sliding Mode Extremum Seeking Control Scheme Based on PSO for Maximum Power Point Tracking in Photovoltaic Systems

    Directory of Open Access Journals (Sweden)

    Her-Terng Yau

    2013-01-01

    Full Text Available An extremum seeking control (ESC scheme is proposed for maximum power point tracking (MPPT in photovoltaic power generation systems. The robustness of the proposed scheme toward irradiance changes is enhanced by implementing the ESC scheme using a sliding mode control (SMC law. In the proposed approach, the chattering phenomenon caused by high frequency switching is suppressed by means of a sliding layer concept. Moreover, in implementing the proposed controller, the optimal value of the gain constant is determined using a particle swarm optimization (PSO algorithm. The experimental and simulation results show that the proposed PSO-based sliding mode ESC (SMESC control scheme yields a better transient response, steady-state stability, and robustness than traditional MPPT schemes based on gradient detection methods.

  2. Security analysis and improvements of arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  3. Power Saving Scheduling Scheme for Internet of Things over LTE/LTE-Advanced Networks

    Directory of Open Access Journals (Sweden)

    Yen-Wei Kuo

    2015-01-01

    Full Text Available The devices of Internet of Things (IoT will grow rapidly in the near future, and the power consumption and radio spectrum management will become the most critical issues in the IoT networks. Long Term Evolution (LTE technology will become a promising technology used in IoT networks due to its flat architecture, all-IP network, and greater spectrum efficiency. The 3rd Generation Partnership Project (3GPP specified the Discontinuous Reception (DRX to reduce device’s power consumption. However, the DRX may pose unexpected communication delay due to missing Physical Downlink Control Channel (PDCCH information in sleep mode. Recent studies mainly focus on optimizing DRX parameters to manage the tradeoff between the energy consumption and communication latency. In this paper, we proposed a fuzzy-based power saving scheduling scheme for IoT over the LTE/LTE-Advanced networks to deal with the issues of the radio resource management and power consumption from the scheduling and resource allocation perspective. The proposed scheme considers not only individual IoT device’s real-time requirement but also the overall network performance. The simulation results show that our proposed scheme can meet the requirements of the DRX cycle and scheduling latency and can save about half of energy consumption for IoT devices compared to conventional approaches.

  4. A SCHEDULING SCHEME WITH DYNAMIC FREQUENCY CLOCKING AND MULTIPLE VOLTAGES FOR LOW POWER DESIGNS

    Institute of Scientific and Technical Information of China (English)

    Wen Dongxin; Wang Ling; Yang Xiaozong

    2007-01-01

    In this letter, a scheduling scheme based on Dynamic Frequency Clocking (DFC) and multiple voltages is proposed for low power designs under the timing and the resource constraints.Unlike the conventional methods at high level synthesis where only voltages of nodes were considered,the scheme based on a gain function considers both voltage and frequency simultaneously to reduce energy consumption. Experiments with a number of DSP benchmarks show that the proposed scheme achieves an effective energy reduction.

  5. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V. [Indira Gandhi Centre for Atomic Research (IGCAR), Kalpakkam (India). Computer Div.; Aghila, G. [National Institute of Technology, Karaikal (India). Dept. of Computer Science and Engineering

    2015-05-15

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  6. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    International Nuclear Information System (INIS)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V.; Aghila, G.

    2015-01-01

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  7. Power for southern Italy: hvdc Sardinia to mainland 200 MW scheme now commissioned

    Energy Technology Data Exchange (ETDEWEB)

    1967-02-16

    Transmission of the maximum rated power of 200 MW over the hvdc system which now links Sardinia with the Italian Mainland marks the successful completion of a notable British Export contract by English Electric. The link was commissioned on February 1. The Sardinia scheme is the seventh hvdc scheme to be completed in the world and is the first to be engineered by submarine cable.

  8. A DC-DC Conversion Powering Scheme for the CMS Phase-1 Pixel Upgrade

    CERN Document Server

    Feld, Lutz Werner; Marcel Friedrichs; Richard Hensch; Karpinski, Waclaw; Klein, Katja; Sammet, Jan Domenik; Wlochal, Michael

    2012-01-01

    The powering scheme of the CMS pixel detector will be described, and the performance of prototype DC-DC buck converters will be presented, including power efficiency, system tests with DC-DC converters and pixel modules, thermal management, reliability at low temperature, and studies of potential frequency locking betwe...

  9. Beam Dynamics Requirements for the Powering Scheme of the HL-LHC Triplet

    CERN Document Server

    AUTHOR|(CDS)2075212; Fartoukh, Stephane; Giovannozzi, Massimo

    2015-01-01

    For the HL-LHC, β ∗ values as small as 15 cm are envisaged as baseline scenario for the high luminosity insertions IR1 and IR5, thus leading to an increase of the maximum β- functions in the inner triplet (IT). The larger beta-functions in the IT result in a higher sensitivity of the beam to any linear or non-linear, static or dynamic, field imperfections in the IT region. In this paper, we summarize accordingly the tolerances of the triplet power supplies in terms of current ripple, stability and reproducibility. Both the baseline IT powering scheme and other alternative schemes will be presented, the later reducing the tune shift caused by a current modulation and thus weakening its possible impact on the long term stability.

  10. UD-WCMA: An Energy Estimation and Forecast Scheme for Solar Powered Wireless Sensor Networks

    KAUST Repository

    Dehwah, Ahmad H.

    2017-04-11

    Energy estimation and forecast represents an important role for energy management in solar-powered wireless sensor networks (WSNs). In general, the energy in such networks is managed over a finite time horizon in the future based on input solar power forecasts to enable continuous operation of the WSNs and achieve the sensing objectives while ensuring that no node runs out of energy. In this article, we propose a dynamic version of the weather conditioned moving average technique (UD-WCMA) to estimate and predict the variations of the solar power in a wireless sensor network. The presented approach combines the information from the real-time measurement data and a set of stored profiles representing the energy patterns in the WSNs location to update the prediction model. The UD-WCMA scheme is based on adaptive weighting parameters depending on the weather changes which makes it flexible compared to the existing estimation schemes without any precalibration. A performance analysis has been performed considering real irradiance profiles to assess the UD-WCMA prediction accuracy. Comparative numerical tests to standard forecasting schemes (EWMA, WCMA, and Pro-Energy) shows the outperformance of the new algorithm. The experimental validation has proven the interesting features of the UD-WCMA in real time low power sensor nodes.

  11. Compatible, energy conserving, bounds preserving remap of hydrodynamic fields for an extended ALE scheme

    Science.gov (United States)

    Burton, D. E.; Morgan, N. R.; Charest, M. R. J.; Kenamond, M. A.; Fung, J.

    2018-02-01

    From the very origins of numerical hydrodynamics in the Lagrangian work of von Neumann and Richtmyer [83], the issue of total energy conservation as well as entropy production has been problematic. Because of well known problems with mesh deformation, Lagrangian schemes have evolved into Arbitrary Lagrangian-Eulerian (ALE) methods [39] that combine the best properties of Lagrangian and Eulerian methods. Energy issues have persisted for this class of methods. We believe that fundamental issues of energy conservation and entropy production in ALE require further examination. The context of the paper is an ALE scheme that is extended in the sense that it permits cyclic or periodic remap of data between grids of the same or differing connectivity. The principal design goals for a remap method then consist of total energy conservation, bounded internal energy, and compatibility of kinetic energy and momentum. We also have secondary objectives of limiting velocity and stress in a non-directional manner, keeping primitive variables monotone, and providing a higher than second order reconstruction of remapped variables. In particular, the new contributions fall into three categories associated with: energy conservation and entropy production, reconstruction and bounds preservation of scalar and tensor fields, and conservative remap of nonlinear fields. The paper presents a derivation of the methods, details of implementation, and numerical results for a number of test problems. The methods requires volume integration of polynomial functions in polytopal cells with planar facets, and the requisite expressions are derived for arbitrary order.

  12. Preserving privacy of online digital physiological signals using blind and reversible steganography.

    Science.gov (United States)

    Shiu, Hung-Jr; Lin, Bor-Sing; Huang, Chien-Hung; Chiang, Pei-Ying; Lei, Chin-Laung

    2017-11-01

    Physiological signals such as electrocardiograms (ECG) and electromyograms (EMG) are widely used to diagnose diseases. Presently, the Internet offers numerous cloud storage services which enable digital physiological signals to be uploaded for convenient access and use. Numerous online databases of medical signals have been built. The data in them must be processed in a manner that preserves patients' confidentiality. A reversible error-correcting-coding strategy will be adopted to transform digital physiological signals into a new bit-stream that uses a matrix in which is embedded the Hamming code to pass secret messages or private information. The shared keys are the matrix and the version of the Hamming code. An online open database, the MIT-BIH arrhythmia database, was used to test the proposed algorithms. The time-complexity, capacity and robustness are evaluated. Comparisons of several evaluations subject to related work are also proposed. This work proposes a reversible, low-payload steganographic scheme for preserving the privacy of physiological signals. An (n,  m)-hamming code is used to insert (n - m) secret bits into n bits of a cover signal. The number of embedded bits per modification is higher than in comparable methods, and the computational power is efficient and the scheme is secure. Unlike other Hamming-code based schemes, the proposed scheme is both reversible and blind. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. Achieve Location Privacy-Preserving Range Query in Vehicular Sensing.

    Science.gov (United States)

    Kong, Qinglei; Lu, Rongxing; Ma, Maode; Bao, Haiyong

    2017-08-08

    Modern vehicles are equipped with a plethora of on-board sensors and large on-board storage, which enables them to gather and store various local-relevant data. However, the wide application of vehicular sensing has its own challenges, among which location-privacy preservation and data query accuracy are two critical problems. In this paper, we propose a novel range query scheme, which helps the data requester to accurately retrieve the sensed data from the distributive on-board storage in vehicular ad hoc networks (VANETs) with location privacy preservation. The proposed scheme exploits structured scalars to denote the locations of data requesters and vehicles, and achieves the privacy-preserving location matching with the homomorphic Paillier cryptosystem technique. Detailed security analysis shows that the proposed range query scheme can successfully preserve the location privacy of the involved data requesters and vehicles, and protect the confidentiality of the sensed data. In addition, performance evaluations are conducted to show the efficiency of the proposed scheme, in terms of computation delay and communication overhead. Specifically, the computation delay and communication overhead are not dependent on the length of the scalar, and they are only proportional to the number of vehicles.

  14. A digital memories based user authentication scheme with privacy preservation.

    Directory of Open Access Journals (Sweden)

    JunLiang Liu

    Full Text Available The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key, which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.

  15. Regulation control and energy management scheme for wireless power transfer

    Science.gov (United States)

    Miller, John M.

    2015-12-29

    Power transfer rate at a charging facility can be maximized by employing a feedback scheme. The state of charge (SOC) and temperature of the regenerative energy storage system (RESS) pack of a vehicle is monitored to determine the load due to the RESS pack. An optimal frequency that cancels the imaginary component of the input impedance for the output signal from a grid converter is calculated from the load of the RESS pack, and a frequency offset f* is made to the nominal frequency f.sub.0 of the grid converter output based on the resonance frequency of a magnetically coupled circuit. The optimal frequency can maximize the efficiency of the power transfer. Further, an optimal grid converter duty ratio d* can be derived from the charge rate of the RESS pack. The grid converter duty ratio d* regulates wireless power transfer (WPT) power level.

  16. Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks†

    Science.gov (United States)

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-01-01

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromised master nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals. PMID:25615731

  17. Collusion-aware privacy-preserving range query in tiered wireless sensor networks.

    Science.gov (United States)

    Zhang, Xiaoying; Dong, Lei; Peng, Hui; Chen, Hong; Zhao, Suyun; Li, Cuiping

    2014-12-11

    Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromisedmaster nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals.

  18. Collusion-Aware Privacy-Preserving Range Query in Tiered Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoying Zhang

    2014-12-01

    Full Text Available Wireless sensor networks (WSNs are indispensable building blocks for the Internet of Things (IoT. With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromisedmaster nodes, but neglects the damage of node collusion. In this paper, we propose a series of collusion-aware privacy-preserving range query protocols in two-tiered WSNs. To the best of our knowledge, this paper is the first to consider collusion attacks for a range query in tiered WSNs while fulfilling the preservation of privacy and integrity. To preserve the privacy of data and queries, we propose a novel encoding scheme to conceal sensitive information. To preserve the integrity of the results, we present a verification scheme using the correlation among data. In addition, two schemes are further presented to improve result accuracy and reduce communication cost. Finally, theoretical analysis and experimental results confirm the efficiency, accuracy and privacy of our proposals.

  19. Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud

    Directory of Open Access Journals (Sweden)

    Tengfei Tu

    2017-01-01

    Full Text Available As information technology develops, cloud storage has been widely accepted for keeping volumes of data. Remote data auditing scheme enables cloud user to confirm the integrity of her outsourced file via the auditing against cloud storage, without downloading the file from cloud. In view of the significant computational cost caused by the auditing process, outsourced auditing model is proposed to make user outsource the heavy auditing task to third party auditor (TPA. Although the first outsourced auditing scheme can protect against the malicious TPA, this scheme enables TPA to have read access right over user’s outsourced data, which is a potential risk for user data privacy. In this paper, we introduce the notion of User Focus for outsourced auditing, which emphasizes the idea that lets user dominate her own data. Based on User Focus, our proposed scheme not only can prevent user’s data from leaking to TPA without depending on data encryption but also can avoid the use of additional independent random source that is very difficult to meet in practice. We also describe how to make our scheme support dynamic updates. According to the security analysis and experimental evaluations, our proposed scheme is provably secure and significantly efficient.

  20. New Scheme for Seamless Operation for Stand-Alone Power Systems

    Directory of Open Access Journals (Sweden)

    Hyun-Jun Kim

    2016-06-01

    Full Text Available On remote islands photovoltaic (PV panels with battery energy storage systems (BESSs supply electric power to customers in parallel operation with engine generators (EGs to reduce fuel consumption and environmental burden. A BESS operates in voltage control mode when it supplies power to loads alone, while it operates in current control mode when it supplies power to loads in parallel with the EG. This paper proposes a smooth mode change of the BESS from current control to voltage control by using initial value at the output of integral part in the voltage controller, and a smooth mode change from voltage control to current control by tracking the EG output voltage to the BESS output voltage using a phase-locked loop (PLL. The feasibility of the proposed scheme was verified through computer simulations and experiments with a scaled prototype.

  1. Development scheme of the public power transportation network; Le schema de developpement du reseau public de transport d'electricite

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    Article 14 of the modified law from February 10, 2000 relative to the modernization and development of the electric utility foresees that the development scheme of the public power transportation network is regularly submitted to the approval of the ministry of energy after advice from the energy regulation commission. The development scheme identifies the areas of 'power fragility' with respect to the existing or future constraints susceptible to occur at the short- or medium-term on the French power grid. This document comprises the text of the law 2000-108 from February 10, 2000, and the complete development scheme with its appendixes (regulatory and administrative context relative to network projects, constraints relative to each administrative region). (J.S.)

  2. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks.

    Science.gov (United States)

    Shi, Binbin; Wei, Wei; Wang, Yihuai; Shu, Wanneng

    2016-10-14

    In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS) based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories. Secondly, the redundancy degree of a node is calculated according to its sensing area being covered by the neighboring sensors. Finally, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network at the same time. The simulation results show that the proposed CPCSS can balance the energy consumption and optimize the coverage performance of the sensor network.

  3. Energy Aware Routing Schemes in Solar PoweredWireless Sensor Networks

    KAUST Repository

    Dehwah, Ahmad H.

    2016-10-01

    Wireless sensor networks enable inexpensive distributed monitoring systems that are the backbone of smart cities. In this dissertation, we are interested in wireless sensor networks for traffic monitoring and an emergency flood detection to improve the safety of future cities. To achieve real-time traffic monitoring and emergency flood detection, the system has to be continually operational. Accordingly, an energy source is needed to ensure energy availability at all times. The sun provides for the most inexpensive source of energy, and therefore the energy is provided here by a solar panel working in conjunction with a rechargeable battery. Unlike batteries, solar energy fluctuates spatially and temporally due to the panel orientation, seasonal variation and node location, particularly in cities where buildings cast shadows. Especially, it becomes scarce whenever floods are likely to occur, as the weather tends to be cloudy at such times when the emergency detection system is most needed. These considerations lead to the need for the optimization of the energy of the sensor network, to maximize its sensing performance. In this dissertation, we address the challenges associated with long term outdoor deployments along with providing some solutions to overcome part of these challenges. We then introduce the energy optimization problem, as a distributed greedy approach. Motivated by the flood sensing application, our objective is to maximize the energy margin in the solar powered network at the onset of the high rain event, to maximize the network lifetime. The decentralized scheme will achieve this by optimizing the energy over a time horizon T, taking into account the available and predicted energy over the entire routing path. Having a good energy forecasting scheme can significantly enhance the energy optimization in WSN. Thus, this dissertation proposes a new energy forecasting scheme that is compatible with the platform’s capabilities. This proposed

  4. Carbon price instead of support schemes: wind power investments by the electricity market

    International Nuclear Information System (INIS)

    Petitet, Marie; Finon, Dominique; Janssen, Tanguy

    2014-10-01

    In this paper we study the development of wind power by the electricity market without any usual support scheme which is aimed at subsidizing non mature renewables, with the sole incentive of a significant carbon price. Long term electricity market and investment decisions simulation by system dynamics modelling is used to trace the electricity generation mix evolution over a 20-year period in a pure thermal system. A range of stable carbon price, as a tax could be, is tested in order to determine the value above which wind power development by market forces becomes economically possible. Not only economic competitiveness in terms of cost price, but also profitability against traditional fossil fuel technologies are necessary for a market-driven development of wind power. Results stress that wind power is really profitable for investors only if the carbon price is very significantly higher than the price required for making wind power MWh's cost price competitive with CCGT and coal-fired plants on the simplistic basis of levelized costs. In this context, the market-driven development of wind power seems only possible if there is a strong commitment to climate policy, reflected by the preference for a stable and high carbon price rather than a fuzzy price of an emission trading scheme. Besides, results show that market-driven development of wind power would require a sky-rocketing carbon price if the initial technology mix includes a share of nuclear plants even with a moratorium on new nuclear development. (authors)

  5. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  6. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  7. Self-tuning wireless power transmission scheme based on on-line scattering parameters measurement and two-side power matching.

    Science.gov (United States)

    Luo, Yanting; Yang, Yongmin; Chen, Zhongsheng

    2014-04-10

    Sub-resonances often happen in wireless power transmission (WPT) systems using coupled magnetic resonances (CMR) due to environmental changes, coil movements or component degradations, which is a serious challenge for high efficiency power transmission. Thus self-tuning is very significant to keep WPT systems following strongly magnetic resonant conditions in practice. Traditional coupled-mode ways is difficult to solve this problem. In this paper a two-port power wave model is presented, where power matching and the overall systemic power transmission efficiency are firstly defined by scattering (S) parameters. Then we propose a novel self-tuning scheme based on on-line S parameters measurements and two-side power matching. Experimental results testify the feasibility of the proposed method. These findings suggest that the proposed method is much potential to develop strongly self-adaptive WPT systems with CMR.

  8. Central-Upwind Schemes for Two-Layer Shallow Water Equations

    KAUST Repository

    Kurganov, Alexander

    2009-01-01

    We derive a second-order semidiscrete central-upwind scheme for one- and two-dimensional systems of two-layer shallow water equations. We prove that the presented scheme is well-balanced in the sense that stationary steady-state solutions are exactly preserved by the scheme and positivity preserving; that is, the depth of each fluid layer is guaranteed to be nonnegative. We also propose a new technique for the treatment of the nonconservative products describing the momentum exchange between the layers. The performance of the proposed method is illustrated on a number of numerical examples, in which we successfully capture (quasi) steady-state solutions and propagating interfaces. © 2009 Society for Industrial and Applied Mathematics.

  9. An Enhanced Power Sharing Scheme for Voltage unbalance and harmonics compensation in an islanded AC microgrid

    DEFF Research Database (Denmark)

    Han, Yang; Shen, Pan; Zhao, Xin

    2016-01-01

    In this paper, an enhanced hierarchical control structure with multiple current loop damping schemes for voltage unbalance and harmonics compensation in ac islanded microgrid is proposed to address unequal power sharing problems. The distributed generation (DG) is properly controlled to autonomou......In this paper, an enhanced hierarchical control structure with multiple current loop damping schemes for voltage unbalance and harmonics compensation in ac islanded microgrid is proposed to address unequal power sharing problems. The distributed generation (DG) is properly controlled...... to autonomously compensate voltage unbalance and harmonics while sharing the compensation effort for the real power, reactive power, unbalance and harmonic powers. The proposed control system of the microgrid mainly consists of the positive sequence real and reactive power droop controllers, voltage and current......) technique is adopted to send the compensation command of the secondary control and auxiliary control from the microgrid control center (MGCC) to the local controllers of DG unit. Finally, the hardware-in-the-loop (HIL) results using dSPACE 1006 platform are presented to demonstrate the effectiveness...

  10. Efficient and privacy-preserving biometric identification in cloud

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-09-01

    Full Text Available With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based identification systems have been extensively studied and deployed. However, to adopt biometric identification systems in practical applications, two main obstacles in terms of efficiency and client privacy must be resolved simultaneously. That is, identification should be performed at an acceptable time, and only a client should have access to his/her biometric traits, which are not revocable if leaked. Until now, multiple studies have demonstrated successful protection of client biometric data; however, such systems lack efficiency that leads to excessive time utilization for identification. The most recently researched scheme shows efficiency improvements but reveals client biometric traits to other entities such as biometric database server. This violates client privacy. In this paper, we propose an efficient and privacy-preserving fingerprint identification scheme by using cloud systems. The proposed scheme extensively exploits the computation power of a cloud so that most of the laborious computations are performed by the cloud service provider. According to our experimental results on an Amazon EC2 cloud, the proposed scheme is faster than the existing schemes and guarantees client privacy by exploiting symmetric homomorphic encryption. Our security analysis shows that during identification, the client fingerprint data is not disclosed to the cloud service provider or fingerprint database server.

  11. A novel GUI modeled fuzzy logic controller for a solar powered energy utilization scheme

    International Nuclear Information System (INIS)

    Altas, I. H.; Sharaf, A. M.

    2007-01-01

    Photovoltaic PVA-solar powered electrical systems comprise different components and subsystems to be controlled separately. Since the generated solar power is dependant on uncontrollable environmental conditions, it requires extra caution to design controllers that handle unpredictable events and maintain efficient load matching power. In this study, a photovoltaic (PV) solar array model is developed for Matlab/Simulink GUI environment and controlled using a fuzzy logic controller (FLC), which is also developed for GUI environment. The FLC is also used to control the DC load bus voltage at constant value as well as controlling the speed of a PMDC motor as one of the loads being fed. The FLC controller designed using the Matlab/Simuling GUI environment has flexible design criteria's so that it can easily be modified and extended for controlling different systems. The proposed FLC is used in three different parts of the PVA stand alone utilization scheme here. One of these parts is the speed control of the PMDC load, one of the other parts is controlling the DC load bus voltage, and the third part is the maximum power point (MPPT) tracking control, which is used to operate the PVA at its available maximum power as the solar insolation and ambient temperature change. This paper presents a study of a standalone Photovoltaic energy utilization system feeding a DC and AC hybrid electric load and is fully controlled by a novel and simple on-line fuzzy logic based dynamic search, detection and tracking controller that ensures maximum power point operation under excursions in Solar Insolation, Ambient temperature and electric load variations. The maximum power point MPP-Search and Detection algorithm is fully dynamic in nature and operates without any required direct measurement or forecasted PV array information about the irradiation and temperature. An added Search sensitivity measure is defined and also used in the MPP search algorithm to sense and dynamic response for

  12. Analysis of the imbalance price scheme in the Spanish electricity market: A wind power test case

    International Nuclear Information System (INIS)

    Bueno-Lorenzo, Miriam; Moreno, M. Ángeles; Usaola, Julio

    2013-01-01

    This work investigates the interaction between wind power and electricity markets. The paper is focused on balancing markets pricing policies. The proposal of a new imbalance price scheme is included and conveniently evaluated. This proposed scheme tries to minimise the use of ancillary services to compensate for deviations in searching for a more efficient market design. The effectiveness of imbalance prices as market signals is also examined, and policy recommendations regarding imbalance services are discussed. Two test cases are included that analyse the participation of a wind power producer in the Spanish electricity market using a stochastic optimisation strategy. For this purpose, the uncertainty of the variables is considered, i.e., wind power production and prediction, intraday and imbalance prices. Test cases were run with real data for 10 months, and realistic results are presented along with a hypothetical test case. The regulation of the imbalance prices may not be adequate for the Spanish electricity market because an error drop is not sufficiently encouraged. Therefore, we suggest the application of a new imbalance price scheme, which includes an additional constraint. The conclusions of this paper can be assumed to be general policy recommendations

  13. Conflict and Power Games in a Multinational Corporation : Sensegiving as a Strategy of Preservation

    NARCIS (Netherlands)

    Drori, Israel; Ellis, Shemuel

    In this paper, we seek to extend existing understandings of how sensegiving is associated with conflict and power games. We look specifically at sensegiving by managers that promotes strategies and actions geared toward preserving their positions against change. Formulating a conceptual framework

  14. Preservation of competence and cooperation with universities. Initiatives of German nuclear power plant operators to further know-how and competence preservation

    International Nuclear Information System (INIS)

    Seidel, Andre; Mohrbach, Ludger

    2009-01-01

    Nuclear power plants and nuclear technology offer graduates of technical and scientific university disciplines ambitious challenges in an attractive working environment. Irrespective of the politically motivated opt-out of the peaceful use of nuclear power in Germany, nuclear industry will continue to need motivated and committed young scientists and engineers for the next few decades. They contribute to the success of nuclear power plant operators, manufacturers, and consulting institutions. German nuclear power plant operators promote institutions of learning and research focusing on nuclear topics by means of a coordinated initiative. In this way, they contribute to preserving competence, attracting young scientists and engineers, and expanding research and development in Germany beyond the confines of specific topics. VGB PowerTech e.V. (VGB) supports operators in organizing these activities also by establishing subject-related working parties as a platform for exchanging information and harmonizing specific measures. (orig.)

  15. Robust Power Decoupling Control Scheme for DC Side Split Decoupling Capacitor Circuit with Mismatched Capacitance in Single Phase System

    DEFF Research Database (Denmark)

    Yao, Wenli; Loh, Poh Chiang; Tang, Yi

    2016-01-01

    dc capacitor to realize power decoupling, but the conventional power decoupling control scheme for this half-bridge circuit is developed with equal storage capacitances, which may vary in practice and degrade the ac and dc performance. The intention of this paper is to quantify ac and dc...... imperfections when storage mismatch occurs, which may break the standard requirement such as IEEE 1547. As a consequence, a robust control scheme is then proposed for half-bridge circuit, which realized power decoupling by generating second order harmonic voltage on the split dc decoupling capacitor instead...

  16. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks

    Science.gov (United States)

    Shi, Binbin; Wei, Wei; Wang, Yihuai; Shu, Wanneng

    2016-01-01

    In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS) based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories. Secondly, the redundancy degree of a node is calculated according to its sensing area being covered by the neighboring sensors. Finally, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network at the same time. The simulation results show that the proposed CPCSS can balance the energy consumption and optimize the coverage performance of the sensor network. PMID:27754405

  17. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Binbin Shi

    2016-10-01

    Full Text Available In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories. Secondly, the redundancy degree of a node is calculated according to its sensing area being covered by the neighboring sensors. Finally, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network at the same time. The simulation results show that the proposed CPCSS can balance the energy consumption and optimize the coverage performance of the sensor network.

  18. Index-based reactive power compensation scheme for voltage regulation

    Science.gov (United States)

    Dike, Damian Obioma

    2008-10-01

    Increasing demand for electrical power arising from deregulation and the restrictions posed to the construction of new transmission lines by environment, socioeconomic, and political issues had led to higher grid loading. Consequently, voltage instability has become a major concern, and reactive power support is vital to enhance transmission grid performance. Improved reactive power support to distressed grid is possible through the application of relatively unfamiliar emerging technologies of "Flexible AC Transmission Systems (FACTS)" devices and "Distributed Energy Resources (DERS)." In addition to these infrastructure issues, a lack of situational awareness by system operators can cause major power outages as evidenced by the August 14, 2003 widespread North American blackout. This and many other recent major outages have highlighted the inadequacies of existing power system indexes. In this work, a novel "Index-based reactive compensation scheme" appropriate for both on-line and off-line computation of grid status has been developed. A new voltage stability index (Ls-index) suitable for long transmission lines was developed, simulated, and compared to the existing two-machine modeled L-index. This showed the effect of long distance power wheeling amongst regional transmission organizations. The dissertation further provided models for index modulated voltage source converters (VSC) and index-based load flow analysis of both FACTS and microgrid interconnected power systems using the Newton-Raphson's load flow model incorporated with multi-FACTS devices. The developed package has been made user-friendly through the embodiment of interactive graphical user interface and implemented on the IEEE 14, 30, and 300 bus systems. The results showed reactive compensation has system wide-effect, provided readily accessible system status indicators, ensured seamless DERs interconnection through new islanding modes and enhanced VSC utilization. These outcomes may contribute

  19. A Hierarchical Control Scheme for Reactive Power and Harmonic Current Sharing in Islanded Microgrids

    DEFF Research Database (Denmark)

    Lorzadeh, Iman; Firoozabadi, Mehdi Savaghebi; Askarian Abyaneh, Hossein

    2015-01-01

    In this paper, a hierarchical control scheme consisting of primary and secondary levels is proposed for achieving accurate reactive power and harmonic currents sharing among interface inverters of distributed generators (DGs) in islanded microgrids. Firstly, fundamental and main harmonic componen...

  20. Development scheme of the public power transportation network; Le schema de developpement du reseau public de transport d'electricite

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    Article 14 of the modified law from February 10, 2000 relative to the modernization and development of the electric utility foresees that the development scheme of the public power transportation network is regularly submitted to the approval of the ministry of energy after advice from the energy regulation commission. The development scheme identifies the areas of 'power fragility' with respect to the existing or future constraints susceptible to occur at the short- or medium-term on the French power grid. This document comprises the text of the law 2000-108 from February 10, 2000, and the complete development scheme with its appendixes (regulatory and administrative context relative to network projects, constraints relative to each administrative region). (J.S.)

  1. Experimental study of heating scheme effect on the inner divertor power footprint widths in EAST lower single null discharges

    Science.gov (United States)

    Deng, G. Z.; Xu, J. C.; Liu, X.; Liu, X. J.; Liu, J. B.; Zhang, H.; Liu, S. C.; Chen, L.; Yan, N.; Feng, W.; Liu, H.; Xia, T. Y.; Zhang, B.; Shao, L. M.; Ming, T. F.; Xu, G. S.; Guo, H. Y.; Xu, X. Q.; Gao, X.; Wang, L.

    2018-04-01

    A comprehensive work of the effects of plasma current and heating schemes on divertor power footprint widths is carried out in the experimental advanced superconducting tokamak (EAST). The divertor power footprint widths, i.e., the scrape-off layer heat flux decay length λ q and the heat spreading S, are crucial physical and engineering parameters for fusion reactors. Strong inverse scaling of λ q and S with plasma current have been demonstrated for both neutral beam (NB) and lower hybrid wave (LHW) heated L-mode and H-mode plasmas at the inner divertor target. For plasmas heated by the combination of the two kinds of auxiliary heating schemes (NB and LHW), the divertor power widths tend to be larger in plasmas with higher ratio of LHW power. Comparison between experimental heat flux profiles at outer mid-plane (OMP) and divertor target for NB heated and LHW heated L-mode plasmas reveals that the magnetic topology changes induced by LHW may be the main reason to the wider divertor power widths in LHW heated discharges. The effect of heating schemes on divertor peak heat flux has also been investigated, and it is found that LHW heated discharges tend to have a lower divertor peak heat flux compared with NB heated discharges under similar input power. All these findings seem to suggest that plasmas with LHW auxiliary heating scheme are better heat exhaust scenarios for fusion reactors and should be the priorities for the design of next-step fusion reactors like China Fusion Engineering Test Reactor.

  2. An On-Time Power-Aware Scheduling Scheme for Medical Sensor SoC-Based WBAN Systems

    Science.gov (United States)

    Hwang, Tae-Ho; Kim, Dong-Sun; Kim, Jung-Guk

    2013-01-01

    The focus of many leading technologies in the field of medical sensor systems is on low power consumption and robust data transmission. For example, the implantable cardioverter-defibrillator (ICD), which is used to maintain the heart in a healthy state, requires a reliable wireless communication scheme with an extremely low duty-cycle, high bit rate, and energy-efficient media access protocols. Because such devices must be sustained for over 5 years without access to battery replacement, they must be designed to have extremely low power consumption in sleep mode. Here, an on-time, energy-efficient scheduling scheme is proposed that performs power adjustments to minimize the sleep-mode current. The novelty of this scheduler is that it increases the determinacy of power adjustment and the predictability of scheduling by employing non-pre-emptible dual priority scheduling. This predictable scheduling also guarantees the punctuality of important periodic tasks based on their serialization, by using their worst case execution time) and the power consumption optimization. The scheduler was embedded into a system on chip (SoC) developed to support the wireless body area network—a wakeup-radio and wakeup-timer for implantable medical devices. This scheduling system is validated by the experimental results of its performance when used with life-time extensions of ICD devices. PMID:23271602

  3. An on-time power-aware scheduling scheme for medical sensor SoC-based WBAN systems.

    Science.gov (United States)

    Hwang, Tae-Ho; Kim, Dong-Sun; Kim, Jung-Guk

    2012-12-27

    The focus of many leading technologies in the field of medical sensor systems is on low power consumption and robust data transmission. For example, the implantable cardioverter-defibrillator (ICD), which is used to maintain the heart in a healthy state, requires a reliable wireless communication scheme with an extremely low duty-cycle, high bit rate, and energy-efficient media access protocols. Because such devices must be sustained for over 5 years without access to battery replacement, they must be designed to have extremely low power consumption in sleep mode. Here, an on-time, energy-efficient scheduling scheme is proposed that performs power adjustments to minimize the sleep-mode current. The novelty of this scheduler is that it increases the determinacy of power adjustment and the predictability of scheduling by employing non-pre-emptible dual priority scheduling. This predictable scheduling also guarantees the punctuality of important periodic tasks based on their serialization, by using their worst case execution time) and the power consumption optimization. The scheduler was embedded into a system on chip (SoC) developed to support the wireless body area network-a wakeup-radio and wakeup-timer for implantable medical devices. This scheduling system is validated by the experimental results of its performance when used with life-time extensions of ICD devices.

  4. A stochastic asymptotic-preserving scheme for a kinetic-fluid model for disperse two-phase flows with uncertainty

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Shi, E-mail: sjin@wisc.edu [Department of Mathematics, University of Wisconsin–Madison, Madison, WI 53706 (United States); Institute of Natural Sciences, School of Mathematical Science, MOELSEC and SHL-MAC, Shanghai Jiao Tong University, Shanghai 200240 (China); Shu, Ruiwen, E-mail: rshu2@math.wisc.edu [Department of Mathematics, University of Wisconsin–Madison, Madison, WI 53706 (United States)

    2017-04-15

    In this paper we consider a kinetic-fluid model for disperse two-phase flows with uncertainty. We propose a stochastic asymptotic-preserving (s-AP) scheme in the generalized polynomial chaos stochastic Galerkin (gPC-sG) framework, which allows the efficient computation of the problem in both kinetic and hydrodynamic regimes. The s-AP property is proved by deriving the equilibrium of the gPC version of the Fokker–Planck operator. The coefficient matrices that arise in a Helmholtz equation and a Poisson equation, essential ingredients of the algorithms, are proved to be positive definite under reasonable and mild assumptions. The computation of the gPC version of a translation operator that arises in the inversion of the Fokker–Planck operator is accelerated by a spectrally accurate splitting method. Numerical examples illustrate the s-AP property and the efficiency of the gPC-sG method in various asymptotic regimes.

  5. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  6. Achieving privacy-preserving big data aggregation with fault tolerance in smart grid

    Directory of Open Access Journals (Sweden)

    Zhitao Guan

    2017-11-01

    Full Text Available In a smart grid, a huge amount of data is collected for various applications, such as load monitoring and demand response. These data are used for analyzing the power state and formulating the optimal dispatching strategy. However, these big energy data in terms of volume, velocity and variety raise concern over consumers’ privacy. For instance, in order to optimize energy utilization and support demand response, numerous smart meters are installed at a consumer's home to collect energy consumption data at a fine granularity, but these fine-grained data may contain information on the appliances and thus the consumer's behaviors at home. In this paper, we propose a privacy-preserving data aggregation scheme based on secret sharing with fault tolerance in a smart grid, which ensures that the control center obtains the integrated data without compromising privacy. Meanwhile, we also consider fault tolerance and resistance to differential attack during the data aggregation. Finally, we perform a security analysis and performance evaluation of our scheme in comparison with the other similar schemes. The analysis shows that our scheme can meet the security requirement, and it also shows better performance than other popular methods.

  7. Analysis of floor technology scheme in open-top construction of nuclear power project

    International Nuclear Information System (INIS)

    Zhang Shuxia; Lu Qinwu; Han Xiaoping

    2014-01-01

    Open-top construction is general technology in Ⅲ generation in nuclear power project. Because traditional floor structure and its form board upholding doesn't meet open-top construction, four floor scheme are presented, whose characters, advantages and disadvantages, and its application are summarized. The research results will help to the application of open-top construction. (authors)

  8. An analysis of control scheme and test results of fast feedback power supply

    International Nuclear Information System (INIS)

    Gupta, Shivam Kumar; Gupta, C.N.; Shah, Kunal; Makwana, Moti

    2017-01-01

    Real time Plasma Position Control is essential for obtaining long duration plasma in tokamaks. For that purpose four external coils has been installed in toroidal direction. Magnetic field of these coils interact with the plasma and tries to keep it radially stable in vacuum vessel to avoid direct contact of plasma to wall of tokamak. A fast feedback power supply has been installed in Aditya Tokamak which is able to set the appropriate current in either direction and current magnitude in external coils on the fast scale. In this paper, an analysis of control scheme and testing of Fast Feedback Power Supply (FFPS) has been described. FFPS is IGBT based H-bridge inverter programmable power supply

  9. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  10. A positivity preserving and conservative variational scheme for phase-field modeling of two-phase flows

    Science.gov (United States)

    Joshi, Vaibhav; Jaiman, Rajeev K.

    2018-05-01

    We present a positivity preserving variational scheme for the phase-field modeling of incompressible two-phase flows with high density ratio. The variational finite element technique relies on the Allen-Cahn phase-field equation for capturing the phase interface on a fixed Eulerian mesh with mass conservative and energy-stable discretization. The mass conservation is achieved by enforcing a Lagrange multiplier which has both temporal and spatial dependence on the underlying solution of the phase-field equation. To make the scheme energy-stable in a variational sense, we discretize the spatial part of the Lagrange multiplier in the phase-field equation by the mid-point approximation. The proposed variational technique is designed to reduce the spurious and unphysical oscillations in the solution while maintaining the second-order accuracy of both spatial and temporal discretizations. We integrate the Allen-Cahn phase-field equation with the incompressible Navier-Stokes equations for modeling a broad range of two-phase flow and fluid-fluid interface problems. The coupling of the implicit discretizations corresponding to the phase-field and the incompressible flow equations is achieved via nonlinear partitioned iterative procedure. Comparison of results between the standard linear stabilized finite element method and the present variational formulation shows a remarkable reduction of oscillations in the solution while retaining the boundedness of the phase-indicator field. We perform a standalone test to verify the accuracy and stability of the Allen-Cahn two-phase solver. We examine the convergence and accuracy properties of the coupled phase-field solver through the standard benchmarks of the Laplace-Young law and a sloshing tank problem. Two- and three-dimensional dam break problems are simulated to assess the capability of the phase-field solver for complex air-water interfaces involving topological changes on unstructured meshes. Finally, we demonstrate the phase

  11. Development of an Optimal Power Control Scheme for Wave-Offshore Hybrid Generation Systems

    Directory of Open Access Journals (Sweden)

    Seungmin Jung

    2015-08-01

    Full Text Available Integration technology of various distribution systems for improving renewable energy utilization has been receiving attention in the power system industry. The wave-offshore hybrid generation system (HGS, which has a capacity of over 10 MW, was recently developed by adopting several voltage source converters (VSC, while a control method for adopted power conversion systems has not yet been configured in spite of the unique system characteristics of the designated structure. This paper deals with a reactive power assignment method for the developed hybrid system to improve the power transfer efficiency of the entire system. Through the development and application processes for an optimization algorithm utilizing the real-time active power profiles of each generator, a feasibility confirmation of power transmission loss reduction was implemented. To find the practical effect of the proposed control scheme, the real system information regarding the demonstration process was applied from case studies. Also, an evaluation for the loss of the improvement rate was calculated.

  12. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  13. Flocking of Second-Order Multiagent Systems With Connectivity Preservation Based on Algebraic Connectivity Estimation.

    Science.gov (United States)

    Fang, Hao; Wei, Yue; Chen, Jie; Xin, Bin

    2017-04-01

    The problem of flocking of second-order multiagent systems with connectivity preservation is investigated in this paper. First, for estimating the algebraic connectivity as well as the corresponding eigenvector, a new decentralized inverse power iteration scheme is formulated. Then, based on the estimation of the algebraic connectivity, a set of distributed gradient-based flocking control protocols is built with a new class of generalized hybrid potential fields which could guarantee collision avoidance, desired distance stabilization, and the connectivity of the underlying communication network simultaneously. What is important is that the proposed control scheme allows the existing edges to be broken without violation of connectivity constraints, and thus yields more flexibility of motions and reduces the communication cost for the multiagent system. In the end, nontrivial comparative simulations and experimental results are performed to demonstrate the effectiveness of the theoretical results and highlight the advantages of the proposed estimation scheme and control algorithm.

  14. Coordinated Scheme of Under-Frequency Load Shedding with Intelligent Appliances in a Cyber Physical Power System

    Directory of Open Access Journals (Sweden)

    Qi Wang

    2016-08-01

    Full Text Available The construction of a cyber physical system in a power grid provides more potential control strategies for the power grid. With the rapid employment of intelligent terminal equipment (e.g., smart meters and intelligent appliances in the environment of a smart grid, abundant dynamic response information could be introduced to support a secure and stable power system. Combining demand response technology with the traditional under-frequency load shedding (UFLS scheme, a new UFLS strategy-determining method involving intelligent appliances is put forward to achieve the coordinated control of quick response resources and the traditional control resources. Based on this method, intelligent appliances can be used to meet the regulatory requirements of system operation in advance and prevent significant frequency drop, thereby improving the flexibility and stability of the system. Time-domain simulation verifies the effectiveness of the scheme, which is able to mitigate frequency drop and reduce the amount of load shedding.

  15. Derivation and Analysis of a Low-Cost, High-performance Analogue BPCM Control Scheme for Class-D Audio Power Amplifiers

    DEFF Research Database (Denmark)

    Høyerby, Mikkel Christian Wendelboe; Andersen, Michael A. E.

    2005-01-01

    This paper presents a low-cost analogue control scheme for class-D audio power amplifiers. The scheme is based around bandpass current-mode (BPCM) control, and provides ample stability margins and low distortion over a wide range of operating conditions. Implementation is very simple and does...

  16. An On-Time Power-Aware Scheduling Scheme for Medical Sensor SoC-Based WBAN Systems

    Directory of Open Access Journals (Sweden)

    Jung-Guk Kim

    2012-12-01

    Full Text Available The focus of many leading technologies in the field of medical sensor systems is on low power consumption and robust data transmission. For example, the implantable cardioverter-defibrillator (ICD, which is used to maintain the heart in a healthy state, requires a reliable wireless communication scheme with an extremely low duty-cycle, high bit rate, and energy-efficient media access protocols. Because such devices must be sustained for over 5 years without access to battery replacement, they must be designed to have extremely low power consumption in sleep mode. Here, an on-time, energy-efficient scheduling scheme is proposed that performs power adjustments to minimize the sleep-mode current. The novelty of this scheduler is that it increases the determinacy of power adjustment and the predictability of scheduling by employing non-pre-emptible dual priority scheduling. This predictable scheduling also guarantees the punctuality of important periodic tasks based on their serialization, by using their worst case execution time and the power consumption optimization. The scheduler was embedded into a system on chip (SoC developed to support the wireless body area network—a wakeup-radio and wakeup-timer for implantable medical devices. This scheduling system is validated by the experimental results of its performance when used with life-time extensions of ICD devices.

  17. Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yi Sun

    2014-01-01

    Full Text Available With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients’ health information and doctors’ diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions.

  18. The new WAGR data acquisition scheme

    International Nuclear Information System (INIS)

    Ellis, W.E.; Leng, J.H.; Smith, I.C.; Smith, M.R.

    1976-06-01

    The existing WAGR data acquisition equipment was inadequate to meet the requirements introduced by the installation of two additional experimental loops and was in any case due for replacement. A completely new scheme was planned and implemented based on mini-computers, which while preserving all the useful features of the old scheme provided additional flexibility and improved data display. Both the initial objectives of the design and the final implementation are discussed without introducing detailed descriptions of hardware or the programming techniques employed. Although the scheme solves a specific problem the general principles are more widely applicable and could readily be adapted to other data checking and display problems. (author)

  19. Bound-preserving Legendre-WENO finite volume schemes using nonlinear mapping

    Science.gov (United States)

    Smith, Timothy; Pantano, Carlos

    2017-11-01

    We present a new method to enforce field bounds in high-order Legendre-WENO finite volume schemes. The strategy consists of reconstructing each field through an intermediate mapping, which by design satisfies realizability constraints. Determination of the coefficients of the polynomial reconstruction involves nonlinear equations that are solved using Newton's method. The selection between the original or mapped reconstruction is implemented dynamically to minimize computational cost. The method has also been generalized to fields that exhibit interdependencies, requiring multi-dimensional mappings. Further, the method does not depend on the existence of a numerical flux function. We will discuss details of the proposed scheme and show results for systems in conservation and non-conservation form. This work was funded by the NSF under Grant DMS 1318161.

  20. Maximum power extraction under different vector-control schemes and grid-synchronization strategy of a wind-driven Brushless Doubly-Fed Reluctance Generator.

    Science.gov (United States)

    Mousa, Mohamed G; Allam, S M; Rashad, Essam M

    2018-01-01

    This paper proposes an advanced strategy to synchronize the wind-driven Brushless Doubly-Fed Reluctance Generator (BDFRG) to the grid-side terminals. The proposed strategy depends mainly upon determining the electrical angle of the grid voltage, θ v and using the same transformation matrix of both the power winding and grid sides to ensure that the generated power-winding voltage has the same phase-sequence of the grid-side voltage. On the other hand, the paper proposes a vector-control (power-winding flux orientation) technique for maximum wind-power extraction under two schemes summarized as; unity power-factor operation and minimum converter-current. Moreover, a soft-starting method is suggested to avoid the employed converter over-current. The first control scheme is achieved by adjusting the command power-winding reactive power at zero for a unity power-factor operation. However, the second scheme depends on setting the command d-axis control-winding current at zero to maximize the ratio of the generator electromagnetic-torque per the converter current. This enables the system to get a certain command torque under minimum converter current. A sample of the obtained simulation and experimental results is presented to check the effectiveness of the proposed control strategies. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  1. Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2017-01-01

    Full Text Available With cloud computing being integrated with wireless body area networks, the digital ecosystem called cloud-assisted WBAN was proposed. In cloud-assisted medical systems, the integrity of the stored data is important. Recently, based on certificateless public key cryptography, He et al. proposed a certificateless public auditing scheme for cloud-assisted WBANs. But He et al.’s scheme is not a scheme with privacy preserving. After many checks on some of the same data blocks, the auditor can derive these data blocks. In this paper, we propose a certificateless public auditing scheme with privacy preserving for cloud-assisted WBANs. In the proof phase of the proposed scheme, the proof information is protected from being directly exposed to the auditor. So, the curious auditor could not derive the data blocks. We also prove that the proposed scheme is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard, and we give a comparison of the proposed scheme with He et al.’s scheme in terms of security and computation cost.

  2. A privacy-preserving parallel and homomorphic encryption scheme

    Directory of Open Access Journals (Sweden)

    Min Zhaoe

    2017-04-01

    Full Text Available In order to protect data privacy whilst allowing efficient access to data in multi-nodes cloud environments, a parallel homomorphic encryption (PHE scheme is proposed based on the additive homomorphism of the Paillier encryption algorithm. In this paper we propose a PHE algorithm, in which plaintext is divided into several blocks and blocks are encrypted with a parallel mode. Experiment results demonstrate that the encryption algorithm can reach a speed-up ratio at about 7.1 in the MapReduce environment with 16 cores and 4 nodes.

  3. Large deflection angle, high-power adaptive fiber optics collimator with preserved near-diffraction-limited beam quality.

    Science.gov (United States)

    Zhi, Dong; Ma, Yanxing; Chen, Zilun; Wang, Xiaolin; Zhou, Pu; Si, Lei

    2016-05-15

    We report on the development of a monolithic adaptive fiber optics collimator, with a large deflection angle and preserved near-diffraction-limited beam quality, that has been tested at a maximal output power at the 300 W level. Additionally, a new measurement method of beam quality (M2 factor) is developed. Experimental results show that the deflection angle of the collimated beam is in the range of 0-0.27 mrad in the X direction and 0-0.19 mrad in the Y direction. The effective working frequency of the device is about 710 Hz. By employing the new measurement method of the M2 factor, we calculate that the beam quality is Mx2=1.35 and My2=1.24, which is in agreement with the result from the beam propagation analyzer and is preserved well with the increasing output power.

  4. Asymptotic analysis of discrete schemes for non-equilibrium radiation diffusion

    International Nuclear Information System (INIS)

    Cui, Xia; Yuan, Guang-wei; Shen, Zhi-jun

    2016-01-01

    Motivated by providing well-behaved fully discrete schemes in practice, this paper extends the asymptotic analysis on time integration methods for non-equilibrium radiation diffusion in [2] to space discretizations. Therein studies were carried out on a two-temperature model with Larsen's flux-limited diffusion operator, both the implicitly balanced (IB) and linearly implicit (LI) methods were shown asymptotic-preserving. In this paper, we focus on asymptotic analysis for space discrete schemes in dimensions one and two. First, in construction of the schemes, in contrast to traditional first-order approximations, asymmetric second-order accurate spatial approximations are devised for flux-limiters on boundary, and discrete schemes with second-order accuracy on global spatial domain are acquired consequently. Then by employing formal asymptotic analysis, the first-order asymptotic-preserving property for these schemes and furthermore for the fully discrete schemes is shown. Finally, with the help of manufactured solutions, numerical tests are performed, which demonstrate quantitatively the fully discrete schemes with IB time evolution indeed have the accuracy and asymptotic convergence as theory predicts, hence are well qualified for both non-equilibrium and equilibrium radiation diffusion. - Highlights: • Provide AP fully discrete schemes for non-equilibrium radiation diffusion. • Propose second order accurate schemes by asymmetric approach for boundary flux-limiter. • Show first order AP property of spatially and fully discrete schemes with IB evolution. • Devise subtle artificial solutions; verify accuracy and AP property quantitatively. • Ideas can be generalized to 3-dimensional problems and higher order implicit schemes.

  5. Perspectives of high power ultrasound in food preservation

    Science.gov (United States)

    Evelyn; Silva, F. V. M.

    2018-04-01

    High Power ultrasound can be used to alter physicochemical properties and improve the quality of foods during processing due to a number of mechanical, chemical, and biochemical effects arising from acoustic cavitation. Cavitation creates pressure waves that inactivate microbes and de-agglomerate bacterial clusters or release ascospores from fungal asci. Bacterial and heat resistant fungal spores’ inactivation is a great challenge in food preservation due to their ability to survive after conventional food processing, causing food-borne diseases or spoilage. In this work, a showcase of application of high power ultrasound combined with heat or thermosonication, to inactivate bacterial spores i.e. Bacillus cereus spores in beef slurry and fungal spores i.e. Neosartorya fischeri ascospores in apple juice was presented and compared with thermal processing. Faster inactivation was achieved at higher TS (24 KHz, 0.33 W/g or W/mL) temperatures. Around 2 log inactivation was obtained for B. cereus spores after1 min (70 °C) and N. fischeri ascospores after 30 min (75 °C). Thermal treatments caused <1 log in B. Cereus after 2 min (70 °C) and no inactivation in N. Fischeri ascospores after 30 min (80 °C). In conclusion, temperature plays a significant role for TS spore inactivation and TS was more effective than thermal treatment alone. The mould spores were more resistant than the bacterial spores.

  6. Issues in measure-preserving three dimensional flow integrators: Self-adjointness, reversibility, and non-uniform time stepping

    International Nuclear Information System (INIS)

    Finn, John M.

    2015-01-01

    Properties of integration schemes for solenoidal fields in three dimensions are studied, with a focus on integrating magnetic field lines in a plasma using adaptive time stepping. It is shown that implicit midpoint (IM) and a scheme we call three-dimensional leapfrog (LF) can do a good job (in the sense of preserving KAM tori) of integrating fields that are reversible, or (for LF) have a “special divergence-free” (SDF) property. We review the notion of a self-adjoint scheme, showing that such schemes are at least second order accurate and can always be formed by composing an arbitrary scheme with its adjoint. We also review the concept of reversibility, showing that a reversible but not exactly volume-preserving scheme can lead to a fractal invariant measure in a chaotic region, although this property may not often be observable. We also show numerical results indicating that the IM and LF schemes can fail to preserve KAM tori when the reversibility property (and the SDF property for LF) of the field is broken. We discuss extensions to measure preserving flows, the integration of magnetic field lines in a plasma and the integration of rays for several plasma waves. The main new result of this paper relates to non-uniform time stepping for volume-preserving flows. We investigate two potential schemes, both based on the general method of Feng and Shang [Numer. Math. 71, 451 (1995)], in which the flow is integrated in split time steps, each Hamiltonian in two dimensions. The first scheme is an extension of the method of extended phase space, a well-proven method of symplectic integration with non-uniform time steps. This method is found not to work, and an explanation is given. The second method investigated is a method based on transformation to canonical variables for the two split-step Hamiltonian systems. This method, which is related to the method of non-canonical generating functions of Richardson and Finn [Plasma Phys. Controlled Fusion 54, 014004 (2012

  7. A combined feedforward and feedback control scheme for low-ripple fast-response switchmode magnet power supplies

    International Nuclear Information System (INIS)

    Jin, H.; Dewan, S.B.

    1994-01-01

    In this paper, a new feedforward technique is introduced, and a combined feedforward/feedback control scheme is applied to switchmode magnet power supplies for low-ripple fast-response performance. The purposes of the feedforward technique are two-fold: to reduce the effect of source variations and low-order harmonics, and to improve the reference tracking ability of the system. The algorithm of the proposed control scheme is presented in the paper, and results of a two-quadrant system are provided to verify the concept

  8. Cost and Benefit Analysis of VSC-HVDC Schemes for Offshore Wind Power Transmission

    Institute of Scientific and Technical Information of China (English)

    Sheng WANG; Chunmei FENG; An WEN; Jun LIANG

    2013-01-01

    Due to low load factors of wind power generation,it is possible to reduce transmission capacity to minimize the cost of transmission system construction.Two VSC-HVDC schemes for offshore wind farm,called the point to point (PTP) and DC mesh connections are compared in terms of the utilization of transmission system and its cost.A Weibull distribution is used for estimating offshore wind power generation,besides,the cross correlation between wind farms is considered.The wind energy curtailment is analyzed using the capacity output possibility table (COPT).The system power losses,costs of transmission investment and wind energy curtailment are also computed.A statistic model for the wind generation and transmission is built and simulated in MATLAB to validate the study.It is concluded that a DC mesh transmission can reduce the energy curtailment and power losses.Further benefit is achievable as the wind cross correlation between wind farms decreases.

  9. The Optimal Configuration Scheme of the Virtual Power Plant Considering Benefits and Risks of Investors

    Directory of Open Access Journals (Sweden)

    Jingmin Wang

    2017-07-01

    Full Text Available A virtual power plant (VPP is a special virtual unit that integrates various distributed energy resources (DERs distributed in the generation and consumption sides. The optimal configuration scheme of the VPP needs to break the geographical restrictions to make full use of DERs, considering the uncertainties. First, the components of the DERs and the structure of the VPP are briefly introduced. Next, the cubic exponential smoothing method is adopted to predict the VPP load requirement. Finally, the optimal configuration of the DER capacities inside the VPP is calculated by using portfolio theory and genetic algorithms (GA. The results show that the configuration scheme can optimize the DER capacities considering uncertainties, guaranteeing economic benefits of investors, and fully utilizing the DERs. Therefore, this paper provides a feasible reference for the optimal configuration scheme of the VPP from the perspective of investors.

  10. Design study on the efficiency of the thermal scheme of power unit of thermal power plants in hot climates

    Science.gov (United States)

    Sedlov, A.; Dorokhov, Y.; Rybakov, B.; Nenashev, A.

    2017-11-01

    At the stage of pre-proposals unit of the thermal power plants for regions with a hot climate requires a design study on the efficiency of possible options for the structure of the thermal circuit and a set of key parameters. In this paper, the thermal circuit of the condensing unit powerfully 350 MW. The main feature of the external conditions of thermal power plants in hot climates is the elevated temperature of cooling water of the turbine condensers. For example, in the Persian Gulf region as the cooling water is sea water. In the hot season of the year weighted average sea water temperature of 30.9 °C and during the cold season to 22.8 °C. From the turbine part of the steam is supplied to the distillation-desalination plant. In the hot season of the year heat scheme with pressure fresh pair of 23.54 MPa, temperature 570/560 °C and feed pump with electric drive (EDP) is characterized by a efficiency net of 0.25% higher than thermal schem with feed turbine pump (TDP). However, the supplied power unit with PED is less by 11.6 MW. Calculations of thermal schemes in all seasons of the year allowed us to determine the difference in the profit margin of units of the TDP and EDP. During the year the unit with the TDP provides the ability to obtain the profit margin by 1.55 million dollars more than the unit EDP. When using on the market subsidized price of electricity (Iran) marginal profit of a unit with TDP more at 7.25 million dollars.

  11. Multisymplectic Structure-Preserving in Simple Finite Element Method in High Dimensional Case

    Institute of Scientific and Technical Information of China (English)

    BAI Yong-Qiang; LIU Zhen; PEI Ming; ZHENG Zhu-Jun

    2003-01-01

    In this paper, we study a finite element scheme of some semi-linear elliptic boundary value problems inhigh-dimensional space. With uniform mesh, we find that, the numerical scheme derived from finite element method cankeep a preserved multisymplectic structure.

  12. A New Battery Energy Storage Charging/Discharging Scheme for Wind Power Producers in Real-Time Markets

    Directory of Open Access Journals (Sweden)

    Minh Y Nguyen

    2012-12-01

    Full Text Available Under a deregulated environment, wind power producers are subject to many regulation costs due to the intermittence of natural resources and the accuracy limits of existing prediction tools. This paper addresses the operation (charging/discharging problem of battery energy storage installed in a wind generation system in order to improve the value of wind power in the real-time market. Depending on the prediction of market prices and the probabilistic information of wind generation, wind power producers can schedule the battery energy storage for the next day in order to maximize the profit. In addition, by taking into account the expenses of using batteries, the proposed charging/discharging scheme is able to avoid the detrimental operation of battery energy storage which can lead to a significant reduction of battery lifetime, i.e., uneconomical operation. The problem is formulated in a dynamic programming framework and solved by a dynamic programming backward algorithm. The proposed scheme is then applied to the study cases, and the results of simulation show its effectiveness.

  13. An Enhanced Dual Droop Control Scheme for Resilient Active Power Sharing among Paralleled Two-Stage Converters

    DEFF Research Database (Denmark)

    Liu, Hongpeng; Yang, Yongheng; Wang, Xiongfei

    2017-01-01

    Traditional droop-controlled system has assumed that generators can always generate the powers demanded from them. This is true with conventional sources, where fuel supplies are usually planned in advance. For renewable sources, it may also be possible if energy storage is available. Energy...... storage, usually as batteries, may however be expensive, depending on its planned capacity. Renewable sources are therefore sometimes installed as non-dispatch-able sources without storage. This may not be viable for remote grids, where renewable sources may be the only or major type of sources. In those...... cases, traditional droop scheme may not work well when its demanded power cannot be met by some renewable sources due to intermittency. When that happens, the system may become unstable with some sources progressively brought out of generation. To avoid such occurrence, an enhanced dual droop scheme...

  14. Self-adjusting entropy-stable scheme for compressible Euler equations

    Institute of Scientific and Technical Information of China (English)

    程晓晗; 聂玉峰; 封建湖; LuoXiao-Yu; 蔡力

    2015-01-01

    In this work, a self-adjusting entropy-stable scheme is proposed for solving compressible Euler equations. The entropy-stable scheme is constructed by combining the entropy conservative flux with a suitable diffusion operator. The entropy has to be preserved in smooth solutions and be dissipated at shocks. To achieve this, a switch function, based on entropy variables, is employed to make the numerical diffusion term added around discontinuities automatically. The resulting scheme is still entropy-stable. A number of numerical experiments illustrating the robustness and accuracy of the scheme are presented. From these numerical results, we observe a remarkable gain in accuracy.

  15. Multisymplectic Structure-Preserving in Simple Finite Element Method in High Dimensional Case

    Institute of Scientific and Technical Information of China (English)

    BAIYong-Qiang; LIUZhen; PEIMing; ZHENGZhu-Jun

    2003-01-01

    In this paper, we study a finite element scheme of some semi-linear elliptic boundary value problems in high-dhnensjonal space. With uniform mesh, we find that, the numerical scheme derived from finite element method can keep a preserved multisymplectic structure.

  16. Optimal powering schemes for legged robotics

    Science.gov (United States)

    Muench, Paul; Bednarz, David; Czerniak, Gregory P.; Cheok, Ka C.

    2010-04-01

    Legged Robots have tremendous mobility, but they can also be very inefficient. These inefficiencies can be due to suboptimal control schemes, among other things. If your goal is to get from point A to point B in the least amount of time, your control scheme will be different from if your goal is to get there using the least amount of energy. In this paper, we seek a balance between these extremes by looking at both efficiency and speed. We model a walking robot as a rimless wheel, and, using Pontryagin's Maximum Principle (PMP), we find an "on-off" control for the model, and describe the switching curve between these control extremes.

  17. Coordinated Control Scheme for Ancillary Services from Offshore Wind Power Plants to AC and DC Grids

    DEFF Research Database (Denmark)

    Sakamuri, Jayachandra N.; Altin, Müfit; Hansen, Anca Daniela

    2016-01-01

    This paper proposes a new approach of providing ancillary services to AC and DC grids from offshore wind power plants (OWPPs), connected through multi-terminal HVDC network. A coordinated control scheme where OWPP’s AC grid frequency modulated according to DC grid voltage variations is used...... to detect and provide the ancillary service requirements of both AC and DC grids, is proposed in this paper. In particular, control strategies for onshore frequency control, fault ridethrough support in the onshore grid, and DC grid voltage control are considered. The proposed control scheme involves only...

  18. An asymptotic preserving multidimensional ALE method for a system of two compressible flows coupled with friction

    Science.gov (United States)

    Del Pino, S.; Labourasse, E.; Morel, G.

    2018-06-01

    We present a multidimensional asymptotic preserving scheme for the approximation of a mixture of compressible flows. Fluids are modelled by two Euler systems of equations coupled with a friction term. The asymptotic preserving property is mandatory for this kind of model, to derive a scheme that behaves well in all regimes (i.e. whatever the friction parameter value is). The method we propose is defined in ALE coordinates, using a Lagrange plus remap approach. This imposes a multidimensional definition and analysis of the scheme.

  19. Four-level conservative finite-difference schemes for Boussinesq paradigm equation

    Science.gov (United States)

    Kolkovska, N.

    2013-10-01

    In this paper a two-parametric family of four level conservative finite difference schemes is constructed for the multidimensional Boussinesq paradigm equation. The schemes are explicit in the sense that no inner iterations are needed for evaluation of the numerical solution. The preservation of the discrete energy with this method is proved. The schemes have been numerically tested on one soliton propagation model and two solitons interaction model. The numerical experiments demonstrate that the proposed family of schemes has second order of convergence in space and time steps in the discrete maximal norm.

  20. Support schemes and ownership structures - The policy context for fuel cell based micro-combined heat and power

    Energy Technology Data Exchange (ETDEWEB)

    Ropenus, S.; Thorsten Schroeder, S.; Costa, A.; Obe, E.

    2010-05-15

    In recent years, fuel cell based micro-combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects of the ongoing fuel cell based micro-combined heat and power (mCHP) demonstration projects by addressing the socio-economic and systems analyses perspectives of a large-scale promotion scheme of fuel cells. This document constitutes the deliverable of Work Package 1 of the FC4Home project and provides an introduction to the policy context for mCHP. Section 1 describes the rationale for the promotion of mCHP by explaining its potential contribution to European energy policy goals. Section 2 addresses the policy context at the supranational European level by outlining relevant EU Directives on support schemes for promoting combined heat and power and energy from renewable sources. These Directives are to be implemented at the national level by the Member States. Section 3 conceptually presents the spectrum of national support schemes, ranging from investment support to market-based operational support. The choice of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project, Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up previous findings and provides a short 'preview' of the quantitative analyses in subsequent Work Packages by giving some food for thought on the way. (author)

  1. Development of a serial powering scheme and a versatile characterization system for the ATLAS pixel detector upgrade

    Energy Technology Data Exchange (ETDEWEB)

    Filimonov, Viacheslav

    2017-08-15

    In order to increase the probability of new discoveries the LHC will be upgraded to the HL-LHC. The upgrade of the ATLAS detector is an essential part of this program. The entire ATLAS tracking system will be replaced by an all-silicon detector called Inner Tracker (ITk) which should be able to withstand the increased luminosity of 5 x 10{sup 34} cm{sup -2}s{sup -1}. The work presented in this thesis is focused on the ATLAS ITk pixel detector upgrade. Advanced silicon pixel detectors will be an essential part of the ITk pixel detector where they will be used for tracking and vertexing. Characterization of the pixel detectors is one of the required tasks for a successful ATLAS tracker upgrade. Therefore, the work presented in this thesis includes the development of a versatile and modular test system for advanced silicon pixel detectors for the HL-LHC. The performance of the system is verified. Single and quad FE-I4 modules functionalities are characterized with the developed system. The reduction of the material budget of the ATLAS ITk pixel detector is essential for a successful operation at high luminosity. Therefore, a low mass, efficient power distribution scheme to power detector modules (serial powering scheme) is investigated as well in the framework of this thesis. A serially powered pixel detector prototype is built with all the components that are needed for current distribution, data transmission, sensor biasing, bypassing and redundancy in order to prove the feasibility of implementing the serial powering scheme in the ITk. Detailed investigations of the electrical performance of the detector prototype equipped with FE-I4 quad modules are made with the help of the developed readout system.

  2. Development of a serial powering scheme and a versatile characterization system for the ATLAS pixel detector upgrade

    International Nuclear Information System (INIS)

    Filimonov, Viacheslav

    2017-08-01

    In order to increase the probability of new discoveries the LHC will be upgraded to the HL-LHC. The upgrade of the ATLAS detector is an essential part of this program. The entire ATLAS tracking system will be replaced by an all-silicon detector called Inner Tracker (ITk) which should be able to withstand the increased luminosity of 5 x 10 34 cm -2 s -1 . The work presented in this thesis is focused on the ATLAS ITk pixel detector upgrade. Advanced silicon pixel detectors will be an essential part of the ITk pixel detector where they will be used for tracking and vertexing. Characterization of the pixel detectors is one of the required tasks for a successful ATLAS tracker upgrade. Therefore, the work presented in this thesis includes the development of a versatile and modular test system for advanced silicon pixel detectors for the HL-LHC. The performance of the system is verified. Single and quad FE-I4 modules functionalities are characterized with the developed system. The reduction of the material budget of the ATLAS ITk pixel detector is essential for a successful operation at high luminosity. Therefore, a low mass, efficient power distribution scheme to power detector modules (serial powering scheme) is investigated as well in the framework of this thesis. A serially powered pixel detector prototype is built with all the components that are needed for current distribution, data transmission, sensor biasing, bypassing and redundancy in order to prove the feasibility of implementing the serial powering scheme in the ITk. Detailed investigations of the electrical performance of the detector prototype equipped with FE-I4 quad modules are made with the help of the developed readout system.

  3. A Note on Symplectic, Multisymplectic Scheme in Finite Element Method

    Institute of Scientific and Technical Information of China (English)

    GUO Han-Ying; JI Xiao-Mei; LI Yu-Qi; WU Ke

    2001-01-01

    We find that with uniform mesh, the numerical schemes derived from finite element method can keep a preserved symplectic structure in one-dimensional case and a preserved multisymplectic structure in two-dimensional case respectively. These results are in fact the intrinsic reason why the numerical experiments show that such finite element algorithms are accurate in practice.``

  4. Multi-Agent System Based Special Protection and Emergency Control Scheme against Cascading Events in Power System

    DEFF Research Database (Denmark)

    Liu, Zhou

    relay operations due to low voltage or overload state in the post stage of N-1 (or N-k) contingency. If such state could be sensed and adjusted appropriately before those relay actions, the system stability might be sustained. So it is of great significance to develop a suitable protection scheme...... the proposed protection strategy in this thesis, a real time simulation platform based on Real Time Digital Simulator (RTDS) and LabVIEW is built. In this platform, the cases of cascaded blackouts are simulated on the test system simplified from the East Denmark power system. For the MAS based control system......, the distributed power system agents are set up in RTDS, while the agents in higher level are designed by LabVIEW toolkits. The case studies and simulation results demonstrate the effectiveness of real time application of the proposed MAS based special protection and emergency control scheme against the cascaded...

  5. Development of a DC-DC conversion powering scheme for the CMS Phase-1 pixel upgrade

    CERN Document Server

    Feld, Lutz Werner; Karpinski, Waclaw; Klein, Katja; Lipinski, Martin; Preuten, Marius; Max Rauch; Rittich, David Michael; Sammet, Jan Domenik; Wlochal, Michael

    2014-01-01

    A novel powering scheme based on the DC-DC conversion technique will be exploited to power the CMS Phase-1 pixel detector. DC-DC buck converters for the CMS pixel project have been developed, based on the AMIS5 ASIC designed by CERN. The powering system of the Phase-1 pixel detector is described and the performance of the converter prototypes is detailed, including power efficiency, stability of the output voltage, shielding, and thermal management. Results from a test of the magnetic field tolerance of the DC-DC converters are reported. System tests with pixel modules using many components of the future pixel barrel system are summarized. Finally first impressions from a pre-series of 200 DC-DC converters are presented.

  6. Numerical Simulations of Reacting Flows Using Asynchrony-Tolerant Schemes for Exascale Computing

    Science.gov (United States)

    Cleary, Emmet; Konduri, Aditya; Chen, Jacqueline

    2017-11-01

    Communication and data synchronization between processing elements (PEs) are likely to pose a major challenge in scalability of solvers at the exascale. Recently developed asynchrony-tolerant (AT) finite difference schemes address this issue by relaxing communication and synchronization between PEs at a mathematical level while preserving accuracy, resulting in improved scalability. The performance of these schemes has been validated for simple linear and nonlinear homogeneous PDEs. However, many problems of practical interest are governed by highly nonlinear PDEs with source terms, whose solution may be sensitive to perturbations caused by communication asynchrony. The current work applies the AT schemes to combustion problems with chemical source terms, yielding a stiff system of PDEs with nonlinear source terms highly sensitive to temperature. Examples shown will use single-step and multi-step CH4 mechanisms for 1D premixed and nonpremixed flames. Error analysis will be discussed both in physical and spectral space. Results show that additional errors introduced by the AT schemes are negligible and the schemes preserve their accuracy. We acknowledge funding from the DOE Computational Science Graduate Fellowship administered by the Krell Institute.

  7. Cures for the shock instability: Development of a shock-stable Roe scheme

    CERN Document Server

    Kim, S S; Rho, O H; Kyu-Hong, S

    2003-01-01

    This paper deals with the development of an improved Roe scheme that is free from the shock instability and still preserves the accuracy and efficiency of the original Roe's Flux Difference Splitting (FDS). Roe's FDS is known to possess good accuracy but to suffer from the shock instability, such as the carbuncle phenomenon. As the first step towards a shock-stable scheme, Roe's FDS is compared with the HLLE scheme to identify the source of the shock instability. Through a linear perturbation analysis on the odd-even decoupling problem, damping characteristic is examined and Mach number-based functions f and g are introduced to balance damping and feeding rates, which leads to a shock-stable Roe scheme. In order to satisfy the conservation of total enthalpy, which is crucial in predicting surface heat transfer rate in high-speed steady flows, an analysis of dissipation mechanism in the energy equation is carried out to find out the error source and to make the proposed scheme preserve total enthalpy. By modif...

  8. Self-adjusting entropy-stable scheme for compressible Euler equations

    International Nuclear Information System (INIS)

    Cheng Xiao-Han; Nie Yu-Feng; Cai Li; Feng Jian-Hu; Luo Xiao-Yu

    2015-01-01

    In this work, a self-adjusting entropy-stable scheme is proposed for solving compressible Euler equations. The entropy-stable scheme is constructed by combining the entropy conservative flux with a suitable diffusion operator. The entropy has to be preserved in smooth solutions and be dissipated at shocks. To achieve this, a switch function, which is based on entropy variables, is employed to make the numerical diffusion term be automatically added around discontinuities. The resulting scheme is still entropy-stable. A number of numerical experiments illustrating the robustness and accuracy of the scheme are presented. From these numerical results, we observe a remarkable gain in accuracy. (paper)

  9. Self-Consistent Scheme for Spike-Train Power Spectra in Heterogeneous Sparse Networks.

    Science.gov (United States)

    Pena, Rodrigo F O; Vellmer, Sebastian; Bernardi, Davide; Roque, Antonio C; Lindner, Benjamin

    2018-01-01

    Recurrent networks of spiking neurons can be in an asynchronous state characterized by low or absent cross-correlations and spike statistics which resemble those of cortical neurons. Although spatial correlations are negligible in this state, neurons can show pronounced temporal correlations in their spike trains that can be quantified by the autocorrelation function or the spike-train power spectrum. Depending on cellular and network parameters, correlations display diverse patterns (ranging from simple refractory-period effects and stochastic oscillations to slow fluctuations) and it is generally not well-understood how these dependencies come about. Previous work has explored how the single-cell correlations in a homogeneous network (excitatory and inhibitory integrate-and-fire neurons with nearly balanced mean recurrent input) can be determined numerically from an iterative single-neuron simulation. Such a scheme is based on the fact that every neuron is driven by the network noise (i.e., the input currents from all its presynaptic partners) but also contributes to the network noise, leading to a self-consistency condition for the input and output spectra. Here we first extend this scheme to homogeneous networks with strong recurrent inhibition and a synaptic filter, in which instabilities of the previous scheme are avoided by an averaging procedure. We then extend the scheme to heterogeneous networks in which (i) different neural subpopulations (e.g., excitatory and inhibitory neurons) have different cellular or connectivity parameters; (ii) the number and strength of the input connections are random (Erdős-Rényi topology) and thus different among neurons. In all heterogeneous cases, neurons are lumped in different classes each of which is represented by a single neuron in the iterative scheme; in addition, we make a Gaussian approximation of the input current to the neuron. These approximations seem to be justified over a broad range of parameters as

  10. Self-Consistent Scheme for Spike-Train Power Spectra in Heterogeneous Sparse Networks

    Directory of Open Access Journals (Sweden)

    Rodrigo F. O. Pena

    2018-03-01

    Full Text Available Recurrent networks of spiking neurons can be in an asynchronous state characterized by low or absent cross-correlations and spike statistics which resemble those of cortical neurons. Although spatial correlations are negligible in this state, neurons can show pronounced temporal correlations in their spike trains that can be quantified by the autocorrelation function or the spike-train power spectrum. Depending on cellular and network parameters, correlations display diverse patterns (ranging from simple refractory-period effects and stochastic oscillations to slow fluctuations and it is generally not well-understood how these dependencies come about. Previous work has explored how the single-cell correlations in a homogeneous network (excitatory and inhibitory integrate-and-fire neurons with nearly balanced mean recurrent input can be determined numerically from an iterative single-neuron simulation. Such a scheme is based on the fact that every neuron is driven by the network noise (i.e., the input currents from all its presynaptic partners but also contributes to the network noise, leading to a self-consistency condition for the input and output spectra. Here we first extend this scheme to homogeneous networks with strong recurrent inhibition and a synaptic filter, in which instabilities of the previous scheme are avoided by an averaging procedure. We then extend the scheme to heterogeneous networks in which (i different neural subpopulations (e.g., excitatory and inhibitory neurons have different cellular or connectivity parameters; (ii the number and strength of the input connections are random (Erdős-Rényi topology and thus different among neurons. In all heterogeneous cases, neurons are lumped in different classes each of which is represented by a single neuron in the iterative scheme; in addition, we make a Gaussian approximation of the input current to the neuron. These approximations seem to be justified over a broad range of

  11. Alcan Kitimat smelter modernization project remedial action scheme functional requirements

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-09-09

    This paper identified remedial actions for reducing islanding and voltage collapse at the Alcan Kitimat smelter modernization project. The study was conducted after an earlier study indicated that the proposed project significantly increased electricity loads and stresses on Alcan's power system. Remedial actions included shedding the appropriate number of Kemano (KMO) generators; reducing Kitimat potline loads by de-saturating saturable reactors and lowering tap changers; and shedding potlines to preserve the Kitimat auxiliary load and facilitate power restoration. Power flow and transient stability studies were conducted to evaluate the impact of the remedial actions on the KMO generators and the transmission system. Results showed that fast load reduction improved power system response. Load reduction by changing the converter transformer tap reduced significant amounts of loads, but was too slow to be effective during fast voltage collapse. The study showed that although the remedial action scheme (RAS) reduced the impact of various contingencies on the Alcan system, performance was degraded due to the significant load increase. Fast load shedding capability was also reduced. It was concluded that further research is needed to develop and implement the RAS. 3 tabs., 7 figs.

  12. ASCERTAINMENT OF ELECTRIC-SUPPLY SCHEMES RELIABILITY FOR THE ATOMIC POWER PLANT AUXILIARIES

    Directory of Open Access Journals (Sweden)

    A. L. Starzhinskij

    2015-01-01

    Full Text Available The paper completes ascertainment of electrical-supply scheme reliability for the auxiliaries of a nuclear power plant. Thereat the author considers the system behavior during the block normal operation, carrying out current maintenance, and capital repairs in combination with initiating events. The initiating events for reactors include complete blackout, i.e. the loss of outside power supply (normal and reserve; emergency switching one of the working turbogenerators; momentary dumping the normal rating to the level of auxiliaries with seating the cutout valve of one turbo-generator. The combination of any initiating event with the repairing mode in case of one of the system elements failure should not lead to blackout occurrence of more than one system of the reliable power supply. This requirement rests content with the help of the reliable power supply system self-dependence (electrical and functional and the emergency power-supply operational autonomy (diesel generator and accumulator batteries.The reliability indicators of the power supply system for the nuclear power plant auxiliaries are the conditional probabilities of conjoined blackout of one, two, and three sections of the reliable power supply conditional upon an initiating event emerging and the blackout of one, two, and three reliable power-supply sections under the normal operational mode. Furthermore, they also are the blackout periodicity of one and conjointly two, three, and four sections of normal operation under the block normal operational mode. It is established that the blackout of one bus section of normal operation and one section of reliable power-supply system of the auxiliaries that does not lead to complete blackout of the plant auxiliaries may occur once in three years. The probability of simultaneous power failure of two or three normal-operation sections and of two reliable power-supply sections during the power plant service life is unlikely.

  13. Radial distribution of power starting from the reactivity using nodal schemes of second and third order

    International Nuclear Information System (INIS)

    Delfin L, A.; Alonso V, G.; Valle G, E. del

    2003-01-01

    In this work two nodal schemes of finite element are presented, one of second and the other of third order of accurate that allow to determine the radial distribution of power starting from the corresponding reactivities.The schemes here developed were obtained taking as starting point the equation developed by Driscoll et al, the one which is based on the diffusion approach of 1-1/2 energy groups. This equation relates the power fraction of an assemble with their reactivity and with the power fractions and reactivities of the assemblies that its surround it. Driscoll and collaborators they solve in form approximate such equation supposing that the reactivity of each assemble it is but a lineal function of the burnt one of the fuel. The spatial approach carries out it with the classic technique of finite differences centered in mesh. Nevertheless that the algebraic system to which its arrive it can be solved without more considerations introduce some additional suppositions and adjustment parameters that it allows them to predict results comparable to those contributed by three dimensions analysis and this way to reduce the one obtained error when its compare their results with those of a production code like CASMO. Also in the two schemes that here are presented the same approaches of Driscoll were used being obtained errors of the one 10% and of 5% for the second schemes and third order respectively for a test case that it was built starting from data of the Cycle 1 of the Unit 1 of the Laguna Verde Nucleo electric plant. These errors its were obtained when comparing with a computer program based on the matrix response method. It is sought to have this way a quick and efficient tool for the multicycle analysis in the fuel management. However, this model presents problems in the appropriate prediction of the average burnt of the nucleus and of the burnt one by lot. (Author)

  14. The Influence of Small-Scale Power Plant Supporting Schemes on the Public Trader and Consumers

    Directory of Open Access Journals (Sweden)

    Renata Varfolomejeva

    2017-06-01

    Full Text Available The mechanism of support schemes for achieving the required share of renewable energy sources (RES was implemented into the energy sector. The issued amount of support requires state subsidies. The end-users of electricity are paying the mandatory procurement component taxes to cover these subsidies. The article examines the way of minimizing the influence of the existing RES supporting schemes on the consumers. The fixed purchased electricity price in the case of RES does not encourage producers to operate at hours of peak consumption or when the price is high. Modification of the RES support mechanisms at the legislative level, firstly, could minimize the influence of the mandatory procurement component on the end-users’ electricity price, and secondly, could provide a great opportunity for the public trader to forecast the operation of small power plants and their generation abilities. Numerical experiments with models of two types of power plants (biofuel and hydropower prove the existence of a problem and the presence of a solution. This problem constitutes the main subject of the present paper.

  15. Analysis and Design of Timing Recovery Schemes for DMT Systems over Indoor Power-Line Channels

    Directory of Open Access Journals (Sweden)

    Cortés José Antonio

    2007-01-01

    Full Text Available Discrete multitone (DMT modulation is a suitable technique to cope with main impairments of broadband indoor power-line channels: spectral selectivity and cyclic time variations. Due to the high-density constellations employed to achieve the required bit-rates, synchronization issues became an important concern in these scenarios. This paper analyzes the performance of a conventional DMT timing recovery scheme designed for linear time-invariant (LTI channels when employed over indoor power lines. The influence of the channel cyclic short-term variations and the sampling jitter on the system performance is assessed. Bit-rate degradation due to timing errors is evaluated in a set of measured channels. It is shown that this synchronization mechanism limits the system performance in many residential channels. Two improvements are proposed to avoid this end: a new phase error estimator that takes into account the short-term changes in the channel response, and the introduction of notch filters in the timing recovery loop. Simulations confirm that the new scheme eliminates the bit-rate loss in most situations.

  16. Privacy-Preserving Meter Report Protocol of Isolated Smart Grid Devices

    Directory of Open Access Journals (Sweden)

    Zhiwei Wang

    2017-01-01

    Full Text Available Smart grid aims to improve the reliability, efficiency, and security of the traditional grid, which allows two-way transmission and efficiency-driven response. However, a main concern of this new technique is that the fine-grained metering data may leak the personal privacy information of the customers. Thus, the data aggregation mechanism for privacy protection is required for the meter report protocol in smart grid. In this paper, we propose an efficient privacy-preserving meter report protocol for the isolated smart grid devices. Our protocol consists of an encryption scheme with additively homomorphic property and a linearly homomorphic signature scheme, where the linearly homomorphic signature scheme is suitable for privacy-preserving data aggregation. We also provide security analysis of our protocol in the context of some typical attacks in smart grid. The implementation of our protocol on the Intel Edison platform shows that our protocol is efficient enough for the physical constrained devices, like smart meters.

  17. Analysis of a Relaxation Scheme for a Nonlinear Schrödinger Equation Occurring in Plasma Physics

    KAUST Repository

    Oelz, Dietmar; Trabelsi, Saber

    2014-01-01

    This paper is devoted to the analysis of a relaxation-type numerical scheme for a nonlinear Schrödinger equation arising in plasma physics. The scheme is shown to be preservative in the sense that it preserves mass and energy. We prove the well-posedness of the semidiscretized system and prove convergence to the solution of the time-continuous model. © 2014 © Vilnius Gediminas Technical University, 2014.

  18. Analysis of a Relaxation Scheme for a Nonlinear Schrödinger Equation Occurring in Plasma Physics

    KAUST Repository

    Oelz, Dietmar

    2014-03-15

    This paper is devoted to the analysis of a relaxation-type numerical scheme for a nonlinear Schrödinger equation arising in plasma physics. The scheme is shown to be preservative in the sense that it preserves mass and energy. We prove the well-posedness of the semidiscretized system and prove convergence to the solution of the time-continuous model. © 2014 © Vilnius Gediminas Technical University, 2014.

  19. Design and control strategy applying the novel highly effective magnetic flux coupling (HEMFC) scheme for a non-contact power transfer system

    International Nuclear Information System (INIS)

    Chen, W.-P.; Huang, W.-N.; Chen, P.-S.; Fan, T.-Y.; Chen, M.-P.; Teng, C.-C.

    2006-01-01

    In this paper, the novel design concept for highly effective magnetic flux coupling (HEMFC) schemes, based on enhancement of path guiding effect for leakage flux transmitting, is proposed for a non-contact power transfer system. Two implementation techniques are presented herein utilizing simple structure opinions of specific slant air gap as well as adding of metal bushing components. Both simulation and experimental results demonstrate that the improvement of magnetic coupling ratio and overall system efficiency are achieved by applying the two HEMFC schemes as the power transmitting devices

  20. Co-ordination of renewable energy support schemes in the EU

    Energy Technology Data Exchange (ETDEWEB)

    Grenaa Jensen, S.; Morthorst, P.E. [Risoe National Lab., Roskilde (Denmark)

    2007-05-15

    This paper illustrates the effect that can be observed when support schemes for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e.g., price of power, conditions for conventional power producers, and changes in import and export of power. The results are based on a deterministic partial equilibrium model, where two cases are studied. The first case covers countries with regional power markets that also regionalise their tradable green certificate (TGC) support schemes. The second, countries with separate national power markets that regionalise their TGC-support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising their RES-E support scheme already has a common liberalised power market. In this case, introduction of a common TGC-support scheme for renewable technologies will lead to more efficient sitings of renewable plants, improving economic and environmental performance of the total power system. But if no such common power market exits, regionalising their TGC-schemes might, due to interactions, introduce distortions in the conventional power system. Thus, contrary to intentions, we might in this case end up in a system that is far from optimal with regard to efficiency and emissions. (au)

  1. Co-ordination of renewable energy support schemes in the EU

    International Nuclear Information System (INIS)

    Grenaa Jensen, S.; Morthorst, P.E.

    2007-01-01

    This paper illustrates the effect that can be observed when support schemes for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e.g., price of power, conditions for conventional power producers, and changes in import and export of power. The results are based on a deterministic partial equilibrium model, where two cases are studied. The first case covers countries with regional power markets that also regionalise their tradable green certificate (TGC) support schemes. The second, countries with separate national power markets that regionalise their TGC-support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising their RES-E support scheme already has a common liberalised power market. In this case, introduction of a common TGC-support scheme for renewable technologies will lead to more efficient sitings of renewable plants, improving economic and environmental performance of the total power system. But if no such common power market exits, regionalising their TGC-schemes might, due to interactions, introduce distortions in the conventional power system. Thus, contrary to intentions, we might in this case end up in a system that is far from optimal with regard to efficiency and emissions. (au)

  2. Power transmission study for a wave energy scheme based on Lancaster Flexible Bag devices. Supervisory and telecontrol system

    Energy Technology Data Exchange (ETDEWEB)

    1981-11-01

    Various options are considered for power data transmission associated with the power collection and transmission system of a postulated wave energy conversion scheme off the Outer Hebrides. For data transmission between the off-shore and on-shore power collector stations a Power Line Carrier (PLC) system is judged to be most suitable. In the case of data transmission between power collector stations and the main control centre, a microwave/radio link is proposed as the amount of data does not lend itself to a PLC system. Cost estimates, in the main for equipment supply only, are given.

  3. Strong Stability Preserving Property of the Deferred Correction Time Discretization

    National Research Council Canada - National Science Library

    Liu, Yuan; Shu, Chi-Wang; Zhang, Mengping

    2007-01-01

    In this paper, we study the strong stability preserving "SSP" property of a class of deferred correction time discretization methods, for solving the method-of-lines schemes approximating hyperbolic...

  4. Frequency Stabilizing Scheme for a Danish Island Grid

    DEFF Research Database (Denmark)

    Cha, Seung-Tae; Wu, Qiuwei; Østergaard, Jacob

    2012-01-01

    of wind power is necessary to avoid unwanted power oscillations, which lead to uncontrolled oscillations in the power plant control. Since this might deteriorate power quality including frequency in an island grid, a frequency stabilizing control scheme or strategies using intelligent controller......This paper describes the development of frequency stabilizing control scheme for a small Danish island of Bornholm. The Bornholm power system is able to transit from interconnected operation with the Nordic power system to isolated islanding operation. During islanding operation the shedding...... with a battery energy storage system (BESS) has been proposed. The real-time models of distribution grids of Bornholm power system were used to carry out case studies to illustrate the performance of centralized load frequency control as well as coordinated control scheme. Case study results show...

  5. A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Chang, Ya-Fen; Yu, Shih-Hui; Shiao, Ding-Rui

    2013-04-01

    Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data.

  6. 0D modelling and efficiency analysis of three power amplification schemes for inductive storage generators in the μs scale

    International Nuclear Information System (INIS)

    Huet, D.; Lassalle, F.; Chuvatin, A.S.

    2005-01-01

    Extensive studies were conducted to sharpen current pulse on IES (Inductive Energy Storage) drivers using the plasma opening switch scheme. Due to the emergence of new power amplification concepts, new opportunities appear for improving IES generators operation. In order to evaluate and compare the performances of these schemes this paper proposes a system analysis based on a 0D modelling [ru

  7. A fast iterative scheme for the linearized Boltzmann equation

    Science.gov (United States)

    Wu, Lei; Zhang, Jun; Liu, Haihu; Zhang, Yonghao; Reese, Jason M.

    2017-06-01

    Iterative schemes to find steady-state solutions to the Boltzmann equation are efficient for highly rarefied gas flows, but can be very slow to converge in the near-continuum flow regime. In this paper, a synthetic iterative scheme is developed to speed up the solution of the linearized Boltzmann equation by penalizing the collision operator L into the form L = (L + Nδh) - Nδh, where δ is the gas rarefaction parameter, h is the velocity distribution function, and N is a tuning parameter controlling the convergence rate. The velocity distribution function is first solved by the conventional iterative scheme, then it is corrected such that the macroscopic flow velocity is governed by a diffusion-type equation that is asymptotic-preserving into the Navier-Stokes limit. The efficiency of this new scheme is assessed by calculating the eigenvalue of the iteration, as well as solving for Poiseuille and thermal transpiration flows. We find that the fastest convergence of our synthetic scheme for the linearized Boltzmann equation is achieved when Nδ is close to the average collision frequency. The synthetic iterative scheme is significantly faster than the conventional iterative scheme in both the transition and the near-continuum gas flow regimes. Moreover, due to its asymptotic-preserving properties, the synthetic iterative scheme does not need high spatial resolution in the near-continuum flow regime, which makes it even faster than the conventional iterative scheme. Using this synthetic scheme, with the fast spectral approximation of the linearized Boltzmann collision operator, Poiseuille and thermal transpiration flows between two parallel plates, through channels of circular/rectangular cross sections and various porous media are calculated over the whole range of gas rarefaction. Finally, the flow of a Ne-Ar gas mixture is solved based on the linearized Boltzmann equation with the Lennard-Jones intermolecular potential for the first time, and the difference

  8. On the use of kinetic energy preserving DG-schemes for large eddy simulation

    Science.gov (United States)

    Flad, David; Gassner, Gregor

    2017-12-01

    -grid-scale models on top doesn't change much or in worst case decreases the fidelity even more. Finally, the core of this work is a novel LES strategy based on split form DG methods that are kinetic energy preserving. The scheme offers excellent stability with full control over the amount and shape of the added artificial dissipation. This premise is the main idea of the work and we will assess the LES capabilities of the novel split form DG approach when applied to shock-free, moderate Mach number turbulence. We will demonstrate that the novel DG LES strategy offers similar accuracy as the iLES methodology for well resolved cases, but strongly increases fidelity in case of more realistic coarse resolutions.

  9. Drive Control Scheme of Electric Power Assisted Wheelchair Based on Neural Network Learning of Human Wheelchair Operation Characteristics

    Science.gov (United States)

    Tanohata, Naoki; Seki, Hirokazu

    This paper describes a novel drive control scheme of electric power assisted wheelchairs based on neural network learning of human wheelchair operation characteristics. “Electric power assisted wheelchair” which enhances the drive force of the operator by employing electric motors is expected to be widely used as a mobility support system for elderly and disabled people. However, some handicapped people with paralysis of the muscles of one side of the body cannot maneuver the wheelchair as desired because of the difference in the right and left input force. Therefore, this study proposes a neural network learning system of such human wheelchair operation characteristics and a drive control scheme with variable distribution and assistance ratios. Some driving experiments will be performed to confirm the effectiveness of the proposed control system.

  10. A Novel Nondestructive Bit-Line Discharging Scheme for Deep Submicrometer STT-RAM

    DEFF Research Database (Denmark)

    Zeinali, Behzad; Madsen, Jens Kargaard; Raghavan, Praveen

    . In this paper, we propose a novel non-destructive self-reference sensing scheme for STT-RAM. The proposed technique overcomes the large bit-to-bit variation of MTJ resistance. In the proposed scheme, the stored value in the STTRAM cell preserves, hence, the long write-back operation is eliminated. Besides...

  11. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  12. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  13. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2016-06-01

    Full Text Available WSNs (Wireless sensor networks are nowadays viewed as a vital portion of the IoTs (Internet of Things. Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  14. System Protection Schemes in Eastern Denmark

    DEFF Research Database (Denmark)

    Rasmussen, Joana

    outages in the southern part of the 132-kV system introduce further stress in the power system, eventually leading to a voltage collapse. The local System Protection Scheme against voltage collapse is designed as a response-based scheme, which is dependent on local indication of reactive and active power...... effective measures, because they are associated with large reactive power losses in the transmission system. Ordered reduction of wind generation is considered an effective measure to maintain voltage stability in the system. Reactive power in the system is released due to tripping of a significant amount...... system. In that way, the power system capability could be extended beyond normal limits....

  15. On Richardson extrapolation for low-dissipation low-dispersion diagonally implicit Runge-Kutta schemes

    Science.gov (United States)

    Havasi, Ágnes; Kazemi, Ehsan

    2018-04-01

    In the modeling of wave propagation phenomena it is necessary to use time integration methods which are not only sufficiently accurate, but also properly describe the amplitude and phase of the propagating waves. It is not clear if amending the developed schemes by extrapolation methods to obtain a high order of accuracy preserves the qualitative properties of these schemes in the perspective of dissipation, dispersion and stability analysis. It is illustrated that the combination of various optimized schemes with Richardson extrapolation is not optimal for minimal dissipation and dispersion errors. Optimized third-order and fourth-order methods are obtained, and it is shown that the proposed methods combined with Richardson extrapolation result in fourth and fifth orders of accuracy correspondingly, while preserving optimality and stability. The numerical applications include the linear wave equation, a stiff system of reaction-diffusion equations and the nonlinear Euler equations with oscillatory initial conditions. It is demonstrated that the extrapolated third-order scheme outperforms the recently developed fourth-order diagonally implicit Runge-Kutta scheme in terms of accuracy and stability.

  16. Optimal stochastic reactive power scheduling in a microgrid considering voltage droop scheme of DGs and uncertainty of wind farms

    International Nuclear Information System (INIS)

    Khorramdel, Benyamin; Raoofat, Mahdi

    2012-01-01

    Distributed Generators (DGs) in a microgrid may operate in three different reactive power control strategies, including PV, PQ and voltage droop schemes. This paper proposes a new stochastic programming approach for reactive power scheduling of a microgrid, considering the uncertainty of wind farms. The proposed algorithm firstly finds the expected optimal operating point of each DG in V-Q plane while the wind speed is a probabilistic variable. A multi-objective function with goals of loss minimization, reactive power reserve maximization and voltage security margin maximization is optimized using a four-stage multi-objective nonlinear programming. Then, using Monte Carlo simulation enhanced by scenario reduction technique, the proposed algorithm simulates actual condition and finds optimal operating strategy of DGs. Also, if any DGs are scheduled to operate in voltage droop scheme, the optimum droop is determined. Also, in the second part of the research, to enhance the optimality of the results, PSO algorithm is used for the multi-objective optimization problem. Numerical examples on IEEE 34-bus test system including two wind turbines are studied. The results show the benefits of voltage droop scheme for mitigating the impacts of the uncertainty of wind. Also, the results show preference of PSO method in the proposed approach. -- Highlights: ► Reactive power scheduling in a microgrid considering loss and voltage security. ► Stochastic nature of wind farms affects reactive power scheduling and is considered. ► Advantages of using the voltage droop characteristics of DGs in voltage security are shown. ► Power loss, voltage security and VAR reserve are three goals of a multi-objective optimization. ► Monte Carlo method with scenario reduction is used to determine optimal control strategy of DGs.

  17. An Optimally Stable and Accurate Second-Order SSP Runge-Kutta IMEX Scheme for Atmospheric Applications

    Science.gov (United States)

    Rokhzadi, Arman; Mohammadian, Abdolmajid; Charron, Martin

    2018-01-01

    The objective of this paper is to develop an optimized implicit-explicit (IMEX) Runge-Kutta scheme for atmospheric applications focusing on stability and accuracy. Following the common terminology, the proposed method is called IMEX-SSP2(2,3,2), as it has second-order accuracy and is composed of diagonally implicit two-stage and explicit three-stage parts. This scheme enjoys the Strong Stability Preserving (SSP) property for both parts. This new scheme is applied to nonhydrostatic compressible Boussinesq equations in two different arrangements, including (i) semiimplicit and (ii) Horizontally Explicit-Vertically Implicit (HEVI) forms. The new scheme preserves the SSP property for larger regions of absolute monotonicity compared to the well-studied scheme in the same class. In addition, numerical tests confirm that the IMEX-SSP2(2,3,2) improves the maximum stable time step as well as the level of accuracy and computational cost compared to other schemes in the same class. It is demonstrated that the A-stability property as well as satisfying "second-stage order" and stiffly accurate conditions lead the proposed scheme to better performance than existing schemes for the applications examined herein.

  18. About positive, energy conservative and equilibrium state preserving schemes for the isotropic Fokker-Planck-Landau equation; Sur les schemas positifs, conservant l'energie et les etats d'equilibre pour l'equation de Fokker-Planck-Landau isotrope

    Energy Technology Data Exchange (ETDEWEB)

    Buet, Ch. [CEA Bruyeres-le-Chatel, Dept. des Sciences de la Simulation et de l' Information, 91 (France); Le Thanh, K.C. [CEA Bruyeres-le-Chatel, Dept. de Physique Theorique et Appliquee, 91 (France)

    2006-07-01

    The aim of this paper is to describe the discretization of the Fokker-Planck-Landau (FPL) collision term in the isotropic case which models the self collision for the electrons when they are totally isotropized by heavy particles background such as ions. The discussion focus on schemes which could preserve positivity, mass, energy and Maxwellian equilibrium. First, we analyze in detail the popular Chang and Cooper method for this non-linear collision term: derivation, conservation and positivity properties. We show that some variants of this method, based on the drift-diffusion form of the FPL operator, could not be positive or could not conserve the energy. We present a new variant of the Chang and Cooper method derived from the Landau form that is both positive and conservative. We also propose two new alternatives and simpler schemes for the FPL operator which show that the Chang and Cooper method is not the only way to construct positive, energy conservative and equilibrium state preserving schemes for this operator. For all these schemes, we explain clearly the properties of conservation of the density and the energy, the positivity of the solution and the conservation of the equilibrium states, or their lack. The case of Maxwellian and Coulombian potentials are emphasized. (authors)

  19. Design and simulation of a fuel cell hybrid emergency power system for a more electric aircraft: Evaluation of energy management schemes

    Science.gov (United States)

    Njoya Motapon, Souleman

    As the aircraft industries are moving toward more electric aircraft (MEA), the electrical peak load seen by the main and emergency generators becomes higher than in conventional aircraft. Consequently, there is a major concern regarding the aircraft emergency system, which consists of a ram air turbine (RAT) or air driven generator (ADG), to fulfill the load demand during critical situations; particularly at low aircraft speed where the output power is very low. A potential solution under study by most aircraft manufacturers is to replace the air turbine by a fuel cell hybrid system, consisting of fuel cell combined with other high power density sources such as supercapacitors or lithium-ion batteries. To ensure the fuel cell hybrid system will be able to meet the load demand, it must be properly designed and an effective energy management strategy must be tested with real situations load profile. This work aims at designing a fuel cell emergency power system of a more electric aircraft and comparing different energy management schemes (EMS); with the goal to ensure the load demand is fully satisfied within the constraints of each energy source. The fuel cell hybrid system considered in this study consists of fuel cell, lithium-ion batteries and supercapacitors, along with associated DC-DC and DC-AC converters. The energy management schemes addressed are state-of-the-art, most commonly used energy management techniques in fuel cell vehicle applications and include: the state machine control strategy, the rule based fuzzy logic strategy, the classical PI control strategy, the frequency decoupling/fuzzy logic control strategy and the equivalent consumption minimization strategy (ECMS). Moreover, a new optimal scheme based on maximizing the instantaneous energy of batteries/supercapacitors, to improve the fuel economy is proposed. An off-line optimization based scheme is also developed to ascertain the validity of the proposed strategy in terms of fuel consumption

  20. Derivation and Analysis of a Low-Cost, High-performance Analogue BPCM Control Scheme for Class-D Audio Power Amplifiers

    OpenAIRE

    Høyerby, Mikkel Christian Wendelboe; Andersen, Michael A. E.

    2005-01-01

    This paper presents a low-cost analogue control scheme for class-D audio power amplifiers. The scheme is based around bandpass current-mode (BPCM) control, and provides ample stability margins and low distortion over a wide range of operating conditions. Implementation is very simple and does not require the use of operational amplifiers. Small-signal behavior of the controller is accurately predicted, and design is carried out using standard transfer function based linear control methodology...

  1. The ZEUS data preservation project

    International Nuclear Information System (INIS)

    Malka, Janusz; Wichmann, Katarzyna

    2012-01-01

    A project to allow long term access and physics analysis of ZEUS data (ZEUS data preservation) has been established in collaboration with the DESY-IT group. In the ZEUS approach the analysis model is based on the Common Ntuple project, under development since 2006. The real data and all presently available Monte Carlo samples are being preserved in a flat ROOT ntuple format. There is ongoing work to provide the ability to simulate new, additional Monte Carlo samples also in the future. The validation framework of such a scheme using virtualisation techniques is being explored. The goal is to validate the frozen ZEUS software against future changes in hardware and operating system. A cooperation between ZEUS, DESY-IT and the library was established for document digitisation and long-term preservation of collaboration web pages. Part of the ZEUS internal documentation has already been stored within the HEP documentation system INSPIRE. Existing digital documentation, needed to perform physics analysis also in the future, is being centralised and completed.

  2. A Polar Fuzzy Control Scheme for Hybrid Power System Using Vehicle-To-Grid Technique

    Directory of Open Access Journals (Sweden)

    Mohammed Elsayed Lotfy

    2017-07-01

    Full Text Available A novel polar fuzzy (PF control approach for a hybrid power system is proposed in this research. The proposed control scheme remedies the issues of system frequency and the continuity of demand supply caused by renewable sources’ uncertainties. The hybrid power system consists of a wind turbine generator (WTG, solar photovoltaics (PV, a solar thermal power generator (STPG, a diesel engine generator (DEG, an aqua-electrolyzer (AE, an ultra-capacitor (UC, a fuel-cell (FC, and a flywheel (FW. Furthermore, due to the high cost of the battery energy storage system (BESS, a new idea of vehicle-to-grid (V2G control is applied to use the battery of the electric vehicle (EV as equivalent to large-scale energy storage units instead of small batteries to improve the frequency stability of the system. In addition, EV customers’ convenience is taken into account. A minimal-order observer is used to estimate the supply error. Then, the area control error (ACE signal is calculated in terms of the estimated supply error and the frequency deviation. ACE is considered in the frequency domain. Two PF approaches are utilized in the intended system. The mission of each controller is to mitigate one frequency component of ACE. The responsibility for ACE compensation is shared among all parts of the system according to their speed of response. The performance of the proposed control scheme is compared to the conventional fuzzy logic control (FLC. The effectiveness and robustness of the proposed control technique are verified by numerical simulations under various scenarios.

  3. Multiphase volume-preserving interface motions via localized signed distance vector scheme

    Czech Academy of Sciences Publication Activity Database

    Muhammad, R. Z.; Švadlenka, Karel

    2015-01-01

    Roč. 8, č. 5 (2015), s. 969-988 ISSN 1937-1632 Institutional support: RVO:67985840 Keywords : multiphase mean curvature flow * vector-valued signed distance * volume preservation Subject RIV: BA - General Mathematics Impact factor: 0.737, year: 2015 http://www.aimsciences.org/journals/displayArticlesnew.jsp?paperID=11386

  4. Research on the supercapacitor support schemes for LVRT of variable-frequency drive in the thermal power plant

    Science.gov (United States)

    Han, Qiguo; Zhu, Kai; Shi, Wenming; Wu, Kuayu; Chen, Kai

    2018-02-01

    In order to solve the problem of low voltage ride through(LVRT) of the major auxiliary equipment’s variable-frequency drive (VFD) in thermal power plant, the scheme of supercapacitor paralleled in the DC link of VFD is put forward, furthermore, two solutions of direct parallel support and voltage boost parallel support of supercapacitor are proposed. The capacitor values for the relevant motor loads are calculated according to the law of energy conservation, and they are verified by Matlab simulation. At last, a set of test prototype is set up, and the test results prove the feasibility of the proposed schemes.

  5. Principal scheme of preventive maintenance support system for nuclear power plants

    International Nuclear Information System (INIS)

    Nishiyama, Takuya; Terano, Takao; Yokoo, Takeshi; Shinohara, Yasushi

    1985-01-01

    It is of great importance to turn lessons learned from abnormal event experiences to advantage as well as taking apriori actions for prevention of abnormal events in nuclear power plants. From this point of view, a consultation system, named as Preventive Maintenance Support System (PMSS), which is to possess accumulated knowledges drawn from the past abnormal events in nuclear power plants infer occurrences, factors and developments of abnormal events and recommend preventive countermeasures on the basis of the knowledges, has been proposed. This report presents the principal scheme of PMSS. To begin with, following to the discussion of the purpose and use of PMSS, the fundamental functions PMSS should perform are specified. They are (1) event factors analyzation, (2) event prediction (event development estimation and analogous event estimation), (3) event significance evaluation and (4) preventive countermeasures presentation. In the next place, it is asserted that such a system should be constructed as a knowledge engineering one. Then, the R and D subjects and related schedule for PMSS are set up. (author)

  6. Well balancing of the SWE schemes for moving-water steady flows

    Science.gov (United States)

    Caleffi, Valerio; Valiani, Alessandro

    2017-08-01

    In this work, the exact reproduction of a moving-water steady flow via the numerical solution of the one-dimensional shallow water equations is studied. A new scheme based on a modified version of the HLLEM approximate Riemann solver (Dumbser and Balsara (2016) [18]) that exactly preserves the total head and the discharge in the simulation of smooth steady flows and that correctly dissipates mechanical energy in the presence of hydraulic jumps is presented. This model is compared with a selected set of schemes from the literature, including models that exactly preserve quiescent flows and models that exactly preserve moving-water steady flows. The comparison highlights the strengths and weaknesses of the different approaches. In particular, the results show that the increase in accuracy in the steady state reproduction is counterbalanced by a reduced robustness and numerical efficiency of the models. Some solutions to reduce these drawbacks, at the cost of increased algorithm complexity, are presented.

  7. An electromagnetic induced transparency-like scheme for wireless power transfer using dielectric resonators

    Science.gov (United States)

    Elnaggar, Sameh Y.

    2017-02-01

    Similar to the hybridization of three atoms, three coupled resonators interact to form bonding, anti-bonding, and non-bonding modes. The non-bonding mode enables an electromagnetic induced transparency like transfer of energy. Here, the non-bonding mode, resulting from the strong electric coupling of two dielectric resonators and an enclosure, is exploited to show that it is feasible to transfer power over a distance comparable to the operating wavelength. In this scheme, the enclosure acts as a mediator. The strong coupling permits the excitation of the non-bonding mode with high purity. This approach is different from resonant inductive coupling, which works in the sub-wavelength regime. Optimal loads and the corresponding maximum efficiency are determined using two independent methods: Coupled Mode Theory and Circuit modelling. It is shown that, unlike resonant inductive coupling, the figure of merit depends on the enclosure quality and not on the load, which emphasizes the role of the enclosure as a mediator. Briefly after the input excitation is turned on, the energy in the receiver builds up via all coupled and spurious modes. As time elapses, all modes except the non-bonding cease to sustain. Due to the strong coupling between the dielectrics and the enclosure, such systems have unique properties such as high and uniform efficiency over large distances and minimal fringing fields. These properties suggest that electromagnetic induced transparency like schemes that rely on the use of dielectric resonators can be used to power autonomous systems inside an enclosure or find applications when exposure to the fields needs to be minimal. Finite Element computations are used to verify the theoretical predictions by determining the transfer efficiency, field profile, and coupling coefficients for two different systems. It is shown that the three resonators must be present for efficient power transfer; if one or more are removed, the transfer efficiency reduces

  8. Construction of second order accurate monotone and stable residual distribution schemes for unsteady flow problems

    International Nuclear Information System (INIS)

    Abgrall, Remi; Mezine, Mohamed

    2003-01-01

    The aim of this paper is to construct upwind residual distribution schemes for the time accurate solution of hyperbolic conservation laws. To do so, we evaluate a space-time fluctuation based on a space-time approximation of the solution and develop new residual distribution schemes which are extensions of classical steady upwind residual distribution schemes. This method has been applied to the solution of scalar advection equation and to the solution of the compressible Euler equations both in two space dimensions. The first version of the scheme is shown to be, at least in its first order version, unconditionally energy stable and possibly conditionally monotonicity preserving. Using an idea of Csik et al. [Space-time residual distribution schemes for hyperbolic conservation laws, 15th AIAA Computational Fluid Dynamics Conference, Anahein, CA, USA, AIAA 2001-2617, June 2001], we modify the formulation to end up with a scheme that is unconditionally energy stable and unconditionally monotonicity preserving. Several numerical examples are shown to demonstrate the stability and accuracy of the method

  9. The Effects of Run-of-River Hydroelectric Power Schemes on Fish Community Composition in Temperate Streams and Rivers.

    Science.gov (United States)

    Bilotta, Gary S; Burnside, Niall G; Gray, Jeremy C; Orr, Harriet G

    2016-01-01

    The potential environmental impacts of large-scale storage hydroelectric power (HEP) schemes have been well-documented in the literature. In Europe, awareness of these potential impacts and limited opportunities for politically-acceptable medium- to large-scale schemes, have caused attention to focus on smaller-scale HEP schemes, particularly run-of-river (ROR) schemes, to contribute to meeting renewable energy targets. Run-of-river HEP schemes are often presumed to be less environmentally damaging than large-scale storage HEP schemes. However, there is currently a lack of peer-reviewed studies on their physical and ecological impact. The aim of this article was to investigate the effects of ROR HEP schemes on communities of fish in temperate streams and rivers, using a Before-After, Control-Impact (BACI) study design. The study makes use of routine environmental surveillance data collected as part of long-term national and international monitoring programmes at 23 systematically-selected ROR HEP schemes and 23 systematically-selected paired control sites. Six area-normalised metrics of fish community composition were analysed using a linear mixed effects model (number of species, number of fish, number of Atlantic salmon-Salmo salar, number of >1 year old Atlantic salmon, number of brown trout-Salmo trutta, and number of >1 year old brown trout). The analyses showed that there was a statistically significant effect (pcomposition. The implications of these findings are discussed in this article and recommendations are made for best-practice study design for future fish community impact studies.

  10. Wind power and market integration, comparative study of financing schemes

    International Nuclear Information System (INIS)

    2013-10-01

    The financing scheme of renewable energies is a key factor for their development pace and cost. As some countries like France, Germany or Spain have chosen a Feed-in Tariff (FiT) scheme, there are in fact four possible financing schemes: FiT, ex-post prime, ex-ante prime, and quotas (green certificates). A market convergence is then supposed to meet two main objectives: the control of market distortions related to wind energy development, and the optimization of wind energy production with respect to market signals. The authors analyse the underlying economic challenges and the ability of financing schemes to meet these objectives within a short term horizon (2015). They present the different financing schemes, analyse the impact of three key economic factors (market distortion, production optimization, financing costs)

  11. Airfoil noise computation use high-order schemes

    DEFF Research Database (Denmark)

    Zhu, Wei Jun; Shen, Wen Zhong; Sørensen, Jens Nørkær

    2007-01-01

    High-order finite difference schemes with at least 4th-order spatial accuracy are used to simulate aerodynamically generated noise. The aeroacoustic solver with 4th-order up to 8th-order accuracy is implemented into the in-house flow solver, EllipSys2D/3D. Dispersion-Relation-Preserving (DRP) fin...

  12. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  13. [Preservative-free glaucoma treatment : Selection of the correct treatment in 1 min].

    Science.gov (United States)

    Pfennigsdorf, S; Eschstruth, P

    2016-05-01

    The presence of preservatives in topical glaucoma treatments may impact ocular surface function and structure. For treatment to be effective, side effects need to be minimized, in order to promote compliance and allow continuation of therapy. Therefore, in daily clinical practice, it needs to be decided on an individual basis whether a preservative-free treatment is required. This study aimed to develop a questionnaire which helps to quickly and easily identify patients who require preservative-free treatment. A questionnaire was prepared to collect relevant clinical findings needed to make a therapeutic decision (preservative-free required? Yes/No). Moreover, a rating scheme was developed to enable efficient final assessment of the collected data. To check their practicability in daily clinical practice, both instruments were tested in 11 ophthalmological centers in Germany. The questionnaire and rating scheme were easy to use, integrated efficiently into everyday routine, and performed in about 1 min. Data of 1150 glaucoma patients were collected and preservative-free eyedrops recommended for 586 (51 %). Parameters most frequently associated with such a recommendation were a reduced tear film break-up time of preservative-free glaucoma threatment should be recommended. Individualized therapy decisions can thus be made, allowing goal-oriented use of preservative-free antiglaucomatosa. This might help to promote compliance and lead to reduced progression of glaucoma.

  14. Analysis of Program Obfuscation Schemes with Variable Encoding Technique

    Science.gov (United States)

    Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi

    Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.

  15. Sanitizing sensitive association rules using fuzzy correlation scheme

    International Nuclear Information System (INIS)

    Hameed, S.; Shahzad, F.; Asghar, S.

    2013-01-01

    Data mining is used to extract useful information hidden in the data. Sometimes this extraction of information leads to revealing sensitive information. Privacy preservation in Data Mining is a process of sanitizing sensitive information. This research focuses on sanitizing sensitive rules discovered in quantitative data. The proposed scheme, Privacy Preserving in Fuzzy Association Rules (PPFAR) is based on fuzzy correlation analysis. In this work, fuzzy set concept is integrated with fuzzy correlation analysis and Apriori algorithm to mark interesting fuzzy association rules. The identified rules are called sensitive. For sanitization, we use modification technique where we substitute maximum value of fuzzy items with zero, which occurs most frequently. Experiments demonstrate that PPFAR method hides sensitive rules with minimum modifications. The technique also maintains the modified data's quality. The PPFAR scheme has applications in various domains e.g. temperature control, medical analysis, travel time prediction, genetic behavior prediction etc. We have validated the results on medical dataset. (author)

  16. Numerical solution of modified differential equations based on symmetry preservation.

    Science.gov (United States)

    Ozbenli, Ersin; Vedula, Prakash

    2017-12-01

    In this paper, we propose a method to construct invariant finite-difference schemes for solution of partial differential equations (PDEs) via consideration of modified forms of the underlying PDEs. The invariant schemes, which preserve Lie symmetries, are obtained based on the method of equivariant moving frames. While it is often difficult to construct invariant numerical schemes for PDEs due to complicated symmetry groups associated with cumbersome discrete variable transformations, we note that symmetries associated with more convenient transformations can often be obtained by appropriately modifying the original PDEs. In some cases, modifications to the original PDEs are also found to be useful in order to avoid trivial solutions that might arise from particular selections of moving frames. In our proposed method, modified forms of PDEs can be obtained either by addition of perturbation terms to the original PDEs or through defect correction procedures. These additional terms, whose primary purpose is to enable symmetries with more convenient transformations, are then removed from the system by considering moving frames for which these specific terms go to zero. Further, we explore selection of appropriate moving frames that result in improvement in accuracy of invariant numerical schemes based on modified PDEs. The proposed method is tested using the linear advection equation (in one- and two-dimensions) and the inviscid Burgers' equation. Results obtained for these tests cases indicate that numerical schemes derived from the proposed method perform significantly better than existing schemes not only by virtue of improvement in numerical accuracy but also due to preservation of qualitative properties or symmetries of the underlying differential equations.

  17. BioDry: An Inexpensive, Low-Power Method to Preserve Aquatic Microbial Biomass at Room Temperature.

    Science.gov (United States)

    Tuorto, Steven J; Brown, Chris M; Bidle, Kay D; McGuinness, Lora R; Kerkhof, Lee J

    2015-01-01

    This report describes BioDry (patent pending), a method for reliably preserving the biomolecules associated with aquatic microbial biomass samples, without the need of hazardous materials (e.g. liquid nitrogen, preservatives, etc.), freezing, or bulky storage/sampling equipment. Gel electrophoresis analysis of nucleic acid extracts from samples treated in the lab with the BioDry method indicated that molecular integrity was protected in samples stored at room temperature for up to 30 days. Analysis of 16S/18S rRNA genes for presence/absence and relative abundance of microorganisms using both 454-pyrosequencing and TRFLP profiling revealed statistically indistinguishable communities from control samples that were frozen in liquid nitrogen immediately after collection. Seawater and river water biomass samples collected with a portable BioDry "field unit", constructed from off-the-shelf materials and a battery-operated pumping system, also displayed high levels of community rRNA preservation, despite a slight decrease in nucleic acid recovery over the course of storage for 30 days. Functional mRNA and protein pools from the field samples were also effectively conserved with BioDry, as assessed by respective RT-PCR amplification and western blot of ribulose-1-5-bisphosphate carboxylase/oxygenase. Collectively, these results demonstrate that BioDry can adequately preserve a suite of biomolecules from aquatic biomass at ambient temperatures for up to a month, giving it great potential for high resolution sampling in remote locations or on autonomous platforms where space and power are limited.

  18. BioDry: An Inexpensive, Low-Power Method to Preserve Aquatic Microbial Biomass at Room Temperature.

    Directory of Open Access Journals (Sweden)

    Steven J Tuorto

    Full Text Available This report describes BioDry (patent pending, a method for reliably preserving the biomolecules associated with aquatic microbial biomass samples, without the need of hazardous materials (e.g. liquid nitrogen, preservatives, etc., freezing, or bulky storage/sampling equipment. Gel electrophoresis analysis of nucleic acid extracts from samples treated in the lab with the BioDry method indicated that molecular integrity was protected in samples stored at room temperature for up to 30 days. Analysis of 16S/18S rRNA genes for presence/absence and relative abundance of microorganisms using both 454-pyrosequencing and TRFLP profiling revealed statistically indistinguishable communities from control samples that were frozen in liquid nitrogen immediately after collection. Seawater and river water biomass samples collected with a portable BioDry "field unit", constructed from off-the-shelf materials and a battery-operated pumping system, also displayed high levels of community rRNA preservation, despite a slight decrease in nucleic acid recovery over the course of storage for 30 days. Functional mRNA and protein pools from the field samples were also effectively conserved with BioDry, as assessed by respective RT-PCR amplification and western blot of ribulose-1-5-bisphosphate carboxylase/oxygenase. Collectively, these results demonstrate that BioDry can adequately preserve a suite of biomolecules from aquatic biomass at ambient temperatures for up to a month, giving it great potential for high resolution sampling in remote locations or on autonomous platforms where space and power are limited.

  19. High Order Semi-Lagrangian Advection Scheme

    Science.gov (United States)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  20. Dynamico-FE: A Structure-Preserving Hydrostatic Dynamical Core

    Science.gov (United States)

    Eldred, Christopher; Dubos, Thomas; Kritsikis, Evaggelos

    2017-04-01

    It is well known that the inviscid, adiabatic equations of atmospheric motion constitute a non-canonical Hamiltonian system, and therefore posses many important conserved quantities such as as mass, potential vorticity and total energy. In addition, there are also key mimetic properties (such as curl grad = 0) of the underlying continuous vector calculus. Ideally, a dynamical core should have similar properties. A general approach to deriving such structure-preserving numerical schemes has been developed under the frameworks of Hamiltonian methods and mimetic discretizations, and over the past decade, there has been a great deal of work on the development of atmospheric dynamical cores using these techniques. An important example is Dynamico, which conserves mass, potential vorticity and total energy; and possesses additional mimetic properties such as a curl-free pressure gradient. Unfortunately, the underlying finite-difference discretization scheme used in Dynamico has been shown to be inconsistent on general grids. To resolve these accuracy issues, a scheme based on mimetic Galerkin discretizations has been developed that achieves higher-order accuracy while retaining the structure-preserving properties of the existing discretization. This presentation will discuss the new dynamical core, termed Dynamico-FE, and show results from a standard set of test cases on both the plane and the sphere.

  1. Containment Domains: A Scalable, Efficient and Flexible Resilience Scheme for Exascale Systems

    Directory of Open Access Journals (Sweden)

    Jinsuk Chung

    2013-01-01

    Full Text Available This paper describes and evaluates a scalable and efficient resilience scheme based on the concept of containment domains. Containment domains are a programming construct that enable applications to express resilience needs and to interact with the system to tune and specialize error detection, state preservation and restoration, and recovery schemes. Containment domains have weak transactional semantics and are nested to take advantage of the machine and application hierarchies and to enable hierarchical state preservation, restoration and recovery. We evaluate the scalability and efficiency of containment domains using generalized trace-driven simulation and analytical analysis and show that containment domains are superior to both checkpoint restart and redundant execution approaches.

  2. Recent developments in structure-preserving algorithms for oscillatory differential equations

    CERN Document Server

    Wu, Xinyuan

    2018-01-01

    The main theme of this book is recent progress in structure-preserving algorithms for solving initial value problems of oscillatory differential equations arising in a variety of research areas, such as astronomy, theoretical physics, electronics, quantum mechanics and engineering. It systematically describes the latest advances in the development of structure-preserving integrators for oscillatory differential equations, such as structure-preserving exponential integrators, functionally fitted energy-preserving integrators, exponential Fourier collocation methods, trigonometric collocation methods, and symmetric and arbitrarily high-order time-stepping methods. Most of the material presented here is drawn from the recent literature. Theoretical analysis of the newly developed schemes shows their advantages in the context of structure preservation. All the new methods introduced in this book are proven to be highly effective compared with the well-known codes in the scientific literature. This book also addre...

  3. Starved Escherichia coli preserve reducing power under nitric oxide stress

    Energy Technology Data Exchange (ETDEWEB)

    Gowers, Glen-Oliver F. [Department of Molecular Biology, Princeton University, Princeton, NJ (United States); Robinson, Jonathan L. [Department of Chemical and Biological Engineering, Princeton University, Princeton, NJ (United States); Brynildsen, Mark P., E-mail: mbrynild@princeton.edu [Department of Molecular Biology, Princeton University, Princeton, NJ (United States); Department of Chemical and Biological Engineering, Princeton University, Princeton, NJ (United States)

    2016-07-15

    Nitric oxide (NO) detoxification enzymes, such as NO dioxygenase (NOD) and NO reductase (NOR), are important to the virulence of numerous bacteria. Pathogens use these defense systems to ward off immune-generated NO, and they do so in environments that contain additional stressors, such as reactive oxygen species, nutrient deprivation, and acid stress. NOD and NOR both use reducing equivalents to metabolically deactivate NO, which suggests that nutrient deprivation could negatively impact their functionality. To explore the relationship between NO detoxification and nutrient deprivation, we examined the ability of Escherichia coli to detoxify NO under different levels of carbon source availability in aerobic cultures. We observed failure of NO detoxification under both carbon source limitation and starvation, and those failures could have arisen from inabilities to synthesize Hmp (NOD of E. coli) and/or supply it with sufficient NADH (preferred electron donor). We found that when limited quantities of carbon source were provided, NO detoxification failed due to insufficient NADH, whereas starvation prevented Hmp synthesis, which enabled cells to maintain their NADH levels. This maintenance of NADH levels under starvation was confirmed to be dependent on the absence of Hmp. Intriguingly, these data show that under NO stress, carbon-starved E. coli are better positioned with regard to reducing power to cope with other stresses than cells that had consumed an exhaustible amount of carbon. -- Highlights: •Carbon source availability is critical to aerobic E. coli NO detoxification. •Carbon source starvation, under NO stress, preserves intracellular NADH levels. •Preservation of NADH depends on starvation-dependent inhibition of Hmp induction.

  4. A New Coordinated Voltage Control Scheme for Offshore AC Grid of HVDC Connected Offshore Wind Power Plants

    DEFF Research Database (Denmark)

    Sakamuri, Jayachandra N.; Cutululis, Nicolaos Antonio; Rather, Zakir Hussain

    2015-01-01

    This paper proposes a coordinated voltage control scheme (CVCS) which enhances the voltage ride through (VRT) capability of an offshore AC grid comprised of a cluster of offshore wind power plants (WPP) connected through AC cables to the offshore voltage source converter based high voltage DC (VSC......-HVDC) converter station. Due to limited short circuit power contribution from power electronic interfaced variable speed wind generators and with the onshore main grid decoupled by the HVDC link, the offshore AC grid becomes more vulnerable to dynamic voltage events. Therefore, a short circuit fault...... in the offshore AC Grid is likely to have significant implications on the voltage of the offshore AC grid, hence on the power flow to the onshore mainland grid. The proposed CVCS integrates individual local reactive power control of wind turbines and of the HVDC converter with the secondary voltage controller...

  5. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  6. Experience from design, prototyping and production of a DC–DC conversion powering scheme for the CMS Phase-1 Pixel Upgrade

    Energy Technology Data Exchange (ETDEWEB)

    Feld, Lutz, E-mail: Lutz.Feld@cern.ch; Karpinski, Waclaw; Klein, Katja; Lipinski, Martin; Preuten, Marius; Rauch, Max; Schmitz, Stefan; Wlochal, Michael

    2017-02-11

    The CMS pixel detector will be replaced during the technical stop 2016/2017. To allow the new pixel detector to be powered with the legacy cable plant and power supplies, a novel powering scheme based on DC–DC conversion will be employed. After the successful conclusion of an extensive development and prototyping phase, mass production of 1800 DC–DC converters as well as motherboards and other power PCBs has now been completed. This contribution reviews the lessons learned from the development of the power system for the Phase-1 pixel detector, and summarizes the experience gained from the production phase.

  7. Adaptive Digital Predistortion Schemes to Linearize RF Power Amplifiers with Memory Effects

    Institute of Scientific and Technical Information of China (English)

    ZHANG Peng; WU Si-liang; ZHANG Qin

    2008-01-01

    To compensate for nonlinear distortion introduced by RF power amplifiers (PAs) with memory effects, two correlated models, namely an extended memory polynomial (EMP) model and a memory lookup table (LUT) model, are proposed for predistorter design. Two adaptive digital predistortion (ADPD) schemes with indirect learning architecture are presented. One adopts the EMP model and the recursive least square (RLS) algorithm, and the other utilizes the memory LUT model and the least mean square (LMS) algorithm. Simulation results demonstrate that the EMP-based ADPD yields the best linearization performance in terms of suppressing spectral regrowth. It is also shown that the ADPD based on memory LUT makes optimum tradeoff between performance and computational complexity.

  8. Variation-Tolerant and Low-Power Source-Synchronous Multicycle On-Chip Interconnect Scheme

    Directory of Open Access Journals (Sweden)

    Maged Ghoneima

    2007-01-01

    The proposed multicycle bus scheme also leads to significant energy savings due to eliminating the power-hungry flip-flops and efficiently designing the source synchronization overhead. Moreover, eliminating intermediate flip-flops avoids the timing overhead of the setup time, the flip-flop delay, and the single-cycle clock jitter. This delay slack can then be translated into further energy savings by downsizing the repeaters. The significant delay jitter due to capacitive coupling has been addressed and solutions are put forward to alleviate it. Circuit simulations in a  65-nm process environment indicate that energy savings up to 20% are achievable for a 6-cycle 9 mm long 16-bit bus.

  9. Speeding up Monte Carlo molecular simulation by a non-conservative early rejection scheme

    KAUST Repository

    Kadoura, Ahmad Salim

    2015-04-23

    Monte Carlo (MC) molecular simulation describes fluid systems with rich information, and it is capable of predicting many fluid properties of engineering interest. In general, it is more accurate and representative than equations of state. On the other hand, it requires much more computational effort and simulation time. For that purpose, several techniques have been developed in order to speed up MC molecular simulations while preserving their precision. In particular, early rejection schemes are capable of reducing computational cost by reaching the rejection decision for the undesired MC trials at an earlier stage in comparison to the conventional scheme. In a recent work, we have introduced a ‘conservative’ early rejection scheme as a method to accelerate MC simulations while producing exactly the same results as the conventional algorithm. In this paper, we introduce a ‘non-conservative’ early rejection scheme, which is much faster than the conservative scheme, yet it preserves the precision of the method. The proposed scheme is tested for systems of structureless Lennard-Jones particles in both canonical and NVT-Gibbs ensembles. Numerical experiments were conducted at several thermodynamic conditions for different number of particles. Results show that at certain thermodynamic conditions, the non-conservative method is capable of doubling the speed of the MC molecular simulations in both canonical and NVT-Gibbs ensembles. © 2015 Taylor & Francis

  10. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  11. Compressibility-aware media retargeting with structure preserving.

    Science.gov (United States)

    Wang, Shu-Fan; Lai, Shang-Hong

    2011-03-01

    A number of algorithms have been proposed for intelligent image/video retargeting with image content retained as much as possible. However, they usually suffer from some artifacts in the results, such as ridge or structure twist. In this paper, we present a structure-preserving media retargeting technique that preserves the content and image structure as best as possible. Different from the previous pixel or grid based methods, we estimate the image content saliency from the structure of the content. A block structure energy is introduced with a top-down strategy to constrain the image structure inside to deform uniformly in either x or y direction. However, the flexibilities for retargeting are quite different for different images. To cope with this problem, we propose a compressibility assessment scheme for media retargeting by combining the entropies of image gradient magnitude and orientation distributions. Thus, the resized media is produced to preserve the image content and structure as best as possible. Our experiments demonstrate that the proposed method provides resized images/videos with better preservation of content and structure than those by the previous methods.

  12. Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency

    Science.gov (United States)

    Mohaisen, Abedelaziz; Jho, Nam-Su; Hong, Dowon; Nyang, Daehun

    Privacy preserving association rule mining algorithms have been designed for discovering the relations between variables in data while maintaining the data privacy. In this article we revise one of the recently introduced schemes for association rule mining using fake transactions (FS). In particular, our analysis shows that the FS scheme has exhaustive storage and high computation requirements for guaranteeing a reasonable level of privacy. We introduce a realistic definition of privacy that benefits from the average case privacy and motivates the study of a weakness in the structure of FS by fake transactions filtering. In order to overcome this problem, we improve the FS scheme by presenting a hybrid scheme that considers both privacy and resources as two concurrent guidelines. Analytical and empirical results show the efficiency and applicability of our proposed scheme.

  13. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.

  14. An On-Time Power-Aware Scheduling Scheme for Medical Sensor SoC-Based WBAN Systems

    OpenAIRE

    Hwang, Tae-Ho; Kim, Dong-Sun; Kim, Jung-Guk

    2012-01-01

    The focus of many leading technologies in the field of medical sensor systems is on low power consumption and robust data transmission. For example, the implantable cardioverter-defibrillator (ICD), which is used to maintain the heart in a healthy state, requires a reliable wireless communication scheme with an extremely low duty-cycle, high bit rate, and energy-efficient media access protocols. Because such devices must be sustained for over 5 years without access to battery replacement, the...

  15. On Secure NOMA Systems with Transmit Antenna Selection Schemes

    KAUST Repository

    Lei, Hongjiang; Zhang, Jianming; Park, Kihong; Xu, Peng; Ansari, Imran Shafique; Pan, Gaofeng; Alomair, Basel; Alouini, Mohamed-Slim

    2017-01-01

    This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple access systems. Both single-input and single-output and multiple-input and singleoutput systems with different transmit antenna selection (TAS) strategies are considered. Depending on whether the base station has the global channel state information of both the main and wiretap channels, the exact closed-form expressions for the secrecy outage probability (SOP) with suboptimal antenna selection and optimal antenna selection schemes are obtained and compared with the traditional space-time transmission scheme. To obtain further insights, the asymptotic analysis of the SOP in high average channel power gains regime is presented and it is found that the secrecy diversity order for all the TAS schemes with fixed power allocation is zero. Furthermore, an effective power allocation scheme is proposed to obtain the nonzero diversity order with all the TAS schemes. Monte-Carlo simulations are performed to verify the proposed analytical results.

  16. On Secure NOMA Systems with Transmit Antenna Selection Schemes

    KAUST Repository

    Lei, Hongjiang

    2017-08-09

    This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple access systems. Both single-input and single-output and multiple-input and singleoutput systems with different transmit antenna selection (TAS) strategies are considered. Depending on whether the base station has the global channel state information of both the main and wiretap channels, the exact closed-form expressions for the secrecy outage probability (SOP) with suboptimal antenna selection and optimal antenna selection schemes are obtained and compared with the traditional space-time transmission scheme. To obtain further insights, the asymptotic analysis of the SOP in high average channel power gains regime is presented and it is found that the secrecy diversity order for all the TAS schemes with fixed power allocation is zero. Furthermore, an effective power allocation scheme is proposed to obtain the nonzero diversity order with all the TAS schemes. Monte-Carlo simulations are performed to verify the proposed analytical results.

  17. Local bounds preserving stabilization for continuous Galerkin discretization of hyperbolic systems

    Science.gov (United States)

    Mabuza, Sibusiso; Shadid, John N.; Kuzmin, Dmitri

    2018-05-01

    The objective of this paper is to present a local bounds preserving stabilized finite element scheme for hyperbolic systems on unstructured meshes based on continuous Galerkin (CG) discretization in space. A CG semi-discrete scheme with low order artificial dissipation that satisfies the local extremum diminishing (LED) condition for systems is used to discretize a system of conservation equations in space. The low order artificial diffusion is based on approximate Riemann solvers for hyperbolic conservation laws. In this case we consider both Rusanov and Roe artificial diffusion operators. In the Rusanov case, two designs are considered, a nodal based diffusion operator and a local projection stabilization operator. The result is a discretization that is LED and has first order convergence behavior. To achieve high resolution, limited antidiffusion is added back to the semi-discrete form where the limiter is constructed from a linearity preserving local projection stabilization operator. The procedure follows the algebraic flux correction procedure usually used in flux corrected transport algorithms. To further deal with phase errors (or terracing) common in FCT type methods, high order background dissipation is added to the antidiffusive correction. The resulting stabilized semi-discrete scheme can be discretized in time using a wide variety of time integrators. Numerical examples involving nonlinear scalar Burgers equation, and several shock hydrodynamics simulations for the Euler system are considered to demonstrate the performance of the method. For time discretization, Crank-Nicolson scheme and backward Euler scheme are utilized.

  18. Power quality improvement by using STATCOM control scheme in wind energy generation interface to grid

    Science.gov (United States)

    Kirmani, Sheeraz; Kumar, Brijesh

    2018-01-01

    “Electric Power Quality (EPQ) is a term that refers to maintaining the near sinusoidal waveform of power distribution bus voltages and currents at rated magnitude and frequency”. Today customers are more aware of the seriousness that the power quality possesses, this prompt the utilities to assure good quality of power to their customer. The power quality is basically customer centric. Increased focus of utilities toward maintaining reliable power supply by employing power quality improvement tools has reduced the power outages and black out considerably. Good power quality is the characteristic of reliable power supply. Low power factor, harmonic pollution, load imbalance, fast voltage variations are some common parameters which are used to define the power quality. If the power quality issues are not checked i.e. the parameters that define power quality doesn't fall within the predefined standards than it will lead into high electricity bill, high running cost in industries, malfunctioning of equipments, challenges in connecting renewable. Capacitor banks, FACTS devices, harmonic filters, SVC’s (static voltage compensators), STATCOM (Static-Compensator) are the solutions to achieve the power quality. The performance of Wind turbine generators is affected by poor quality power, at the same time these wind power generating plant affects the power quality negatively. This paper presents the STATCOM-BESS (battery energy storage system) system and studies its impact on the power quality in a system which consists of wind turbine generator, non linear load, hysteresis controller for controlling the operation of STATCOM and grid. The model is simulated in the MATLAB/Simulink. This scheme mitigates the power quality issues, improves voltage profile and also reduces harmonic distortion of the waveforms. BESS level out the imbalances caused in real power due to intermittent nature of wind power available due to varying wind speeds.

  19. Hybrid Genetic Algorithm Fuzzy-Based Control Schemes for Small Power System with High-Penetration Wind Farms

    Directory of Open Access Journals (Sweden)

    Mohammed Elsayed Lotfy

    2018-03-01

    Full Text Available Wind is a clean, abundant, and inexhaustible source of energy. However, wind power is not constant, as windmill output is proportional to the cube of wind speed. As a result, the generated power of wind turbine generators (WTGs fluctuates significantly. Power fluctuation leads to frequency deviation and voltage flicker inside the system. This paper presents a new methodology for controlling system frequency and power. Two decentralized fuzzy logic-based control schemes with a high-penetration non-storage wind–diesel system are studied. First, one is implemented in the governor of conventional generators to damp frequency oscillation, while the other is applied to control the pitch angle system of wind turbines to smooth wind output power fluctuations and enhance the power system performance. A genetic algorithm (GA is employed to tune and optimize the membership function parameters of the fuzzy logic controllers to obtain optimal performance. The effectiveness of the suggested controllers is validated by time domain simulation for the standard IEEE nine-bus three-generator test system, including three wind farms. The robustness of the power system is checked under normal and faulty operating conditions.

  20. Nanofluidic crystal: a facile, high-efficiency and high-power-density scaling up scheme for energy harvesting based on nanofluidic reverse electrodialysis

    International Nuclear Information System (INIS)

    Ouyang Wei; Wang Wei; Zhang Haixia; Wu Wengang; Li Zhihong

    2013-01-01

    The great advances in nanotechnology call for advances in miniaturized power sources for micro/nano-scale systems. Nanofluidic channels have received great attention as promising high-power-density substitutes for ion exchange membranes for use in energy harvesting from ambient ionic concentration gradient, namely reverse electrodialysis. This paper proposes the nanofluidic crystal (NFC), of packed nanoparticles in micro-meter-sized confined space, as a facile, high-efficiency and high-power-density scaling-up scheme for energy harvesting by nanofluidic reverse electrodialysis (NRED). Obtained from the self-assembly of nanoparticles in a micropore, the NFC forms an ion-selective network with enormous nanochannels due to electrical double-layer overlap in the nanoparticle interstices. As a proof-of-concept demonstration, a maximum efficiency of 42.3 ± 1.84%, a maximum power density of 2.82 ± 0.22 W m −2 , and a maximum output power of 1.17 ± 0.09 nW/unit (nearly three orders of magnitude of amplification compared to other NREDs) were achieved in our prototype cell, which was prepared within 30 min. The current NFC-based prototype cell can be parallelized and cascaded to achieve the desired output power and open circuit voltage. This NFC-based scaling-up scheme for energy harvesting based on NRED is promising for the building of self-powered micro/nano-scale systems. (paper)

  1. Support schemes and ownership structures - the policy context for fuel cell based micro-combined heat and power

    Science.gov (United States)

    Schroeder, Sascha Thorsten; Costa, Ana; Obé, Elisabeth

    In recent years, fuel cell based micro-combined heat and power (mCHP) has received increasing attention due to its potential contribution to European energy policy goals, i.e., sustainability, competitiveness and security of supply. Besides technical advances, regulatory framework and ownership structures are of crucial importance in order to achieve greater diffusion of the technology in residential applications. This paper analyses the interplay of policy and ownership structures for the future deployment of mCHP. Furthermore, it regards the three country cases Denmark, France and Portugal. Firstly, the implications of different kinds of support schemes on investment risk and the diffusion of a technology are explained conceptually. Secondly, ownership arrangements are addressed. Then, a cross-country comparison on present support schemes for mCHP and competing technologies discusses the national implementation of European legislation in Denmark, France and Portugal. Finally, resulting implications for ownership arrangements on the choice of support scheme are explained. From a conceptual point of view, investment support, feed-in tariffs and price premiums are the most appropriate schemes for fuel cell mCHP. This can be used for improved analysis of operational strategies. The interaction of this plethora of elements necessitates careful balancing from a private- and socio-economic point of view.

  2. Testing of an acoustic smolt deflection system, Blantyre hydroelectric power scheme

    International Nuclear Information System (INIS)

    1996-01-01

    The aim of this study was to test the effectiveness of an underwater acoustic barrier as a means of preventing the entry of salmon (Salmo salar) and sea trout (Salmo trutta) smolts and other fish into the water intake of a hydro-electric power (HEP) station. A secondary objective was to measure the injury rate of fish passed through the turbine, so that the risk to any fish that penetrated the acoustic barrier could also be determined. The test site, which was a 575kW Kaplan plant located at Blantyre on the R. Clyde, Lanarkshire, was selected as being representative of run-of-river sites currently being developed under the Government's NFFO (Non-Fossil Fuel Obligation) and SRO (Scottish Renewables Order) schemes. A further objective was to disseminate information arising from the project to the scientific and HEP community. (author)

  3. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  4. The effects of run-of-river hydroelectric power schemes on invertebrate community composition in temperate streams and rivers.

    Science.gov (United States)

    Bilotta, Gary S; Burnside, Niall G; Turley, Matthew D; Gray, Jeremy C; Orr, Harriet G

    2017-01-01

    Run-of-river (ROR) hydroelectric power (HEP) schemes are often presumed to be less ecologically damaging than large-scale storage HEP schemes. However, there is currently limited scientific evidence on their ecological impact. The aim of this article is to investigate the effects of ROR HEP schemes on communities of invertebrates in temperate streams and rivers, using a multi-site Before-After, Control-Impact (BACI) study design. The study makes use of routine environmental surveillance data collected as part of long-term national and international monitoring programmes at 22 systematically-selected ROR HEP schemes and 22 systematically-selected paired control sites. Five widely-used family-level invertebrate metrics (richness, evenness, LIFE, E-PSI, WHPT) were analysed using a linear mixed effects model. The analyses showed that there was a statistically significant effect (p<0.05) of ROR HEP construction and operation on the evenness of the invertebrate community. However, no statistically significant effects were detected on the four other metrics of community composition. The implications of these findings are discussed in this article and recommendations are made for best-practice study design for future invertebrate community impact studies.

  5. Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Rasoolzadegan, Abbas

    2016-11-01

    Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.

  6. Topology preserving non-rigid image registration using time-varying elasticity model for MRI brain volumes.

    Science.gov (United States)

    Ahmad, Sahar; Khan, Muhammad Faisal

    2015-12-01

    In this paper, we present a new non-rigid image registration method that imposes a topology preservation constraint on the deformation. We propose to incorporate the time varying elasticity model into the deformable image matching procedure and constrain the Jacobian determinant of the transformation over the entire image domain. The motion of elastic bodies is governed by a hyperbolic partial differential equation, generally termed as elastodynamics wave equation, which we propose to use as a deformation model. We carried out clinical image registration experiments on 3D magnetic resonance brain scans from IBSR database. The results of the proposed registration approach in terms of Kappa index and relative overlap computed over the subcortical structures were compared against the existing topology preserving non-rigid image registration methods and non topology preserving variant of our proposed registration scheme. The Jacobian determinant maps obtained with our proposed registration method were qualitatively and quantitatively analyzed. The results demonstrated that the proposed scheme provides good registration accuracy with smooth transformations, thereby guaranteeing the preservation of topology. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. A solar PV augmented hybrid scheme for enhanced wind power generation through improved control strategy for grid connected doubly fed induction generator

    Directory of Open Access Journals (Sweden)

    Adikanda Parida

    2016-12-01

    Full Text Available In this paper, a wind power generation scheme using a grid connected doubly fed induction generator (DFIG augmented with solar PV has been proposed. A reactive power-based rotor speed and position estimation technique with reduced machine parameter sensitivity is also proposed to improve the performance of the DFIG controller. The estimation algorithm is based on model reference adaptive system (MRAS, which uses the air gap reactive power as the adjustable variable. The overall generation reliability of the wind energy conversion system can be considerably improved as both solar and wind energy can supplement each other during lean periods of either of the sources. The rotor-side DC-link voltage and active power generation at the stator terminals of the DFIG are maintained constant with minimum storage battery capacity using single converter arrangement without grid-side converter (GSC. The proposed scheme has been simulated and experimentally validated with a practical 2.5 kW DFIG using dSPACE CP1104 module which produced satisfactory results.

  8. A well-balanced scheme for Ten-Moment Gaussian closure equations with source term

    Science.gov (United States)

    Meena, Asha Kumari; Kumar, Harish

    2018-02-01

    In this article, we consider the Ten-Moment equations with source term, which occurs in many applications related to plasma flows. We present a well-balanced second-order finite volume scheme. The scheme is well-balanced for general equation of state, provided we can write the hydrostatic solution as a function of the space variables. This is achieved by combining hydrostatic reconstruction with contact preserving, consistent numerical flux, and appropriate source discretization. Several numerical experiments are presented to demonstrate the well-balanced property and resulting accuracy of the proposed scheme.

  9. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  10. Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud

    OpenAIRE

    Tu, Tengfei; Rao, Lu; Zhang, Hua; Wen, Qiaoyan; Xiao, Jia

    2017-01-01

    As information technology develops, cloud storage has been widely accepted for keeping volumes of data. Remote data auditing scheme enables cloud user to confirm the integrity of her outsourced file via the auditing against cloud storage, without downloading the file from cloud. In view of the significant computational cost caused by the auditing process, outsourced auditing model is proposed to make user outsource the heavy auditing task to third party auditor (TPA). Although the first outso...

  11. Privacy-preserving security solution for cloud services

    OpenAIRE

    L. Malina; J. Hajny; P. Dzurenda; V. Zeman

    2015-01-01

    We propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their...

  12. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  13. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  14. Shape Preserving Interpolation Using C2 Rational Cubic Spline

    Directory of Open Access Journals (Sweden)

    Samsul Ariffin Abdul Karim

    2016-01-01

    Full Text Available This paper discusses the construction of new C2 rational cubic spline interpolant with cubic numerator and quadratic denominator. The idea has been extended to shape preserving interpolation for positive data using the constructed rational cubic spline interpolation. The rational cubic spline has three parameters αi, βi, and γi. The sufficient conditions for the positivity are derived on one parameter γi while the other two parameters αi and βi are free parameters that can be used to change the final shape of the resulting interpolating curves. This will enable the user to produce many varieties of the positive interpolating curves. Cubic spline interpolation with C2 continuity is not able to preserve the shape of the positive data. Notably our scheme is easy to use and does not require knots insertion and C2 continuity can be achieved by solving tridiagonal systems of linear equations for the unknown first derivatives di, i=1,…,n-1. Comparisons with existing schemes also have been done in detail. From all presented numerical results the new C2 rational cubic spline gives very smooth interpolating curves compared to some established rational cubic schemes. An error analysis when the function to be interpolated is ft∈C3t0,tn is also investigated in detail.

  15. Physical renormalization schemes and asymptotic safety in quantum gravity

    Science.gov (United States)

    Falls, Kevin

    2017-12-01

    The methods of the renormalization group and the ɛ -expansion are applied to quantum gravity revealing the existence of an asymptotically safe fixed point in spacetime dimensions higher than two. To facilitate this, physical renormalization schemes are exploited where the renormalization group flow equations take a form which is independent of the parameterisation of the physical degrees of freedom (i.e. the gauge fixing condition and the choice of field variables). Instead the flow equation depends on the anomalous dimensions of reference observables. In the presence of spacetime boundaries we find that the required balance between the Einstein-Hilbert action and Gibbons-Hawking-York boundary term is preserved by the beta functions. Exploiting the ɛ -expansion near two dimensions we consider Einstein gravity coupled to matter. Scheme independence is generically obscured by the loop-expansion due to breaking of two-dimensional Weyl invariance. In schemes which preserve two-dimensional Weyl invariance we avoid the loop expansion and find a unique ultraviolet (UV) fixed point. At this fixed point the anomalous dimensions are large and one must resum all loop orders to obtain the critical exponents. Performing the resummation a set of universal scaling dimensions are found. These scaling dimensions show that only a finite number of matter interactions are relevant. This is a strong indication that quantum gravity is renormalizable.

  16. Design of a Control Scheme for Distribution Static Synchronous Compensators with Power-Quality Improvement Capability

    Directory of Open Access Journals (Sweden)

    Pedro Roncero-Sànchez

    2014-04-01

    Full Text Available Electric power systems are among the greatest achievements of the last century. Today, important issues, such as an ever-increasing demand, the flexible and reliable integration of distributed generation or a growth in disturbing loads, must be borne in mind. In this context, smart grids play a key role, allowing better efficiency of power systems. Power electronics provides solutions to the aforementioned matters, since it allows various energy sources to be integrated into smart grids. Nevertheless, the design of the various control schemes that are necessary for the correct operation of the power-electronic interface is a very important issue that must always be taken into consideration. This paper deals with the design of the control system of a distribution static synchronous compensator (DSTATCOM based on flying-capacitor multilevel converters. The control system is tailored to compensate for both voltage sags by means of reactive-power injection and voltage imbalances caused by unbalanced loads. The design of the overall control is carried out by using the root-locus and frequency-response techniques, improving both the transient response and the steady-state error of the closed-loop system. Simulation results obtained using PSCADTM/EMTDCTM (Manitoba Hydro International Ltd., Commerce Drive, Winnipeg, MB, Canada show the resultant voltage regulation.

  17. Preserving anonymity in e-voting system using voter non-repudiation oriented scheme

    Science.gov (United States)

    Hamid, Isredza Rahmi A.; Radzi, Siti Nafishah Md; Rahman, Nurul Hidayah Ab; Wen, Chuah Chai; Abdullah, Nurul Azma

    2017-10-01

    The voting system has been developed from traditional paper ballot to electronic voting (e-voting). The e-voting system has high potential to be widely used in election event. However, the e-voting system still does not meet the most important security properties which are voter's authenticity and non-repudiation. This is because voters can simply vote again by entering other people's identification number. In this project, an electronic voting using voter non-repudiation oriented scheme will be developed. This system contains ten modules which are log in, vote session, voter, candidate, open session, voting results, user account, initial score, logs and reset vote count. In order to ensure there would be no non-repudiation issue, a voter non-repudiation oriented scheme concept will be adapted and implemented in the system. This system will be built using Microsoft Visual Studio 2013 which only can be accessed using personal computers at the voting center. This project will be beneficial for future use in order to overcome non-repudiation issue.

  18. Real-time-service-based Distributed Scheduling Scheme for IEEE 802.16j Networks

    OpenAIRE

    Kuo-Feng Huang; Shih-Jung Wu

    2013-01-01

    Supporting Quality of Service (QoS) guarantees for diverse multimedia services is the primary concern for IEEE802.16j networks. A scheduling scheme that satisfies the QoS requirements has become more important for wireless communications. We proposed an adaptive nontransparent-based distributed scheduling scheme (ANDS) for IEEE 802.16j networks. ANDS comprises three major components: Priority Assignment, Resource Allocation, Preserved Bandwidth Adjustment. Different service-type connections p...

  19. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  20. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    Full Text Available Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  1. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    Science.gov (United States)

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  2. Preserving ‘Great Power Status’: The Complex Case of the British Intervention in the Falklands (1982

    Directory of Open Access Journals (Sweden)

    Grandpierron Matthieu

    2017-09-01

    Full Text Available This article aims to examine the importance of an often overlooked argument when it comes to explaining why great powers go to war against a weaker actor. This argument involves great power status considerations. The article argues that states care deeply about their status, especially states which are current and former great powers, and would opt to go to war to preserve this status even if the political and military consequences of such intervention are negligible to objective observers. To illustrate this argument, I will be looking at why the British decided to reestablish their sovereignty over the Falklands in 1982. The empirical part of the analysis is based on formerly secret documents declassified by the British government. This qualitative primary analysis of British documents provides new insights about the crisis and suggests that status considerations played a large role in the British decision to re-conquer the Falklands.

  3. Charge-conserving FEM-PIC schemes on general grids

    International Nuclear Information System (INIS)

    Campos Pinto, M.; Jund, S.; Salmon, S.; Sonnendruecker, E.

    2014-01-01

    Particle-In-Cell (PIC) solvers are a major tool for the understanding of the complex behavior of a plasma or a particle beam in many situations. An important issue for electromagnetic PIC solvers, where the fields are computed using Maxwell's equations, is the problem of discrete charge conservation. In this article, we aim at proposing a general mathematical formulation for charge-conserving finite-element Maxwell solvers coupled with particle schemes. In particular, we identify the finite-element continuity equations that must be satisfied by the discrete current sources for several classes of time-domain Vlasov-Maxwell simulations to preserve the Gauss law at each time step, and propose a generic algorithm for computing such consistent sources. Since our results cover a wide range of schemes (namely curl-conforming finite element methods of arbitrary degree, general meshes in two or three dimensions, several classes of time discretization schemes, particles with arbitrary shape factors and piecewise polynomial trajectories of arbitrary degree), we believe that they provide a useful roadmap in the design of high-order charge-conserving FEM-PIC numerical schemes. (authors)

  4. New IES scheme for power conditioning at ultra-high currents: from concept to MHD modeling and first experiments

    International Nuclear Information System (INIS)

    Chuvatin, Alexandre S.; Aranchuk, Leonid E.; Rudakov, Leonid I.; Kokshenev, Vladimir A.; Kurmaev, Nikolai E.; Fursov, Fiodor I.; Huet, Dominique; Gasilov, Vladimir A.; Krukovskii, Alexandre Yu.

    2002-01-01

    This work introduces an inductive energy storage (IES) scheme which aims pulsed-power conditioning at multi- MJ energies. The key element of the scheme represents an additional plasma volume, where a magnetically accelerated wire array is used for inductive current switching. This plasma acceleration volume is connected in parallel to a microsecond capacitor bank and to a 100-ns current ruse-time useful load. Simple estimates suggest that optimized scheme parameters could be reachable even when operating at ultra-high currents. We describe first proof-of-principle experiments carried out on GIT12 generator at the wire-array current level of 2 MA. The obtained confirmation of the concept consists in generation of a 200 kV voltage directly at an inductive load. This load voltage value can be already sufficient to transfer the available magnetic energy into kinetic energy of a liner at this current level. Two-dimensional modeling with the radiational MHD numerical tool Marple confirms the development of inductive voltage in the system. However, the average voltage increase is accompanied by short-duration voltage drops due to interception of the current by the low-density upstream plasma. Upon our viewpoint, this instability of the current distribution represents the main physical limitation to the scheme performance

  5. High-Order Hyperbolic Residual-Distribution Schemes on Arbitrary Triangular Grids

    Science.gov (United States)

    Mazaheri, Alireza; Nishikawa, Hiroaki

    2015-01-01

    In this paper, we construct high-order hyperbolic residual-distribution schemes for general advection-diffusion problems on arbitrary triangular grids. We demonstrate that the second-order accuracy of the hyperbolic schemes can be greatly improved by requiring the scheme to preserve exact quadratic solutions. We also show that the improved second-order scheme can be easily extended to third-order by further requiring the exactness for cubic solutions. We construct these schemes based on the LDA and the SUPG methodology formulated in the framework of the residual-distribution method. For both second- and third-order-schemes, we construct a fully implicit solver by the exact residual Jacobian of the second-order scheme, and demonstrate rapid convergence of 10-15 iterations to reduce the residuals by 10 orders of magnitude. We demonstrate also that these schemes can be constructed based on a separate treatment of the advective and diffusive terms, which paves the way for the construction of hyperbolic residual-distribution schemes for the compressible Navier-Stokes equations. Numerical results show that these schemes produce exceptionally accurate and smooth solution gradients on highly skewed and anisotropic triangular grids, including curved boundary problems, using linear elements. We also present Fourier analysis performed on the constructed linear system and show that an under-relaxation parameter is needed for stabilization of Gauss-Seidel relaxation.

  6. Four-state discrimination scheme beyond the heterodyne limit

    DEFF Research Database (Denmark)

    Muller, C. R.; Castaneda, Mario A. Usuga; Wittmann, C.

    2012-01-01

    We propose and experimentally demonstrate a hybrid discrimination scheme for the quadrature phase shift keying protocol, which outperforms heterodyne detection for any signal power. The discrimination is composed of a quadrature measurement, feed forward and photon detection.......We propose and experimentally demonstrate a hybrid discrimination scheme for the quadrature phase shift keying protocol, which outperforms heterodyne detection for any signal power. The discrimination is composed of a quadrature measurement, feed forward and photon detection....

  7. Exact Finite-Difference Schemes for d-Dimensional Linear Stochastic Systems with Constant Coefficients

    Directory of Open Access Journals (Sweden)

    Peng Jiang

    2013-01-01

    Full Text Available The authors attempt to construct the exact finite-difference schemes for linear stochastic differential equations with constant coefficients. The explicit solutions to Itô and Stratonovich linear stochastic differential equations with constant coefficients are adopted with the view of providing exact finite-difference schemes to solve them. In particular, the authors utilize the exact finite-difference schemes of Stratonovich type linear stochastic differential equations to solve the Kubo oscillator that is widely used in physics. Further, the authors prove that the exact finite-difference schemes can preserve the symplectic structure and first integral of the Kubo oscillator. The authors also use numerical examples to prove the validity of the numerical methods proposed in this paper.

  8. Implicit and explicit schemes for mass consistency preservation in hybrid particle/finite-volume algorithms for turbulent reactive flows

    International Nuclear Information System (INIS)

    Popov, Pavel P.; Pope, Stephen B.

    2014-01-01

    This work addresses the issue of particle mass consistency in Large Eddy Simulation/Probability Density Function (LES/PDF) methods for turbulent reactive flows. Numerical schemes for the implicit and explicit enforcement of particle mass consistency (PMC) are introduced, and their performance is examined in a representative LES/PDF application, namely the Sandia–Sydney Bluff-Body flame HM1. A new combination of interpolation schemes for velocity and scalar fields is found to better satisfy PMC than multilinear and fourth-order Lagrangian interpolation. A second-order accurate time-stepping scheme for stochastic differential equations (SDE) is found to improve PMC relative to Euler time stepping, which is the first time that a second-order scheme is found to be beneficial, when compared to a first-order scheme, in an LES/PDF application. An explicit corrective velocity scheme for PMC enforcement is introduced, and its parameters optimized to enforce a specified PMC criterion with minimal corrective velocity magnitudes

  9. Perona Malik anisotropic diffusion model using Peaceman Rachford scheme on digital radiographic image

    International Nuclear Information System (INIS)

    Halim, Suhaila Abd; Razak, Rohayu Abd; Ibrahim, Arsmah; Manurung, Yupiter HP

    2014-01-01

    In image processing, it is important to remove noise without affecting the image structure as well as preserving all the edges. Perona Malik Anisotropic Diffusion (PMAD) is a PDE-based model which is suitable for image denoising and edge detection problems. In this paper, the Peaceman Rachford scheme is applied on PMAD to remove unwanted noise as the scheme is efficient and unconditionally stable. The capability of the scheme to remove noise is evaluated on several digital radiography weld defect images computed using MATLAB R2009a. Experimental results obtained show that the Peaceman Rachford scheme improves the image quality substantially well based on the Peak Signal to Noise Ratio (PSNR). The Peaceman Rachford scheme used in solving the PMAD model successfully removes unwanted noise in digital radiographic image

  10. Perona Malik anisotropic diffusion model using Peaceman Rachford scheme on digital radiographic image

    Energy Technology Data Exchange (ETDEWEB)

    Halim, Suhaila Abd; Razak, Rohayu Abd; Ibrahim, Arsmah [Center of Mathematics Studies, Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA, 40450 Shah Alam. Selangor DE (Malaysia); Manurung, Yupiter HP [Advanced Manufacturing Technology Excellence Center (AMTEx), Faculty of Mechanical Engineering, Universiti Teknologi MARA, 40450 Shah Alam. Selangor DE (Malaysia)

    2014-06-19

    In image processing, it is important to remove noise without affecting the image structure as well as preserving all the edges. Perona Malik Anisotropic Diffusion (PMAD) is a PDE-based model which is suitable for image denoising and edge detection problems. In this paper, the Peaceman Rachford scheme is applied on PMAD to remove unwanted noise as the scheme is efficient and unconditionally stable. The capability of the scheme to remove noise is evaluated on several digital radiography weld defect images computed using MATLAB R2009a. Experimental results obtained show that the Peaceman Rachford scheme improves the image quality substantially well based on the Peak Signal to Noise Ratio (PSNR). The Peaceman Rachford scheme used in solving the PMAD model successfully removes unwanted noise in digital radiographic image.

  11. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    Directory of Open Access Journals (Sweden)

    Weirong Cui

    Full Text Available Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched, and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  12. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    Science.gov (United States)

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  13. A faster numerical scheme for a coupled system modeling soil erosion and sediment transport

    Science.gov (United States)

    Le, M.-H.; Cordier, S.; Lucas, C.; Cerdan, O.

    2015-02-01

    Overland flow and soil erosion play an essential role in water quality and soil degradation. Such processes, involving the interactions between water flow and the bed sediment, are classically described by a well-established system coupling the shallow water equations and the Hairsine-Rose model. Numerical approximation of this coupled system requires advanced methods to preserve some important physical and mathematical properties; in particular, the steady states and the positivity of both water depth and sediment concentration. Recently, finite volume schemes based on Roe's solver have been proposed by Heng et al. (2009) and Kim et al. (2013) for one and two-dimensional problems. In their approach, an additional and artificial restriction on the time step is required to guarantee the positivity of sediment concentration. This artificial condition can lead the computation to be costly when dealing with very shallow flow and wet/dry fronts. The main result of this paper is to propose a new and faster scheme for which only the CFL condition of the shallow water equations is sufficient to preserve the positivity of sediment concentration. In addition, the numerical procedure of the erosion part can be used with any well-balanced and positivity preserving scheme of the shallow water equations. The proposed method is tested on classical benchmarks and also on a realistic configuration.

  14. Efficient positive, conservative, Maxwellian preserving and implicit difference schemes for the 1-D isotropic Fokker-Planck-Landau equation; Schemas positifs, implicites, conservant l'energie et les etats d'equilibre pour l'equation de Fokker-Planck-Landau isotrope

    Energy Technology Data Exchange (ETDEWEB)

    Buet, Ch. [CEA Bruyeres-le-Chatel, Dept. Sciences de la Simulation et de l' Information, Service Numerique Environnement et Constantes, 91 (France); Le Thanh, K.C. [CEA Bruyeres-le-Chatel, Service Physique des Plasmas et Electromagnetisme, 91 (France). Dept. de Physique Theorique et Appliquee

    2008-07-01

    The aim of this paper is to describe the discretization of the Fokker-Planck-Landau (FPL) collision term in the isotropic case, which models the self-collision for the electrons when they are totally isotropized by heavy particles background such as ions. The discussion focuses on schemes, which could preserve positivity, mass, energy and Maxwellian equilibrium. The Chang and Cooper method is widely used by plasma's physicists for the FPL equation (and for Fokker-Planck type equations). We present a new variant that is both positive and conservative contrary to the existing one's. We propose also a non Chang and Cooper 'type scheme on non-uniform grid, which is also both positive, conservative and equilibrium state preserving contrary to existing one's. The case of Coulombian potential is emphasized. We address also the problem of the time discretization. In particular we show how to recast some implicit methods to get band diagonal system and to solve it by direct method with a linear cost. (authors)

  15. A distributed model predictive control based load frequency control scheme for multi-area interconnected power system using discrete-time Laguerre functions.

    Science.gov (United States)

    Zheng, Yang; Zhou, Jianzhong; Xu, Yanhe; Zhang, Yuncheng; Qian, Zhongdong

    2017-05-01

    This paper proposes a distributed model predictive control based load frequency control (MPC-LFC) scheme to improve control performances in the frequency regulation of power system. In order to reduce the computational burden in the rolling optimization with a sufficiently large prediction horizon, the orthonormal Laguerre functions are utilized to approximate the predicted control trajectory. The closed-loop stability of the proposed MPC scheme is achieved by adding a terminal equality constraint to the online quadratic optimization and taking the cost function as the Lyapunov function. Furthermore, the treatments of some typical constraints in load frequency control have been studied based on the specific Laguerre-based formulations. Simulations have been conducted in two different interconnected power systems to validate the effectiveness of the proposed distributed MPC-LFC as well as its superiority over the comparative methods. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  16. Nuclear Knowledge Preservation in Croatia

    International Nuclear Information System (INIS)

    Pleslic, S.; Novosel, N.

    2006-01-01

    Since the International Atomic Energy Agency (IAEA, Vienna, Austria) was founded in 1957 as an autonomous intergovernmental organization, it was authorized for exchange of technical and scientific information on peaceful uses of atomic energy. 35 years ago the International Nuclear Information System (INIS) was established from IAEA as an international bibliographic database in the nuclear field and in nuclear related areas. INIS as an instrument for a comprehensive and systematic dissemination of all information and knowledge becomes a big technological and science information system with 134 Members (114 countries and 20 international organizations). In INIS Membership Arrangements all Members are responsible for the collection, selection, description of information and providing the Agency with the full text of each item of non-conventional literature. Participation of each Member is important because decentralized information management is an operational philosophy of INIS. During all these years status of nuclear power changed significantly in the world. Some developing countries started to develop nuclear power programme and some developed countries showed tendency to decrease use of nuclear power. Anyway, expert knowledge accumulated over decades and the achievements in the field of nuclear science and technology have to be preserved and later transferred to future generations. It became obvious that the INIS is practically a pioneer in the area of nuclear knowledge preservation with well defined goals of knowledge preservation: selection of the most valuable information to convey to the future, ensuring that it remains accessible, readable and understandable and management of technological change. Main components of knowledge preservation are: selection of information for preservation including evaluation and prioritisation by value, use and risk, information capture (purchasing, copy, digitise, web links), describing, classifying, store and access

  17. An Enhanced Islanding Microgrid Reactive Power, Imbalance Power, and Harmonic Power Sharing Scheme

    DEFF Research Database (Denmark)

    He, Jinwei; Lin, Yun Wei; Blaabjerg, Frede

    2015-01-01

    To address inaccurate power sharing problems in autonomous islanding microgrids, an enhanced droop control method through online virtual impedance adjustment is proposed. First, a term associated with DG reactive power, imbalance power, or harmonic power is added to the conventional real power...

  18. The St. Niklausen drinking-water powered, small hydro scheme in Bad Ragaz; Gemeinde Bad Ragaz - Trinkwasserkraftwerk St. Niklausen - Vorstudie Bericht

    Energy Technology Data Exchange (ETDEWEB)

    Rueesch, T.

    2009-04-15

    This report for the Swiss Federal Office of Energy (SFOE) takes a look at the results a preliminary study on the installation of a drinking-water powered small hydro scheme in Bad Ragaz, Switzerland. The installation of new pressure pipes and a new balancing reservoir are proposed. Three variants are proposed and discussed, two of which are considered as being economically viable. The various new installations and components proposed are described and discussed. Investment considerations, energy production and costs are looked at as well as support from the Swiss scheme for the cost-covering remuneration for electricity from renewable energy sources. The report is augmented with photos and plans.

  19. preservation of audio-visual records at National Archives

    African Journals Online (AJOL)

    Walter

    ... where the equipment and power supply might not be readily available. ... of information beyond the written word and they serve as direct and powerful ... preservation of mankind's collective memory, and access to information by citizens.

  20. Globalization and Localization of Heritage Preservation in Taiwan - an Analysis Perspective under the Cultural Heritage Preservation Act

    Science.gov (United States)

    Chen, C.-C.; Fu, C.-C.

    2015-08-01

    The key contribution to the legislation of heritage preservation in Taiwan primarily derived from the historical monument movements in the 1970s. Specific legislation results include the establishment of Council for Cultural Affairs and the implementation of the Cultural Heritage Preservation Act in 1982. Although the Cultural Heritage Preservation Act is the first subjective cultural act, its lack of structure during the initial commencement stages made it un-conducive to heritage preservation and thus unable to meet the people's expectations. Therefore, throughout the 33 years after the implementation of the Cultural Heritage Preservation Act, the Act has been amended 6 times. These amendments reflect the degree of importance that the society has attached to heritage preservation, and the innovative system also showcases the progress in preservation concepts and methods. These innovative orientations, such as emphasizing on the authenticity and integrity of heritage preservation, intangible cultural heritage, and cultural diversity, conform to the international preservation trends. They are also local trends such as encouraging community participation, adaptive-reuse, or enhancing the local governments' powers to implement local cultural governance. This is particularly true for the fifth comprehensive revision in 2005, which has symbolic significance because its contents epitomized the heritage preservation work while moving Taiwan's heritage preservation system towards globalization and localization. Therefore, we analyzed the Cultural Heritage Preservation Act amendment and revision processes over the past 33 years to highlight the innovations in Taiwan's cultural heritage work and illustrate their globalization and localization features. Finally, we proposed recommendations for Taiwan's preservation work in the future as the Cultural Heritage Preservation Act is about to undergo its seventh amendment in 2015.

  1. Alternating Direction Implicit (ADI) schemes for a PDE-based image osmosis model

    Science.gov (United States)

    Calatroni, L.; Estatico, C.; Garibaldi, N.; Parisotto, S.

    2017-10-01

    We consider Alternating Direction Implicit (ADI) splitting schemes to compute efficiently the numerical solution of the PDE osmosis model considered by Weickert et al. in [10] for several imaging applications. The discretised scheme is shown to preserve analogous properties to the continuous model. The dimensional splitting strategy traduces numerically into the solution of simple tridiagonal systems for which standard matrix factorisation techniques can be used to improve upon the performance of classical implicit methods, even for large time steps. Applications to the shadow removal problem are presented.

  2. Joint multiuser switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa

    2012-12-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, we devise two schemes for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme selects the user that reports the best channel quality. In order to alleviate the high feedback load associated with the first scheme, we develop a second scheme based on the concept of switched diversity where the base station scans the users in a sequential manner until an acceptable user is found. In addition to these two selection schemes, we consider two power adaptive settings at the secondary users based on the amount of interference available at the secondary transmitter. In the On/Off power setting, users are allowed to transmit based on whether the interference constraint is met or not, while in the full power adaptive setting, the users are allowed to vary their transmission power to satisfy the interference constraint. Finally, we present numerical results for our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load for both schemes. © 2012 IEEE.

  3. Joint multiuser switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa; Abdallah, Mohamed M.; Serpedin, Erchin; Alouini, Mohamed-Slim; Alnuweiri, Hussein M.

    2012-01-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, we devise two schemes for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme selects the user that reports the best channel quality. In order to alleviate the high feedback load associated with the first scheme, we develop a second scheme based on the concept of switched diversity where the base station scans the users in a sequential manner until an acceptable user is found. In addition to these two selection schemes, we consider two power adaptive settings at the secondary users based on the amount of interference available at the secondary transmitter. In the On/Off power setting, users are allowed to transmit based on whether the interference constraint is met or not, while in the full power adaptive setting, the users are allowed to vary their transmission power to satisfy the interference constraint. Finally, we present numerical results for our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load for both schemes. © 2012 IEEE.

  4. An Evaluation of Interference Mitigation Schemes for HAPS Systems

    Directory of Open Access Journals (Sweden)

    Nam Kim

    2008-07-01

    Full Text Available The International Telecommunication Union-Radiocommunication sector (ITU-R has conducted frequency sharing studies between fixed services (FSs using a high altitude platform station (HAPS and fixed-satellite services (FSSs. In particular, ITU-R has investigated the power limitations related to HAPS user terminals (HUTs to facilitate frequency sharing with space station receivers. To reduce the level of interference from the HUTs that can harm a geostationary earth orbit (GEO satellite receiver in a space station, previous studies have taken two approaches: frequency sharing using a separated distance (FSSD and frequency sharing using power control (FSPC. In this paper, various performance evaluation results of interference mitigation schemes are presented. The results include performance evaluations using a new interference mitigation approach as well as conventional approaches. An adaptive beamforming scheme (ABS is introduced as a new scheme for efficient frequency sharing, and the interference mitigation effect on the ABS is examined considering pointing mismatch errors. The results confirm that the application of ABS enables frequency sharing between two systems with a smaller power reduction of HUTs in a cocoverage area compared to this reduction when conventional schemes are utilized. In addition, the analysis results provide the proper amount of modification at the transmitting power level of the HUT required for the suitable frequency sharing.

  5. Cost-based droop scheme for DC microgrid

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Wang, Peng; Loh, Poh Chiang

    2014-01-01

    voltage level, less on optimized operation and control of generation sources. The latter theme is perused in this paper, where cost-based droop scheme is proposed for distributed generators (DGs) in DC microgrids. Unlike traditional proportional power sharing based droop scheme, the proposed scheme......-connected operation. Most importantly, the proposed scheme can reduce overall total generation cost in DC microgrids without centralized controller and communication links. The performance of the proposed scheme has been verified under different load conditions.......DC microgrids are gaining interest due to higher efficiencies of DC distribution compared with AC. The benefits of DC systems have been widely researched for data centers, IT facilities and residential applications. The research focus, however, has been more on system architecture and optimal...

  6. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  7. Poly(4-vinylphenol) gate insulator with cross-linking using a rapid low-power microwave induction heating scheme for organic thin-film-transistors

    Science.gov (United States)

    Fan, Ching-Lin; Shang, Ming-Chi; Hsia, Mao-Yuan; Wang, Shea-Jue; Huang, Bohr-Ran; Lee, Win-Der

    2016-03-01

    A Microwave-Induction Heating (MIH) scheme is proposed for the poly(4-vinylphenol) (PVP) gate insulator cross-linking process to replace the traditional oven heating cross-linking process. The cross-linking time is significantly decreased from 1 h to 5 min by heating the metal below the PVP layer using microwave irradiation. The necessary microwave power was substantially reduced to about 50 W by decreasing the chamber pressure. The MIH scheme is a good candidate to replace traditional thermal heating for cross-linking of PVP as the gate insulator for organic thin-film-transistors.

  8. Robust second-order scheme for multi-phase flow computations

    Science.gov (United States)

    Shahbazi, Khosro

    2017-06-01

    A robust high-order scheme for the multi-phase flow computations featuring jumps and discontinuities due to shock waves and phase interfaces is presented. The scheme is based on high-order weighted-essentially non-oscillatory (WENO) finite volume schemes and high-order limiters to ensure the maximum principle or positivity of the various field variables including the density, pressure, and order parameters identifying each phase. The two-phase flow model considered besides the Euler equations of gas dynamics consists of advection of two parameters of the stiffened-gas equation of states, characterizing each phase. The design of the high-order limiter is guided by the findings of Zhang and Shu (2011) [36], and is based on limiting the quadrature values of the density, pressure and order parameters reconstructed using a high-order WENO scheme. The proof of positivity-preserving and accuracy is given, and the convergence and the robustness of the scheme are illustrated using the smooth isentropic vortex problem with very small density and pressure. The effectiveness and robustness of the scheme in computing the challenging problem of shock wave interaction with a cluster of tightly packed air or helium bubbles placed in a body of liquid water is also demonstrated. The superior performance of the high-order schemes over the first-order Lax-Friedrichs scheme for computations of shock-bubble interaction is also shown. The scheme is implemented in two-dimensional space on parallel computers using message passing interface (MPI). The proposed scheme with limiter features approximately 50% higher number of inter-processor message communications compared to the corresponding scheme without limiter, but with only 10% higher total CPU time. The scheme is provably second-order accurate in regions requiring positivity enforcement and higher order in the rest of domain.

  9. A novel powering scheme based on DC-DC conversion for the luminosity upgrades of the CMS tracking system at CERN

    International Nuclear Information System (INIS)

    Sammet, Jan

    2014-01-01

    The instantaneous luminosity of the LHC is expected to reach 2 x 10 34 s -1 cm -2 and 5 x 10 34 s -1 cm -2 around the years 2019 and 2024, respectively. After the second upgrade the LHC will be referred to as the High Luminosity LHC (HL-LHC). In order to benefit from the higher luminosities, CMS foresees to upgrade its pixel detector during an extended winter shutdown of the LHC at the end of 2016 and the beginning of 2017. During a long shutdown of the LHC over the years 2022 and 2023, it is foreseen to install a completely new tracking system in CMS. Both upgrades are expected to result in the need to provide more electric current to the detector. However, power losses in cables already contribute 50% to the power consumption of the present tracker and rise with the current squared. Since no more space is available for cables, and thicker cables within the tracking volume spoil the material budget of the detector, new powering schemes are considered mandatory. CMS foresees the use of radiation tolerant DC-DC converters on the front-end to reduce power losses on cables. This thesis describes the new powering scheme of the CMS pixel detector and discusses the options with respect to a new strip tracker. A radiation and magnetic field tolerant DC-DC converter prototype, the PIXV8A, is introduced and the research that led to its development is summarised. The PIXV8A has been developed for the application in the pixel upgrade and is also a first approach for a DC-DC converter for the later upgrade of the CMS tracking system. The PIXV8A makes use of the AMIS4 chip, which has been proven to stay operational for total ionising doses of up to 1 MGy and fluences of up to 10 15 n eq /cm 2 . With an input voltage of 10 V, the PIXV8A converter provides an efficiency of about 80% for output voltages of 2.5 V and 3.0 V. Within this thesis the robustness of the novel powering scheme and the qualification of the PIXV8A are demonstrated in several tests, including system test

  10. An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Xiuxiu Jiang

    2017-05-01

    Full Text Available Symmetric searchable encryption for cloud storage enables users to retrieve the documents they want in a privacy-preserving way, which has become a hotspot of research. In this paper, we propose an efficient keyword search scheme over encrypted cloud data. We firstly adopt a structure named as inverted matrix (IM to build search index. The IM is consisted of index vectors, each of which is associated with a keyword. Then we map a keyword to an address used to locate the corresponding index vector. Finally, we mask index vectors with pseudo-random bits to obtain an encrypted enlarged inverted matrix (EEIM. Through the security analysis and experimental evaluation, we demonstrate the privacy and efficiency of our scheme respectively. In addition, we further consider two extended practical search situations, i.e., occurrence queries and dynamic user management, and then give two relevant schemes.

  11. A 600-µW ultra-low-power associative processor for image pattern recognition employing magnetic tunnel junction-based nonvolatile memories with autonomic intelligent power-gating scheme

    Science.gov (United States)

    Ma, Yitao; Miura, Sadahiko; Honjo, Hiroaki; Ikeda, Shoji; Hanyu, Takahiro; Ohno, Hideo; Endoh, Tetsuo

    2016-04-01

    A novel associative processor using magnetic tunnel junction (MTJ)-based nonvolatile memories has been proposed and fabricated under a 90 nm CMOS/70 nm perpendicular-MTJ (p-MTJ) hybrid process for achieving the exceptionally low-power performance of image pattern recognition. A four-transistor 2-MTJ (4T-2MTJ) spin transfer torque magnetoresistive random access memory was adopted to completely eliminate the standby power. A self-directed intelligent power-gating (IPG) scheme specialized for this associative processor is employed to optimize the operation power by only autonomously activating currently accessed memory cells. The operations of a prototype chip at 20 MHz are demonstrated by measurement. The proposed processor can successfully carry out single texture pattern matching within 6.5 µs using 128-dimension bag-of-feature patterns, and the measured average operation power of the entire processor core is only 600 µW. Compared with the twin chip designed with 6T static random access memory, 91.2% power reductions are achieved. More than 88.0% power reductions are obtained compared with the latest associative memories. The further power performance analysis is discussed in detail, which verifies the special superiority of the proposed processor in power consumption for large-capacity memory-based VLSI systems.

  12. Energy harvesting schemes for building interior environment monitoring

    Science.gov (United States)

    Zylka, Pawel; Pociecha, Dominik

    2016-11-01

    A vision to supply microelectronic devices without batteries making them perpetual or extending time of service in battery-oriented mobile supply schemes is the driving force of the research related to ambient energy harvesting. Energy harnessing aims thus at extracting energy from various ambient energy "pools", which generally are cost- or powerineffective to be scaled up for full-size, power-plant energy generation schemes supplying energy in electric form. These include - but are not limited to - waste heat, electromagnetic hum, vibrations, or human-generated power in addition to traditional renewable energy resources like water flow, tidal and wind energy or sun radiation which can also be exploited at the miniature scale by energy scavengers. However, in case of taking advantage of energy harvesting strategies to power up sensors monitoring environment inside buildings adaptable energy sources are restrained to only some which additionally are limited in spatial and temporal accessibility as well as available power. The paper explores experimentally an energy harvesting scheme exploiting human kinesis applicable in indoor environment for supplying a wireless indoor micro-system, monitoring ambient air properties (pressure, humidity and temperature).

  13. A privacy-preserving sharing method of electricity usage using self-organizing map

    Directory of Open Access Journals (Sweden)

    Yuichi Nakamura

    2018-03-01

    Full Text Available Smart meters for measuring electricity usage are expected in electricity usage management. Although the relevant power supplier stores the measured data, the data are worth sharing among power suppliers because the entire data of a city will be required to control the regional grid stability or demand–supply balance. Even though many techniques and methods of privacy-preserving data mining have been studied to share data while preserving data privacy, a study on sharing electricity usage data is still lacking. In this paper, we propose a sharing method of electricity usage while preserving data privacy using a self-organizing map. Keywords: Privacy preserving, Data sharing, Self-Organizing map

  14. Yellow light for green scheme

    International Nuclear Information System (INIS)

    Morch, Stein

    2004-01-01

    The article asserts that there could be an investment boom for wind, hydro and bio power in a common Norwegian-Swedish market scheme for green certificates. The Swedish authorities are ready, and the Norwegian government is preparing a report to the Norwegian Parliament. What are the ambitions of Norway, and will hydro power be included? A green certificate market common to more countries have never before been established and requires the solution of many challenging problems. In Sweden, certificate support is expected to promote primarily bioenergy, wind power and small-scale hydro power. In Norway there is an evident potential for wind power, and more hydro power can be developed if desired

  15. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    ) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...

  16. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  17. Load shedding scheme in the south/southeastern interconnected system

    Energy Technology Data Exchange (ETDEWEB)

    Vieira Filho, Xisto; Couri, J J.G.; Gomes, P; Almeida, P C [ELETROBRAS, Rio de Janeiro, RJ (Brazil)

    1988-12-31

    This paper presents some characteristics of the Brazilian interconnected system and discusses the load shedding scheme in its different stages considering the beginning of operation of the Itaipu power plant. The present situation of the South and Southeastern load shedding scheme combination is also commented. Finally, the interconnected system evolution and the effects on the load shedding schemes are discussed. 4 refs., 5 figs., 2 tabs.

  18. Institutional analysis of incentive schemes for ecosystem service provision - a comparative study across four European countries

    DEFF Research Database (Denmark)

    Prokofieva, Irina; Górriz, Elena; Boon, Tove Enggrob

    2014-01-01

    Incentive schemes and payments for ecosystem services attract increasing attention as a means for aligning the interests of landowners and society by remunerating forest owners for the goods and services their forests produce. As incentive schemes expand around the world, questions related...... and Italy. The analysed schemes are predominantly aimed at enhancing biodiversity and improving recreation. One of the schemes is also related to preserving a variety of forest ecosystem services from forest fires. The incentive schemes are studied following a framework for the institutional analysis of PES...... developed by Prokofieva and Gorriz (Prokofieva, I. and Gorriz, E. 2013: Institutional analysis of incentives for the provision of forest goods and services: an assessment of incentive schemes in Catalonia (North-East Spain), Forest Policy and Economics, 37, 104-114.). We focus on actor and institutional...

  19. The parity-preserving massive QED3: Vanishing β-function and no parity anomaly

    Directory of Open Access Journals (Sweden)

    O.M. Del Cima

    2015-11-01

    Full Text Available The parity-preserving massive QED3 exhibits vanishing gauge coupling β-function and is parity and infrared anomaly free at all orders in perturbation theory. Parity is not an anomalous symmetry, even for the parity-preserving massive QED3, in spite of some claims about the possibility of a perturbative parity breakdown, called parity anomaly. The proof is done by using the algebraic renormalization method, which is independent of any regularization scheme, based on general theorems of perturbative quantum field theory.

  20. An Evaluation of Interference Mitigation Schemes for HAPS Systems

    Directory of Open Access Journals (Sweden)

    Kim Nam

    2008-01-01

    Full Text Available Abstract The International Telecommunication Union-Radiocommunication sector (ITU-R has conducted frequency sharing studies between fixed services (FSs using a high altitude platform station (HAPS and fixed-satellite services (FSSs. In particular, ITU-R has investigated the power limitations related to HAPS user terminals (HUTs to facilitate frequency sharing with space station receivers. To reduce the level of interference from the HUTs that can harm a geostationary earth orbit (GEO satellite receiver in a space station, previous studies have taken two approaches: frequency sharing using a separated distance (FSSD and frequency sharing using power control (FSPC. In this paper, various performance evaluation results of interference mitigation schemes are presented. The results include performance evaluations using a new interference mitigation approach as well as conventional approaches. An adaptive beamforming scheme (ABS is introduced as a new scheme for efficient frequency sharing, and the interference mitigation effect on the ABS is examined considering pointing mismatch errors. The results confirm that the application of ABS enables frequency sharing between two systems with a smaller power reduction of HUTs in a cocoverage area compared to this reduction when conventional schemes are utilized. In addition, the analysis results provide the proper amount of modification at the transmitting power level of the HUT required for the suitable frequency sharing.

  1. On the security of two remote user authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  2. Poly(4-vinylphenol gate insulator with cross-linking using a rapid low-power microwave induction heating scheme for organic thin-film-transistors

    Directory of Open Access Journals (Sweden)

    Ching-Lin Fan

    2016-03-01

    Full Text Available A Microwave-Induction Heating (MIH scheme is proposed for the poly(4-vinylphenol (PVP gate insulator cross-linking process to replace the traditional oven heating cross-linking process. The cross-linking time is significantly decreased from 1 h to 5 min by heating the metal below the PVP layer using microwave irradiation. The necessary microwave power was substantially reduced to about 50 W by decreasing the chamber pressure. The MIH scheme is a good candidate to replace traditional thermal heating for cross-linking of PVP as the gate insulator for organic thin-film-transistors.

  3. An accurate autonomous islanding microgrid reactive power, imbalance power and harmonic power sharing scheme

    DEFF Research Database (Denmark)

    He, Jinwei; Li, Yun Wei; Blaabjerg, Frede

    2013-01-01

    To address inaccurate power sharing problems in autonomous islanding microgrids, an enhanced droop control method through adaptive virtual impedance adjustment is proposed. First, a term associated with DG reactive power, imbalance power or harmonic power is added to the conventional real power...

  4. Management and construction of a major zero discharge water supply and treatment scheme at Mount Piper Power Station, Australia

    Energy Technology Data Exchange (ETDEWEB)

    Wong, P.; Docker, P.; Gabbrielli, E.; Wade, P. [Pacific Power, Sydney, NSW (Australia)

    1994-09-01

    Excellence in the organisation and management of a large multi-disciplinary design and construct project such as the zero discharge water supply and treatment scheme for Mount Piper coal-fired power station was essential to its successful execution. This paper discusses the management philosophies and strategies of Pacific Power and Transfield-PWT Asia/Pacific that resulted in this project being completed to the satisfaction of the client in the minimum time without delays and cost increases caused by interfaces between the parties. It highlights the advantages of contract packaging and placing the total responsibility for the performance and integration of a complex project system on one organisation. 2 refs., 6 figs.

  5. A Secure and Privacy-Preserving Targeted Ad-System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven M.

    Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.

  6. Wavelet domain image restoration with adaptive edge-preserving regularization.

    Science.gov (United States)

    Belge, M; Kilmer, M E; Miller, E L

    2000-01-01

    In this paper, we consider a wavelet based edge-preserving regularization scheme for use in linear image restoration problems. Our efforts build on a collection of mathematical results indicating that wavelets are especially useful for representing functions that contain discontinuities (i.e., edges in two dimensions or jumps in one dimension). We interpret the resulting theory in a statistical signal processing framework and obtain a highly flexible framework for adapting the degree of regularization to the local structure of the underlying image. In particular, we are able to adapt quite easily to scale-varying and orientation-varying features in the image while simultaneously retaining the edge preservation properties of the regularizer. We demonstrate a half-quadratic algorithm for obtaining the restorations from observed data.

  7. An inter-lighting interference cancellation scheme for MISO-VLC systems

    Science.gov (United States)

    Kim, Kyuntak; Lee, Kyujin; Lee, Kyesan

    2017-08-01

    In this paper, we propose an inter-lighting interference cancellation (ILIC) scheme to reduce the interference between adjacent light-emitting diodes (LEDs) and enhance the transmission capacity of multiple-input-single-output (MISO)-visible light communication (VLC) systems. In indoor environments, multiple LEDs have normally been used as lighting sources, allowing the design of MISO-VLC systems. To enhance the transmission capacity, different data should be simultaneously transmitted from each LED; however, that can lead to interference between adjacent LEDs. In that case, relatively low-received power signals are subjected to large interference because wireless optical systems generally use intensity modulation and direct detection. Thus, only the signal with the highest received power can be detected, while the other received signals cannot be detected. To solve this problem, we propose the ILIC scheme for MISO-VLC systems. The proposed scheme preferentially detects the highest received power signal, and this signal is referred as interference signal by an interference component generator. Then, relatively low-received power signal can be detected by cancelling the interference signal from the total received signals. Therefore, the performance of the proposed scheme can improve the total average bit error rate and throughput of a MISO-VLC system.

  8. A Liouville-operator derived measure-preserving integrator for molecular dynamics simulations in the isothermal-isobaric ensemble

    International Nuclear Information System (INIS)

    Tuckerman, Mark E; Alejandre, Jose; Lopez-Rendon, Roberto; Jochim, Andrea L; Martyna, Glenn J

    2006-01-01

    The constant-pressure, constant-temperature (NPT) molecular dynamics approach is re-examined from the viewpoint of deriving a new measure-preserving reversible geometric integrator for the equations of motion. The underlying concepts of non-Hamiltonian phase-space analysis, measure-preserving integrators and the symplectic property for Hamiltonian systems are briefly reviewed. In addition, current measure-preserving schemes for the constant-volume, constant-temperature ensemble are also reviewed. A new geometric integrator for the NPT method is presented, is shown to preserve the correct phase-space volume element and is demonstrated to perform well in realistic examples. Finally, a multiple time-step version of the integrator is presented for treating systems with motion on several time scales

  9. Support schemes and market design in international offshore grids

    DEFF Research Database (Denmark)

    Schröder, Sascha Thorsten

    2013-01-01

    International offshore grids can combine the grid connection of offshore wind parks with the possibility for international power trading in the future. This paper investigates the choice of support scheme and power market design in international offshore grids and derives resulting incentives...... support. For a stable investment framework in the near future, a tendering/feed-in tariff may be the best choice. It avoids exposing wind farms to balancing with multiple countries. In the long run, also other support scheme options may be of interest....

  10. An upwind space-time conservation element and solution element scheme for solving dusty gas flow model

    Science.gov (United States)

    Rehman, Asad; Ali, Ishtiaq; Qamar, Shamsul

    An upwind space-time conservation element and solution element (CE/SE) scheme is extended to numerically approximate the dusty gas flow model. Unlike central CE/SE schemes, the current method uses the upwind procedure to derive the numerical fluxes through the inner boundary of conservation elements. These upwind fluxes are utilized to calculate the gradients of flow variables. For comparison and validation, the central upwind scheme is also applied to solve the same dusty gas flow model. The suggested upwind CE/SE scheme resolves the contact discontinuities more effectively and preserves the positivity of flow variables in low density flows. Several case studies are considered and the results of upwind CE/SE are compared with the solutions of central upwind scheme. The numerical results show better performance of the upwind CE/SE method as compared to the central upwind scheme.

  11. Is my network module preserved and reproducible?

    Directory of Open Access Journals (Sweden)

    Peter Langfelder

    2011-01-01

    Full Text Available In many applications, one is interested in determining which of the properties of a network module change across conditions. For example, to validate the existence of a module, it is desirable to show that it is reproducible (or preserved in an independent test network. Here we study several types of network preservation statistics that do not require a module assignment in the test network. We distinguish network preservation statistics by the type of the underlying network. Some preservation statistics are defined for a general network (defined by an adjacency matrix while others are only defined for a correlation network (constructed on the basis of pairwise correlations between numeric variables. Our applications show that the correlation structure facilitates the definition of particularly powerful module preservation statistics. We illustrate that evaluating module preservation is in general different from evaluating cluster preservation. We find that it is advantageous to aggregate multiple preservation statistics into summary preservation statistics. We illustrate the use of these methods in six gene co-expression network applications including 1 preservation of cholesterol biosynthesis pathway in mouse tissues, 2 comparison of human and chimpanzee brain networks, 3 preservation of selected KEGG pathways between human and chimpanzee brain networks, 4 sex differences in human cortical networks, 5 sex differences in mouse liver networks. While we find no evidence for sex specific modules in human cortical networks, we find that several human cortical modules are less preserved in chimpanzees. In particular, apoptosis genes are differentially co-expressed between humans and chimpanzees. Our simulation studies and applications show that module preservation statistics are useful for studying differences between the modular structure of networks. Data, R software and accompanying tutorials can be downloaded from the following webpage: http://www.genetics.ucla.edu/labs/horvath/CoexpressionNetwork/ModulePreservation.

  12. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  13. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Directory of Open Access Journals (Sweden)

    Hakjun Lee

    Full Text Available With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  14. Nucleart, cultural inheritance and nuclear preservation

    International Nuclear Information System (INIS)

    Anon.

    1978-01-01

    Application of gamma radiation to the preservation of artistic objects: destruction of living organisms by irradiation to a suitable dose and possibility to initiate and control polymerization of organic monomers. Penetrating power of gamma rays allows treatment of thick objects [fr

  15. Complexity Management Using Metrics for Trajectory Flexibility Preservation and Constraint Minimization

    Science.gov (United States)

    Idris, Husni; Shen, Ni; Wing, David J.

    2011-01-01

    The growing demand for air travel is increasing the need for mitigating air traffic congestion and complexity problems, which are already at high levels. At the same time new surveillance, navigation, and communication technologies are enabling major transformations in the air traffic management system, including net-based information sharing and collaboration, performance-based access to airspace resources, and trajectory-based rather than clearance-based operations. The new system will feature different schemes for allocating tasks and responsibilities between the ground and airborne agents and between the human and automation, with potential capacity and cost benefits. Therefore, complexity management requires new metrics and methods that can support these new schemes. This paper presents metrics and methods for preserving trajectory flexibility that have been proposed to support a trajectory-based approach for complexity management by airborne or ground-based systems. It presents extensions to these metrics as well as to the initial research conducted to investigate the hypothesis that using these metrics to guide user and service provider actions will naturally mitigate traffic complexity. The analysis showed promising results in that: (1) Trajectory flexibility preservation mitigated traffic complexity as indicated by inducing self-organization in the traffic patterns and lowering traffic complexity indicators such as dynamic density and traffic entropy. (2)Trajectory flexibility preservation reduced the potential for secondary conflicts in separation assurance. (3) Trajectory flexibility metrics showed potential application to support user and service provider negotiations for minimizing the constraints imposed on trajectories without jeopardizing their objectives.

  16. An upwind space-time conservation element and solution element scheme for solving dusty gas flow model

    Directory of Open Access Journals (Sweden)

    Asad Rehman

    Full Text Available An upwind space-time conservation element and solution element (CE/SE scheme is extended to numerically approximate the dusty gas flow model. Unlike central CE/SE schemes, the current method uses the upwind procedure to derive the numerical fluxes through the inner boundary of conservation elements. These upwind fluxes are utilized to calculate the gradients of flow variables. For comparison and validation, the central upwind scheme is also applied to solve the same dusty gas flow model. The suggested upwind CE/SE scheme resolves the contact discontinuities more effectively and preserves the positivity of flow variables in low density flows. Several case studies are considered and the results of upwind CE/SE are compared with the solutions of central upwind scheme. The numerical results show better performance of the upwind CE/SE method as compared to the central upwind scheme. Keywords: Dusty gas flow, Solid particles, Upwind schemes, Rarefaction wave, Shock wave, Contact discontinuity

  17. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  18. Agent-based reactive power management of power distribution networks with distributed energy generation

    International Nuclear Information System (INIS)

    Rahman, M.S.; Mahmud, M.A.; Oo, A.M.T.; Pota, H.R.; Hossain, M.J.

    2016-01-01

    Highlights: • A coordinated multi-agent system is proposed for reactive power management. • A linear quadratic regulator with a proportional integral controller is designed. • Proposed multi-agent scheme provides accurate estimation and control of the system. • Voltage stability is improved with proper power management for different scenarios. • Results obtained from the proposed scheme is compared to the traditional approach. - Abstract: In this paper, a new agent-based distributed reactive power management scheme is proposed to improve the voltage stability of energy distribution systems with distributed generation units. Three types of agents – distribution system agent, estimator agent, and control agent are developed within the multi-agent framework. The agents simultaneously coordinated their activities through the online information and energy flow. The overall achievement of the proposed scheme depends on the coordination between two tasks – (i) estimation of reactive power using voltage variation formula and (ii) necessary control actions to provide the estimated reactive power to the distribution networks through the distributed static synchronous compensators. A linear quadratic regulator with a proportional integrator is designed for the control agent in order to control the reactive component of the current and the DC voltage of the compensators. The performance of the proposed scheme is tested on a 10-bus power distribution network under various scenarios. The effectiveness is validated by comparing the proposed approach to the conventional proportional integral control approach. It is found that, the agent-based scheme provides excellent robust performance under various operating conditions of the power distribution network.

  19. A new BIST scheme for low-power and high-resolution DAC testing

    Directory of Open Access Journals (Sweden)

    H. Li

    2003-01-01

    Full Text Available A BIST scheme for testing on chip DAC is presented in this paper. We discuss the generation of on chip testing stimuli and the measurement of digital signals with a narrow-band digital filter. We validate the scheme with software simulation and point out the possibility of ADC BIST with verified DACicus-journals.

  20. A novel modulation scheme for noise reduction in analog fiber optic links

    NARCIS (Netherlands)

    Marpaung, D.A.I.; Roeloffzen, C.G.H.; van Etten, Wim

    2006-01-01

    A novel noise reduction scheme called Balanced Modulation and Detection (BMD) is proposed. In this scheme, the modulating RF signal is half-wave rectified in the optical domain, eliminating the DC optical power resulting from pre-biasing of the optical source. A link model employing this scheme has

  1. A modified symplectic PRK scheme for seismic wave modeling

    Science.gov (United States)

    Liu, Shaolin; Yang, Dinghui; Ma, Jian

    2017-02-01

    A new scheme for the temporal discretization of the seismic wave equation is constructed based on symplectic geometric theory and a modified strategy. The ordinary differential equation in terms of time, which is obtained after spatial discretization via the spectral-element method, is transformed into a Hamiltonian system. A symplectic partitioned Runge-Kutta (PRK) scheme is used to solve the Hamiltonian system. A term related to the multiplication of the spatial discretization operator with the seismic wave velocity vector is added into the symplectic PRK scheme to create a modified symplectic PRK scheme. The symplectic coefficients of the new scheme are determined via Taylor series expansion. The positive coefficients of the scheme indicate that its long-term computational capability is more powerful than that of conventional symplectic schemes. An exhaustive theoretical analysis reveals that the new scheme is highly stable and has low numerical dispersion. The results of three numerical experiments demonstrate the high efficiency of this method for seismic wave modeling.

  2. Compatible discrete operator schemes on polyhedral meshes for elliptic and Stokes equations

    International Nuclear Information System (INIS)

    Bonelle, Jerome

    2014-01-01

    This thesis presents a new class of spatial discretization schemes on polyhedral meshes, called Compatible Discrete Operator (CDO) schemes and their application to elliptic and Stokes equations In CDO schemes, preserving the structural properties of the continuous equations is the leading principle to design the discrete operators. De Rham maps define the degrees of freedom according to the physical nature of fields to discretize. CDO schemes operate a clear separation between topological relations (balance equations) and constitutive relations (closure laws). Topological relations are related to discrete differential operators, and constitutive relations to discrete Hodge operators. A feature of CDO schemes is the explicit use of a second mesh, called dual mesh, to build the discrete Hodge operator. Two families of CDO schemes are considered: vertex-based schemes where the potential is located at (primal) mesh vertices, and cell-based schemes where the potential is located at dual mesh vertices (dual vertices being in one-to-one correspondence with primal cells). The CDO schemes related to these two families are presented and their convergence is analyzed. A first analysis hinges on an algebraic definition of the discrete Hodge operator and allows one to identify three key properties: symmetry, stability, and P0-consistency. A second analysis hinges on a definition of the discrete Hodge operator using reconstruction operators, and the requirements on these reconstruction operators are identified. In addition, CDO schemes provide a unified vision on a broad class of schemes proposed in the literature (finite element, finite element, mimetic schemes... ). Finally, the reliability and the efficiency of CDO schemes are assessed on various test cases and several polyhedral meshes. (author)

  3. The terminator "toy" chemistry test: a simple tool to assess errors in transport schemes

    Directory of Open Access Journals (Sweden)

    P. H. Lauritzen

    2015-05-01

    Full Text Available This test extends the evaluation of transport schemes from prescribed advection of inert scalars to reactive species. The test consists of transporting two interacting chemical species in the Nair and Lauritzen 2-D idealized flow field. The sources and sinks for these two species are given by a simple, but non-linear, "toy" chemistry that represents combination (X + X → X2 and dissociation (X2 → X + X. This chemistry mimics photolysis-driven conditions near the solar terminator, where strong gradients in the spatial distribution of the species develop near its edge. Despite the large spatial variations in each species, the weighted sum XT = X + 2X2 should always be preserved at spatial scales at which molecular diffusion is excluded. The terminator test demonstrates how well the advection–transport scheme preserves linear correlations. Chemistry–transport (physics–dynamics coupling can also be studied with this test. Examples of the consequences of this test are shown for illustration.

  4. Establishment of a world food preservation center

    Directory of Open Access Journals (Sweden)

    Wilson Charles L

    2013-01-01

    Full Text Available Abstract A World Food Preservation Center (WFPC is proposed in response to a pending civilization-threatening food shortage and our limited ability to adequately increase food production. Some estimates put losses of food in developing countries after it is produced and before it is consumed at 50%. These losses are particularly threatening to individuals and farmers who are living in the midst of food insecurity. Although numerous organizations have attempted to address this problem worldwide, the magnitude of the effort has not come close to the enormity of the problem. Most of these programs are also short-term and require continuous input by postharvest specialists from developed countries in order to be sustainable. A critical need exists for a substantial and sustainable worldwide program that can significantly reduce losses and waste of food in developing countries. The World Food Preservation Center proposed here meets this need by educating young scientists in developing countries about low-input, appropriate technologies for preserving food postharvest. It also conducts research on postharvest technologies especially suited for application in developing countries such as biological control, solar refrigeration, and coordinated transport and marketing schemes that support and sustain the local production of food commodities.

  5. Well-balanced schemes for the Euler equations with gravitation: Conservative formulation using global fluxes

    Science.gov (United States)

    Chertock, Alina; Cui, Shumo; Kurganov, Alexander; Özcan, Şeyma Nur; Tadmor, Eitan

    2018-04-01

    We develop a second-order well-balanced central-upwind scheme for the compressible Euler equations with gravitational source term. Here, we advocate a new paradigm based on a purely conservative reformulation of the equations using global fluxes. The proposed scheme is capable of exactly preserving steady-state solutions expressed in terms of a nonlocal equilibrium variable. A crucial step in the construction of the second-order scheme is a well-balanced piecewise linear reconstruction of equilibrium variables combined with a well-balanced central-upwind evolution in time, which is adapted to reduce the amount of numerical viscosity when the flow is at (near) steady-state regime. We show the performance of our newly developed central-upwind scheme and demonstrate importance of perfect balance between the fluxes and gravitational forces in a series of one- and two-dimensional examples.

  6. Design and Implementation of a High Quality Power Supply Scheme for Distributed Generation in a Micro-Grid

    Directory of Open Access Journals (Sweden)

    Mingchao Xia

    2013-09-01

    Full Text Available A low carbon, high efficiency and high quality power supply scheme for Distributed Generation (DG in a micro-grid is presented. A three-phase, four-leg DG grid-interfacing converter based on the improved structure of a Unified Power Quality Conditioner (UPQC, including a series converter and a parallel converter is adopted, and improved indirect and direct control strategies are proposed. It can be observed that these strategies effectively compensate for voltage sags, voltage swells and voltage distortion, as well as voltage power quality problems resulting from the nonlinear and unbalanced loads in a micro-grid. While solving the coupling interference from series–parallel, the grid-interfacing converter can achieve proper load power sharing in a micro-grid. In particular, an improved minimum-energy compensation method is proposed that can overcome the conventional compensation algorithm defects, ensure the load voltage’s phase angle stability, improve the voltage compensating ability and range, reduce the capacity and cost of converters, and reduce the shock of micro-grid switching between grid-connected mode and islanded mode. Moreover, the advantages/disadvantages and application situation of the two improved control strategies are analyzed. Finally, the performance of the proposed control strategies has been verified through a MATLAB/Simulink simulation under various operating conditions.

  7. Dry air preservation and corrosion prevention using desiccant dehumidification

    International Nuclear Information System (INIS)

    Tykesson, M.; Ashworth, C.

    1991-01-01

    The preservation and longevity of power station plants is a significant problem, particularly in cold shut down situations for prolonged periods of time, and also in storage of parts prior to installation. Power station protection and equipment preservation using the desiccant method is not new. For many years dehumidification machinery has been employed as a barrier to moisture related degradation. The first rotary desiccant dehumidifiers were installed within the power plant industry in the mid 1960s. Many of these first installations remain in operation today. In order to understand the functioning of a desiccant unit as compared with other air handling systems, it is essential to understand the fundamentals of a psychrometric chart. This article will attempt to give the reader an understanding of the subject. (author)

  8. Cost-Based Droop Schemes for Economic Dispatch in Islanded Microgrids

    DEFF Research Database (Denmark)

    Chen, Feixiong; Chen, Minyou; Li, Qiang

    2017-01-01

    In this paper, cost based droop schemes are proposed, to minimize the total active power generation cost in an islanded microgrid (MG), while the simplicity and decentralized nature of the droop control are retained. In cost based droop schemes, the incremental costs of distributed generators (DGs...

  9. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  10. Demand response scheme based on lottery-like rebates

    KAUST Repository

    Schwartz, Galina A.; Tembine, Hamidou; Amin, Saurabh; Sastry, S. Shankar

    2014-01-01

    In this paper, we develop a novel mechanism for reducing volatility of residential demand for electricity. We construct a reward-based (rebate) mechanism that provides consumers with incentives to shift their demand to off-peak time. In contrast to most other mechanisms proposed in the literature, the key feature of our mechanism is its modest requirements on user preferences, i.e., it does not require exact knowledge of user responsiveness to rewards for shifting their demand from the peak to the off-peak time. Specifically, our mechanism utilizes a probabilistic reward structure for users who shift their demand to the off-peak time, and is robust to incomplete information about user demand and/or risk preferences. We approach the problem from the public good perspective, and demonstrate that the mechanism can be implemented via lottery-like schemes. Our mechanism permits to reduce the distribution losses, and thus improve efficiency of electricity distribution. Finally, the mechanism can be readily incorporated into the emerging demand response schemes (e.g., the time-of-day pricing, and critical peak pricing schemes), and has security and privacy-preserving properties.

  11. Demand response scheme based on lottery-like rebates

    KAUST Repository

    Schwartz, Galina A.

    2014-08-24

    In this paper, we develop a novel mechanism for reducing volatility of residential demand for electricity. We construct a reward-based (rebate) mechanism that provides consumers with incentives to shift their demand to off-peak time. In contrast to most other mechanisms proposed in the literature, the key feature of our mechanism is its modest requirements on user preferences, i.e., it does not require exact knowledge of user responsiveness to rewards for shifting their demand from the peak to the off-peak time. Specifically, our mechanism utilizes a probabilistic reward structure for users who shift their demand to the off-peak time, and is robust to incomplete information about user demand and/or risk preferences. We approach the problem from the public good perspective, and demonstrate that the mechanism can be implemented via lottery-like schemes. Our mechanism permits to reduce the distribution losses, and thus improve efficiency of electricity distribution. Finally, the mechanism can be readily incorporated into the emerging demand response schemes (e.g., the time-of-day pricing, and critical peak pricing schemes), and has security and privacy-preserving properties.

  12. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  13. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  14. Scheme of fault tectonic and tectonic activity manifestation in the region of the Crimea nuclear power plant construction

    International Nuclear Information System (INIS)

    Pasynkov, A.L.

    1989-01-01

    Characteristic of fault tectonics and tectonic activity manifestation in the region of the Crimea nuclear power plant construction is presented. Mosaic-block structure of the area, predetermined by the development of diagonal systems of activated tectonic dislocations with different displacement amplitudes and different stratigraphic ranges of manifestation, was established. Strained-stressed state of the region is determined by the presence of the South-Azov zone of deep fault and Krasnogorsk-Samarlinks fault system. The presented scheme can be used as tectonic basis of seismogenic activity of the region

  15. A Downlink and Uplink Alignment Scheme for Power Saving in IEEE 802.16 Protocol

    Directory of Open Access Journals (Sweden)

    Jenhui Chen

    2014-01-01

    Full Text Available This study shows the problem of power saving mechanism (PSM that sleep intervals of uplink (UL connections do not synchronize with sleep intervals of downlink (DL connections. That is, the energy of a mobile station (MS is not really saved if the DL connections are in the sleep mode while the UL connections are in normal mode, and vice versa. To avoid the asynchronism of power saving (PS between UL and DL connections, we invent a mechanism of DL connections regulating UL connections, called DL and UL Alignment (DUAL scheme, to improve the energy efficiency for PS. Considering that the buffer size of MS is limited, DUAL uses the mean packet arrival rate of UL λu and a relatively safe threshold of buffer size QT as the parameters to estimate the maximum allowable waiting time to align the UL with the DL connections. To analyze the performance of DUAL, a system model of PS is proposed to evaluate the performance of DUAL under different conditions. The correctness of performance analysis of DUAL is validated by using simulation with realistic parameters. Numerical experiments show that DUAL improves the energy conservation significantly when UL traffic is greater than DL traffic.

  16. KNK-II knowledge preservation and related activities in Germany

    International Nuclear Information System (INIS)

    Knebel, J.; Wehmann, U.; Stanculescu, A.

    2004-01-01

    Many of the scenarios describing possible energy futures, e.g., the World Energy Council and the Intergovernmental Panel on Climate Change (IPCC), foresee a role for nuclear power in meeting a growing world energy demand through 2050. While some scenarios explore the impact of a nuclear phase out, others envision a major growth in nuclear technology's share of the world energy mix. Given the forecasted growth in world population and in economic development, the environmental advantages of nuclear power, and concerns over climate change and the growth of greenhouse gas emissions, it is not unreasonable to expect an increased interest in nuclear power in the coming decades. Loss of nuclear knowledge is a serious concern, in particular with regard to areas where, for various reasons, nuclear technology development and innovation has been slowed down. Knowledge can be preserved by archival techniques and by passing it on to new generations. In the case of the Federal Republic of Germany, in spite of the lack of funding and political support, both avenues are followed. Data retrieval and preservation by archiving activities for the German experimental fast reactor KNK-II were undertaken within the framework of IAEA's initiative on Fast Reactor Knowledge Preservation. The paper will shortly introduce the IAEA initiative (scope, objectives, status, and outlook). The general approach to nuclear knowledge preservation in Germany will be presented, and the concrete archiving activities undertaken for KNK-II will be summarized. (author)

  17. Adaptive Image Transmission Scheme over Wavelet-Based OFDM System

    Institute of Scientific and Technical Information of China (English)

    GAOXinying; YUANDongfeng; ZHANGHaixia

    2005-01-01

    In this paper an adaptive image transmission scheme is proposed over Wavelet-based OFDM (WOFDM) system with Unequal error protection (UEP) by the design of non-uniform signal constellation in MLC. Two different data division schemes: byte-based and bitbased, are analyzed and compared. Different bits are protected unequally according to their different contribution to the image quality in bit-based data division scheme, which causes UEP combined with this scheme more powerful than that with byte-based scheme. Simulation results demonstrate that image transmission by UEP with bit-based data division scheme presents much higher PSNR values and surprisingly better image quality. Furthermore, by considering the tradeoff of complexity and BER performance, Haar wavelet with the shortest compactly supported filter length is the most suitable one among orthogonal Daubechies wavelet series in our proposed system.

  18. An improved anonymous authentication scheme for roaming in ubiquitous networks

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  19. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  20. Positivity Preserving Interpolation Using Rational Bicubic Spline

    Directory of Open Access Journals (Sweden)

    Samsul Ariffin Abdul Karim

    2015-01-01

    Full Text Available This paper discusses the positivity preserving interpolation for positive surfaces data by extending the C1 rational cubic spline interpolant of Karim and Kong to the bivariate cases. The partially blended rational bicubic spline has 12 parameters in the descriptions where 8 of them are free parameters. The sufficient conditions for the positivity are derived on every four boundary curves network on the rectangular patch. Numerical comparison with existing schemes also has been done in detail. Based on Root Mean Square Error (RMSE, our partially blended rational bicubic spline is on a par with the established methods.

  1. Optimization of preservation activities and preservation engineering (1)

    International Nuclear Information System (INIS)

    Aoki, Takayuki; Mimaki, Hidehito; Oda, Mitsuyuki

    2004-01-01

    In order to deal with the optimization of preservation activities and 'preservation engineering' which makes it possible, the relation between general society and preservation, the content and the structure of preservation activities, and the viewpoint and the approach of the optimization of the preventive preservation are described. The optimization of the preventive preservation is shown respectively in the four stages of planning, implementation, result evaluation and countermeasure. (K. Kato)

  2. Technical Information/Website Preservation

    Science.gov (United States)

    PintoRey, Christian R.

    2010-01-01

    This document reviews the work of the author in NASA's Motivating Undergraduates in Science and Technology (MUST) internship. The intern worked on the Space Shuttles hydraulic systems (i.e., Auxiliary Power Units (APU's) and Hydraulic Pump Units (HPU's)), and website preservation of the hydraulic technology captured in websites relating to the coming.the Space Shuttle Retirement. Several figures and pictures show an overview of the orbiter's hydraulic systems

  3. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  4. New schemes for high-voltage pulsed generators based on stepped transmission lines

    International Nuclear Information System (INIS)

    Bossamykin, V.S.; Gordeev, V.S.; Pavlovskii, A.I.

    1993-01-01

    Wave processes were analyzed from the point of effective energy delivery in pulsed power systems based on transmission lines. A series of new schemes for the pulsed generators based on multistage stepped transmission lines both with the capacitive and inductive energy storage was found. These devices can provide voltage or current transformation up to 5-10 times due to wave processes if stage's characteristic impedances are in a certain correlation. The schemes suggested can be widely applied in the new powerful pulsed power accelerators. The theoretical conclusions are justified experimentally

  5. Scheme for generation of fully-coherent, TW power level hard X-ray pulses from baseline undulators at the European X-ray FEL

    International Nuclear Information System (INIS)

    Geloni, Gianluca; Kocharyan, Vitali; Saldin, Evgeni

    2010-07-01

    The most promising way to increase the output power of an X-ray FEL (XFEL) is by tapering the magnetic field of the undulator. Also, significant increase in power is achievable by starting the FEL process from a monochromatic seed rather than from noise. This report proposes to make use of a cascade self-seeding scheme with wake monochromators in a tunable-gap baseline undulator at the European XFEL to create a source capable of delivering coherent radiation of unprecedented characteristics at hard X-ray wavelengths. Compared with SASE X-ray FEL parameters, the radiation from the new source has three truly unique aspects: complete longitudinal and transverse coherence, and a peak brightness three orders of magnitude higher than what is presently available at LCLS. Additionally, the new source will generate hard X-ray beam at extraordinary peak (TW) and average (kW) power level. The proposed source can thus revolutionize fields like single biomolecule imaging, inelastic scattering and nuclear resonant scattering. The self-seeding scheme with the wake monochromator is extremely compact, and takes almost no cost and time to be implemented. The upgrade proposed in this paper could take place during the commissioning stage of the European XFEL, opening a vast new range of applications from the very beginning of operations.We present feasibility study and examplifications for the SASE2 line of the European XFEL. (orig.)

  6. Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation.

    Science.gov (United States)

    Shen, Qinghua; Liang, Xiaohui; Shen, Xuemin; Lin, Xiaodong; Luo, Henry Y

    2014-03-01

    In this paper, we propose an e-health monitoring system with minimum service delay and privacy preservation by exploiting geo-distributed clouds. In the system, the resource allocation scheme enables the distributed cloud servers to cooperatively assign the servers to the requested users under the load balance condition. Thus, the service delay for users is minimized. In addition, a traffic-shaping algorithm is proposed. The traffic-shaping algorithm converts the user health data traffic to the nonhealth data traffic such that the capability of traffic analysis attacks is largely reduced. Through the numerical analysis, we show the efficiency of the proposed traffic-shaping algorithm in terms of service delay and privacy preservation. Furthermore, through the simulations, we demonstrate that the proposed resource allocation scheme significantly reduces the service delay compared to two other alternatives using jointly the short queue and distributed control law.

  7. THE SCHEME WITH THE MULTIPURPOSE RELAY FOR ECONOMY OF ELECTRIC ENERGY IN TO GRAIN THROWER

    Directory of Open Access Journals (Sweden)

    N. A. Mazukha

    2015-01-01

    Full Text Available The scheme for economy of electric energy during the work for an example of a grain thrower of the ZME 60 type (Voronezh Region, Semiluki on grain flows in rural economy is offered. Grain thrower can carry out the following technological operations: loading of grain in vehicles; loading and unloading of grain stores; mechanical shoveling of grain on the open areas; separation of grain with office of light impurity. In the scheme the relay 3UG3521/22t (SIEMENS firm is used. The relay can carry out multipurpose protection of engines and comprises the relay of the maximum current, the relay of the minimum current, a timer and the index relay. Temporary charts of the relay 3UG3521/22t are provided in the mode "without preservation" and in the mode with "preservation" for the OVER functions (reaction to growth of current and the UNDER function (reaction to recession of current. Use of the relay 3UG3521/22t allowed to receive protection at long start-up of electric motors, at an overload of electric motors, when idling (for economy of electric energy due to automatic shutdown of the conveyor and at break or jamming of the conveyor. Besides, in the scheme it is offered the multipurpose relay of tension (the relay of control of phases for protection of three engines of a grain thrower at not full-phase modes of a power line. The economy of electric energy can be received in case of, for example, the late actions of the operator for timely shutdown of the engine of a self-feed upon transition of a grain thrower to idling. In practice transition of a grain thrower to the mode of idling is quite often possible in process of reduction of amount of the thrown grain on a platform before a grain thrower. In practice transition of a grain thrower to the mode of idling is quite often possible in process of reduction of amount of the thrown grain on a platform before a grain thrower. The offered electric circuit can be used in the grain thrower and grain loaders

  8. An Enhanced Control Scheme for Uninterruptible Power Supply

    DEFF Research Database (Denmark)

    Lu, Jinghang; Savaghebi, Mehdi; Wei, Baoze

    2017-01-01

    To address the active power feeding issue in the parallel Uninterruptible Power Supply (UPS) system, a DC-link Voltage Protection (DCVP) control strategy is proposed in this paper. The proposed control method only relies on local load information, which increases the system reliability...... and robustness. Moreover, virtual resistance based regulation strategies are proposed for solving the active power sharing imbalance caused by the active power feeding and harmonic power sharing imbalanced caused by the line resistance mismatching. In addition, an anti-windup based consensus distributed...

  9. Design Scheme of Remote Monitoring System Based on Qt

    Directory of Open Access Journals (Sweden)

    Xu Dawei

    2015-01-01

    Full Text Available This paper introduces a design scheme of remote monitoring system based on Qt, the scheme of remote monitoring system based on S3C2410 and Qt, with the aid of cross platform development tools Qt and powerful ARM platform design and implementation. The development of remote video surveillance system based on embedded terminal has practical significance and value.

  10. Building fast well-balanced two-stage numerical schemes for a model of two-phase flows

    Science.gov (United States)

    Thanh, Mai Duc

    2014-06-01

    We present a set of well-balanced two-stage schemes for an isentropic model of two-phase flows arisen from the modeling of deflagration-to-detonation transition in granular materials. The first stage is to absorb the source term in nonconservative form into equilibria. Then in the second stage, these equilibria will be composed into a numerical flux formed by using a convex combination of the numerical flux of a stable Lax-Friedrichs-type scheme and the one of a higher-order Richtmyer-type scheme. Numerical schemes constructed in such a way are expected to get the interesting property: they are fast and stable. Tests show that the method works out until the parameter takes on the value CFL, and so any value of the parameter between zero and this value is expected to work as well. All the schemes in this family are shown to capture stationary waves and preserves the positivity of the volume fractions. The special values of the parameter 0,1/2,1/(1+CFL), and CFL in this family define the Lax-Friedrichs-type, FAST1, FAST2, and FAST3 schemes, respectively. These schemes are shown to give a desirable accuracy. The errors and the CPU time of these schemes and the Roe-type scheme are calculated and compared. The constructed schemes are shown to be well-balanced and faster than the Roe-type scheme.

  11. Active Participation of Air Conditioners in Power System Frequency Control Considering Users’ Thermal Comfort

    Directory of Open Access Journals (Sweden)

    Rongxiang Zhang

    2015-09-01

    Full Text Available Air conditioners have great potential to participate in power system frequency control. This paper proposes a control strategy to facilitate the active participation of air conditioners. For each air conditioner, a decentralized control law is designed to adjust its temperature set point in response to the system frequency deviation. The decentralized control law accounts for the user’s thermal comfort that is evaluated by a fuzzy algorithm. The aggregation of air conditioners’ response is conducted by using the Monte Carlo simulation method. A structure preserving model is applied to the multi-bus power system, in which air conditioners are aggregated at certain load buses. An inner-outer iteration scheme is adopted to solve power system dynamics. An experiment is conducted on a test air conditioner to examine the performance of the proposed decentralized control law. Simulation results on a test power system verify the effectiveness of the proposed strategy for air conditioners participating in frequency control.

  12. Autonomous power management for interlinked AC-DC microgrids

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Meegahapola, Lasantha; Andrew, Loh Poh Chiang

    2018-01-01

    of the DC micro-grid before importing power from the interlinked AC microgrid. This strategy enables voltage regulation in the DC microgrid, and also reduces the number of converters in operation. The proposed scheme is fully autonomous while it retains the plug-n-play features for generators and tie......The existing power management schemes for inter-linked AC-DC microgrids have several operational drawbacks. Some of the existing control schemes are designed with the main objective of sharing power among the interlinked microgrids based on their loading conditions, while other schemes regulate...... the voltage of the interlinked microgrids without considering the specific loading conditions. However, the existing schemes cannot achieve both objectives efficiently. To address these issues, an autonomous power management scheme is proposed, which explicitly considers the specific loading condition...

  13. New hybrid reverse differential pulse position width modulation scheme for wireless optical communication

    Science.gov (United States)

    Liao, Renbo; Liu, Hongzhan; Qiao, Yaojun

    2014-05-01

    In order to improve the power efficiency and reduce the packet error rate of reverse differential pulse position modulation (RDPPM) for wireless optical communication (WOC), a hybrid reverse differential pulse position width modulation (RDPPWM) scheme is proposed, based on RDPPM and reverse pulse width modulation. Subsequently, the symbol structure of RDPPWM is briefly analyzed, and its performance is compared with that of other modulation schemes in terms of average transmitted power, bandwidth requirement, and packet error rate over ideal additive white Gaussian noise (AWGN) channels. Based on the given model, the simulation results show that the proposed modulation scheme has the advantages of improving the power efficiency and reducing the bandwidth requirement. Moreover, in terms of error probability performance, RDPPWM can achieve a much lower packet error rate than that of RDPPM. For example, at the same received signal power of -28 dBm, the packet error rate of RDPPWM can decrease to 2.6×10-12, while that of RDPPM is 2.2×10. Furthermore, RDPPWM does not need symbol synchronization at the receiving end. These considerations make RDPPWM a favorable candidate to select as the modulation scheme in the WOC systems.

  14. An 802.11 n wireless local area network transmission scheme for wireless telemedicine applications.

    Science.gov (United States)

    Lin, C F; Hung, S I; Chiang, I H

    2010-10-01

    In this paper, an 802.11 n transmission scheme is proposed for wireless telemedicine applications. IEEE 802.11n standards, a power assignment strategy, space-time block coding (STBC), and an object composition Petri net (OCPN) model are adopted. With the proposed wireless system, G.729 audio bit streams, Joint Photographic Experts Group 2000 (JPEG 2000) clinical images, and Moving Picture Experts Group 4 (MPEG-4) video bit streams achieve a transmission bit error rate (BER) of 10-7, 10-4, and 103 simultaneously. The proposed system meets the requirements prescribed for wireless telemedicine applications. An essential feature of this proposed transmission scheme is that clinical information that requires a high quality of service (QoS) is transmitted at a high power transmission rate with significant error protection. For maximizing resource utilization and minimizing the total transmission power, STBC and adaptive modulation techniques are used in the proposed 802.11 n wireless telemedicine system. Further, low power, direct mapping (DM), low-error protection scheme, and high-level modulation are adopted for messages that can tolerate a high BER. With the proposed transmission scheme, the required reliability of communication can be achieved. Our simulation results have shown that the proposed 802.11 n transmission scheme can be used for developing effective wireless telemedicine systems.

  15. Designing Structure-Dependent MPC-Based AGC Schemes Considering Network Topology

    Directory of Open Access Journals (Sweden)

    Young-Sik Jang

    2015-04-01

    Full Text Available This paper presents the important features of structure-dependent model predictive control (MPC-based approaches for automatic generation control (AGC considering network topology. Since power systems have various generators under different topologies, it is necessary to reflect the characteristics of generators in power networks and the control system structures in order to improve the dynamic performance of AGC. Specifically, considering control system structures is very important because not only can the topological problems be reduced, but also a computing system for AGC in a bulk-power system can be realized. Based on these considerations, we propose new schemes in the proposed controller for minimizing inadvertent line flows and computational burden, which strengthen the advantages of MPC-based approach for AGC. Analysis and simulation results in the IEEE 39-bus model system show different dynamic behaviors among structure-dependent control schemes and possible improvements in computational burden via the proposed control scheme while system operators in each balancing area consider physical load reference ramp constraints among generators.

  16. Edge-preserving Intra mode for efficient depth map coding based on H.264/AVC

    DEFF Research Database (Denmark)

    Zamarin, Marco; Forchhammer, Søren

    2014-01-01

    Depth-image-based-rendering (DIBR) algorithms for 3D video communication systems based on the “multi-view video plus depth” format are very sensitive to the accuracy of depth information. Specifically, edge regions in the depth data should be preserved in the coding/decoding process to ensure good...... view synthesis performance, which directly affects the overall system performance. This paper proposes a novel scheme for edge-aware Intra depth compression based on the H.264/AVC framework enabled on both Intra (I) and Inter (P) slices. The proposed scheme includes a new Intra mode specifically...

  17. A new scheme for maximizing the lifetime of heterogeneous wireless sensor networks

    OpenAIRE

    Aldaihani, Reem; AboElFotoh, Hosam

    2016-01-01

    Heterogeneous wireless sensor network consists of wireless sensor nodes with different abilities, such as different computing power and different initial energy. We present in this paper a new scheme for maximizing heterogeneous WSN lifetime. The proposed scheme employs two types of sensor nodes that are named (consistent with IEEE 802.15.4 standard) Full Function Device (FFD) and Reduced Function Device (RFD). The FFDs are the expensive sensor nodes with high power and computational capabili...

  18. A Joint Watermarking and ROI Coding Scheme for Annotating Traffic Surveillance Videos

    Directory of Open Access Journals (Sweden)

    Su Po-Chyi

    2010-01-01

    Full Text Available We propose a new application of information hiding by employing the digital watermarking techniques to facilitate the data annotation in traffic surveillance videos. There are two parts in the proposed scheme. The first part is the object-based watermarking, in which the information of each vehicle collected by the intelligent transportation system will be conveyed/stored along with the visual data via information hiding. The scheme is integrated with H.264/AVC, which is assumed to be adopted by the surveillance system, to achieve an efficient implementation. The second part is a Region of Interest (ROI rate control mechanism for encoding traffic surveillance videos, which helps to improve the overall performance. The quality of vehicles in the video will be better preserved and a good rate-distortion performance can be attained. Experimental results show that this potential scheme works well in traffic surveillance videos.

  19. Optimization of preservation activities and preservation engineering (2)

    International Nuclear Information System (INIS)

    Aoki, Takayuki; Mimaki, Hidehito; Oda, Mitsuyuki

    2004-01-01

    In order to deal with the optimization of preservation activities and 'preservation engineering' which makes it possible, the viewpoint and the approach of the optimization of the ex post facto preservation and the content to be possessed in 'preservation engineering' are described. The optimization of the ex post facto preservation is shown respectively in the four stages of planning, implementation, result evaluation and countermeasure. (K. Kato)

  20. Experimental Results of Network-Assisted Interference Suppression Scheme Using Adaptive Beam-Tilt Switching

    Directory of Open Access Journals (Sweden)

    Tomoki Murakami

    2017-01-01

    Full Text Available This paper introduces a network-assisted interference suppression scheme using beam-tilt switching per frame for wireless local area network systems and its effectiveness in an actual indoor environment. In the proposed scheme, two access points simultaneously transmit to their own desired station by adjusting angle of beam-tilt including transmit power assisted from network server for the improvement of system throughput. In the conventional researches, it is widely known that beam-tilt is effective for ICI suppression in the outdoor scenario. However, the indoor effectiveness of beam-tilt for ICI suppression has not yet been indicated from the experimental evaluation. Thus, this paper indicates the effectiveness of the proposed scheme by analyzing multiple-input multiple-output channel matrices from experimental measurements in an office environment. The experimental results clearly show that the proposed scheme offers higher system throughput than the conventional scheme using just transmit power control.

  1. Algebraic renormalization of parity-preserving QED3 coupled to scalar matter II: broken case

    International Nuclear Information System (INIS)

    Cima, O.M. del; Franco, D.H.T.; Helayel-Neto, J.A.; Piguet, O.

    1996-11-01

    In this letter the algebraic renormalization method, which is independent of any kind of regularization scheme, is presented for the parity-preserving QED 3 coupled to scalar matter in the broken regime, where the scalar assumes a finite vacuum expectation value, =v. The model shows to be stable under radiative corrections and anomaly free. (author)

  2. Construction of Low Dissipative High Order Well-Balanced Filter Schemes for Non-Equilibrium Flows

    Science.gov (United States)

    Wang, Wei; Yee, H. C.; Sjogreen, Bjorn; Magin, Thierry; Shu, Chi-Wang

    2009-01-01

    The goal of this paper is to generalize the well-balanced approach for non-equilibrium flow studied by Wang et al. [26] to a class of low dissipative high order shock-capturing filter schemes and to explore more advantages of well-balanced schemes in reacting flows. The class of filter schemes developed by Yee et al. [30], Sjoegreen & Yee [24] and Yee & Sjoegreen [35] consist of two steps, a full time step of spatially high order non-dissipative base scheme and an adaptive nonlinear filter containing shock-capturing dissipation. A good property of the filter scheme is that the base scheme and the filter are stand alone modules in designing. Therefore, the idea of designing a well-balanced filter scheme is straightforward, i.e., choosing a well-balanced base scheme with a well-balanced filter (both with high order). A typical class of these schemes shown in this paper is the high order central difference schemes/predictor-corrector (PC) schemes with a high order well-balanced WENO filter. The new filter scheme with the well-balanced property will gather the features of both filter methods and well-balanced properties: it can preserve certain steady state solutions exactly; it is able to capture small perturbations, e.g., turbulence fluctuations; it adaptively controls numerical dissipation. Thus it shows high accuracy, efficiency and stability in shock/turbulence interactions. Numerical examples containing 1D and 2D smooth problems, 1D stationary contact discontinuity problem and 1D turbulence/shock interactions are included to verify the improved accuracy, in addition to the well-balanced behavior.

  3. Novel transmission pricing scheme based on point-to-point tariff and transaction pair matching for pool market

    International Nuclear Information System (INIS)

    Chen, Qixin; Xia, Qing; Kang, Chongqing

    2010-01-01

    Transmission pricing scheme is a key component in the infrastructure of power market, and pool is an indispensable pattern of market organization; meanwhile, pay-as-bid (PAB) serves as a main option to determine market prices in pool. In this paper, a novel transmission pricing scheme is proposed for pool power market based on PAB. The new scheme is developed by utilizing point-to-point (PTP) tariff and introducing an approach of transaction pair matching (TPM). The model and procedure of the new scheme are presented in detail. Apart from the advantages of existing transmission pricing schemes, such as ensuing open, fair and non-discriminatory access, proper recovery for investment as well as transparency, the new scheme provides economic signals to promote the maximum use of the existing transmission network, encourages appropriate bidding behaviors in pool, and helps to reduce the possibility of the enforcement of market power and the appearing of price spikes; thus improves market operation efficiency and trading effects. In order to testify the effectiveness of the proposed scheme, a case based on IEEE 30-bus system is studied. (author)

  4. Novel transmission pricing scheme based on point-to-point tariff and transaction pair matching for pool market

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Qixin; Xia, Qing; Kang, Chongqing [State Key Lab. of Power System, Dept. of Electrical Engineering, Tsinghua University, Beijing 100084 (China)

    2010-04-15

    Transmission pricing scheme is a key component in the infrastructure of power market, and pool is an indispensable pattern of market organization; meanwhile, pay-as-bid (PAB) serves as a main option to determine market prices in pool. In this paper, a novel transmission pricing scheme is proposed for pool power market based on PAB. The new scheme is developed by utilizing point-to-point (PTP) tariff and introducing an approach of transaction pair matching (TPM). The model and procedure of the new scheme are presented in detail. Apart from the advantages of existing transmission pricing schemes, such as ensuing open, fair and non-discriminatory access, proper recovery for investment as well as transparency, the new scheme provides economic signals to promote the maximum use of the existing transmission network, encourages appropriate bidding behaviors in pool, and helps to reduce the possibility of the enforcement of market power and the appearing of price spikes; thus improves market operation efficiency and trading effects. In order to testify the effectiveness of the proposed scheme, a case based on IEEE 30-bus system is studied. (author)

  5. Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography

    Directory of Open Access Journals (Sweden)

    Debiao He

    2017-01-01

    Full Text Available Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the last several years. However, most of them suffer from security weaknesses or have poor performances. To reduce computation cost and achieve better security, we construct a lightweight data aggregation scheme against internal attackers in the smart grid environment using Elliptic Curve Cryptography (ECC. Security analysis of our proposed approach shows that it is provably secure and can provide confidentiality, authentication, and integrity. Performance analysis of the proposed scheme demonstrates that both computation and communication costs of the proposed scheme are much lower than the three previous schemes. As a result of these aforementioned benefits, the proposed lightweight data aggregation scheme is more practical for deployment in the smart grid environment.

  6. Reactive Power Support of Electrical Vehicle Charging Station Upgraded with Flywheel Energy Storage System

    DEFF Research Database (Denmark)

    SUN, BO; Dragicevic, Tomislav; Savaghebi, Mehdi

    2015-01-01

    Electrical vehicles (EVs) are presenting increasingly potential to replace the conventional fossil fuel based vehicles due to environmental friendly characteristic. Accordingly, Charging Stations (CS), as an intermediate between grid and large numbers of EVs, are supposed to have more critical...... influence on future smart transportation network. This paper explores an off-board charging station upgraded with flywheel energy storage system that could provide a reactive power support to the grid utility. A supervisory control scheme based on distributed bus signaling is proposed to coordinate...... the operation of each component in the system. As a result, the charging station could supply the reactive power support to the utility grid without compromising the charging algorithm and preserve the battery’s lifetime. Finally, the real-time simulation results based on dSPACE1006 verifies the proposed...

  7. An Antenna Diversity Scheme for Digital Front-End with OFDM Technology

    Institute of Scientific and Technical Information of China (English)

    Fa-Long Luol; Ward Williams; Bruce Gladstone

    2011-01-01

    In,this paper, we propose a new antenna diversity scheme for OFDM-based wireless communication and digital broadcasting applications. Compared with existing schemes, such as post-fast Fourier transform (FFT), pre-FFT, and polyphase-based fitter-bank, the proposed scheme performs optimally and has very low computational complexity. It offers a better compromise between performance, power consumption, and complexity in real-time implementation of the receivers of broadband communication and digital broadcasting systems.

  8. An adaptive scaling and biasing scheme for OFDM-based visible light communication systems.

    Science.gov (United States)

    Wang, Zhaocheng; Wang, Qi; Chen, Sheng; Hanzo, Lajos

    2014-05-19

    Orthogonal frequency-division multiplexing (OFDM) has been widely used in visible light communication systems to achieve high-rate data transmission. Due to the nonlinear transfer characteristics of light emitting diodes (LEDs) and owing the high peak-to-average-power ratio of OFDM signals, the transmitted signal has to be scaled and biased before modulating the LEDs. In this contribution, an adaptive scaling and biasing scheme is proposed for OFDM-based visible light communication systems, which fully exploits the dynamic range of the LEDs and improves the achievable system performance. Specifically, the proposed scheme calculates near-optimal scaling and biasing factors for each specific OFDM symbol according to the distribution of the signals, which strikes an attractive trade-off between the effective signal power and the clipping-distortion power. Our simulation results demonstrate that the proposed scheme significantly improves the performance without changing the LED's emitted power, while maintaining the same receiver structure.

  9. Three-State Locally Adaptive Texture Preserving Filter for Radar and Optical Image Processing

    Directory of Open Access Journals (Sweden)

    Jaakko T. Astola

    2005-05-01

    Full Text Available Textural features are one of the most important types of useful information contained in images. In practice, these features are commonly masked by noise. Relatively little attention has been paid to texture preserving properties of noise attenuation methods. This stimulates solving the following tasks: (1 to analyze the texture preservation properties of various filters; and (2 to design image processing methods capable to preserve texture features well and to effectively reduce noise. This paper deals with examining texture feature preserving properties of different filters. The study is performed for a set of texture samples and different noise variances. The locally adaptive three-state schemes are proposed for which texture is considered as a particular class. For “detection” of texture regions, several classifiers are proposed and analyzed. As shown, an appropriate trade-off of the designed filter properties is provided. This is demonstrated quantitatively for artificial test images and is confirmed visually for real-life images.

  10. Reconfigurable Charge Pump Circuit with Variable Pumping Frequency Scheme for Harvesting Solar Energy under Various Sunlight Intensities

    Directory of Open Access Journals (Sweden)

    Jeong Heon Kim

    2014-01-01

    Full Text Available We propose variable pumping frequency (VPF scheme which is merged with the previous reconfigurable charge pump (RCP circuit that can change its architecture according to a given sunlight condition. Here, merging the VPF scheme with the architecture reconfiguration can improve percentage output currents better by 21.4% and 22.4% than RCP circuit with the fixed pumping frequencies of 7 MHz and 15 MHz, respectively. Comparing the VPF scheme with real maximum power points (MPP, the VPF can deliver 91.9% of the maximum amount of output current to the load on average. In terms of the power and area overheads, the VPF scheme proposed in this paper consumes the power by 0.4% of the total power consumption and occupies the layout area by 1.61% of the total layout area.

  11. Robust Power Allocation for Multi-Carrier Amplify-and-Forward Relaying Systems

    KAUST Repository

    Rao, Anlei

    2012-09-08

    It has been shown that adaptive power allocation can provide a substantial performance gain in wireless communication systems when perfect channel state information (CSI) is available at the transmitter. However when only imperfect CSI is available, the performance may degrade significantly, and as such robust power allocation schemes have been developed to minimize the effects of this degradation. In this paper, we investigate power allocation strategies for multicarrier systems, in which each subcarrier employs single amplify-and-forward (AF) relaying scheme. Optimal power allocation schemes are proposed by maximizing the approximated channel capacity under aggregate power constraint (APC) and separate power constraint (SPC). By comparison with the uniform power allocation scheme and the best channel power allocation scheme, we confirm that both the APC and SPC schemes achieve a performance gain over benchmark schemes. In addition, the impact of channel uncertainty is also considered in this paper by modeling the uncertainty regions as bounded sets, and results show that the uncertainty can degrade the worst-case performance significantly.

  12. Verification of an objective analysis scheme

    International Nuclear Information System (INIS)

    Cats, G.J.; Haan, B.J. de; Hafkenscheid, L.M.

    1987-01-01

    An intermittent data assimilation scheme has been used to produce wind and precipitation fields during the 10 days after the explosion at the Chernobyl nuclear power plant on 25 April 1986. The wind fields are analyses, the precipitation fields have been generated by the forecast model part of the scheme. The precipitation fields are of fair quality. The quality of the wind fields has been monitored by the ensuing trajectories. These were found to describe the arrival times of radioactive air in good agreement with most observational data, taken all over Europe. The wind analyses are therefore considered to be reliable. 25 refs.; 13 figs

  13. Direct-to-PCR tissue preservation for DNA profiling.

    Science.gov (United States)

    Sorensen, Amy; Berry, Clare; Bruce, David; Gahan, Michelle Elizabeth; Hughes-Stamm, Sheree; McNevin, Dennis

    2016-05-01

    Disaster victim identification (DVI) often occurs in remote locations with extremes of temperatures and humidities. Access to mortuary facilities and refrigeration are not always available. An effective and robust DNA sampling and preservation procedure would increase the probability of successful DNA profiling and allow faster repatriation of bodies and body parts. If the act of tissue preservation also released DNA into solution, ready for polymerase chain reaction (PCR), the DVI process could be further streamlined. In this study, we explored the possibility of obtaining DNA profiles without DNA extraction, by adding aliquots of preservative solutions surrounding fresh human muscle and decomposing human muscle and skin tissue samples directly to PCR. The preservatives consisted of two custom preparations and two proprietary solutions. The custom preparations were a salt-saturated solution of dimethyl sulfoxide (DMSO) with ethylenediaminetetraacetic (EDTA) and TENT buffer (Tris, EDTA, NaCl, Tween 20). The proprietary preservatives were DNAgard (Biomatrica(®)) and Tissue Stabilising Kit (DNA Genotek). We obtained full PowerPlex(®) 21 (Promega) and GlobalFiler(®) (Life Technologies) DNA profiles from fresh and decomposed tissue preserved at 35 °C for up to 28 days for all four preservatives. The preservative aliquots removed from the fresh muscle tissue samples had been stored at -80 °C for 4 years, indicating that long-term archival does not diminish the probability of successful DNA typing. Rather, storage at -80 °C seems to reduce PCR inhibition.

  14. Improved performance of the control scheme for IUAC superconducting Linac

    International Nuclear Information System (INIS)

    Sahu, B.K.; Suman, S.K.; Kumar, R.

    2015-01-01

    Since many years energized ion beams from linac are being delivered routinely for scheduled experiments using all the three accelerating modules of linac along with super buncher and rebuncher. Major efforts are dedicated to improve the performance of the control scheme to minimise the down time of the linac during operation. Earlier, a number of developments were carried out to improve the dynamics of the control scheme. The most significant of them is the piezoelectric actuator based tuning mechanism which is implemented in all the operational resonators of second and third accelerating modules of superconducting linac. This has helped us to bridge the gap between the accelerating fields achieved during Q measurement at 6 W of helium power and during phase locking of the resonator during beam operation at a given RF power (∼120W). The piezoelectric actuator based tuner is also instrumental to reduce the unlocking rate of the resonators. Pulse width modulation (PWM) control based helium gas operated tuner is implemented in few resonators to improve phase locking performance. CAMAC based distributed control scheme is upgraded to VME based distributed control without changing the existing client interface to maintain uniformity between the Pelletron and linac control. Python code support has been implemented to protect the resonators against high forward power during unlocking. This is also integrated with the display status of the resonators for monitoring. A frequency to voltage converter is incorporated in control scheme to monitor the frequency error. This has helped us to develop a scheme for automatic phase locking of the cavities using piezoelectric actuator based tuner control. (author)

  15. The scheme optimization and management innovation for the first containment integrated in-service test of nuclear power plant

    International Nuclear Information System (INIS)

    Wang Haiwei; Yang Gang

    2014-01-01

    The containment integrated test is a large-scale, high risk and very difficult test in pressurized water reactor nuclear power plants. By simulating peak pressure inside the containment in DESIGN-BASIS accident conditions, measuring the total leakage rate of the containment with the peak pressure, and implementing the structure inspection test on several pressure levels, the containment's performance can be verified. Containment integrated test is an important witness point supervised by NNSA. The test results crucially decide the reactor to be started or not. The containment integrated test in 301 overhaul is the first in-service test of Unit 3. By the experience of the same 6 former tests in Qinshan Second Nuclear Power Plant and the feedback from other plants, the test scheme get more scientific and the organization management more standardized. This article discusses the containment integrated test in 301 overhaul and summarizes the experience to provide some references for the following containment integrated tests in the future. (authors)

  16. A simple photoionization scheme for characterizing electron and ion spectrometers

    Energy Technology Data Exchange (ETDEWEB)

    Wituschek, A.; Vangerow, J. von; Grzesiak, J.; Stienkemeier, F.; Mudrich, M., E-mail: mudrich@physik.uni-freiburg.de [Physikalisches Institut, Universität Freiburg, 79104 Freiburg (Germany)

    2016-08-15

    We present a simple diode laser-based photoionization scheme for generating electrons and ions with well-defined spatial and energetic (≲2 eV) structures. This scheme can easily be implemented in ion or electron imaging spectrometers for the purpose of off-line characterization and calibration. The low laser power ∼1 mW needed from a passively stabilized diode laser and the low flux of potassium atoms in an effusive beam make our scheme a versatile source of ions and electrons for applications in research and education.

  17. [Ocular Surface Evaluation in Patients Treated with Prostaglandin Analogues Considering Preservative Agent].

    Science.gov (United States)

    Mlčáková, E; Mlčák, P; Karhanová, M; Langová, K; Marešová, K

    The aim of this study was to evaluate the ocular surface in patients treated with prostaglandin analogues considering contained preservative agent. 60 patients with glaucoma or ocular hypertension treated with prostaglandin analogue monotherapy were enrolled in this observational study. 20 patients with glaucoma suspect or ocular hypertension without local or systemic glaucoma medication formed the control group. Demographic data and medical history were recorded for each participant. Patients filled in the Ocular surface disease index© (OSDI) questionnaire and underwent an ophthalmological examination including assessment of conjunctival hyperaemia according to Efron, tear film break up time (BUT) and fluorescein staining according to the Oxford grading scheme. Treated participants were divided into 3 groups according to the preservative contained in the currently used prostaglandin analogue: the preservative-free group (18 patients), the polyquaternium group (17 patients) and the benzalkonium chloride (BAK) group (25 patients). The control group had significantly lower fluorescein staining than the preservative-free group (p=0.001), the polyquaternium group (p=0.007) and the BAK group (p=0.002). The conjunctival hyperaemia was significantly lower in the preservative-free group compared to the polyquaternium group (p=0.011). There was no significant difference among the other groups. The difference neither in the OSDI score nor in the BUT was statistically important. This study confirmed that the ocular surface is worse in patients treated with prostaglandin analogue monotherapy than in people without glaucoma medication. A significant difference among treated patients depending on a preservative agent was not proved.Key words: benzalkonium chloride, glaucoma, ocular surface disease, preservatives, prostaglandin analogues.

  18. A Coherence Preservation Control Strategy in Cavity QED Based on Classical Quantum Feedback

    Directory of Open Access Journals (Sweden)

    Ming Li

    2013-01-01

    Full Text Available For eliminating the unexpected decoherence effect in cavity quantum electrodynamics (cavity QED, the transfer function of Rabi oscillation is derived theoretically using optical Bloch equations. In particular, the decoherence in cavity QED from the atomic spontaneous emission is especially considered. A feedback control strategy is proposed to preserve the coherence through Rabi oscillation stabilization. In the scheme, a classical quantum feedback channel for the quantum information acquisition is constructed via the quantum tomography technology, and a compensation system based on the root locus theory is put forward to suppress the atomic spontaneous emission and the associated decoherence. The simulation results have proved its effectiveness and superiority for the coherence preservation.

  19. Upwind differencing scheme for the equations of ideal magnetohydrodynamics

    International Nuclear Information System (INIS)

    Brio, M.; Wu, C.C.

    1988-01-01

    Recently, upwind differencing schemes have become very popular for solving hyperbolic partial differential equations, especially when discontinuities exist in the solutions. Among many upwind schemes successfully applied to the problems in gas dynamics, Roe's method stands out for its relative simplicity and clarity of the underlying physical model. In this paper, an upwind differencing scheme of Roe-type for the MHD equations is constructed. In each computational cell, the problem is first linearized around some averaged state which preserves the flux differences. Then the solution is advanced in time by computing the wave contributions to the flux at the cell interfaces. One crucial task of the linearization procedure is the construction of a Roe matrix. For the special case γ = 2, a Roe matrix in the form of a mean value Jacobian is found, and for the general case, a simple averaging procedure is introduced. All other necessary ingredients of the construction, which include eigenvalues, and a complete set of right eigenvectors of the Roe matrix and decomposition coefficients are presented. As a numerical example, we chose a coplanar MHD Riemann problem. The problem is solved by the newly constructed second-order upwind scheme as well as by the Lax-Friedrichs, the Lax-Wendroff, and the flux-corrected transport schemes. The results demonstrate several advantages of the upwind scheme. In this paper, we also show that the MHD equations are nonconvex. This is a contrast to the general belief that the fast and slow waves are like sound waves in the Euler equations. As a consequence, the wave structure becomes more complicated; for example, compound waves consisting of a shock and attached to it a rarefaction wave of the same family can exist in MHD. copyright 1988 Academic Press, Inc

  20. Maximum generation power evaluation of variable frequency offshore wind farms when connected to a single power converter

    Energy Technology Data Exchange (ETDEWEB)

    Gomis-Bellmunt, Oriol; Sumper, Andreas [Centre d' Innovacio Tecnologica en Convertidors Estatics i Accionaments (CITCEA-UPC), Universitat Politecnica de Catalunya UPC, Av. Diagonal, 647, Pl. 2, 08028 Barcelona (Spain); IREC Catalonia Institute for Energy Research, Barcelona (Spain); Junyent-Ferre, Adria; Galceran-Arellano, Samuel [Centre d' Innovacio Tecnologica en Convertidors Estatics i Accionaments (CITCEA-UPC), Universitat Politecnica de Catalunya UPC, Av. Diagonal, 647, Pl. 2, 08028 Barcelona (Spain)

    2010-10-15

    The paper deals with the evaluation of power generated by variable and constant frequency offshore wind farms connected to a single large power converter. A methodology to analyze different wind speed scenarios and system electrical frequencies is presented and applied to a case study, where it is shown that the variable frequency wind farm concept (VF) with a single power converter obtains 92% of the total available power, obtained with individual power converters in each wind turbine (PC). The PC scheme needs multiple power converters implying drawbacks in terms of cost, maintenance and reliability. The VF scheme is also compared to a constant frequency scheme CF, and it is shown that a significant power increase of more than 20% can be obtained with VF. The case study considers a wind farm composed of four wind turbines based on synchronous generators. (author)

  1. Low-peak-to-average power ratio and low-complexity asymmetrically clipped optical orthogonal frequency-division multiplexing uplink transmission scheme for long-reach passive optical network.

    Science.gov (United States)

    Zhou, Ji; Qiao, Yaojun

    2015-09-01

    In this Letter, we propose a discrete Hartley transform (DHT)-spread asymmetrically clipped optical orthogonal frequency-division multiplexing (DHT-S-ACO-OFDM) uplink transmission scheme in which the multiplexing/demultiplexing process also uses the DHT algorithm. By designing a simple encoding structure, the computational complexity of the transmitter can be reduced from O(Nlog(2)(N)) to O(N). At the probability of 10(-3), the peak-to-average power ratio (PAPR) of 2-ary pulse amplitude modulation (2-PAM)-modulated DHT-S-ACO-OFDM is approximately 9.7 dB lower than that of 2-PAM-modulated conventional ACO-OFDM. To verify the feasibility of the proposed scheme, a 4-Gbit/s DHT-S-ACO-OFDM uplink transmission scheme with a 1∶64 way split has been experimentally implemented using 100-km standard single-mode fiber (SSMF) for a long-reach passive optical network (LR-PON).

  2. Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption

    Science.gov (United States)

    Nissenbaum, O. V.; Ponomarov, K. Y.; Zaharov, A. A.

    2018-04-01

    This article proposes a three-side cryptographic scheme for verifying device attributes with a Supervisor and a Certification Authority (CA) for attribute-based encryption. Two options are suggested: using a message authentication code and using a digital signature. The first version is suitable for networks with one CA, and the second one for networks with several CAs, including dynamic systems. Also, the addition of this scheme with a blind signature is proposed to preserve the confidentiality of the device attributes from the CA. The introduction gives a definition and a brief historical overview of attribute-based encryption (ABE), addresses the use of ABE in the Internet of Things.

  3. Power Generation and Distribution via Distributed Coordination Control

    OpenAIRE

    Kim, Byeong-Yeon; Oh, Kwang-Kyo; Ahn, Hyo-Sung

    2014-01-01

    This paper presents power coordination, power generation, and power flow control schemes for supply-demand balance in distributed grid networks. Consensus schemes using only local information are employed to generate power coordination, power generation and power flow control signals. For the supply-demand balance, it is required to determine the amount of power needed at each distributed power node. Also due to the different power generation capacities of each power node, coordination of pow...

  4. A gas dynamics scheme for a two moments model of radiative transfer

    International Nuclear Information System (INIS)

    Buet, Ch.; Despres, B.

    2007-01-01

    We address the discretization of the Levermore's two moments and entropy model of the radiative transfer equation. We present a new approach for the discretization of this model: first we rewrite the moment equations as a Compressible Gas Dynamics equation by introducing an additional quantity that plays the role of a density. After that we discretize using a Lagrange-projection scheme. The Lagrange-projection scheme permits us to incorporate the source terms in the fluxes of an acoustic solver in the Lagrange step, using the well-known piecewise steady approximation and thus to capture correctly the diffusion regime. Moreover we show that the discretization is entropic and preserve the flux-limited property of the moment model. Numerical examples illustrate the feasibility of our approach. (authors)

  5. Cost-prioritized droop schemes for autonomous microgrids

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop schemes for parallel source control usually aims for proportional power sharing tuned in accordance to the source ratings. This works fine for sources with close similarity, but not really for an autonomous microgrid where different types of Distributed Generators (DGs) may be present without...

  6. Analysis of Paper reduction schemes to develop selection criteria for ofdm signals

    International Nuclear Information System (INIS)

    Abro, F.R.

    2015-01-01

    This paper presents a review of different PAPR (Peak to Average Power Ratio) reduction schemes of OFDM (Orthogonal Frequency Division Multiplexing) signals. The schemes that have been considered include Clipping and Filtering, Coding, ACE (Active Contstellation Extension), SLM (Selected Mapping), PTS (Partial Transmit Sequence), TI (Tone Injection) and TR (Tone Reservation). A comparative analysis has been carried out qualitatively. It has been demonstrated how these schemes can be combined with MIMO (Multiple Input Multiple Output) technologies. Finally, criteria for selection of PAPR reduction schemes of OFDM systems are discussed. (author)

  7. A New Switching-Based Median Filtering Scheme and Algorithm for Removal of High-Density Salt and Pepper Noise in Images

    Directory of Open Access Journals (Sweden)

    Jayaraj V

    2010-01-01

    Full Text Available A new switching-based median filtering scheme for restoration of images that are highly corrupted by salt and pepper noise is proposed. An algorithm based on the scheme is developed. The new scheme introduces the concept of substitution of noisy pixels by linear prediction prior to estimation. A novel simplified linear predictor is developed for this purpose. The objective of the scheme and algorithm is the removal of high-density salt and pepper noise in images. The new algorithm shows significantly better image quality with good PSNR, reduced MSE, good edge preservation, and reduced streaking. The good performance is achieved with reduced computational complexity. A comparison of the performance is made with several existing algorithms in terms of visual and quantitative results. The performance of the proposed scheme and algorithm is demonstrated.

  8. Analysis and design of a nuclear boiler control scheme

    International Nuclear Information System (INIS)

    Hughes, F.M.

    1982-01-01

    The steam raising plant of a British designed nuclear power station for which the installed control scheme has given rise to performance and stability problems is considered. The lecture is based on studies carried out for the plant which illustrate the way in which multivariable frequency response methods can be used to analyse and identify the source of control problems and further enable alternative control schemes, having improved performance, to be designed. (author)

  9. Lightning protection scheme for the CPRF/ZTH system complex

    International Nuclear Information System (INIS)

    Konkel, H.

    1987-01-01

    This paper describes some of the background in the design and the lightning protection and grounding scheme recommended for the CPRF/ZTH system at the Los Alamos Laboratory. Standard power industry practices were applied to minimize the effect on both the system and personnel of a high magnitude, direct lightning discharge in the CPRF/ZTH area. The recommended scheme is in compliance with existing local and national electric and safety codes. 7 refs., 3 figs

  10. A Novel Support Vector Machine with Globality-Locality Preserving

    Directory of Open Access Journals (Sweden)

    Cheng-Long Ma

    2014-01-01

    Full Text Available Support vector machine (SVM is regarded as a powerful method for pattern classification. However, the solution of the primal optimal model of SVM is susceptible for class distribution and may result in a nonrobust solution. In order to overcome this shortcoming, an improved model, support vector machine with globality-locality preserving (GLPSVM, is proposed. It introduces globality-locality preserving into the standard SVM, which can preserve the manifold structure of the data space. We complete rich experiments on the UCI machine learning data sets. The results validate the effectiveness of the proposed model, especially on the Wine and Iris databases; the recognition rate is above 97% and outperforms all the algorithms that were developed from SVM.

  11. Energy-Efficient Relay Selection Scheme for Physical Layer Security in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Li Jiang

    2015-01-01

    selection and dynamic power allocation in order to maximize SC and to minimize energy consumption. Moreover, we consider finite-state Markov channels and residual relay energy in the relay selection and power allocation process. Specifically, the formulation of the proposed relay selection and power allocation scheme is based on the restless bandit problem, which is solved by the primal-dual index heuristic algorithm. Additionally, the obtained optimal relay selection policy has an indexability property that dramatically reduces the computational complexity. Numerical results are presented to show that our proposed scheme has the maximum SC and minimum energy consumption compared to the existing ones.

  12. A vertical handoff scheme based on adaptive period

    Directory of Open Access Journals (Sweden)

    Li Yang

    2017-08-01

    Full Text Available This paper presents a periodic adaptive vertical handoff scheme.In the phase of handoff initiation,the mobile terminal will adjust the interfaces activating interval to scan the potential new wireless signals according to the Received Signals Strength.In the phase of handoff decision,multiple attribute judgment method are adopted to judge the comprehensive perfomance of each network.The simulation shows that the proposed scheme can discover new wireless networks access the network that has the best comprehensive performance saving consumed power.

  13. Preserving Stability and Rights Protection: Conflict or Coherence?

    Directory of Open Access Journals (Sweden)

    Chongyi Feng

    2013-01-01

    Full Text Available The creation of a new administrative institution known as the “Stability Preservation Office” at the central level, which is overseen by the Chinese Communist Party (CCP Central Committee and has branches at every local level, from streets and townships to enterprises, and has extraordinary powers to override other regular institutions and branches of government, is a clear indication that the Chinese government’s efforts to preserve stability are not limited to the conventional business of crime control or public security. This paper traces the origin of the discourse and practice of preserving stability and the rights defence movement in China, investigating the interplay or interaction between the two. It examines the end and the means of stability preservation, explores whether the measures taken by the government to preserve stability or the rights protection actions taken by citizens are the root cause of social unrest, and whether the suppression of discontent or the improvement of human rights and social justice is the better way to achieve social stability in contemporary China. It contributes to our understanding of emerging state-society relations and the latest social and political trends in China.

  14. Effect of synthetic jet modulation schemes on the reduction of a laminar separation bubble

    Science.gov (United States)

    Seo, J. H.; Cadieux, F.; Mittal, R.; Deem, E.; Cattafesta, L.

    2018-03-01

    The response of a laminar separation bubble to synthetic jet forcing with various modulation schemes is investigated via direct numerical simulations. A simple sinusoidal waveform is considered as a reference case, and various amplitude modulation schemes, including the square-wave "burst" modulation, are employed in the simulations. The results indicate that burst modulation is less effective at reducing the length of the flow separation than the sinusoidal forcing primarily because burst modulation is associated with a broad spectrum of input frequencies that are higher than the target frequency for the flow control. It is found that such high-frequency forcing delays vortex roll-up and promotes vortex pairing and merging, which have an adverse effect on reducing the separation bubble length. A commonly used amplitude modulation scheme is also found to have reduced effectiveness due to its spectral content. A new amplitude modulation scheme which is tailored to impart more energy at the target frequency is proposed and shown to be more effective than the other modulation schemes. Experimental measurements confirm that modulation schemes can be preserved through the actuator and used to enhance the energy content at the target modulation frequency. The present study therefore suggests that the effectiveness of synthetic jet-based flow control could be improved by carefully designing the spectral content of the modulation scheme.

  15. Scheme dependence of quantum gravity on de Sitter background

    Energy Technology Data Exchange (ETDEWEB)

    Kitamoto, Hiroyuki, E-mail: kitamoto@post.kek.jp [KEK Theory Center, Tsukuba, Ibaraki 305-0801 (Japan); Kitazawa, Yoshihisa, E-mail: kitazawa@post.kek.jp [KEK Theory Center, Tsukuba, Ibaraki 305-0801 (Japan); The Graduate University for Advanced Studies (Sokendai), Department of Particle and Nuclear Physics, Tsukuba, Ibaraki 305-0801 (Japan)

    2013-08-11

    We extend our investigation of the IR effects on the local dynamics of matter fields in quantum gravity. Specifically we clarify how the IR effects depend on the change of the quantization scheme: different parametrization of the metric and the matter field redefinition. Conformal invariance implies effective Lorentz invariance of the matter system in de Sitter space. An arbitrary choice of the parametrization of the metric and the matter field redefinition does not preserve the effective Lorentz invariance of the local dynamics. As for the effect of different parametrization of the metric alone, the effective Lorentz symmetry breaking term can be eliminated by shifting the background metric. In contrast, we cannot compensate the matter field redefinition dependence by such a way. The effective Lorentz invariance can be retained only when we adopt the specific matter field redefinitions where all dimensionless couplings become scale invariant at the classical level. This scheme is also singled out by unitarity as the kinetic terms are canonically normalized.

  16. Comparison of the Tangent Linear Properties of Tracer Transport Schemes Applied to Geophysical Problems.

    Science.gov (United States)

    Kent, James; Holdaway, Daniel

    2015-01-01

    A number of geophysical applications require the use of the linearized version of the full model. One such example is in numerical weather prediction, where the tangent linear and adjoint versions of the atmospheric model are required for the 4DVAR inverse problem. The part of the model that represents the resolved scale processes of the atmosphere is known as the dynamical core. Advection, or transport, is performed by the dynamical core. It is a central process in many geophysical applications and is a process that often has a quasi-linear underlying behavior. However, over the decades since the advent of numerical modelling, significant effort has gone into developing many flavors of high-order, shape preserving, nonoscillatory, positive definite advection schemes. These schemes are excellent in terms of transporting the quantities of interest in the dynamical core, but they introduce nonlinearity through the use of nonlinear limiters. The linearity of the transport schemes used in Goddard Earth Observing System version 5 (GEOS-5), as well as a number of other schemes, is analyzed using a simple 1D setup. The linearized version of GEOS-5 is then tested using a linear third order scheme in the tangent linear version.

  17. Construction of low dissipative high-order well-balanced filter schemes for non-equilibrium flows

    International Nuclear Information System (INIS)

    Wang Wei; Yee, H.C.; Sjoegreen, Bjoern; Magin, Thierry; Shu, Chi-Wang

    2011-01-01

    The goal of this paper is to generalize the well-balanced approach for non-equilibrium flow studied by Wang et al. (2009) to a class of low dissipative high-order shock-capturing filter schemes and to explore more advantages of well-balanced schemes in reacting flows. More general 1D and 2D reacting flow models and new examples of shock turbulence interactions are provided to demonstrate the advantage of well-balanced schemes. The class of filter schemes developed by Yee et al. (1999) , Sjoegreen and Yee (2004) and Yee and Sjoegreen (2007) consist of two steps, a full time step of spatially high-order non-dissipative base scheme and an adaptive non-linear filter containing shock-capturing dissipation. A good property of the filter scheme is that the base scheme and the filter are stand-alone modules in designing. Therefore, the idea of designing a well-balanced filter scheme is straightforward, i.e. choosing a well-balanced base scheme with a well-balanced filter (both with high-order accuracy). A typical class of these schemes shown in this paper is the high-order central difference schemes/predictor-corrector (PC) schemes with a high-order well-balanced WENO filter. The new filter scheme with the well-balanced property will gather the features of both filter methods and well-balanced properties: it can preserve certain steady-state solutions exactly; it is able to capture small perturbations, e.g. turbulence fluctuations; and it adaptively controls numerical dissipation. Thus it shows high accuracy, efficiency and stability in shock/turbulence interactions. Numerical examples containing 1D and 2D smooth problems, 1D stationary contact discontinuity problem and 1D turbulence/shock interactions are included to verify the improved accuracy, in addition to the well-balanced behavior.

  18. Nearly optimal measurement schemes in a noisy Mach-Zehnder interferometer with coherent and squeezed vacuum

    Energy Technology Data Exchange (ETDEWEB)

    Gard, Bryan T.; You, Chenglong; Singh, Robinjeet; Lee, Hwang; Corbitt, Thomas R.; Dowling, Jonathan P. [Louisiana State University, Baton Rouge, LA (United States); Mishra, Devendra K. [Louisiana State University, Baton Rouge, LA (United States); V.S. Mehta College of Science, Physics Department, Bharwari, UP (India)

    2017-12-15

    The use of an interferometer to perform an ultra-precise parameter estimation under noisy conditions is a challenging task. Here we discuss nearly optimal measurement schemes for a well known, sensitive input state, squeezed vacuum and coherent light. We find that a single mode intensity measurement, while the simplest and able to beat the shot-noise limit, is outperformed by other measurement schemes in the low-power regime. However, at high powers, intensity measurement is only outperformed by a small factor. Specifically, we confirm, that an optimal measurement choice under lossless conditions is the parity measurement. In addition, we also discuss the performance of several other common measurement schemes when considering photon loss, detector efficiency, phase drift, and thermal photon noise. We conclude that, with noise considerations, homodyne remains near optimal in both the low and high power regimes. Surprisingly, some of the remaining investigated measurement schemes, including the previous optimal parity measurement, do not remain even near optimal when noise is introduced. (orig.)

  19. Powerful and large regional authorities are needed to preserve green open space for urban agglomerations

    Directory of Open Access Journals (Sweden)

    Carmen Aalbers

    2013-10-01

    Full Text Available Identification and assessment of strategies for the conservation and multifunctional development of green open space in the urban fringe of European urban regions is a challenge to both the academic and the real life world. Within the EU funded research project PLUREL – Peri-urban land use relationships – ‘Strategies and sustainability assessment tools for urban rural linkages’, we developed a methodology for international comparison of regional strategies that considers the policy context at supra-regional level. This methodology helped to explain the reported impacts of strategies. For this we further elaborated the theoretical concept of policy arrangements and policy dimensions by Van Tatenhove et al. (2000 and Arts et al. (2006. Strategies and policy contexts referred to are from Montpellier Agglomeration, a formal coalition of now 31 municipalities, Leipzig-Halle region, a functional urban region (FUR with governance coalitions around green open space preservation strategies, and Hangzhou in China, a very large city with hierarchical formal government. Results showed how the means of influence from different government levels can complement and reinforce each other and raise the effectiveness of the strategies. A combination of hierarchical government with a horizontal coalition between local authorities covering the full FUR can be very effective for managing the land use developments in the urban fringe, even when private business, CSOs or other NGOs are not included in the coalition. Supra-regional authorities do not have to possess the land resources, but setting the Rules of the Game is a powerful means of influence to coerce local municipalities to preserve green open space in the urban fringe.

  20. Knowledge Preservation and Data Collection on FR in Kazakhstan

    International Nuclear Information System (INIS)

    Andropenkov, S.

    2013-01-01

    Since 2004 after the JSC NAK “Kazatomprom” became the owner of the “MAEK-Kazatomprom” LLP, the work on search, collecting and preservation of the knowledge connected with life cycle of BN-350 RI was initiated. The participating organizations, which were involved in work connected with different stages of life cycle of BN-350 RI, including international were defined. The structure of the organization of works on preservation of knowledge of BN-350 RI was defined. The main objectives of the knowledge preservation initiative are: • Halt the on-going loss of the knowledge connected with stages of life cycle of BN-350 RI. • Search, collecting, retrieving and preservation of the accumulated knowledge connected with stages of life cycle of BN-350 RI, for their possible use when developing the program of development of nuclear power in the RK, maintenance of the reached level of safety and its increase

  1. A Novel Real-Time Feature Matching Scheme

    Directory of Open Access Journals (Sweden)

    Ying Liu

    2014-02-01

    Full Text Available Affine Scale Invariant Feature Transform (ASIFT can obtain fully affine invariance, however, its time cost reaches about twice that in Scale Invariant Feature Transform (SIFT. We propose an improved ASIFT algorithm based on feature points in scale space for real-time application. In order to detect the affine invariant feature point, we establish a second-order difference of Gaussian (DOG pyramid and replace the extreme detection in the DOG pyramid by zero detection in the proposed second-order DOG pyramid, which decreases the complexity of the scheme. Experimental results show that the proposed method has a big progress in the real-time performance compared to the traditional one, while preserving the fully affine invariance and precision.

  2. Extension of the time-average model to Candu refueling schemes involving reshuffling

    International Nuclear Information System (INIS)

    Rouben, Benjamin; Nichita, Eleodor

    2008-01-01

    Candu reactors consist of a horizontal non-pressurized heavy-water-filled vessel penetrated axially by fuel channels, each containing twelve 50-cm-long fuel bundles cooled by pressurized heavy water. Candu reactors are refueled on-line and, as a consequence, the core flux and power distributions change continuously. For design purposes, a 'time-average' model was developed in the 1970's to calculate the average over time of the flux and power distribution and to study the effects of different refueling schemes. The original time-average model only allows treatment of simple push-through refueling schemes whereby fresh fuel is inserted at one end of the channel and irradiated fuel is removed from the other end. With the advent of advanced fuel cycles and new Candu designs, novel refueling schemes may be considered, such as reshuffling discharged fuel from some channels into other channels, to achieve better overall discharge burnup. Such reshuffling schemes cannot be handled by the original time-average model. This paper presents an extension of the time-average model to allow for the treatment of refueling schemes with reshuffling. Equations for the extended model are presented, together with sample results for a simple demonstration case. (authors)

  3. Secure and privacy-preserving data communication in Internet of Things

    CERN Document Server

    Zhu, Liehuang; Xu, Chang

    2017-01-01

    This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

  4. A hybrid Eulerian–Lagrangian numerical scheme for solving prognostic equations in fluid dynamics

    Directory of Open Access Journals (Sweden)

    E. Kaas

    2013-11-01

    Full Text Available A new hybrid Eulerian–Lagrangian numerical scheme (HEL for solving prognostic equations in fluid dynamics is proposed. The basic idea is to use an Eulerian as well as a fully Lagrangian representation of all prognostic variables. The time step in Lagrangian space is obtained as a translation of irregularly spaced Lagrangian parcels along downstream trajectories. Tendencies due to other physical processes than advection are calculated in Eulerian space, interpolated, and added to the Lagrangian parcel values. A directionally biased mixing amongst neighboring Lagrangian parcels is introduced. The rate of mixing is proportional to the local deformation rate of the flow. The time stepping in Eulerian representation is achieved in two steps: first a mass-conserving Eulerian or semi-Lagrangian scheme is used to obtain a provisional forecast. This forecast is then nudged towards target values defined from the irregularly spaced Lagrangian parcel values. The nudging procedure is defined in such a way that mass conservation and shape preservation is ensured in Eulerian space. The HEL scheme has been designed to be accurate, multi-tracer efficient, mass conserving, and shape preserving. In Lagrangian space only physically based mixing takes place; i.e., the problem of artificial numerical mixing is avoided. This property is desirable in atmospheric chemical transport models since spurious numerical mixing can impact chemical concentrations severely. The properties of HEL are here verified in two-dimensional tests. These include deformational passive transport on the sphere, and simulations with a semi-implicit shallow water model including topography.

  5. Obfuscated RSUs Vector Based Signature Scheme for Detecting Conspiracy Sybil Attack in VANETs

    Directory of Open Access Journals (Sweden)

    Xia Feng

    2017-01-01

    Full Text Available Given the popularity of vehicular Ad hoc networks (VANETs in traffic management, a new challenging issue comes into traffic safety, that is, security of the networks, especially when the adversary breaks defence. Sybil attack, for example, is a potential security threat through forging several identities to carry out attacks in VANETs. At this point, the paper proposed a solution named DMON that is a Sybil attack detection method with obfuscated neighbor relationship of Road Side Units (RSUs. DMON presents a ring signature based identification scheme and replaces vehicles’ identities with their trajectory for the purpose of anonymity. Furthermore, the neighbor relationship of RSUs is obfuscated to achieve privacy preserving of locations. The proposed scheme has been formally proved in the views of security and performance. Simulation has also been implemented to validate the scheme, in which the findings reveal the lower computational overhead and higher detection rate comparing with other related solutions.

  6. Privacy-Preserving Smart Metering with Authentication in a Smart Grid

    Directory of Open Access Journals (Sweden)

    Jun Beom Hur

    2015-12-01

    Full Text Available The traditional security objectives of smart grids have been availability, integrity, and confidentiality. However, as the grids incorporate smart metering and load management, user and corporate privacy is increasingly becoming an issue in smart grid networks. Although transmitting current power consumption levels to the supplier or utility from each smart meter at short intervals has an advantage for the electricity supplier’s planning and management purposes, it threatens user privacy by disclosing fine-grained consumption data and usage behavior to utility providers. In this study, we propose a distributed incremental data aggregation scheme where all smart meters on an aggregation path are involved in routing the data from the source meter to the collection unit. User privacy is preserved by symmetric homomorphic encryption, which allows smart meters to participate in the aggregation without seeing any intermediate or final result. Aggregated data is further integrated with an aggregate signature to achieve data integrity and smart meter authentication in such a way that dishonest or fake smart meters cannot falsify data en route. Only the collection unit can obtain the aggregated data and verify its integrity while the individual plain data are not exposed to the collection unit. Therefore, user privacy and security are improved for the smart metering in a smart grid network.

  7. Adaptive protection coordination scheme for distribution network with distributed generation using ABC

    Directory of Open Access Journals (Sweden)

    A.M. Ibrahim

    2016-09-01

    Full Text Available This paper presents an adaptive protection coordination scheme for optimal coordination of DOCRs in interconnected power networks with the impact of DG, the used coordination technique is the Artificial Bee Colony (ABC. The scheme adapts to system changes; new relays settings are obtained as generation-level or system-topology changes. The developed adaptive scheme is applied on the IEEE 30-bus test system for both single- and multi-DG existence where results are shown and discussed.

  8. Comparison of Tissue Preservation using Formalin and Ethanol as Preservative Formula

    OpenAIRE

    See Woan Shian; Arifin Soenggono; Sawkar Vijay Pramod

    2016-01-01

    Background: Tissue preservation can be performed through embalming, by providing the chemical embalming fluid to the human remains. Formalin’s preservative formula is the foundation for modern methods of embalming. Unfortunately, this preservative formula has several disadvantages. While Ethanol’s preservative formula is a considerable agent to replace formalin’s preservative formula. The aim of this study was to compare the tissue preservation using formalin and ethanol as preservative formu...

  9. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.; Aï ssa, Sonia

    2012-01-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary's reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  10. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.

    2012-09-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary\\'s reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  11. Implementation of a micro hydropower supply scheme in the Kwazulu-Natal Drakensberg

    International Nuclear Information System (INIS)

    Dooge, G.R.

    1997-01-01

    Eskom has implemented a 5 kW micro hydropower supply scheme in the Kwazulu-Natal Drakensberg. The scheme supplies electrical power to five schools using a Single Wire Earth Return (SWER) transmission line. This paper describes the implementation of the scheme and covers the social aspects, the mechanical, civil and electrical works, and also scheme economics. The main aim of this project was to obtain experience in the design and implementation of a micro hydro system, both technically and socially, so that the technology could be used with confidence in Eskom's non-grid electrification programme. 5 refs., 3 figs

  12. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  13. A Suboptimal Scheme for Multi-User Scheduling in Gaussian Broadcast Channels

    KAUST Repository

    Zafar, Ammar; Alouini, Mohamed-Slim; Shaqfeh, Mohammad

    2014-01-01

    This work proposes a suboptimal multi-user scheduling scheme for Gaussian broadcast channels which improves upon the classical single user selection, while considerably reducing complexity as compared to the optimal superposition coding with successful interference cancellation. The proposed scheme combines the two users with the maximum weighted instantaneous rate using superposition coding. The instantaneous rate and power allocation are derived in closed-form, while the long term rate of each user is derived in integral form for all channel distributions. Numerical results are then provided to characterize the prospected gains of the proposed scheme.

  14. A Suboptimal Scheme for Multi-User Scheduling in Gaussian Broadcast Channels

    KAUST Repository

    Zafar, Ammar

    2014-05-28

    This work proposes a suboptimal multi-user scheduling scheme for Gaussian broadcast channels which improves upon the classical single user selection, while considerably reducing complexity as compared to the optimal superposition coding with successful interference cancellation. The proposed scheme combines the two users with the maximum weighted instantaneous rate using superposition coding. The instantaneous rate and power allocation are derived in closed-form, while the long term rate of each user is derived in integral form for all channel distributions. Numerical results are then provided to characterize the prospected gains of the proposed scheme.

  15. P-Q simultaneous control scheme for SMES

    International Nuclear Information System (INIS)

    Tsuji, K.; Ise, T.; Murakami, Y.

    1981-01-01

    Superconducting magnetic energy storage (SMES) can be looked at as a control device as well as an effective energy storage device in power system applications. Thus far, active power control and reactive power control seem to have been treated separately. However, under some minor constraints, active (P) and reactive power (Q) may be controlled simultaneously and this capability is perhaps one of the most valuable characteristics of SMES in power system applications. In this brief paper, we examine the possibility of controlling active and reactive power simultaneously (henceforth we call it P-Q simultaneous control) and propose a direct digital control algorithm for the P-Q simultaneous control of SMES. Some simulation results are presented. In addition, a hierarchical control scheme for SMES at a load center is briefly discussed as an extension of P-Q simultaneous control presented in this paper

  16. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    , Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...

  17. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  18. Global regularizing flows with topology preservation for active contours and polygons.

    Science.gov (United States)

    Sundaramoorthi, Ganesh; Yezzi, Anthony

    2007-03-01

    Active contour and active polygon models have been used widely for image segmentation. In some applications, the topology of the object(s) to be detected from an image is known a priori, despite a complex unknown geometry, and it is important that the active contour or polygon maintain the desired topology. In this work, we construct a novel geometric flow that can be added to image-based evolutions of active contours and polygons in order to preserve the topology of the initial contour or polygon. We emphasize that, unlike other methods for topology preservation, the proposed geometric flow continually adjusts the geometry of the original evolution in a gradual and graceful manner so as to prevent a topology change long before the curve or polygon becomes close to topology change. The flow also serves as a global regularity term for the evolving contour, and has smoothness properties similar to curvature flow. These properties of gradually adjusting the original flow and global regularization prevent geometrical inaccuracies common with simple discrete topology preservation schemes. The proposed topology preserving geometric flow is the gradient flow arising from an energy that is based on electrostatic principles. The evolution of a single point on the contour depends on all other points of the contour, which is different from traditional curve evolutions in the computer vision literature.

  19. Green-Frag: Energy-Efficient Frame Fragmentation Scheme for Wireless Sensor Networks

    KAUST Repository

    Daghistani, Anas H.

    2013-05-15

    Power management is an active area of research in wireless sensor networks (WSNs). Efficient power management is necessary because WSNs are battery-operated devices that can be deployed in mission-critical applications. From the communications perspective, one main approach to reduce energy is to maximize throughput so the data can be transmitted in a short amount of time. Frame fragmentation techniques aim to achieve higher throughput by reducing retransmissions. Using experiments on a WSN testbed, we show that frame fragmentation helps to reduce energy consumption. We then study and compare recent frame fragmentation schemes to find the most energy-efficient scheme. Our main contribution is to propose a new frame fragmentation scheme that is optimized to be energy efficient, which is originated from the chosen frame fragmentation scheme. This new energy-efficient frame fragmentation protocol is called (Green-Frag). Green-Frag uses an algorithm that gives sensor nodes the ability to transmit data with optimal transmit power and optimal frame structure based on environmental conditions. Green-Frag takes into consideration the channel conditions, interference patterns and level, as well as the distance between sender and receiver. The thesis discusses various design and implementation considerations for Green-Frag. Also, it shows empirical results of comparing Green-Frag with other frame fragmentation protocols in terms of energy efficiency. Green-Frag performance results shows that it is capable of choosing the best transmit according to the channel conditions. Subsequently, Green-Frag achieves the least energy consumption in all environmental conditions.

  20. Optimized Power Allocation and Relay Location Selection in Cooperative Relay Networks

    Directory of Open Access Journals (Sweden)

    Jianrong Bao

    2017-01-01

    Full Text Available An incremental selection hybrid decode-amplify forward (ISHDAF scheme for the two-hop single relay systems and a relay selection strategy based on the hybrid decode-amplify-and-forward (HDAF scheme for the multirelay systems are proposed along with an optimized power allocation for the Internet of Thing (IoT. Given total power as the constraint and outage probability as an objective function, the proposed scheme possesses good power efficiency better than the equal power allocation. By the ISHDAF scheme and HDAF relay selection strategy, an optimized power allocation for both the source and relay nodes is obtained, as well as an effective reduction of outage probability. In addition, the optimal relay location for maximizing the gain of the proposed algorithm is also investigated and designed. Simulation results show that, in both single relay and multirelay selection systems, some outage probability gains by the proposed scheme can be obtained. In the comparison of the optimized power allocation scheme with the equal power allocation one, nearly 0.1695 gains are obtained in the ISHDAF single relay network at a total power of 2 dB, and about 0.083 gains are obtained in the HDAF relay selection system with 2 relays at a total power of 2 dB.

  1. Wavelet Based Protection Scheme for Multi Terminal Transmission System with PV and Wind Generation

    Science.gov (United States)

    Manju Sree, Y.; Goli, Ravi kumar; Ramaiah, V.

    2017-08-01

    A hybrid generation is a part of large power system in which number of sources usually attached to a power electronic converter and loads are clustered can operate independent of the main power system. The protection scheme is crucial against faults based on traditional over current protection since there are adequate problems due to fault currents in the mode of operation. This paper adopts a new approach for detection, discrimination of the faults for multi terminal transmission line protection in presence of hybrid generation. Transient current based protection scheme is developed with discrete wavelet transform. Fault indices of all phase currents at all terminals are obtained by analyzing the detail coefficients of current signals using bior 1.5 mother wavelet. This scheme is tested for different types of faults and is found effective for detection and discrimination of fault with various fault inception angle and fault impedance.

  2. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  3. Privacy-preserving data aggregation in two-tiered wireless sensor networks with mobile nodes.

    Science.gov (United States)

    Yao, Yonglei; Liu, Jingfa; Xiong, Neal N

    2014-11-10

    Privacy-preserving data aggregation in wireless sensor networks (WSNs) with mobile nodes is a challenging problem, as an accurate aggregation result should be derived in a privacy-preserving manner, under the condition that nodes are mobile and have no pre-specified keys for cryptographic operations. In this paper, we focus on the SUM aggregation function and propose two privacy-preserving data aggregation protocols for two-tiered sensor networks with mobile nodes: Privacy-preserving Data Aggregation against non-colluded Aggregator and Sink (PDAAS) and Privacy-preserving Data Aggregation against Colluded Aggregator and Sink (PDACAS). Both protocols guarantee that the sink can derive the SUM of all raw sensor data but each sensor's raw data is kept confidential. In PDAAS, two keyed values are used, one shared with the sink and the other shared with the aggregator. PDAAS can protect the privacy of sensed data against external eavesdroppers, compromised sensor nodes, the aggregator or the sink, but fails if the aggregator and the sink collude. In PDACAS, multiple keyed values are used in data perturbation, which are not shared with the aggregator or the sink. PDACAS can protect the privacy of sensor nodes even the aggregator and the sink collude, at the cost of a little more overhead than PDAAS. Thorough analysis and experiments are conducted, which confirm the efficacy and efficiency of both schemes.

  4. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  5. An unconditionally stable, positivity-preserving splitting scheme for nonlinear Black-Scholes equation with transaction costs.

    Science.gov (United States)

    Guo, Jianqiang; Wang, Wansheng

    2014-01-01

    This paper deals with the numerical analysis of nonlinear Black-Scholes equation with transaction costs. An unconditionally stable and monotone splitting method, ensuring positive numerical solution and avoiding unstable oscillations, is proposed. This numerical method is based on the LOD-Backward Euler method which allows us to solve the discrete equation explicitly. The numerical results for vanilla call option and for European butterfly spread are provided. It turns out that the proposed scheme is efficient and reliable.

  6. Simulation of steam-water and binary geothermal power plants

    International Nuclear Information System (INIS)

    Popel', O.S.; Frid, S.E.; Shpil'rajn, Eh.Eh.

    2004-01-01

    The generalized scheme of the geothermal power plant (GeoPP), assuming the possibility of the electric power production in the steam-water turbine or in the turbine on the low-boiling working body, is considered. The GeoPP mathematical model, making it possible to carry out the comparison of the power indices of various GeoPP schemes and analysis of the calculational indices sensitivity of these schemes to the mode parameters change, is presented [ru

  7. Performance comparison of binary modulation schemes for visible light communication

    KAUST Repository

    Park, Kihong

    2015-09-11

    In this paper, we investigate the power spectral density of several binary modulation schemes including variable on-off keying, variable pulse position modulation, and pulse dual slope modulation which were previously proposed for visible light communication with dimming control. We also propose a novel slope-based modulation called differential chip slope modulation (DCSM) and develop a chip-based hard-decision receiver to demodulate the resulting signal, detect the chip sequence, and decode the input bit sequence. We show that the DCSM scheme can exploit spectrum density more efficiently than the reference schemes while providing an error rate performance comparable to them. © 2015 IEEE.

  8. Upgrade of the Nuclotron power supply

    International Nuclear Information System (INIS)

    Karpinskij, V.N.; Kondrat'ev, N.G.; Osipenkov, A.L.

    2010-01-01

    One of topics of the Nuclotron development is the modification of its power supply scheme and upgrade of the energy evacuation system aimed to provide long and safe operation of the Nuclotron at the dipole magnetic field up to 2 T. It is necessary for the Nuclotron operation as a part of injection chain of the heavy ion collider under design at JINR as well as for fulfillment of its current scientific program. In the report the structure and peculiarity of the existing power supply system are described. The existing system is based on separated supply of dipole magnets and quadrupole lenses. General goals of the power supply modification are described, structural and principal schemes of the power supply, control system and the schemes of the energy evacuation key are presented

  9. Reassessment of MLST schemes for Leptospira spp. typing worldwide.

    Science.gov (United States)

    Varni, Vanina; Ruybal, Paula; Lauthier, Juan José; Tomasini, Nicolás; Brihuega, Bibiana; Koval, Ariel; Caimi, Karina

    2014-03-01

    Leptospirosis is a neglected zoonosis of global importance. Several multilocus sequence typing (MLST) methods have been developed for Leptospira spp., the causative agent of leptospirosis. In this study we reassessed the most commonly used MLST schemes in a set of worldwide isolates, in order to select the loci that achieve the maximum power of discrimination for typing Leptospira spp. Global eBURST algorithm was used to detect clonal complexes among STs and phylogenetic relationships among concatenated and individual sequences were inferred through maximum likelihood (ML) analysis. The evaluation of 12 loci combined to type a subset of strains rendered 57 different STs. Seven of these loci were selected into a final scheme upon studying the number of alleles and polymorphisms, the typing efficiency, the discriminatory power and the ratio dN/dS per nucleotide site for each locus. This new 7-locus scheme was applied to a wider collection of worldwide strains. The ML tree constructed from concatenated sequences of the 7 loci identified 6 major clusters corresponding to 6 Leptospira species. Global eBURST established 8 CCs, which showed that genotypes were clearly related by geographic origin and host. ST52 and ST47, represented mostly by Argentinian isolates, grouped the higher number of isolates. These isolates were serotyped as serogroups Pomona and Icterohaemorrhagiae, showing a unidirectional correlation in which the isolates with the same ST belong to the same serogroup. In summary, this scheme combines the best loci from the most widely used MLST schemes for Leptospira spp. and supports worldwide strains classification. The Argentinian isolates exhibited congruence between allelic profile and serogroup, providing an alternative to serological methods. Published by Elsevier B.V.

  10. Nonperturbative renormalization-group approach preserving the momentum dependence of correlation functions

    Science.gov (United States)

    Rose, F.; Dupuis, N.

    2018-05-01

    We present an approximation scheme of the nonperturbative renormalization group that preserves the momentum dependence of correlation functions. This approximation scheme can be seen as a simple improvement of the local potential approximation (LPA) where the derivative terms in the effective action are promoted to arbitrary momentum-dependent functions. As in the LPA, the only field dependence comes from the effective potential, which allows us to solve the renormalization-group equations at a relatively modest numerical cost (as compared, e.g., to the Blaizot-Mendéz-Galain-Wschebor approximation scheme). As an application we consider the two-dimensional quantum O(N ) model at zero temperature. We discuss not only the two-point correlation function but also higher-order correlation functions such as the scalar susceptibility (which allows for an investigation of the "Higgs" amplitude mode) and the conductivity. In particular, we show how, using Padé approximants to perform the analytic continuation i ωn→ω +i 0+ of imaginary frequency correlation functions χ (i ωn) computed numerically from the renormalization-group equations, one can obtain spectral functions in the real-frequency domain.

  11. Hybrid Food Preservation Program Improves Food Preservation and Food Safety Knowledge

    Science.gov (United States)

    Francis, Sarah L.

    2014-01-01

    The growing trend in home food preservation raises concerns about whether the resulting food products will be safe to eat. The increased public demand for food preservation information led to the development of the comprehensive food preservation program, Preserve the Taste of Summer (PTTS). PTTS is a comprehensive hybrid food preservation program…

  12. Gender and power contestations over water use in irrigation schemes: Lessons from the lake Chilwa basin

    Science.gov (United States)

    Nkhoma, Bryson; Kayira, Gift

    2016-04-01

    Over the past two decades, Malawi has been adversely hit by climatic variability and changes, and irrigation schemes which rely mostly on water from rivers have been negatively affected. In the face of dwindling quantities of water, distribution and sharing of water for irrigation has been a source of contestations and conflicts. Women who constitute a significant section of irrigation farmers in schemes have been major culprits. The study seeks to analyze gender contestations and conflicts over the use of water in the schemes developed in the Lake Chilwa basin, in southern Malawi. Using oral and written sources as well as drawing evidence from participatory and field observations conducted at Likangala and Domasi irrigation schemes, the largest schemes in the basin, the study observes that women are not passive victims of male domination over the use of dwindling waters for irrigation farming. They have often used existing political and traditional structures developed in the management of water in the schemes to competitively gain monopoly over water. They have sometimes expressed their agency by engaging in irrigation activities that fall beyond the control of formal rules and regulations of irrigation agriculture. Other than being losers, women are winning the battle for water and land resources in the basin.

  13. Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing

    Directory of Open Access Journals (Sweden)

    Hongliang Zhu

    2018-01-01

    Full Text Available With the development of cloud computing, the advantages of low cost and high computation ability meet the demands of complicated computation of multimedia processing. Outsourcing computation of cloud could enable users with limited computing resources to store and process distributed multimedia application data without installing multimedia application software in local computer terminals, but the main problem is how to protect the security of user data in untrusted public cloud services. In recent years, the privacy-preserving outsourcing computation is one of the most common methods to solve the security problems of cloud computing. However, the existing computation cannot meet the needs for the large number of nodes and the dynamic topologies. In this paper, we introduce a novel privacy-preserving outsourcing computation method which combines GM homomorphic encryption scheme and Bloom filter together to solve this problem and propose a new privacy-preserving outsourcing set intersection computation protocol. Results show that the new protocol resolves the privacy-preserving outsourcing set intersection computation problem without increasing the complexity and the false positive probability. Besides, the number of participants, the size of input secret sets, and the online time of participants are not limited.

  14. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  15. Software preservation

    Directory of Open Access Journals (Sweden)

    Tadej Vodopivec

    2011-01-01

    Full Text Available Comtrade Ltd. covers a wide range of activities related to information and communication technologies; its deliverables include web applications, locally installed programs,system software, drivers, embedded software (used e.g. in medical devices, auto parts,communication switchboards. Also the extensive knowledge and practical experience about digital long-term preservation technologies have been acquired. This wide spectrum of activities puts us in the position to discuss the often overlooked aspect of the digital preservation - preservation of software programs. There are many resources dedicated to digital preservation of digital data, documents and multimedia records,but not so many about how to preserve the functionalities and features of computer programs. Exactly these functionalities - dynamic response to inputs - render the computer programs rich compared to documents or linear multimedia. The article opens the questions on the beginning of the way to the permanent digital preservation. The purpose is to find a way in the right direction, where all relevant aspects will be covered in proper balance. The following questions are asked: why at all to preserve computer programs permanently, who should do this and for whom, when we should think about permanent program preservation, what should be persevered (such as source code, screenshots, documentation, and social context of the program - e.g. media response to it ..., where and how? To illustrate the theoretic concepts given the idea of virtual national museum of electronic banking is also presented.

  16. Convolutional Code Based PAPR Reduction Scheme for Multicarrier Transmission with Higher Number of Subcarriers

    Directory of Open Access Journals (Sweden)

    SAJJAD ALIMEMON

    2017-10-01

    Full Text Available Multicarrier transmission technique has become a prominent transmission technique in high-speed wireless communication systems. It is due to its frequency diversity,small inter-symbol interference in the multipath fading channel, simple equalizer structure, and high bandwidth efficiency. Nevertheless, in thetime domain, multicarrier transmission signal has high PAPR (Peak-to-Average Power Ratio thatinterprets to low power amplifier efficiencies. To decrease the PAPR, a CCSLM (Convolutional Code Selective Mapping scheme for multicarrier transmission with a high number of subcarriers is proposed in this paper. Proposed scheme is based on SLM method and employs interleaver and convolutional coding. Related works on the PAPR reduction have considered either 128 or 256 number of subcarriers. However, PAPR of multicarrier transmission signal will increase as a number of subcarriers increases. The proposed method achieves significant PAPR reduction for ahigher number of subcarriers as well as better power amplifier efficiency. Simulation outcomes validate the usefulness of projected scheme.

  17. Dual watermarking scheme for secure buyer-seller watermarking protocol

    Science.gov (United States)

    Mehra, Neelesh; Shandilya, Madhu

    2012-04-01

    A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. It enables a seller to successfully identify a malicious seller from a pirated copy, while preventing the seller from framing an innocent buyer and provide anonymity to buyer. Up to now many buyer-seller watermarking protocols have been proposed which utilize more and more cryptographic scheme to solve many common problems such as customer's rights, unbinding problem, buyer's anonymity problem and buyer's participation in the dispute resolution. But most of them are infeasible since the buyer may not have knowledge of cryptography. Another issue is the number of steps to complete the protocols are large, a buyer needs to interact with different parties many times in these protocols, which is very inconvenient for buyer. To overcome these drawbacks, in this paper we proposed dual watermarking scheme in encrypted domain. Since neither of watermark has been generated by buyer so a general layman buyer can use the protocol.

  18. An early separation scheme for the LHC luminosity upgrade

    CERN Document Server

    Sterbini, G

    2010-01-01

    The present document is organized in five chapters. In the first chapter the framework of the study is described, developing the motivations, the goals and the requirements for the LHC Luminosity Upgrade. We analyze the need for the crossing angle and its impact on the peak luminosity of the collider. After having introduced the Early Separation Scheme, we explain how it may overcome some limitations of the present machine. We compare the nominal LHC crossing scheme with the proposed one underlining its potential in terms of performance and its issues with respect to the integration in the detectors. An analysis of the integrated magnetic field required is given. In the second chapter we introduce one of the most powerful aspect of the scheme: the luminosity leveling. After the description of the physical model adopted, we compare the results of its analytical and numerical solutions. All the potential improvement due to the Early Separation Scheme are shown on the luminosity plane (peak luminosity versus int...

  19. Cost-based droop scheme with lower generation costs for microgrids

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2014-01-01

    -based droop scheme, whose objective is to reduce a generation cost function realised with various DG operating characteristics taken into consideration. Where desired, proportional power sharing based on the DG kVA ratings can also be included, whose disadvantage is a slightly higher generation cost, which...... on the DG kilovolts ampere (kVA) ratings. Other factors like generation costs, efficiencies and emission penalties at different load demands have not been considered. This omission might not be appropriate if different types of DGs are present in the microgrids. As an alternative, this study proposes a cost...... is still lower than that produced by the traditional droop schemes. The proposed droop scheme therefore retains all advantages of the traditional droop schemes, whereas at the same time, keeps its generation cost low. These findings have been validated in experiments....

  20. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  1. Polarization preservation and control in a figure-8 ring

    Energy Technology Data Exchange (ETDEWEB)

    Derbenev, Yaroslav S. [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Morozov, Vasiliy [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Lin, Fanglei [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Zhang, Yuhong [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Kondratenko, A. M. [GOO Zaryad, Russkaya st., 41, Novosibirsk, 630058; Kondratenko, M. A. [GOO Zaryad, Russkaya st., 41, Novosibirsk, 630058; Filatov, Yuri [Joint Inst. for Nuclear Research (JINR), Dubna (Russian Federation); GOO Zaryad, Russkaya st., 41, Novosibirsk, 630058

    2016-02-01

    We present a complete scheme for managing the polarization of ion beams in Jefferson Lab's proposed Medium-energy Electron-Ion Collider (MEIC). It provides preservation of the ion polarization during all stages of beam acceleration and polarization control in the collider's experimental straights. We discuss characteristic features of the spin motion in accelerators with Siberian snakes and in accelerators of figure-8 shape. We propose 3D spin rotators for polarization control in the MEIC ion collider ring. We provide polarization calculations in the collider with the 3D rotator for deuteron and proton beams. The main polarization control features of the figure-8 design are summarized.

  2. Transmit Antenna Selection for Power Adaptive Underlay Cognitive Radio with Instantaneous Interference Constraint

    KAUST Repository

    Hanif, Muhammad

    2017-03-31

    The high hardware cost associated with multiple antennas at the secondary transmitter of an underlay cognitive radio (CR) can be reduced by antenna selection. This paper analyzes different power adaptive transmit antenna selection (TAS) schemes for an underlay CR, which ensure that the instantaneous interference caused by the secondary transmitter to the primary receiver is below a predetermined level. We consider the optimal continuous power adaptive TAS and present a low-complexity antenna and power level selection scheme, named sequential antenna and power level selection scheme (SAPS), for discrete power adaptation. Exact statistical characterizations of the signal-to-interference plus noise ratio at the secondary receiver are derived for the considered schemes. Based on the newly derived statistics, we prove that the considered schemes achieve the highest diversity order equaling the number of antennas at the secondary transmitter. Further, we also derive a closed-form expression of the ergodic capacity for the underlay CR with SAPS scheme. Finally, we show that the proposed scheme outperforms existing schemes in terms of ergodic capacity.

  3. A plausible congestion management scheme for the internal electricity market of the European Union

    International Nuclear Information System (INIS)

    Perez-Arriaga, I.J.; Olmos, L.

    2005-01-01

    This paper proposes a scheme for the management of network congestion in the Internal Electricity Market (IEM) of the European Union. This scheme tries to combine the rigor in the treatment of the energy and transmission capacity transactions with the flexibility and pragmatism that are necessary to make the scheme compatible with the current diversity of regulatory approaches and market structures in the Member States participating in the IEM. First, a reference scheme is presented with a complete formulation that jointly deals with the energy and capacity markets. Because of the implementation difficulties of this conceptually ideal approach, a more pragmatic scheme is proposed instead. The core of this scheme is an explicit auction mechanism that must be run prior to any short-term (daily, typically) energy markets. In this auction, where only transmission capacity is traded, both bilateral contracts and energy bids to Power Exchanges can participate in order to acquire the capacity that is necessary to carry out their transactions. Some technical issues related to the practical implementation of the proposed approach are also examined; these include market liquidity, the financial or physical nature of the long-term contracts, the potential problems of 'slicing' transmission capacity and the allocation of congestion rents. Market power issues are ignored. (author)

  4. A plausible congestion management scheme for the internal electricity market of the European Union

    Energy Technology Data Exchange (ETDEWEB)

    Perez-Arriaga, I.J.; Olmos, L. [Universidad Pontificia Comillas, Madrid (Spain). Instituto de Investigacion Tecnologica

    2005-06-01

    This paper proposes a scheme for the management of network congestion in the Internal Electricity Market (IEM) of the European Union. This scheme tries to combine the rigor in the treatment of the energy and transmission capacity transactions with the flexibility and pragmatism that are necessary to make the scheme compatible with the current diversity of regulatory approaches and market structures in the Member States participating in the IEM. First, a reference scheme is presented with a complete formulation that jointly deals with the energy and capacity markets. Because of the implementation difficulties of this conceptually ideal approach, a more pragmatic scheme is proposed instead. The core of this scheme is an explicit auction mechanism that must be run prior to any short-term (daily, typically) energy markets. In this auction, where only transmission capacity is traded, both bilateral contracts and energy bids to Power Exchanges can participate in order to acquire the capacity that is necessary to carry out their transactions. Some technical issues related to the practical implementation of the proposed approach are also examined; these include market liquidity, the financial or physical nature of the long-term contracts, the potential problems of 'slicing' transmission capacity and the allocation of congestion rents. Market power issues are ignored. (author)

  5. Study on the power control system for NPP power unit with the WWER-440 reactor

    International Nuclear Information System (INIS)

    Aleksandrova, N.D.; Naumov, A.V.

    1981-01-01

    Results of model investigations into basic version of the power control systems (PCS) conformably to the WWER-440 NPP power unit are stated. Transient processes in the power unit system when being two PCS versions during perturbations of different parameters: unit power, vapour pressure or position of control rods have been simulated. Investigations into the different PCS versions show that quality of operation of a traditional scheme with a turbine power controller and reactor pressure controller can be significantly improved with the introduction of a high-speed signal of pressure into the reactor controller. The PCS version with the compensation of interrelations between the turbine and reactor controllers constructed according to the same principles as the standard schemes of power units of thermal electric power plant is perspective as well [ru

  6. Changes in Ocular Surface Characteristics after Switching from Benzalkonium Chloride-Preserved Latanoprost to Preservative-Free Tafluprost or Benzalkonium Chloride-Preserved Tafluprost

    Directory of Open Access Journals (Sweden)

    Naoto Tokuda

    2017-01-01

    Full Text Available Purpose. The aim of the present study was to examine the effects of switching from Latanoprost ophthalmic solution containing a preservative to preservative-free Tafluprost ophthalmic solution or Tafluprost containing a preservative on ocular surfaces. Materials and Methods. Forty patients (40 eyes with glaucoma (mean age: 62.0 ± 10.9 years using Latanoprost with preservative for six months or longer were assigned either to a Tafluprost-containing-preservative group (20 eyes or preservative-free-Tafluprost group (20 eyes. The intraocular pressure, corneal epithelial barrier function (fluorescein uptake concentration with fluorophotometer FL-500, superficial punctate keratopathy (AD classification, and tear film breakup time (TBUT were assessed before switching and at 12 weeks after switching. Results. No significant differences in intraocular pressure were noted after switching in either group. Corneal epithelial barrier function was improved significantly after switching in both the Tafluprost-containing-preservative and the preservative-free-Tafluprost groups. There were no significant differences in AD scores after switching in the Tafluprost-containing-preservative group, but significant improvements were noted in the preservative-free-Tafluprost group. No significant differences in TBUT were noted in the Tafluprost-containing-preservative or preservative-free-Tafluprost groups after switching. Conclusion. After switching from preservative Latanoprost to Tafluprost containing-preservative or preservative-free Tafluprost, corneal epithelial barrier function was improved while the intraocular pressure reduction was retained.

  7. Changes in Ocular Surface Characteristics after Switching from Benzalkonium Chloride-Preserved Latanoprost to Preservative-Free Tafluprost or Benzalkonium Chloride-Preserved Tafluprost.

    Science.gov (United States)

    Tokuda, Naoto; Kitaoka, Yasushi; Matsuzawa, Akiko; Tsukamoto, Ayaka; Sase, Kana; Sakae, Shinsuke; Takagi, Hitoshi

    2017-01-01

    The aim of the present study was to examine the effects of switching from Latanoprost ophthalmic solution containing a preservative to preservative-free Tafluprost ophthalmic solution or Tafluprost containing a preservative on ocular surfaces. Forty patients (40 eyes) with glaucoma (mean age: 62.0 ± 10.9 years) using Latanoprost with preservative for six months or longer were assigned either to a Tafluprost-containing-preservative group (20 eyes) or preservative-free-Tafluprost group (20 eyes). The intraocular pressure, corneal epithelial barrier function (fluorescein uptake concentration with fluorophotometer FL-500), superficial punctate keratopathy (AD classification), and tear film breakup time (TBUT) were assessed before switching and at 12 weeks after switching. No significant differences in intraocular pressure were noted after switching in either group. Corneal epithelial barrier function was improved significantly after switching in both the Tafluprost-containing-preservative and the preservative-free-Tafluprost groups. There were no significant differences in AD scores after switching in the Tafluprost-containing-preservative group, but significant improvements were noted in the preservative-free-Tafluprost group. No significant differences in TBUT were noted in the Tafluprost-containing-preservative or preservative-free-Tafluprost groups after switching. After switching from preservative Latanoprost to Tafluprost containing-preservative or preservative-free Tafluprost, corneal epithelial barrier function was improved while the intraocular pressure reduction was retained.

  8. Smart LED allocation scheme for efficient multiuser visible light communication networks.

    Science.gov (United States)

    Sewaiwar, Atul; Tiwari, Samrat Vikramaditya; Chung, Yeon Ho

    2015-05-18

    In a multiuser bidirectional visible light communication (VLC), a large number of LEDs or an LED array needs to be allocated in an efficient manner to ensure sustainable data rate and link quality. Moreover, in order to support an increasing or decreasing number of users in the network, the LED allocation is required to be performed dynamically. In this paper, a novel smart LED allocation scheme for efficient multiuser VLC networks is presented. The proposed scheme allocates RGB LEDs to multiple users in a dynamic and efficient fashion, while satisfying illumination requirements in an indoor environment. The smart LED array comprised of RGB LEDs is divided into sectors according to the location of the users. The allocated sectors then provide optical power concentration toward the users for efficient and reliable data transmission. An algorithm for the dynamic allocation of the LEDs is also presented. To verify its effective resource allocation feature of the proposed scheme, simulations were performed. It is found that the proposed smart LED allocation scheme provides the effect of optical beamforming toward individual users, thereby increasing the collective power concentration of the optical signals on the desirable users and resulting in significantly increased data rate, while ensuring sufficient illumination in a multiuser VLC environment.

  9. Automated image enhancement using power law transformations

    Indian Academy of Sciences (India)

    We propose a scheme for automating power law transformations which are used for image enhancement. The scheme we propose does not require the user to choose the exponent in the power law transformation. This method works well for images having poor contrast, especially to those images in which the peaks ...

  10. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  11. Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'.

    Directory of Open Access Journals (Sweden)

    S K Hafizul Islam

    Full Text Available Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1 the correctness of identity and password are not verified during the login and password change phases; (2 it is vulnerable to impersonation attack and privileged-insider attack; (3 it is designed without the revocation of lost/stolen smart card; (4 the explicit key confirmation and the no key control properties are absent, and (5 user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.

  12. A first generation numerical geomagnetic storm prediction scheme

    International Nuclear Information System (INIS)

    Akasofu, S.-I.; Fry, C.F.

    1986-01-01

    Because geomagnetic and auroral disturbances cause significant interference on many electrical systems, it is essential to develop a reliable geomagnetic and auroral storm prediction scheme. A first generation numerical prediction scheme has been developed. The scheme consists of two major computer codes which in turn consist of a large number of subroutine codes and of empirical relationships. First of all, when a solar flare occurs, six flare parameters are determined as the input data set for the first code which is devised to show the simulated propagation of solar wind disturbances in the heliosphere to a distance of 2 a.u. Thus, one can determine the relative location of the propagating disturbances with the Earth's position. The solar wind speed and the three interplanetary magnetic field (IMF) components are then computed as a function of time at the Earth's location or any other desired (space probe) locations. These quantities in turn become the input parameters for the second major code which computes first the power of the solar wind-magnetosphere dynamo as a function of time. The power thus obtained and the three IMF components can be used to compute or infer: the predicted geometry of the auroral oval; the cross-polar cap potential; the two geomagnetic indices AE and Dst; the total energy injection rate into the polar ionosphere; and the atmospheric temperature, etc. (author)

  13. Performance of double source boiler with coal-fired and solar power tower heat for supercritical power generating unit

    International Nuclear Information System (INIS)

    Zhang, Maolong; Du, Xiaoze; Pang, Liping; Xu, Chao; Yang, Lijun

    2016-01-01

    An approach of high-efficiency utilization of solar energy was proposed, by which the high concentrated heat received by the solar tower was integrated to the supercritical coal-fired boiler. Two schemes that solar energy was used to heat superheat steam or subcooled feed water were presented. The thermodynamic and heat transfer models were established. For a practical 660 MW supercritical power generating unit, the standard coal consumption of power generation could be decreased by more than 17 g/kWh by such double source boiler. The drawbacks of both schemes were found and then were amended by adding a flue gas bypass to the boiler. It also can be concluded that the maximum solar contribution of two schemes for the gross power generation are 6.11% and 4.90%, respectively. The solar power efficiency of the re-modified designs were demonstrated be superior to that of PS10. In terms of turbine efficiency, the comparisons with Solar Two plant having similar initial temperature found that the efficiency of Scheme I was 5.25% higher than that of Solar Two while the advantage of Scheme II was existing either. Additionally, in two schemes with flue bypass when the medium was extracted, the thermal efficiency of boiler could be improved as well. - Highlights: • High concentrated solar tower heat is integrated to the supercritical coal-fired boiler. • The double source boiler can use solar energy to heat superheat steam or subcooled feed water. • Power generating coal consumption can be reduced by more than 17 g/kWh by the double source boiler. • The solar contribution of double source boiler for the gross power generation can be as high as 6.11%.

  14. The effects of betatron motion on the preservation of FEL microbunching

    Energy Technology Data Exchange (ETDEWEB)

    Geloni, Gianluca [European XFEL GmbH, Hamburg (Germany); Kocharyan, Vitali; Saldin, Evgeni [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2011-05-15

    In some options for circular polarization control at X-ray FELs, a helical radiator is placed a few ten meters distance behind the baseline undulator. If the microbunch structure induced in the baseline (planar) undulator can be preserved, intense coherent radiation is emitted in the helical radiator. The effects of betatron motion on the preservation of micro bunching in such in-line schemes should be accounting for. In this paper we present a comprehensive study of these effects. It is shown that one can work out an analytical expression for the debunching of an electron beam moving in a FODO lattice, strictly valid in the asymptote for a FODO cell much shorter than the betatron function. Further on, numerical studies can be used to demonstrate that the validity of such analytical expression goes beyond the abovementioned asymptote, and can be used in much more a general context. Finally, a comparison with Genesis simulations is given. (orig.)

  15. The effects of betatron motion on the preservation of FEL microbunching

    International Nuclear Information System (INIS)

    Geloni, Gianluca; Kocharyan, Vitali; Saldin, Evgeni

    2011-05-01

    In some options for circular polarization control at X-ray FELs, a helical radiator is placed a few ten meters distance behind the baseline undulator. If the microbunch structure induced in the baseline (planar) undulator can be preserved, intense coherent radiation is emitted in the helical radiator. The effects of betatron motion on the preservation of micro bunching in such in-line schemes should be accounting for. In this paper we present a comprehensive study of these effects. It is shown that one can work out an analytical expression for the debunching of an electron beam moving in a FODO lattice, strictly valid in the asymptote for a FODO cell much shorter than the betatron function. Further on, numerical studies can be used to demonstrate that the validity of such analytical expression goes beyond the abovementioned asymptote, and can be used in much more a general context. Finally, a comparison with Genesis simulations is given. (orig.)

  16. Cognitive Aware Interference Mitigation Scheme for LTE Femtocells

    KAUST Repository

    Alqerm, Ismail

    2015-04-21

    Femto-cells deployment in today’s cellular networks came into practice to fulfill the increasing demand for data services. However, interference to other femto and macro-cells users remains an unresolved challenge. In this paper, we propose an interference mitigation scheme to control the cross-tier interference caused by femto-cells to the macro users and the co-tier interference among femtocells. Cognitive radio spectrum sensing capability is utilized to determine the non-occupied channels or the ones that cause minimal interference to the macro users. An awareness based channel allocation scheme is developed with the assistance of the graph-coloring algorithm to assign channels to the femto-cells base stations with power optimization, minimal interference, maximum throughput, and maximum spectrum efficiency. In addition, the scheme exploits negotiation capability to match traffic load and QoS with the channel capacity, and to maintain efficient utilization of the available channels.

  17. Risk management of the North Anna Power Station Service Water System Preservation Project using the IPE model

    International Nuclear Information System (INIS)

    Afzali, A.; Donovan, M.D.; Sartain, M.D.; Bankley, A.V.

    1993-01-01

    This paper discusses the application of the North Anna Power Station Individual Plant Examination (IPE) models in PRA study of the Service Water System Preservation Project (SWSPP). The service water project involves repair and restoration of the Service Water System (SWS) piping and will require excavation of the buried SWS lines in addition to temporarily removing one of the two redundant SWS loops from operation. The SWSPP will be carried out with one or both units in normal operation. The objective of the PRA study was to quantify the risk impact (as measured by the change in Core Damage Frequency (ΔCDF)) of the SWSPP and to identify and evaluate countermeasures to reduce the risk impact of the project activities. The study concluded that the ΔCDF would be acceptable by undertaking preventative measures and by providing additional accident mitigating measures during performance of the SWSPP activities

  18. Renewable energy investments under different support schemes: A real options approach

    DEFF Research Database (Denmark)

    Boomsma, Trine Krogh; Meade, Nigel; Fleten, Stein-Erik

    2012-01-01

    -in tariff encourages earlier investment. Nevertheless, as investment has been undertaken, renewable energy certificate trading creates incentives for larger projects. In our baseline scenario and taking the fixed feed-in tariff as a base, the revenue required to trigger investments is 61% higher......This paper adopts a real options approach to analyze investment timing and capacity choice for renewable energy projects under different support schemes. The main purpose is to examine investment behavior under the most extensively employed support schemes, namely, feed-in tariffs and renewable...... energy certificate trading. We consider both multiple sources of uncertainty under each support scheme and uncertainty with respect to any change of support scheme, and we obtain both analytical (when possible) and numerical solutions. In a Nordic case study based on wind power, we find that the feed...

  19. History based batch method preserving tally means

    International Nuclear Information System (INIS)

    Shim, Hyung Jin; Choi, Sung Hoon

    2012-01-01

    In the Monte Carlo (MC) eigenvalue calculations, the sample variance of a tally mean calculated from its cycle-wise estimates is biased because of the inter-cycle correlations of the fission source distribution (FSD). Recently, we proposed a new real variance estimation method named the history-based batch method in which a MC run is treated as multiple runs with small number of histories per cycle to generate independent tally estimates. In this paper, the history-based batch method based on the weight correction is presented to preserve the tally mean from the original MC run. The effectiveness of the new method is examined for the weakly coupled fissile array problem as a function of the dominance ratio and the batch size, in comparison with other schemes available

  20. Reduced-Order Structure-Preserving Model for Parallel-Connected Three-Phase Grid-Tied Inverters

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Brian B [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Purba, Victor [University of Minnesota; Jafarpour, Saber [University of California Santa-Barbara; Bullo, Francesco [University of California Santa-Barbara; Dhople, Sairaj V. [University of Minnesota

    2017-08-21

    Next-generation power networks will contain large numbers of grid-connected inverters satisfying a significant fraction of system load. Since each inverter model has a relatively large number of dynamic states, it is impractical to analyze complex system models where the full dynamics of each inverter are retained. To address this challenge, we derive a reduced-order structure-preserving model for parallel-connected grid-tied three-phase inverters. Here, each inverter in the system is assumed to have a full-bridge topology, LCL filter at the point of common coupling, and the control architecture for each inverter includes a current controller, a power controller, and a phase-locked loop for grid synchronization. We outline a structure-preserving reduced-order inverter model with lumped parameters for the setting where the parallel inverters are each designed such that the filter components and controller gains scale linearly with the power rating. By structure preserving, we mean that the reduced-order three-phase inverter model is also composed of an LCL filter, a power controller, current controller, and PLL. We show that the system of parallel inverters can be modeled exactly as one aggregated inverter unit and this equivalent model has the same number of dynamical states as any individual inverter in the system. Numerical simulations validate the reduced-order model.