WorldWideScience

Sample records for pseudo-time marching scheme

  1. A stable fast marching scheme for computational fluid mechanics

    Science.gov (United States)

    Behnia, M.; de Vahl Davis, G.; Wolfshtein, M.

    1990-04-01

    A stable fast marching scheme has been developed for the solution of coupled parabolic partial differential equations such as the Navier-Stokes equations. The scheme was developed with the aid of a stability analysis. The implementation of the method in standard alternating direction implicit algorithms is straightforward. The scheme was tested on the problem of natural convection in a square cavity. The number of iterations required for convergence was significantly reduced compared to conventional methods.

  2. A Time Marching Scheme for Solving Volume Integral Equations on Nonlinear Scatterers

    KAUST Repository

    Bagci, Hakan

    2015-01-07

    Transient electromagnetic field interactions on inhomogeneous penetrable scatterers can be analyzed by solving time domain volume integral equations (TDVIEs). TDVIEs are oftentimes solved using marchingon-in-time (MOT) schemes. Unlike finite difference and finite element schemes, MOT-TDVIE solvers require discretization of only the scatterers, do not call for artificial absorbing boundary conditions, and are more robust to numerical phase dispersion. On the other hand, their computational cost is high, they suffer from late-time instabilities, and their implicit nature makes incorporation of nonlinear constitutive relations more difficult. Development of plane-wave time-domain (PWTD) and FFT-based schemes has significantly reduced the computational cost of the MOT-TDVIE solvers. Additionally, latetime instability problem has been alleviated for all practical purposes with the development of accurate integration schemes and specially designed temporal basis functions. Addressing the third challenge is the topic of this presentation. I will talk about an explicit MOT scheme developed for solving the TDVIE on scatterers with nonlinear material properties. The proposed scheme separately discretizes the TDVIE and the nonlinear constitutive relation between electric field intensity and flux density. The unknown field intensity and flux density are expanded using half and full Schaubert-Wilton-Glisson (SWG) basis functions in space and polynomial temporal interpolators in time. The resulting coupled system of the discretized TDVIE and constitutive relation is integrated in time using an explicit P E(CE) m scheme to yield the unknown expansion coefficients. Explicitness of time marching allows for straightforward incorporation of the nonlinearity as a function evaluation on the right hand side of the coupled system of equations. Consequently, the resulting MOT scheme does not call for a Newton-like nonlinear solver. Numerical examples, which demonstrate the applicability

  3. Minimal gain marching schemes: searching for unstable steady-states with unsteady solvers

    Science.gov (United States)

    de S. Teixeira, Renan; S. de B. Alves, Leonardo

    2017-12-01

    Reference solutions are important in several applications. They are used as base states in linear stability analyses as well as initial conditions and reference states for sponge zones in numerical simulations, just to name a few examples. Their accuracy is also paramount in both fields, leading to more reliable analyses and efficient simulations, respectively. Hence, steady-states usually make the best reference solutions. Unfortunately, standard marching schemes utilized for accurate unsteady simulations almost never reach steady-states of unstable flows. Steady governing equations could be solved instead, by employing Newton-type methods often coupled with continuation techniques. However, such iterative approaches do require large computational resources and very good initial guesses to converge. These difficulties motivated the development of a technique known as selective frequency damping (SFD) (Åkervik et al. in Phys Fluids 18(6):068102, 2006). It adds a source term to the unsteady governing equations that filters out the unstable frequencies, allowing a steady-state to be reached. This approach does not require a good initial condition and works well for self-excited flows, where a single nonzero excitation frequency is selected by either absolute or global instability mechanisms. On the other hand, it seems unable to damp stationary disturbances. Furthermore, flows with a broad unstable frequency spectrum might require the use of multiple filters, which delays convergence significantly. Both scenarios appear in convectively, absolutely or globally unstable flows. An alternative approach is proposed in the present paper. It modifies the coefficients of a marching scheme in such a way that makes the absolute value of its linear gain smaller than one within the required unstable frequency spectra, allowing the respective disturbance amplitudes to decay given enough time. These ideas are applied here to implicit multi-step schemes. A few chosen test cases

  4. A globally convergent matrix-free algorithm for implicit time-marching schemes arising in finite element analysis in fluids

    Science.gov (United States)

    Johan, Zdenek; Hughes, Thomas J. R.; Shakib, Farzin

    1991-01-01

    A solution procedure for solving nonlinear time-marching problems is presented. The nonsymmetric systems of equations arising from a Newton-type linearization of these time-marching problems are solved using an iterative strategy based on the generalized minimal residual (GMRES) algorithm. Matrix-free techniques leading to reduction in storage are presented. Incorporation of a linesearch algorithm in the Newton-GMRES scheme is discussed. An automatic time-increment control strategy is developed to increase the stability of the time-marching process. High-speed flow computations demonstrate the effectiveness of these algorithms.

  5. Recent advances in marching-on-in-time schemes for solving time domain volume integral equations

    KAUST Repository

    Sayed, Sadeed Bin

    2015-05-16

    Transient electromagnetic field interactions on inhomogeneous penetrable scatterers can be analyzed by solving time domain volume integral equations (TDVIEs). TDVIEs are constructed by setting the summation of the incident and scattered field intensities to the total field intensity on the volumetric support of the scatterer. The unknown can be the field intensity or flux/current density. Representing the total field intensity in terms of the unknown using the relevant constitutive relation and the scattered field intensity in terms of the spatiotemporal convolution of the unknown with the Green function yield the final form of the TDVIE. The unknown is expanded in terms of local spatial and temporal basis functions. Inserting this expansion into the TDVIE and testing the resulting equation at discrete times yield a system of equations that is solved by the marching on-in-time (MOT) scheme. At each time step, a smaller system of equations, termed MOT system is solved for the coefficients of the expansion. The right-hand side of this system consists of the tested incident field and discretized spatio-temporal convolution of the unknown samples computed at the previous time steps with the Green function.

  6. Marching on-in-time solution of the time domain magnetic field integral equation using a predictor-corrector scheme

    KAUST Repository

    Ulku, Huseyin Arda

    2013-08-01

    An explicit marching on-in-time (MOT) scheme for solving the time-domain magnetic field integral equation (TD-MFIE) is presented. The proposed MOT-TD-MFIE solver uses Rao-Wilton-Glisson basis functions for spatial discretization and a PE(CE)m-type linear multistep method for time marching. Unlike previous explicit MOT-TD-MFIE solvers, the time step size can be chosen as large as that of the implicit MOT-TD-MFIE solvers without adversely affecting accuracy or stability. An algebraic stability analysis demonstrates the stability of the proposed explicit solver; its accuracy and efficiency are established via numerical examples. © 1963-2012 IEEE.

  7. A stable higher order space time Galerkin marching-on-in-time scheme

    KAUST Repository

    Pray, Andrew J.

    2013-07-01

    We present a method for the stable solution of time-domain integral equations. The method uses a technique developed in [1] to accurately evaluate matrix elements. As opposed to existing stabilization schemes, the method presented uses higher order basis functions in time to improve the accuracy of the solver. The method is validated by showing convergence in temporal basis function order, time step size, and geometric discretization order. © 2013 IEEE.

  8. Cross-correlation least-squares reverse time migration in the pseudo-time domain

    Science.gov (United States)

    Li, Qingyang; Huang, Jianping; Li, Zhenchun

    2017-08-01

    The least-squares reverse time migration (LSRTM) method with higher image resolution and amplitude is becoming increasingly popular. However, the LSRTM is not widely used in field land data processing because of its sensitivity to the initial migration velocity model, large computational cost and mismatch of amplitudes between the synthetic and observed data. To overcome the shortcomings of the conventional LSRTM, we propose a cross-correlation least-squares reverse time migration algorithm in pseudo-time domain (PTCLSRTM). Our algorithm not only reduces the depth/velocity ambiguities, but also reduces the effect of velocity error on the imaging results. It relieves the accuracy requirements on the migration velocity model of least-squares migration (LSM). The pseudo-time domain algorithm eliminates the irregular wavelength sampling in the vertical direction, thus it can reduce the vertical grid points and memory requirements used during computation, which makes our method more computationally efficient than the standard implementation. Besides, for field data applications, matching the recorded amplitudes is a very difficult task because of the viscoelastic nature of the Earth and inaccuracies in the estimation of the source wavelet. To relax the requirement for strong amplitude matching of LSM, we extend the normalized cross-correlation objective function to the pseudo-time domain. Our method is only sensitive to the similarity between the predicted and the observed data. Numerical tests on synthetic and land field data confirm the effectiveness of our method and its adaptability for complex models.

  9. A Stable Marching on-in-time Scheme for Solving the Time Domain Electric Field Volume Integral Equation on High-contrast Scatterers

    KAUST Repository

    Sayed, Sadeed Bin

    2015-05-05

    A time domain electric field volume integral equation (TD-EFVIE) solver is proposed for characterizing transient electromagnetic wave interactions on high-contrast dielectric scatterers. The TD-EFVIE is discretized using the Schaubert- Wilton-Glisson (SWG) and approximate prolate spherical wave (APSW) functions in space and time, respectively. The resulting system of equations can not be solved by a straightforward application of the marching on-in-time (MOT) scheme since the two-sided APSW interpolation functions require the knowledge of unknown “future” field samples during time marching. Causality of the MOT scheme is restored using an extrapolation technique that predicts the future samples from known “past” ones. Unlike the extrapolation techniques developed for MOT schemes that are used in solving time domain surface integral equations, this scheme trains the extrapolation coefficients using samples of exponentials with exponents on the complex frequency plane. This increases the stability of the MOT-TD-EFVIE solver significantly, since the temporal behavior of decaying and oscillating electromagnetic modes induced inside the scatterers is very accurately taken into account by this new extrapolation scheme. Numerical results demonstrate that the proposed MOT solver maintains its stability even when applied to analyzing wave interactions on high-contrast scatterers.

  10. Pseudo-time stepping methods for space-time discontinuous Galerkin discretizations of the compressible Navier-Stokes equations

    NARCIS (Netherlands)

    Klaij, C.M.; van der Vegt, Jacobus J.W.; van der Ven, H.

    2005-01-01

    The space-time discontinuous Galerkin discretization of the compressible Navier-Stokes equations results in a non-linear system of algebraic equations, which we solve with a local pseudo-time stepping method. Explicit Runge-Kutta methods developed for the Euler equations are unsuitable for this

  11. A space-time mixed galerkin marching-on-in-time scheme for the time-domain combined field integral equation

    KAUST Repository

    Beghein, Yves

    2013-03-01

    The time domain combined field integral equation (TD-CFIE), which is constructed from a weighted sum of the time domain electric and magnetic field integral equations (TD-EFIE and TD-MFIE) for analyzing transient scattering from closed perfect electrically conducting bodies, is free from spurious resonances. The standard marching-on-in-time technique for discretizing the TD-CFIE uses Galerkin and collocation schemes in space and time, respectively. Unfortunately, the standard scheme is theoretically not well understood: stability and convergence have been proven for only one class of space-time Galerkin discretizations. Moreover, existing discretization schemes are nonconforming, i.e., the TD-MFIE contribution is tested with divergence conforming functions instead of curl conforming functions. We therefore introduce a novel space-time mixed Galerkin discretization for the TD-CFIE. A family of temporal basis and testing functions with arbitrary order is introduced. It is explained how the corresponding interactions can be computed efficiently by existing collocation-in-time codes. The spatial mixed discretization is made fully conforming and consistent by leveraging both Rao-Wilton-Glisson and Buffa-Christiansen basis functions and by applying the appropriate bi-orthogonalization procedures. The combination of both techniques is essential when high accuracy over a broad frequency band is required. © 2012 IEEE.

  12. Pseudo-time methods for constrained optimization problems governed by PDE

    Science.gov (United States)

    Taasan, Shlomo

    1995-01-01

    In this paper we present a novel method for solving optimization problems governed by partial differential equations. Existing methods are gradient information in marching toward the minimum, where the constrained PDE is solved once (sometimes only approximately) per each optimization step. Such methods can be viewed as a marching techniques on the intersection of the state and costate hypersurfaces while improving the residuals of the design equations per each iteration. In contrast, the method presented here march on the design hypersurface and at each iteration improve the residuals of the state and costate equations. The new method is usually much less expensive per iteration step since, in most problems of practical interest, the design equation involves much less unknowns that that of either the state or costate equations. Convergence is shown using energy estimates for the evolution equations governing the iterative process. Numerical tests show that the new method allows the solution of the optimization problem in a cost of solving the analysis problems just a few times, independent of the number of design parameters. The method can be applied using single grid iterations as well as with multigrid solvers.

  13. March 2001

    African Journals Online (AJOL)

    2001-03-01

    , University of Ilorin Teaching Hospital, Nigeria. Request for reprints ... The proportion of children admitted with severe malaria was significantly higher among the ... The dry season starts in November and lasts till early. March.

  14. March 2001

    African Journals Online (AJOL)

    78 No, 3 March 2001. DENTAL CARIES AND PERIODONTAL CONDITIONS AMONG PRIMARY SCHOOL CHILDREN IN MOROGORO MUNICIPALITY, TANZANIA. E.N. Kikwilu, DDS, MDent (Dar), Lecturer, Department of Preventive and Community Dentistry and 6.1. Mandari, DDS, MDcnt (Dar), Lecturer, Department of.

  15. Marching Choruses

    DEFF Research Database (Denmark)

    Lech, Marcel Lysgaard

    2009-01-01

      This article re-examines the evidence for choral marching in the Athenian theatre, which has fostered ideas on the dramatic choruses as military training for young men, ephebes. But the late lexicographical sources are not relating to the dramatic choruses of the fifth-century and are in constant...... conflict with our text of the plays and literary texts decribing the theatrical context; the lexicographical writings may reflect their own time or other types of choruses e.g. dithyrambic, and can therefore not be held as evidence for 1) the performance of the chorus in fifth-century Athens, 2) tragic...

  16. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  17. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  18. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    This paper describes and discusses two different Scheme documentation tools. The first is SchemeDoc, which is intended for documentation of the interfaces of Scheme libraries (APIs). The second is the Scheme Elucidator, which is for internal documentation of Scheme programs. Although the tools...

  19. The Schroedinger eigenvalue march

    Energy Technology Data Exchange (ETDEWEB)

    Tannous, C; Langlois, J, E-mail: tannous@univ-brest.fr [Laboratoire de Magnetisme de Bretagne, CNRS-FRE 3117, Universite de Bretagne Occidentale, BP: 809 Brest CEDEX 29285 (France)

    2011-11-15

    A simple numerical method for the determination of Schroedinger equation eigenvalues is introduced. It is based on a marching process that starts from an arbitrary point, proceeds in two opposite directions simultaneously and stops after a tolerance criterion is met. The method is applied to solving several 1D potential problems including symmetric double-well (ammonia inversion problem) and Johnson asymmetric potentials, 3D hydrogen atom and Morse potential. Band structure calculation can equally be tackled by extending marching to the complex plane as illustrated with the Kronig-Penney problem.

  20. MAKE UP MARCH 2007

    African Journals Online (AJOL)

    Winnie

    THE SOUTHERN AFRICAN JOURNAL OF HIV MEDICINE. MArCH 2007. 45. CASE STUDY RESPONSES. A – SUBMITTED BY JOHN GOSLING. Given that AA's viral load is undetectable and her genotype appears to be different from the patient's (although her genotype had not been determined recently), and given the.

  1. EAMJ March- Plaque

    African Journals Online (AJOL)

    iMac User

    2008-03-01

    Mar 1, 2008 ... 3 March 2008. PLAQUE AND GROWTH CHARACTERISTICS OF DIFFERENT POLIOVIRUSES ISOLATED FROM ACUTE FLACCID. PARALYSIS IN NORTHERN NIGERIA. W. F. Sule, DVM, MSc, Lecturer, O. I. Oyedele, PhD, ..... John, T.J., Vaccine-associated paralytic polio in India. Bull. WHO. 2002; 80: 917.

  2. The allergic march

    African Journals Online (AJOL)

    and patients when used during consultations in allergy practice. The common atopic conditions such as asthma, allergic rhinitis and eczema are allergic conditions that occur in families and are associated with the production of specific IgE antibodies to food and environmental allergens. The allergic march refers to the ...

  3. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    one more than the total number of blocks or one more than `, whichever is less. min ( f s/bs, `) + 1 (4.10) 4.3.1 MAC-PDP For local data experiments, we...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS COST COMPARISON AMONG PROVABLE DATA POSSESSION SCHEMES by Stephen J. Bremer March 2016 Thesis...response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and

  4. Perry's Intellectual Scheme.

    Science.gov (United States)

    Love, Patrick G.; Guthrie, Victoria L.

    1999-01-01

    Summarizes William Perry's intellectual scheme and places it in the context of the 1990's. Perry's scheme of cognitive development, though more than thirty years old, is still being used by practitioners today to enhance practice in and out of the classroom. It laid a foundation for new research to extend, challenge, and build onto the scheme.…

  5. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  6. The Mawala irrigation scheme

    OpenAIRE

    de Bont, Chris

    2018-01-01

    This booklet was written to share research results with farmers and practitioners in Tanzania. It gives a summary of the empirical material collected during three months of field work in the Mawala irrigation scheme (Kilimanjaro Region), and includes maps, tables and photos. It describes the history of the irrigation scheme, as well current irrigation and farming practices. It especially focuses on the different kinds of infrastructural improvement in the scheme (by farmers and the government...

  7. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well...

  8. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  9. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  10. Explicit solution of the time domain magnetic field integral equation using a predictor-corrector scheme

    KAUST Repository

    Ulku, Huseyin Arda

    2012-09-01

    An explicit yet stable marching-on-in-time (MOT) scheme for solving the time domain magnetic field integral equation (TD-MFIE) is presented. The stability of the explicit scheme is achieved via (i) accurate evaluation of the MOT matrix elements using closed form expressions and (ii) a PE(CE) m type linear multistep method for time marching. Numerical results demonstrate the accuracy and stability of the proposed explicit MOT-TD-MFIE solver. © 2012 IEEE.

  11. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    It is usual practice to evaluate the success of a labelling scheme by looking at the awareness percentage, but in many cases this is not sufficient. The awareness percentage gives no indication of which of the consumer segments that are aware of and use labelling schemes and which do not....... In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire....... 664 households returned a completed questionnaire. There were five answering categories for each label in the questionnaire: * have not seen the label before. * I have seen the label before but I do not know the precise contents of the labelling scheme. * I have seen the label before, I do not know...

  12. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  13. Noise exposure in marching bands

    Science.gov (United States)

    Keefe, Joseph

    2005-09-01

    Previous studies involving orchestras have shown that music ensembles can produce hazardous noise levels. There are no similar data for marching bands and pep bands. In order to evaluate the noise levels produced by marching and pep bands, 1/3-octave-band sound-pressure levels were measured while these groups rehearsed and performed. Data were collected while marching with the bands to ensure a realistic environment. Comparing these data to OSHA and NIOSH criteria, marching and pep band exposures often exceed safe values. For typical exposures, OSHA doses range from 11% to 295%, while NIOSH doses range from 35% to 3055%. Exposures that would be considered hazardous in the workplace are common in marching and pep bands; students and band directors should take steps to recognize the risk posed by various instruments and various locations, and should implement hearing conservation efforts.

  14. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  15. Standing Concertation Commmittee - Ordinary meeting on 27 March 2007

    CERN Multimedia

    HR Department

    2007-01-01

    The main items discussed at the meeting of the Standing Concertation Committee on 27 March 2007 included: Merit Recognition Guidelines : in the context of the new Merit Appraisal and Recognition Scheme (MARS), the committee took note of the documents entitled MARS Guidelines 2007 and the Guidelines for Senior Staff Advancement 2007. Follow-up of Finance Committee and Council meetings The Committee took note of the information provided by S. Lettow, the Director for Finance and Human Resources, including the possibility for a phased increase in Member State contributions from 2008. Registered partnerships It was agreed that staff members with registered partners should be reminded of the social cover available to their partners. Cover is limited to the CERN Health Insurance Scheme and partners may be covered by the Scheme only while the staff member is working. On the staff members retirement or other change in status, or death, partners are no longer eligible for CHIS cover. Retirement seminars It...

  16. Standing Concertation Commmittee - Ordinary meeting on 27 March 2007

    CERN Multimedia

    HR Department

    2007-01-01

    The main items discussed at the meeting of the Standing Concertation Committee on 27 March 2007 included: Merit Recognition Guidelines In the context of the new Merit Appraisal and Recognition Scheme (MARS), the committee took note of the documents entitled 'MARS Guidelines 2007' and the 'Guidelines for Senior Staff Advancement 2007'. Follow-up of Finance Committee and Council meetings The Committee took note of the information provided by S. Lettow, the Director for Finance and Human Resources, including the possibility for a phased increase in Member State contributions from 2008. Registered partnerships It was agreed that staff members with registered partners should be reminded of the social cover available to their partners. Cover is limited to the CERN Health Insurance Scheme and partners may be covered by the Scheme only while the staff member is working. On the staff member's retirement or other change in status, or death, partners are no longer eligible for CHIS cover. Retirement semi...

  17. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  18. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  19. MIT Scheme Reference Manual

    Science.gov (United States)

    1991-01-01

    their Butterfly Scheme Reference, and to Margaret O’Connell for translating it from BBN’s text-formatting language to ours. Special thanks to Richard ... Stallman , Bob Chassell, and Brian Fox, all of the Free Software Foundation, for creating and maintaining the Texinfo formatting language in which this

  20. March 2011 Tohoku, Japan Images

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The March 11 earthquake generated a devastating tsunami that was observed all over the Pacific and caused tremendous devastation locally, including an accident at...

  1. CERN's new arrivals, March 2006.

    CERN Multimedia

    Jacques Fichet

    2006-01-01

    On Thursday 30 March 2006, members of the CERN Management welcomed recently recruited Staff Members and Fellows at the quarterly session of the Induction Programme (photographed here with Enrico CHIAVERI, HR Department).

  2. CERN's new arrivals, March 2004.

    CERN Document Server

    Patrice Loïez

    2004-01-01

    On Tuesday 9 March 2004, representatives of the CERN Management welcomed recently-recruited staff members and fellows at the trimester session of the Induction Programme (photographed here with Werner Zapf, Head of the Human Resources Department).

  3. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  4. Numerical solution to nonlinear Tricomi equation using WENO schemes

    Directory of Open Access Journals (Sweden)

    Adrian Sescu

    2010-09-01

    Full Text Available Nonlinear Tricomi equation is a hybrid (hyperbolic-elliptic second order partial differential equation, modelling the sonic boom focusing. In this paper, the Tricomi equation is transformed into a hyperbolic system of first order equations, in conservation law form. On the upper boundary, a new mixed boundary condition for the acoustic pressure is used to avoid the inclusion of the Dirac function in the numerical solution. Weighted Essentially Non-Oscillatory (WENO schemes are used for the spatial discretization, and the time marching is carried out using the second order accurate Runge-Kutta total-variation diminishing (TVD scheme.

  5. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR SOLUTION OF NONLINEAR INITIAL VALUE PROBLEMS OF FIRST ORDER ORDINARY DIFFERENTIAL EQUATIONS. ... Global Journal of Mathematical Sciences ... KEY WORDS: backward differentiation scheme, collocation, initial value problems. Global Jnl ...

  6. Explicit solution of the time domain volume integral equation using a stable predictor-corrector scheme

    KAUST Repository

    Al Jarro, Ahmed

    2012-11-01

    An explicit marching-on-in-time (MOT) scheme for solving the time domain volume integral equation is presented. The proposed method achieves its stability by employing, at each time step, a corrector scheme, which updates/corrects fields computed by the explicit predictor scheme. The proposedmethod is computationally more efficient when compared to the existing filtering techniques used for the stabilization of explicit MOT schemes. Numerical results presented in this paper demonstrate that the proposed method maintains its stability even when applied to the analysis of electromagnetic wave interactions with electrically large structures meshed using approximately half a million discretization elements.

  7. Bonus Schemes and Trading Activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; Ter Horst, J.R.; Tobler, P.N.

    2013-01-01

    Abstract: Little is known about how different bonus schemes affect traders’ propensity to trade and which bonus schemes improve traders’ performance. We study the effects of linear versus threshold (convex) bonus schemes on traders’ behavior. Traders purchase and sell shares in an experimental stock

  8. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  9. March 2010 Final for Publicat...

    African Journals Online (AJOL)

    User

    March 2010 Vol. 13 (1):94-97. Case Report. FRESH NON-PRESERVED HUMAN AMNIOTIC MEMBRANE. TRANSPLANTATION IN THE TREATMENT OF DEEP CORNEAL ULCERS IN A. DEVELOPING COUNTRY (NIGERIA): CASE .... Areview 550 cases of the Johns. Hopkins Hospital. John Hopkins med J. 1910;.

  10. March 2010 Final for Publicat...

    African Journals Online (AJOL)

    User

    March 2010 Vol. 13 (1):32-36. EPISTAXIS IN SAGAMU. *OA Sogebi,**EA Oyewole ,***OA Adebajo. ABSTRACT. Background: Materials and Methods: Results: Conclusion: Key Words. Epistaxis is a common nasal complaint with varied aetiologies. Physicians need to know the characteristics of epistaxis in their area of ...

  11. March 2010 Final for Publicat...

    African Journals Online (AJOL)

    User

    World Health Organization. Bench aids for the diagnosis of human malaria. Giemsa staining. Technique. 1985; 2; 450. Black water fever in adults with sickle cell anemia. Two fatal cases. Med Trop (Mars). 2000; 60(2); 156-8. Nigerian Journal of Clinical Practice March 2010, Vol.13(1). Black Water Fever. Oguche et al. 105.

  12. Monthly energy review: March 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    This is the March report by the Energy Information Administration. The contents of the report include an article on current and potential markets for alternative-fuel vehicles, an energy overview, and data on energy consumption, petroleum, natural gas, oil and gas resource development, coal, electricity, nuclear energy, energy prices, and international energy. 32 figs., 88 tabs.

  13. Electric power monthly, March 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-03-20

    This report for March 1995, presents monthly electricity statistics for a wide audience including Congress, Federal and State agencies, the electric utility industry, and the general public. The purpose of this publication is to provide energy decisionmakers with accurate and timely information that may be used in forming various perspectives on electric issues that lie ahead.

  14. RE-SONANCEI March 1996

    Indian Academy of Sciences (India)

    collection of his essays, compiled by John. Maynard Smith who in his introduction men- tions their impact on him when he came across them in school. Maynard Smith says" fifteen years later, when I decided to leave engineering and train as a biologist, I entered. RESONANCE I March 1996. S Thangavelu is with Statistics ...

  15. Loglines. March-April 2013

    Science.gov (United States)

    2013-04-01

    Jacquard looms, some so old they were purchased in used condition at the turn of the 20th century when her father brought the family business over from... family business over from Hungary. Ph ot o co ur te sy M ic ha el A . H es sb er g, In c. 29Loglines l March - April 2013 Jacquard looms used to

  16. An efficient explicit marching on in time solver for magnetic field volume integral equation

    KAUST Repository

    Sayed, Sadeed Bin

    2015-07-25

    An efficient explicit marching on in time (MOT) scheme for solving the magnetic field volume integral equation is proposed. The MOT system is cast in the form of an ordinary differential equation and is integrated in time using a PE(CE)m multistep scheme. At each time step, a system with a Gram matrix is solved for the predicted/corrected field expansion coefficients. Depending on the type of spatial testing scheme Gram matrix is sparse or consists of blocks with only diagonal entries regardless of the time step size. Consequently, the resulting MOT scheme is more efficient than its implicit counterparts, which call for inversion of fuller matrix system at lower frequencies. Numerical results, which demonstrate the efficiency, accuracy, and stability of the proposed MOT scheme, are presented.

  17. A predictor-corrector scheme for solving the Volterra integral equation

    KAUST Repository

    Al Jarro, Ahmed

    2011-08-01

    The occurrence of late time instabilities is a common problem of almost all time marching methods developed for solving time domain integral equations. Implicit marching algorithms are now considered stable with various efforts that have been developed for removing low and high frequency instabilities. On the other hand, literature on stabilizing explicit schemes, which might be considered more efficient since they do not require a matrix inversion at each time step, is practically non-existent. In this work, a stable but still explicit predictor-corrector scheme is proposed for solving the Volterra integral equation and its efficacy is verified numerically. © 2011 IEEE.

  18. Natural gas monthly, March 1998

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    The March 1998 edition of the Natural Gas Monthly highlights activities, events, and analyses associated with the natural gas industry. Volume and price data are presented for natural gas production, distribution, consumption, and interstate pipeline activities. Producer-related activities and underground storage data are also reported. This report also features an article on the correction of errors in the drilling activity estimates series, and in-depth drilling activity data. 6 figs., 28 tabs.

  19. Monthly energy review, March 1997

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This is an overview of the March 1997 energy statistics by the Energy Information Administration. The Contents of the report include an update on the effects of Title IV of the Clean Air Act Amendments of 1990 on electric utilities, an energy overview, US energy production, energy consumption, trade stocks and prices for petroleum, natural gas, oil and gas resource development, coal, electricity, nuclear energy, energy prices, and international energy. 37 figs., 60 tabs.

  20. Natural gas monthly, March 1999

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    This issue of the Natural Gas Monthly contains estimates for March 1999 for many natural gas data series at the national level. Estimates of national natural gas prices are available through December 1998 for most series. Highlights of the data contained in this issue are listed below. Preliminary data indicate that the national average wellhead price for 1998 declined to 16% from the previous year ($1.96 compared to $2.32 per thousand cubic feet). At the end of March, the end of the 1998--1999 heating season, the level of working gas in underground natural gas storage facilities is estimated to be 1,354 billion cubic feet, 169 billion cubic feet higher than at the end of March 1998. Gas consumption during the first 3 months of 1999 is estimated to have been 179 billion cubic feet higher than in the same period in 1998. Most of this increase (133 billion cubic feet) occurred in the residential sector due to the cooler temperatures in January and February compared to the same months last year. According to the National Weather Service, heating degree days in January 1999 were 15% greater than the previous year while February recorded a 5% increase.

  1. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements classificat....... This difference between the written requirements specification and the oral discussions at the meetings may help explain software engineers’ general preference for people, rather than documents, as their information sources.......Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements....... While coordination mechanisms focus on how classification schemes enable cooperation among people pursuing a common goal, boundary objects embrace the implicit consequences of classification schemes in situations involving conflicting goals. Moreover, the requirements specification focused on functional...

  2. Two notes about Ponzi schemes

    OpenAIRE

    Honohan, Patrick

    1987-01-01

    A Ponzi scheme is an arrangement whereby a promoter offers an investment opportunity with attractive dividends, but where the only basis for the dividends is the future receipts from new investors. The first of these two notes explores some of the analytical properties of a Ponzi scheme, addressing in particular the question whether it is possible for a Ponzi scheme to exist if all the participants are rational. The second note briefly examines the collapse of the PMPA insurance company whos...

  3. Remarks on quantum duopoly schemes

    Science.gov (United States)

    Fraçkiewicz, Piotr

    2016-01-01

    The aim of this paper is to discuss in some detail the two different quantum schemes for duopoly problems. We investigate under what conditions one of the schemes is more reasonable than the other one. Using the Cournot's duopoly example, we show that the current quantum schemes require a slight refinement so that they output the classical game in a particular case. Then, we show how the amendment changes the way of studying the quantum games with respect to Nash equilibria. Finally, we define another scheme for the Cournot's duopoly in terms of quantum computation.

  4. New Ideas on Labeling Schemes

    DEFF Research Database (Denmark)

    Rotbart, Noy Galil

    times, effectively eliminating the second penalty mentioned. We continue this theoretical study in several ways. First, we dedicate a large part of the thesis to the graph family of trees, for which we provide an overview of labeling schemes supporting several important functions such as ancestry......, routing and especially adjacency. The survey is complemented by novel contributions to this study, among which are the first asymptotically optimal adjacency labeling scheme for bounded degree trees, improved bounds on ancestry labeling schemes, dynamic multifunctional labeling schemes and an experimental...

  5. A real helper data scheme

    NARCIS (Netherlands)

    Shao, X.; Veldhuis, Raymond N.J.

    2013-01-01

    The helper data scheme utilizes a secret key to protect biometric templates. The current helper data scheme requires binary feature representations that introduce quantization error and thus reduce the capacity of biometric channels. For spectral-minutiae based fingerprint recognition systems,

  6. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  7. Multiuser Switched Diversity Scheduling Schemes

    CERN Document Server

    Shaqfeh, Mohammad; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback sys...

  8. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    This paper illustrates the effect that can be observed when support schemes for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e.g., the price of power, conditions for conventional power producers, and changes in import and export of power...... RES-E support schemes already has a common liberalised power market. In this case the introduction of a common support scheme for renewable technologies will lead to more efficient sitings of renewable plants, improving economic and environmental performance of the total power system...

  9. Geneva University - Events in March

    CERN Multimedia

    Geneva University

    2010-01-01

    École de physique - Département de physique nucléaire et corspusculaire 24, quai Ernest-Ansermet 1211 GENEVA 4 Tel: (022) 379 62 73 - Fax: (022) 379 69 92 Monday 8 March 2010 PHYSICS COLLOQUIUM at 17:00 – Stückelberg Auditorium Gravitational lensing: an astrophysical tool Prof. Georges Meylan École Polytechnique fédérale de Lausanne (EPFL) - Observatoire de Sauverny The total solar eclipse of 1919 unveiled the gravitational lens nature of our Sun. The next example of another gravitational lens was discovered in 1979. Originally considered as a mere curiosity, gravitational lensing has matured, during the last two decades, into a genuine astrophysical tool, used in a large variety of problems, from planet search to the quest for the most distant galaxies. We shall present cosmological results obtained at EPFL about (i) strong lensing and time delays, related to the measurements of the Hubble constant ; (ii) micro lensing...

  10. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  11. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  12. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  13. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  14. March 1964 Prince William Sound, USA Images

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Prince William Sound magnitude 9.2 Mw earthquake on March 28, 1964 at 03:36 GMT (March 27 at 5:36 pm local time), was the largest U.S. earthquake ever recorded...

  15. NASA Tech Briefs, March 2008

    Science.gov (United States)

    2008-01-01

    Topics covered include: WRATS Integrated Data Acquisition System; Breadboard Signal Processor for Arraying DSN Antennas; Digital Receiver Phase Meter; Split-Block Waveguide Polarization Twist for 220 to 325 GHz; Nano-Multiplication-Region Avalanche Photodiodes and Arrays; Tailored Asymmetry for Enhanced Coupling to WGM Resonators; Disabling CNT Electronic Devices by Use of Electron Beams; Conical Bearingless Motor/Generators; Integrated Force Method for Indeterminate Structures; Carbon-Nanotube-Based Electrodes for Biomedical Applications; Compact Directional Microwave Antenna for Localized Heating; Using Hyperspectral Imagery to Identify Turfgrass Stresses; Shaping Diffraction-Grating Grooves to Optimize Efficiency; Low-Light-Shift Cesium Fountain without Mechanical Shutters; Magnetic Compensation for Second-Order Doppler Shift in LITS; Nanostructures Exploit Hybrid-Polariton Resonances; Microfluidics, Chromatography, and Atomic-Force Microscopy; Model of Image Artifacts from Dust Particles; Pattern-Recognition System for Approaching a Known Target; Orchestrator Telemetry Processing Pipeline; Scheme for Quantum Computing Immune to Decoherence; Spin-Stabilized Microsatellites with Solar Concentrators; Phase Calibration of Antenna Arrays Aimed at Spacecraft; Ring Bus Architecture for a Solid-State Recorder; and Image Compression Algorithm Altered to Improve Stereo Ranging.

  16. NASA Tech Briefs, March 2005

    Science.gov (United States)

    2005-01-01

    Topics covered include: Scheme for Entering Binary Data Into a Quantum Computer; Encryption for Remote Control via Internet or Intranet; Coupled Receiver/Decoders for Low-Rate Turbo Codes; Processing GPS Occultation Data To Characterize Atmosphere; Displacing Unpredictable Nulls in Antenna Radiation Patterns; Integrated Pointing and Signal Detector for Optical Receiver; Adaptive Thresholding and Parameter Estimation for PPM; Data-Driven Software Framework for Web-Based ISS Telescience; Software for Secondary-School Learning About Robotics; Fuzzy Logic Engine; Telephone-Directory Program; Simulating a Direction-Finder Search for an ELT; Formulating Precursors for Coating Metals and Ceramics; Making Macroscopic Assemblies of Aligned Carbon Nanotubes; Ball Bearings Equipped for In Situ Lubrication on Demand; Synthetic Bursae for Robots; Robot Forearm and Dexterous Hand; Making a Metal-Lined Composite-Overwrapped Pressure Vessel; Ex Vivo Growth of Bioengineered Ligaments and Other Tissues; Stroboscopic Goggles for Reduction of Motion Sickness; Articulating Support for Horizontal Resistive Exercise; Modified Penning-Malmberg Trap for Storing Antiprotons; Tumbleweed Rovers; Two-Photon Fluorescence Microscope for Microgravity Research; Biased Randomized Algorithm for Fast Model-Based Diagnosis; Fast Algorithms for Model-Based Diagnosis; Simulations of Evaporating Multicomponent Fuel Drops; Formation Flying of Tethered and Nontethered Spacecraft; and Two Methods for Efficient Solution of the Hitting- Set Problem.

  17. #MarchOnRome: Of Alterity, Social Media, and Marching Bands

    Science.gov (United States)

    Abramo, Joseph

    2016-01-01

    In this online ethnography, I studied marching band identity by examining marching band enthusiasts' and music educators' responses on music teacher professional forums, Twitter, blogs, and other online media, to sports commentator Jim Rome's tweets describing marching band members as "dorks." Using a framework of alterity--or the…

  18. Modulation Schemes for Wireless Access

    Directory of Open Access Journals (Sweden)

    F. Vejrazka

    2000-12-01

    Full Text Available Four modulation schemes, namely minimum shift keying (MSK, Gaussianminimum shift keying (GMSK, multiamplitude minimum shift keying(MAMSK and π/4 differential quadrature phase shift keying (π/4-QPSKare described and their applicability to wireless access is discussedin the paper. Low complexity receiver structures based on differentialdetection are analysed to estimate the performance of the modulationschemes in the additive Gaussian noise and the Rayleigh and Riceenvelope fast fading channel. The bandwidth efficiency is calculated toevaluate the modulation schemes. The results show that the MAMSK schemegives the greatest bandwidth efficiency, but its performance in theRayleigh channel is rather poor. In contrast, the MSK scheme is lessbandwidth efficient, but it is more resistant to Rayleigh fading. Theperformance of π/4-QPSK signal is considerably improved by appropriateprefiltering.

  19. Acceleration of Marching on in Time Method for TD-EFIE by Equivalent Dipole Moment Method and its Analysis

    Directory of Open Access Journals (Sweden)

    J. Lacik

    2011-09-01

    Full Text Available The paper is focused on the application of the equivalent dipole moment (EDM method to accelerate the marching on in time (MOT method for the time domain electric field integral equation (TD-EFIE. The implicit MOT scheme with the EDM method for the TD-EFIE is derived and analyzed. It is shown that the derived scheme is faster than the conventional one, even if it is not used for modeling electrically large structures. Since the conventional implicit MOT scheme for the TD-EFIE is sensitive to small changes of its coefficients, the full-value using of the MOT scheme with the EDM approximation requires an appropriate technique (e.g. a preconditioning to obtain a well-conditioned scheme.

  20. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  1. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoill...

  2. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    (log(n)) bits for constant ε> 0. (1 + ε)-stretch labeling schemes with polylogarithmic label size have previously been established for doubling dimension graphs by Talwar [Talwar, STOC, 2004]. In addition, we present matching upper and lower bounds for distance labeling for caterpillars, showing that labels...

  3. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  4. Study on optimized upwind schemes for computational areoacoustics and extension of a fully conservative Chimera to finite difference schemes

    Science.gov (United States)

    Chen, Rangfu

    A computational methodology has been developed in the first part of the thesis for the simulations of acoustic radiation, propagation and reflection. The developed methodology is high order accurate, uses less grid points per wave length comparing to standard high order accurate numerical methods, and automatically damps out spurious short waves. Furthermore, the methodology can be applied to acoustic problems in the presence of objects with curved geometries. To achieve these results, high order accurate optimized upwind schemes, which are applied to discretize spatial derivatives on interior grid points, have been developed. High order accurate optimized one- side biased schemes, which are only applied to discretize the spatial derivatives on grid points near computational boundaries, have also been constructed. The developed schemes are combined with a time difference scheme to fully discretize acoustic field equations in multi- dimension in arbitrary curvilinear coordinates. Numerical boundary conditions are investigated and intuitively illustrated. Applications of the developed methodology to a sequence of one-dimensional and multi-dimensional acoustic problems are performed. The numerical results have validated the developed methodology and demonstrated advantages of the methodology over central-difference Dispersion-Relation-Preserving method. Numerical results have also shown that the optimized upwind schemes minimize not only the dissipation error but also the dissipation error, while retaining the numerical stability. The second part of the thesis deals with a fully conservative Chimera methodology. The fully conservative Chimera was originally developed based on a finite volume approach. A finite difference scheme is shown to be identical to a finite volume scheme with proper definition of control volumes and metrics. The fully conservative Chimera has been successfully extended to finite difference schemes for viscous flows including turbulence models

  5. The a(4) Scheme-A High Order Neutrally Stable CESE Solver

    Science.gov (United States)

    Chang, Sin-Chung

    2009-01-01

    The CESE development is driven by a belief that a solver should (i) enforce conservation laws in both space and time, and (ii) be built from a nondissipative (i.e., neutrally stable) core scheme so that the numerical dissipation can be controlled effectively. To provide a solid foundation for a systematic CESE development of high order schemes, in this paper we describe a new high order (4-5th order) and neutrally stable CESE solver of a 1D advection equation with a constant advection speed a. The space-time stencil of this two-level explicit scheme is formed by one point at the upper time level and two points at the lower time level. Because it is associated with four independent mesh variables (the numerical analogues of the dependent variable and its first, second, and third-order spatial derivatives) and four equations per mesh point, the new scheme is referred to as the a(4) scheme. As in the case of other similar CESE neutrally stable solvers, the a(4) scheme enforces conservation laws in space-time locally and globally, and it has the basic, forward marching, and backward marching forms. Except for a singular case, these forms are equivalent and satisfy a space-time inversion (STI) invariant property which is shared by the advection equation. Based on the concept of STI invariance, a set of algebraic relations is developed and used to prove the a(4) scheme must be neutrally stable when it is stable. Numerically, it has been established that the scheme is stable if the value of the Courant number is less than 1/3

  6. Hanford Laboratories monthly activities report, March 1964

    Energy Technology Data Exchange (ETDEWEB)

    1964-04-15

    The monthly report for the Hanford Laboratories Operation, March 1964. Reactor fuels, chemistry, dosimetry, separation processes, reactor technology, financial activities, biology operation, and physics and instrumentation research, and applied mathematics operation, and programming operations are discussed.

  7. PROGRAMME OF SEMINARS MARCH TO JUNE 2004

    CERN Multimedia

    Nathalie Dumeaux

    2004-01-01

    Situation : 09.03.2004 Dates Days Places Available* Bilingual seminars Communication Techniques-1 16, 17, 18 March 3 no Project Management 17, 18, 19 March 3 yes Introduction to Management 23, 24, 25 March 3 yes Communication Techniques-1 8, 9, 10 June 3 yes Quality Management 5, 6, 7 may 3 yes Introduction to Management - Follow-up 22, 23 June 1,5 yes Seminars in English Making Presentations 22, 23 March & 1 April 3 yes Stress Management 22, 23 April 2 yes Chairing or participating in meetings 11, 12, 13 May 3 yes *If you are interested in a seminar where there are no places available, please fill in an application form and we will contact you as soon as a new session is organised. MANAGEMENT & COMMUNICATION Nathalie Dumeaux tel. 781 44 management.communication@cern.ch

  8. Works Technical Department progress report, March 1961

    Energy Technology Data Exchange (ETDEWEB)

    None

    1961-04-19

    This document details the activities of the Savannah River Works Technical Department during the month of March 1961. Topics discussed are: Reactor Technology, Separations Technology, Engineering Assistance, Health Physics, Laboratories Overview, and Technical Papers Issued.

  9. Hanford Laboratories monthly activities report, March 1963

    Energy Technology Data Exchange (ETDEWEB)

    1963-04-15

    This is the monthly report for the Hanford Laboratories Operation March 1963. Reactor fuels, chemistry, dosimetry, separation processes, reactor technology, financial activities, biology operation, physics and instrumentation research, operations research and synthesis, programming, and radiation protection operation are discussed.

  10. Chemical Processing Division monthly report, March 1966

    Energy Technology Data Exchange (ETDEWEB)

    1966-04-22

    This report for March 1966, from the Chemical Processing Department at HAPO, discusses the following: Production operation; Purex and Redox operation; Finished products operation; maintenance; Financial operations; facilities engineering; research; employee relations.

  11. Marching Cubes in Cylindrical and Spherical Coordinates

    Science.gov (United States)

    Goldsmith, J.; Jacobson, A. S.

    1996-01-01

    Isosurface extraction is a common analysis and visualization technique for three-dimensional scalar data. Marching Cubes is the most commonly-used algorithm for finding polygonal representations of isosurfaces in such data. We extend Marching Cubes to produce geometry for data sets that lie in spherical and cylindrical coordinate systems as well as show the steps for derivation of transformations for other coordinate systems.

  12. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    for promoting combined heat and power and energy from renewable sources. These Directives are to be implemented at the national level by the Member States. Section 3 conceptually presents the spectrum of national support schemes, ranging from investment support to market‐based operational support. The choice...... an introduction to the policy context for mCHP. Section 1 describes the rationale for the promotion of mCHP by explaining its potential contribution to European energy policy goals. Section 2 addresses the policy context at the supranational European level by outlining relevant EU Directives on support schemes......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...

  13. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed...

  14. Subranging scheme for SQUID sensors

    Science.gov (United States)

    Penanen, Konstantin I. (Inventor)

    2008-01-01

    A readout scheme for measuring the output from a SQUID-based sensor-array using an improved subranging architecture that includes multiple resolution channels (such as a coarse resolution channel and a fine resolution channel). The scheme employs a flux sensing circuit with a sensing coil connected in series to multiple input coils, each input coil being coupled to a corresponding SQUID detection circuit having a high-resolution SQUID device with independent linearizing feedback. A two-resolution configuration (course and fine) is illustrated with a primary SQUID detection circuit for generating a fine readout, and a secondary SQUID detection circuit for generating a course readout, both having feedback current coupled to the respective SQUID devices via feedback/modulation coils. The primary and secondary SQUID detection circuits function and derive independent feedback. Thus, the SQUID devices may be monitored independently of each other (and read simultaneously) to dramatically increase slew rates and dynamic range.

  15. Supporting Argumentation Schemes in Argumentative Dialogue Games

    Directory of Open Access Journals (Sweden)

    Wells Simon

    2014-03-01

    Full Text Available This paper reports preliminary work into the exploitation of argumentation schemes within dialogue games. We identify a property of dialogue games that we call “scheme awareness” that captures the relationship between dialogue game systems and argumentation schemes. Scheme awareness is used to examine the ways in which existing dialogue games utilise argumentation schemes and consequently the degree with which a dialogue game can be used to construct argument structures. The aim is to develop a set of guidelines for dialogue game design, which feed into a set of Dialogue Game Description Language (DGDL extensions in turn enabling dialogue games to better exploit argumentation schemes.

  16. An Arbitrated Quantum Signature Scheme without Entanglement*

    Science.gov (United States)

    Li, Hui-Ran; Luo, Ming-Xing; Peng, Dai-Yuan; Wang, Xiao-Jun

    2017-09-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.

  17. A biometric signcryption scheme without bilinear pairing

    Science.gov (United States)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  18. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  19. METAPHORIC MECHANISMS IN IMAGE SCHEME DEVELOPMENT

    National Research Council Canada - National Science Library

    Pankratova, S.A

    2017-01-01

    .... In the summary the author underscores that both ways of image scheme development are of importance to cognitive science, both heuristic epiphora and image-based diaphora play a significant role in the explication of image scheme development.

  20. The Ubiquity of Smooth Hilbert Schemes

    OpenAIRE

    Staal, Andrew P.

    2017-01-01

    We investigate the geography of Hilbert schemes that parametrize closed subschemes of projective space with a specified Hilbert polynomial. We classify Hilbert schemes with unique Borel-fixed points via combinatorial expressions for their Hilbert polynomials. We realize the set of all nonempty Hilbert schemes as a probability space and prove that Hilbert schemes are irreducible and nonsingular with probability greater than $0.5$.

  1. MIRD radionuclide data and decay schemes

    CERN Document Server

    Eckerman, Keith F

    2007-01-01

    For all physicians, scientists, and physicists working in the nuclear medicine field, the MIRD: Radionuclide Data and Decay Schemes updated edition is an essential sourcebook for radiation dosimetry and understanding the properties of radionuclides. Includes CD Table of Contents Decay schemes listed by atomic number Radioactive decay processes Serial decay schemes Decay schemes and decay tables This essential reference for nuclear medicine physicians, scientists and physicists also includes a CD with tabulations of the radionuclide data necessary for dosimetry calculations.

  2. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    and Wait (SW), Selective Repeat (SR), Stutter. (ST) and Go-Back-N (GBN) (Lin and Costello,. 2003). Combinations of these schemes lead to mixed mode schemes which include the SR-. GBN, SR-ST1 and SR-ST2. In the mixed mode schemes, when a prescribed number of failures occur in the SR mode, the GBN or ST ...

  3. The Original Management Incentive Schemes

    OpenAIRE

    Richard T. Holden

    2005-01-01

    During the 1990s, the structure of pay for top corporate executives shifted markedly as the use of stock options greatly expanded. By the early 2000s, as the dot-com boom ended and the Nasdaq stock index melted down, these modern executive incentive schemes were being sharply questioned on many grounds—for encouraging excessive risk-taking and a short-run orientation, for being an overly costly and inefficient method of providing incentives, and even for tempting managers of firms like Enron,...

  4. Adaptive Optics Metrics & QC Scheme

    Science.gov (United States)

    Girard, Julien H.

    2017-09-01

    "There are many Adaptive Optics (AO) fed instruments on Paranal and more to come. To monitor their performances and assess the quality of the scientific data, we have developed a scheme and a set of tools and metrics adapted to each flavour of AO and each data product. Our decisions to repeat observations or not depends heavily on this immediate quality control "zero" (QC0). Atmospheric parameters monitoring can also help predict performances . At the end of the chain, the user must be able to find the data that correspond to his/her needs. In Particular, we address the special case of SPHERE."

  5. The mathematics of Ponzi schemes

    OpenAIRE

    Artzrouni, Marc

    2009-01-01

    A first order linear differential equation is used to describe the dynamics of an investment fund that promises more than it can deliver, also known as a Ponzi scheme. The model is based on a promised, unrealistic interest rate; on the actual, realized nominal interest rate; on the rate at which new deposits are accumulated and on the withdrawal rate. Conditions on these parameters are given for the fund to be solvent or to collapse. The model is fitted to data available on Charles...

  6. Comparison of kriging interpolation precision between grid sampling scheme and simple random sampling scheme for precision agriculture

    Directory of Open Access Journals (Sweden)

    Jiang Houlong

    2016-01-01

    Full Text Available Sampling methods are important factors that can potentially limit the accuracy of predictions of spatial distribution patterns. A 10 ha tobacco-planted field was selected to compared the accuracy in predicting the spatial distribution of soil properties by using ordinary kriging and cross validation methods between grid sampling and simple random sampling scheme (SRS. To achieve this objective, we collected soil samples from the topsoil (0-20 cm in March 2012. Sample numbers of grid sampling and SRS were both 115 points each. Accuracies of spatial interpolation using the two sampling schemes were then evaluated based on validation samples (36 points and deviations of the estimates. The results suggested that soil pH and nitrate-N (NO3-N had low variation, whereas all other soil properties exhibited medium variation. Soil pH, organic matter (OM, total nitrogen (TN, cation exchange capacity (CEC, total phosphorus (TP and available phosphorus (AP matched the spherical model, whereas the remaining variables fit an exponential model with both sampling methods. The interpolation error of soil pH, TP, and AP was the lowest in SRS. The errors of interpolation for OM, CEC, TN, available potassium (AK and total potassium (TK were the lowest for grid sampling. The interpolation precisions of the soil NO3-N showed no significant differences between the two sampling schemes. Considering our data on interpolation precision and the importance of minerals for cultivation of flue-cured tobacco, the grid-sampling scheme should be used in tobacco-planted fields to determine the spatial distribution of soil properties. The grid-sampling method can be applied in a practical and cost-effective manner to facilitate soil sampling in tobacco-planted field.

  7. Forum Engelberg, 1-4 March 2004

    CERN Multimedia

    2004-01-01

    The 2004 Forum Engelberg will pay tribute to its President, Hubert Curien, a former President of the CERN Council and former French Minister for Research. The subject of this year's conference, which will take place in Lucerne from 1st to 4th March 2004, is "Science on the Agenda of European Politics." This year, there will be talks by numerous speakers, including the directors of the seven European intergovernmental scientific organisations (EIROforum) and the European Commissioner for Research, Philippe Busquin. The highlights of the conference will include an Interdisciplinary Scientific Programme on 2nd and 3rd March, a session on e-science and the Grid on 4th March and a Young Scientists Programme. The programme and registration forms are available at http://www.forum-engelberg.org/

  8. MANAGEMENT BOARD MEETING OF 28 MARCH 2002

    CERN Multimedia

    2002-01-01

    Outcome of the March Meetings of the Scientific Policy Committee, Finance Committee and Committee of Council and of the Extraordinary March Council Session Summarising the main issues examined at the March meetings, the Director-General reported that, in the context of the ongoing discussions on the financing of LHC to completion, the Management had presented a series of documents covering the status and schedule of the LHC machine, experiments and computing, preliminary orientations for the CERN scientific programme and estimated resources for the years 2002-2010, and envisaged changes in the Organization's management and control structures. The committees had expressed general support for the direction of the Management's proposals, recognising that they represented work in progress and that final proposals would be submitted in June 2002, taking account of the conclusions and recommendations of the internal task forces and of the External Review Committee. The Finance Committee and Committee of Council had...

  9. A fast marching algorithm for the factored eikonal equation

    Energy Technology Data Exchange (ETDEWEB)

    Treister, Eran, E-mail: erantreister@gmail.com [Department of Earth and Ocean Sciences, The University of British Columbia, Vancouver, BC (Canada); Haber, Eldad, E-mail: haber@math.ubc.ca [Department of Earth and Ocean Sciences, The University of British Columbia, Vancouver, BC (Canada); Department of Mathematics, The University of British Columbia, Vancouver, BC (Canada)

    2016-11-01

    The eikonal equation is instrumental in many applications in several fields ranging from computer vision to geoscience. This equation can be efficiently solved using the iterative Fast Sweeping (FS) methods and the direct Fast Marching (FM) methods. However, when used for a point source, the original eikonal equation is known to yield inaccurate numerical solutions, because of a singularity at the source. In this case, the factored eikonal equation is often preferred, and is known to yield a more accurate numerical solution. One application that requires the solution of the eikonal equation for point sources is travel time tomography. This inverse problem may be formulated using the eikonal equation as a forward problem. While this problem has been solved using FS in the past, the more recent choice for applying it involves FM methods because of the efficiency in which sensitivities can be obtained using them. However, while several FS methods are available for solving the factored equation, the FM method is available only for the original eikonal equation. In this paper we develop a Fast Marching algorithm for the factored eikonal equation, using both first and second order finite-difference schemes. Our algorithm follows the same lines as the original FM algorithm and requires the same computational effort. In addition, we show how to obtain sensitivities using this FM method and apply travel time tomography, formulated as an inverse factored eikonal equation. Numerical results in two and three dimensions show that our algorithm solves the factored eikonal equation efficiently, and demonstrate the achieved accuracy for computing the travel time. We also demonstrate a recovery of a 2D and 3D heterogeneous medium by travel time tomography using the eikonal equation for forward modeling and inversion by Gauss–Newton.

  10. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  11. Delivery of a national home safety equipment scheme in England: a survey of local scheme leaders.

    Science.gov (United States)

    Mulvaney, C A; Watson, M C; Hamilton, T; Errington, G

    2013-11-01

    Unintentional home injuries sustained by preschool children are a major cause of morbidity in the UK. Home safety equipment schemes may reduce home injury rates. In 2009, the Royal Society for the Prevention of Accidents was appointed as central coordinator of a two-year, £18m national home safety equipment scheme in England. This paper reports the findings from a national survey of all scheme leaders responsible for local scheme delivery. A questionnaire mailed to all local scheme leaders sought details of how the schemes were operated locally; barriers and facilitators to scheme implementation; evaluation of the local scheme and its sustainability. A response rate of 73% was achieved. Health visitors and family support workers played a key role in both the identification of eligible families and performing home safety checks. The majority of local scheme leaders (94.6%) reported that they thought their local scheme had been successful in including those families considered 'harder to engage'. Many scheme leaders (72.4%) reported that they had evaluated the provision of safety equipment in their scheme and over half (56.6%) stated that they would not be able to continue the scheme once funding ceased. Local schemes need support to effectively evaluate their scheme and to seek sustainability funding to ensure the future of the scheme. There remains a lack of evidence of whether the provision of home safety equipment reduces injuries in preschool children.

  12. Channel Aggregation Schemes for Cognitive Radio Networks

    Science.gov (United States)

    Lee, Jongheon; So, Jaewoo

    This paper proposed three channel aggregation schemes for cognitive radio networks, a constant channel aggregation scheme, a probability distribution-based variable channel aggregation scheme, and a residual channel-based variable channel aggregation scheme. A cognitive radio network can have a wide bandwidth if unused channels in the primary networks are aggregated. Channel aggregation schemes involve either constant channel aggregation or variable channel aggregation. In this paper, a Markov chain is used to develop an analytical model of channel aggregation schemes; and the performance of the model is evaluated in terms of the average sojourn time, the average throughput, the forced termination probability, and the blocking probability. Simulation results show that channel aggregation schemes can reduce the average sojourn time of cognitive users by increasing the channel occupation rate of unused channels in a primary network.

  13. Hybrid scheme for Brownian semistationary processes

    DEFF Research Database (Denmark)

    Bennedsen, Mikkel; Lunde, Asger; Pakkanen, Mikko S.

    is to approximate the kernel function by a power function near zero and by a step function elsewhere. The resulting approximation of the process is a combination of Wiener integrals of the power function and a Riemann sum, which is why we call this method a hybrid scheme. Our main theoretical result describes...... the asymptotics of the mean square error of the hybrid scheme and we observe that the scheme leads to a substantial improvement of accuracy compared to the ordinary forward Riemann-sum scheme, while having the same computational complexity. We exemplify the use of the hybrid scheme by two numerical experiments......We introduce a simulation scheme for Brownian semistationary processes, which is based on discretizing the stochastic integral representation of the process in the time domain. We assume that the kernel function of the process is regularly varying at zero. The novel feature of the scheme...

  14. An explicit MOT scheme for solving the TD-EFVIE on nonlinear and dispersive scatterers

    KAUST Repository

    Sayed, Sadeed Bin

    2017-10-25

    An explicit marching-on-in-time (MOT) scheme for solving the time domain electric field volume integral equation (TD-EFVIE) on nonlinear and dispersive scatterers is described. The unknown electric field intensity, electric flux density, and polarization densities representing Kerr nonlinearity along with Lorentz dispersion relation, all of which are induced inside the scatterer upon excitation, are expanded using half and full Schaubert-Wilton-Glisson functions in space. The TD-EFVIE and the constitutive relations between polarization, field, and flux terms are cast in the form of a first-order ordinary differential equation. The resulting matrix system is integrated in time using a predictor-corrector scheme to obtain the time dependent unknown expansion coefficients. The resulting MOT scheme is explicit and accounts for nonlinearity by simple function evaluations.

  15. RES MARCH COV 07 PRINT DP

    Indian Academy of Sciences (India)

    Page 1. Resonance – March 2007. Nikola Tesla. (1856-1943). Regni Nº CPMGKABGE-340.2008-08 WFP Nº.5. Pºsted at RT Nagar Head Pºst Office, Bângalºre 12,0307. Registered with Registrar ºf Newspapers in India wide Regn, Nº. 6527396.

  16. Irradiation Processing Department monthly report, March 1961

    Energy Technology Data Exchange (ETDEWEB)

    1961-04-14

    This document details activities of the irradiation processing department during the month of March, 1961. A general summary is included at the start of the report, after which the report is divided into the following sections: Research and Engineering Operations; Production and Reactor Operations; Facilities Engineering Operation; Employee Relations Operation; Financial Operation; and NPR project.

  17. EAMJ March Anti-diabetic.indd

    African Journals Online (AJOL)

    East African Medical Journal Vol. 85 No. 3 March 2009. ANTI-DIABETIC DRUGS IN THE PRIVATE AND PUBLIC SECTOR IN DAR ES SALAAM, TANZANIA. M. Justin-Temu, B.Pharm, M.Pharm, PhD, Department of Pharmaceutics, School of Pharmacy, R. S. O. Nondo, B.Pharm,. Department of Pharmacology, Institute of ...

  18. Volume 8 No. 1 2008 March 2008

    African Journals Online (AJOL)

    Administrator

    March 2008. 18. ABSTRACT. This study was conducted to determine the quality of Omaze Uozongombe, a traditional Herero community Ghee in Namibia in order to improve it for commercial purposes. Ghee is not well known and not found in the formal market in Namibia, except from the Herero community who live their ...

  19. Res March 2014 Cover Tp.cdr

    Indian Academy of Sciences (India)

    Admin

    Page 1. 108 pages + c. Resonance- March 2014. John McCarthy. (1927–2011). Regn No.KRNABGE-340/2012-2014 - N ISSN 0971–8044. Licenced to Post without prepayment Nº.6 -. Posted at MBC, GPO, Bangalore secºn. 12.03.14. Registered with Registrar of Newspapers in India vide Regn. No. 66273/96.

  20. EDUCATIONAL ATTAINMENT, MARCH 1967. POPULATION CHARACTERISTICS.

    Science.gov (United States)

    Bureau of the Census (DOC), Suitland, MD.

    DETAILED TABLES, FIGURES, AND RELATED REPORTS DESCRIBE EDUCATIONAL ATTAINMENTS IN THE UNITED STATES AS OF MARCH 1967. DATA ARE COMPARED WITH REFERENCE TO THE POPULATION'S AGE, RACE, SEX, AND RESIDENCE IN NONMETROPOLITAN AND METROPOLITAN AREAS AND IN AND OUTSIDE CENTRAL CITIES. EDUCATIONAL ATTAINMENTS IN 1947 AND 1967 ARE ALSO COMPARED. THIS…

  1. LE MARCHE FINANCIER EN ALGERIE : SITUATION ET ...

    African Journals Online (AJOL)

    Administrateur

    (Tunisie et Maroc). Le marché financier est entendu ici comme «un ensemble de systèmes permettant d'émettre et d'échanger des instru- ments financiers en assurant les conditions .... d'assurances (ALLIANCE ASSURANCE) constitue une op-portunité pour ... Maroc, la capitalisation boursière atteint en 2009, 65% du PIB.

  2. Hanford Works monthly report, March 1951

    Energy Technology Data Exchange (ETDEWEB)

    Prout, G.R.

    1951-04-20

    This is a progress report of the production reactors on the Hanford Reservation for the month of March 1951. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  3. Hanford Works monthly report, March 1949

    Energy Technology Data Exchange (ETDEWEB)

    Prout, G.R.

    1949-04-19

    This is a progress report of the production reactors on the Hanford Reservation for the month of March 1949. This report takes each division (e.g. manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month. (MB)

  4. The allergic march | Weinberg | Continuing Medical Education

    African Journals Online (AJOL)

    The allergic march. ... and patients when used during consultations in allergy practice. The common atopic conditions such as asthma, allergic rhinitis and eczema are allergic conditions that occur in families and are associated with the production of specific IgE antibodies to food and environmental allergens.

  5. Scheme of thinking quantum systems

    Science.gov (United States)

    Yukalov, V. I.; Sornette, D.

    2009-11-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  6. Fragment separator momentum compression schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  7. Fragment separator momentum compression schemes.

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, L.; Erdelyi, B.; Hausmann, M.; Kubo, T.; Nolen, J.; Portillo, M.; Sherrill, B.M. (Physics); (MSU); (Northern Illinois Univ.); (RIKEN)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  8. Fragment separator momentum compression schemes

    Science.gov (United States)

    Bandura, Laura; Erdelyi, Bela; Hausmann, Marc; Kubo, Toshiyuki; Nolen, Jerry; Portillo, Mauricio; Sherrill, Bradley M.

    2011-07-01

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  9. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations......The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...

  10. Staggered Schemes for Fluctuating Hydrodynamics

    CERN Document Server

    Balboa, F; Delgado-Buscalioni, R; Donev, A; Fai, T; Griffith, B; Peskin, C S

    2011-01-01

    We develop numerical schemes for solving the isothermal compressible and incompressible equations of fluctuating hydrodynamics on a grid with staggered momenta. We develop a second-order accurate spatial discretization of the diffusive, advective and stochastic fluxes that satisfies a discrete fluctuation-dissipation balance, and construct temporal discretizations that are at least second-order accurate in time deterministically and in a weak sense. Specifically, the methods reproduce the correct equilibrium covariances of the fluctuating fields to third (compressible) and second (incompressible) order in the time step, as we verify numerically. We apply our techniques to model recent experimental measurements of giant fluctuations in diffusively mixing fluids in a micro-gravity environment [A. Vailati et. al., Nature Communications 2:290, 2011]. Numerical results for the static spectrum of non-equilibrium concentration fluctuations are in excellent agreement between the compressible and incompressible simula...

  11. LLE Review 114 (January-March 2008)

    Energy Technology Data Exchange (ETDEWEB)

    Zuegel, J.D.

    2008-07-30

    This volume of the LLE Review, covering January-March 2008, features 'Cryogenic Targets: Current Status and Future Development', by D. R. Harding, D. H. Edgell, M. D. Wittman, L. M. Elasky, S. J. Verbridge, A. J. Weaver, L. D. Lund, W. Seka, W. T. Shmayda, R. T. Janezic, M. J. Shoup III, M. Moore, R. Junquist, and A. V. Okishev. In this article (p. 57), the authors report on the status of layering cryogenic DT and D{sub 2} targets at LLE for inertial confinement fusion (ICF) targets. This critical effort achieves the important milestone of routinely providing cryogenic DT targets that meet the 1.0-{micro}m (rms) OMEGA ice-quality-surface specification. The best D{sub 2}-ice layers produced so far (rms roughness of 1.1 {micro}m) are approaching the quality typically achieved in DT targets. Efforts to improve the consistency of this process are reported along with investigations supporting the National Ignition Campaign studying issues relevant to indirect-drive and direct-drive cryogenic targets. Additional highlights of recent research presented in this issue include the following: (1) an improved laser speckle smoothing scheme that augments the current NIF 1-D SSD system by using multiple-FM modulators (MultiFM 1-D SSD) (p. 73). With a judicious choice of modulator frequencies, MultiFM 1-D SSD smoothes resonances produced at the higher spatial frequencies and can attain similar or even faster smoothing rates compared to the baseline NIF 2-D SSD system. DRACO simulations have shown that MultiFM 1-D SSD beam smoothing is sufficient for the direct-drive-ignition targets and pulse shapes analyzed thus far, and may even allow reducing the bandwidth enough to eliminate the need for dual-tripler frequency conversion on the NIF. (2) describes a time-gated, monoenergetic proton radiography that provides unique measurements of implosion dynamics of spherical targets in direct-drive inertial confinement fusion (ICF) (p. 81). Radiographs obtained at different

  12. On Optimal Designs of Some Censoring Schemes

    Directory of Open Access Journals (Sweden)

    Dr. Adnan Mohammad Awad

    2016-03-01

    Full Text Available The main objective of this paper  is to explore suitability of some entropy-information measures for introducing a new optimality censoring criterion and to apply it to some censoring schemes from some underlying life-time models.  In addition, the  paper investigates four related issues namely; the  effect of the parameter of parent distribution on optimal scheme, equivalence of schemes based on Shannon and Awad sup-entropy measures, the conjecture that the optimal scheme is one stage scheme, and  a conjecture by Cramer and Bagh (2011 about Shannon minimum and maximum schemes when parent distribution is reflected power. Guidelines for designing an optimal censoring plane are reported together with theoretical and numerical results and illustrations.

  13. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme. These sche......With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme....... These schemes utilize directional relays, power flow through feeders, wind and PV measurements to optimally select the feeders to be disconnected during load shedding such that DG disconnection is minimized while disconnecting required amount of consumption. These different UFLS schemes are compared in terms...

  14. Resonance ionization scheme development for europium

    CERN Document Server

    Chrysalidis, K; Fedosseev, V N; Marsh, B A; Naubereit, P; Rothe, S; Seiffert, C; Kron, T; Wendt, K

    2017-01-01

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  15. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  16. SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES

    OpenAIRE

    Adrian Atanasiu; Laura Savu

    2012-01-01

    This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the results and some examples. The Mambo’s Proxy Signature is adapted for Shortened Digital Signature Standard, being part of a new Proxy Signcryption scheme.

  17. Optics design for CEPC double ring scheme

    Science.gov (United States)

    Wang, Yiwei; Su, Feng; Bai, Sha; Yu, Chenghui; Gao, Jie

    2017-12-01

    The CEPC is a future Circular Electron and Positron Collider proposed by China to mainly study the Higgs boson. Its baseline design is a double ring scheme and an alternative design is a partial double ring scheme. This paper will present the optics design for the main ring of the double ring scheme. The CEPC will also work as a W and Z factory. Compatible optics designs for a W and a Z modes will be presented as well.

  18. Wavelet Denoising within the Lifting Scheme Framework

    Directory of Open Access Journals (Sweden)

    M. P. Paskaš

    2012-11-01

    Full Text Available In this paper, we consider an example of the lifting scheme and present the results of the simple lifting scheme implementation using lazy transform. The paper is tutorial-oriented. The results are obtained by testing several common test signals for the signal denoising problem and using different threshold values. The lifting scheme represents an effective and flexible tool that can be used for introducing signal dependence into the problem by improving the wavelet properties.

  19. Le marche du travail bancaire en algerie : d'une logique de marche ...

    African Journals Online (AJOL)

    Pourtant, ce dernier a connu des bouleversements profonds: segmentation du marché, modification des comportements d'activité, apparition de nouvelles formes d'emploi, flexibilité de l'emploi et émergence de marchés du travail professionnels. Dans ce contexte, le système bancaire algérien est particulièrement ...

  20. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (i......) Ghost states are easily avoided without including semicore shells. (ii) The ultrasoft pseudo-charge-augmentation functions can be made softer. (iii) The number of nonlocal operators is reduced. The scheme will be most useful for transition metals, and the feasibility and accuracy of the scheme...

  1. Central schemes for open-channel flow

    Science.gov (United States)

    Gottardi, Guido; Venutelli, Maurizio

    2003-03-01

    The resolution of the Saint-Venant equations for modelling shock phenomena in open-channel flow by using the second-order central schemes of Nessyahu and Tadmor (NT) and Kurganov and Tadmor (KT) is presented. The performances of the two schemes that we have extended to the non-homogeneous case and that of the classical first-order Lax-Friedrichs (LF) scheme in predicting dam-break and hydraulic jumps in rectangular open channels are investigated on the basis of different numerical and physical conditions. The efficiency and robustness of the schemes are tested by comparing model results with analytical or experimental solutions.

  2. Programme of Seminars January to March 2004

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. MANAGEMENT & COMMUNICATION Nathalie Dumeaux tel. 78144 management.communication@cern.ch Situation : 20.01.2004 DatesDaysPlaces Available** Bilingual seminars Communication Techniques-1/Techniques de communication-1 16, 17, 18 March 3 non Project Management/Gestion de projet 17, 18, 19 March 3 oui Seminars in English Communicating effectively 22, 23 January & 19, 20 February 4 yes Performance Appraisal MAPS 4, 5, 6 February 3 yes Performance Appraisal -MAPS 11, 12, 13 February 3 yes Séminaires en Français Formation à l'entreti...

  3. The Atopic March. A Literature Review

    Directory of Open Access Journals (Sweden)

    Juan F. Salazar-Espinosa

    2015-10-01

    Full Text Available The atopic march is defined as the progression of atopic diseases, generally during childhood, such as atopic dermatitis, asthma, allergic rhinitis and food allergies. The main risk factors for developing these atopic diseases include genetics, aeroallergens, food allergens, late food introduction to the infant, and living in developing countries. The immunologic contributors to this problem include the Th2 response, epigenetics, and lack of certain factors like thymic stromal lymphopoietin (TSLP and filaggrin. As a whole, the therapeutic approach has been changing during recent years because of the discovery of new factors involved in this problem. This article explains the definition of atopic march, the immunological pathway, clinical features, epidemiology and therapeutic approaches to create a context for the broader understanding of this important condition.

  4. Motor Challenge Energy Matters, March 1999

    Energy Technology Data Exchange (ETDEWEB)

    Ericksen, E.

    1999-03-26

    The March 1999 issue of Energy Matters (formerly Turning Point) discusses options industrial customers have for financing energy projects through utilities. This issue also features information about the services provided by energy service companies (ESCOs) and explains how the Northwest Energy Efficiency Alliance sponsors projects to protect the environment and help customers cut utility costs. A special 4-page supplement focuses on the Compressed Air Challenge and opportunities to improve the efficiency of industrial compressed air systems.

  5. Phalanx. Volume 48, Number 1. March 2015

    Science.gov (United States)

    2015-03-01

    session: Social Media in Disaster Re- sponse,” and “Diplomacy, Sentiment, & Social Network Analysis Using Social Media.” Jun Zhuang, University at Buf...www.mors.org) was rede - signed and reorganized and is now a responsive site that automatically adjusts to the platform you are using. The NOAH system replaced...Elizabeth Bartels February 18, 2015 Better Game Design through (Deductive) Social Science Guy Halftech March 25, 2015 How to Use Games to Discover Your Cogni

  6. Nonstandard finite difference schemes for differential equations

    Directory of Open Access Journals (Sweden)

    Mohammad Mehdizadeh Khalsaraei

    2014-12-01

    Full Text Available In this paper, the reorganization of the denominator of the discrete derivative and nonlocal approximation of nonlinear terms are used in the design of nonstandard finite difference schemes (NSFDs. Numerical examples confirming then efficiency of schemes, for some differential equations are provided. In order to illustrate the accuracy of the new NSFDs, the numerical results are compared with standard methods.

  7. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  8. Sampling scheme optimization from hyperspectral data

    NARCIS (Netherlands)

    Debba, P.

    2006-01-01

    This thesis presents statistical sampling scheme optimization for geo-environ-menta] purposes on the basis of hyperspectral data. It integrates derived products of the hyperspectral remote sensing data into individual sampling schemes. Five different issues are being dealt with.First, the optimized

  9. Consolidation of the health insurance scheme

    CERN Multimedia

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  10. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  11. Mobile Machine for E-payment Scheme

    OpenAIRE

    Sattar J Aboud

    2010-01-01

    In this article e-payment scheme by mobile machine is considered. The requirements for a mobile machine in e-payment are presented, particularly when merchant employing accounts for payments and when using advertising. In the proposed scheme we will use the public key infrastructure and certificate for authenticate purchaser and merchant and to secure the communication between them.

  12. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    formation transmitted in digital communication systems. Such schemes ... Department of Electronics and Telecommunications Engineering,. University of Dar es ...... (2): 165-176. Kundaeli, H. N. (2013). Throughput-Delay. Analysis of the SR-ST-GBN ARQ Scheme. Mediterranean Journal of Electronics and. Communication.

  13. Modernisation des marchés agroalimentaires - inclusion des petits ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Modernisation des marchés agroalimentaires - inclusion des petits exploitants aux marchés dynamiques. Les marchés agroalimentaires connaissent de rapides changements dans les pays en développement et les pays en transition. Sous l'influence de la libéralisation du commerce et des nouvelles technologies de ...

  14. Karl Polanyi, les marchés et le Marché

    OpenAIRE

    Jérôme Maucourant

    2003-01-01

    Actes du colloque Karl Polanyi et le marché du12 juin 2003, Nanterre, MSH René-Ginouvès/Les Colloques en ligne, http://www.mae.u-paris10.fr/fx/detail.php?ID=72&query=, mis en ligne en 2004. Disponible en 2014 via l'URL : http://www.gabrielperi.fr/1386.html; National audience; il est important de traiter directement de cette question du " marché " qui est sans doute la source originelle de tant de discordes. En effet, la référence au marché pose de nombreuses difficultés au sein même de la dis...

  15. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  16. Towards an "All Speed" Unstructured Upwind Scheme

    Science.gov (United States)

    Loh, Ching Y.; Jorgenson, Philip C.E.

    2009-01-01

    In the authors previous studies [1], a time-accurate, upwind finite volume method (ETAU scheme) for computing compressible flows on unstructured grids was proposed. The scheme is second order accurate in space and time and yields high resolution in the presence of discontinuities. The scheme features a multidimensional limiter and multidimensional numerical dissipation. These help to stabilize the numerical process and to overcome the annoying pathological behaviors of upwind schemes. In the present paper, it will be further shown that such multidimensional treatments also lead to a nearly all-speed or Mach number insensitive upwind scheme. For flows at very high Mach number, e.g., 10, local numerical instabilities or the pathological behaviors are suppressed, while for flows at very low Mach number, e.g., 0.02, computation can be directly carried out without invoking preconditioning. For flows in different Mach number regimes, i.e., low, medium, and high Mach numbers, one only needs to adjust one or two parameters in the scheme. Several examples with low and high Mach numbers are demonstrated in this paper. Thus, the ETAU scheme is applicable to a broad spectrum of flow regimes ranging from high supersonic to low subsonic, appropriate for both CFD (computational fluid dynamics) and CAA (computational aeroacoustics).

  17. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  18. Secure Electronic Cash Scheme with Anonymity Revocation

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2016-01-01

    Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.

  19. Deitmar schemes, graphs and zeta functions

    Science.gov (United States)

    Mérida-Angulo, Manuel; Thas, Koen

    2017-07-01

    In Thas (2014) it was explained how one can naturally associate a Deitmar scheme (which is a scheme defined over the field with one element, F1) to a so-called ;loose graph; (which is a generalization of a graph). Several properties of the Deitmar scheme can be proven easily from the combinatorics of the (loose) graph, and known realizations of objects over F1 such as combinatorial F1-projective and F1-affine spaces exactly depict the loose graph which corresponds to the associated Deitmar scheme. In this paper, we first modify the construction of loc. cit., and show that Deitmar schemes which are defined by finite trees (with possible end points) are ;defined over F1; in Kurokawa's sense; we then derive a precise formula for the Kurokawa zeta function for such schemes (and so also for the counting polynomial of all associated Fq-schemes). As a corollary, we find a zeta function for all such trees which contains information such as the number of inner points and the spectrum of degrees, and which is thus very different than Ihara's zeta function (which is trivial in this case). Using a process called ;surgery,; we show that one can determine the zeta function of a general loose graph and its associated {Deitmar, Grothendieck}-schemes in a number of steps, eventually reducing the calculation essentially to trees. We study a number of classes of examples of loose graphs, and introduce the Grothendieck ring ofF1-schemes along the way in order to perform the calculations. Finally, we include a computer program for performing more tedious calculations, and compare the new zeta function to Ihara's zeta function for graphs in a number of examples.

  20. Spent-fuel dry-storage testing at E-MAD (March 1978-March 1982)

    Energy Technology Data Exchange (ETDEWEB)

    Unterzuber, R.; Milnes, R.D.; Marinkovich, B.A.; Kubancsek, G.M.

    1982-09-01

    From March 1978 through March 1982, spent fuel dry storage tests were conducted at the Engine Maintenance, Assembly and Disassembly (E-MAD) facility on the Nevada Test Site to confirm that commercial reactor spent fuel could be encapsulated and passively stored in one or more interim dry storage cell concepts. These tests were: electrically heated drywell, isolated and adjacent drywell, concrete silo, fuel assembly internal temperature measurement, and air-cooled vault. This document presents the test data and results as well as results from supporting test operations (spent fuel calorimetry and canister gas sampling).

  1. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  2. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  3. Galilean invariant resummation schemes of cosmological perturbations

    Science.gov (United States)

    Peloso, Marco; Pietroni, Massimo

    2017-01-01

    Many of the methods proposed so far to go beyond Standard Perturbation Theory break invariance under time-dependent boosts (denoted here as extended Galilean Invariance, or GI). This gives rise to spurious large scale effects which spoil the small scale predictions of these approximation schemes. By using consistency relations we derive fully non-perturbative constraints that GI imposes on correlation functions. We then introduce a method to quantify the amount of GI breaking of a given scheme, and to correct it by properly tailored counterterms. Finally, we formulate resummation schemes which are manifestly GI, discuss their general features, and implement them in the so called Time-Flow, or TRG, equations.

  4. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  5. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  6. Graph state-based quantum authentication scheme

    Science.gov (United States)

    Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying

    2017-04-01

    Inspired by the special properties of the graph state, a quantum authentication scheme is proposed in this paper, which is implemented with the utilization of the graph state. Two entities, a reliable party, Trent, as a verifier and Alice as prover are included. Trent is responsible for registering Alice in the beginning and confirming Alice in the end. The proposed scheme is simple in structure and convenient to realize in the realistic physical system due to the use of the graph state in a one-way quantum channel. In addition, the security of the scheme is extensively analyzed and accordingly can resist the general individual attack strategies.

  7. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    . This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC......) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more...

  8. MANAGEMENT BOARD MEETING OF 23 MARCH 2000

    CERN Multimedia

    2000-01-01

    For informationOutcome of the March Meetings of the Scientific Policy Committee, Finance Committee and Committee of CouncilThe Director-General reviewed the highlights of the latest round of Committee meetings held during the week beginning 13 March.The Scientific Policy Committee had heard reports on the Antiproton Decelerator (AD) machine and experiments and had expressed appreciation for the excellent work done in both respects, congratulating all those involved on the progress achieved to date. It had also examined reports on the LHC machine and experiments, the LEP experiments, the Joint Laboratory Directors/ICFA meeting at the Rutherford Appleton Laboratory on 10-11 February, the 'New State of Matter Created at CERN' seminar held at CERN on10 February and the Five-Yearly Review of the Fellows, Associates and Students Programme. In the latter connection, the Committee had held a detailed and extensive discussion of the issues raised in the draft document submitted to it and had made various suggestions f...

  9. March 2017 Arizona thoracic society notes

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2017-03-01

    Full Text Available No abstract available. Article truncated after 150 words. The March 2017 Arizona Thoracic Society meeting was held on Wednesday, March 22, 2017 at the HonorHealth Rehabilitation Hospital beginning at 6:30 PM. This was a dinner meeting with case presentations. There 11 attendance representing the pulmonary, critical care, sleep, thoracic surgery and radiology communities. There was a discussion of supporting the Tobacco 21 bill which had been introduced into the Arizona State Legislature. The bill was assigned to the House Commerce Committee but was not scheduled for a hearing by the Chair-Representative, Jeff Wininger from Chandler. It seems likely that the bill will be reintroduced in the future and the Arizona Thoracic Society will support the bill in the future. Three cases were presented: 1. Dr. Bridgett Ronan presented a 57-year-old man with cough and shortness of breath. His physical examination and spirometry were unremarkable. A thoracic CT scan showed large calcified and noncalcified pleural plaques and mediastinal lymphadenopathy. …

  10. Password authentication scheme based on the quadratic residue problem

    Science.gov (United States)

    Ali, Muhammad Helmi; Ismail, Eddie Shahril

    2017-04-01

    In this paper, we propose a new password-authentication scheme based on quadratic residue problem with the following advantages: the scheme does not require a verification file, and the scheme can withstand replay attacks and resist from the guessing and impersonation attacks. We next discuss the advantages of our designated scheme over other schemes in terms of security and efficiency.

  11. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  12. Designing optimal sampling schemes for field visits

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2008-10-01

    Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...

  13. A Climate Classification Scheme for Habitable Worlds

    Science.gov (United States)

    Byrne, J. F.

    2017-11-01

    This presentation will include an exploration of the internal/external forcings and variability associated with climate using Earth as a reference model in addition to a classification scheme consisting of five categories.

  14. Secure Wake-Up Scheme for WBANs

    Science.gov (United States)

    Liu, Jing-Wei; Ameen, Moshaddique Al; Kwak, Kyung-Sup

    Network life time and hence device life time is one of the fundamental metrics in wireless body area networks (WBAN). To prolong it, especially those of implanted sensors, each node must conserve its energy as much as possible. While a variety of wake-up/sleep mechanisms have been proposed, the wake-up radio potentially serves as a vehicle to introduce vulnerabilities and attacks to WBAN, eventually resulting in its malfunctions. In this paper, we propose a novel secure wake-up scheme, in which a wake-up authentication code (WAC) is employed to ensure that a BAN Node (BN) is woken up by the correct BAN Network Controller (BNC) rather than unintended users or malicious attackers. The scheme is thus particularly implemented by a two-radio architecture. We show that our scheme provides higher security while consuming less energy than the existing schemes.

  15. Renormalization scheme dependence with renormalization group summation

    Science.gov (United States)

    McKeon, D. G. C.

    2015-08-01

    We consider all perturbative radiative corrections to the total e+e- annihilation cross section Re+e- showing how the renormalization group (RG) equation associated with the radiatively induced mass scale μ can be used to sum the logarithmic contributions in two ways. First of all, one can sum leading-log, next-to-leading-log, etc., contributions to Re+e- using in turn the one-loop, two-loop, etc., contributions to the RG function β . A second summation shows how all logarithmic corrections to Re+e- can be expressed entirely in terms of the log-independent contributions when one employs the full β -function. Next, using Stevenson's characterization of any choice of renormalization scheme by the use of the contributions to the β -function arising beyond two-loop order, we examine the RG scheme dependence in Re+e- when using the second way of summing logarithms. The renormalization scheme invariants that arise are then related to the renormalization scheme invariants found by Stevenson. We next consider two choices of the renormalization scheme, one which can be used to express Re+e- solely in terms of two powers of a running coupling, and the second which can be used to express Re+e- as an infinite series in the two-loop running coupling (i.e., a Lambert W -function). In both cases, Re+e- is expressed solely in terms of renormalization scheme invariant parameters that are to be computed by a perturbative evaluation of Re+e-. We then establish how in general the coupling constant arising in one renormalization scheme can be expressed as a power series of the coupling arising in any other scheme. We then establish how, by using a different renormalization mass scale at each order of perturbation theory, all renormalization scheme dependence can be absorbed into these mass scales when one uses the second way of summing logarithmic corrections to Re+e-. We then employ the approach to renormalization scheme dependency that we have applied to Re+e- to a RG summed

  16. Asynchronous Communication Scheme For Hypercube Computer

    Science.gov (United States)

    Madan, Herb S.

    1988-01-01

    Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.

  17. Navigators’ Behavior in Traffic Separation Schemes

    Directory of Open Access Journals (Sweden)

    Zbigniew Pietrzykowski

    2015-03-01

    Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.

  18. Readout scheme of the upgraded ALICE TPC

    CERN Document Server

    Appelshaeuser, Harald; Ivanov, Marian; Lippmann, Christian; Wiechula, Jens

    2016-01-01

    In this document, we present the updated readout scheme for the ALICE TPC Upgrade. Two major design changes are implemented with respect to the concept that was presented in the TPC Upgrade Technical Design Report: – The SAMPA front-end ASIC will be used in direct readout mode. – The ADC sampling frequency will be reduced from 10 to 5 MHz. The main results from simulations and a description of the new readout scheme is outlined.

  19. Dynamic Restarting Schemes for Eigenvalue Problems

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Simon, Horst D.

    1999-03-10

    In studies of restarted Davidson method, a dynamic thick-restart scheme was found to be excellent in improving the overall effectiveness of the eigen value method. This paper extends the study of the dynamic thick-restart scheme to the Lanczos method for symmetric eigen value problems and systematically explore a range of heuristics and strategies. We conduct a series of numerical tests to determine their relative strength and weakness on a class of electronic structure calculation problems.

  20. An explicit MOT-TDVIE scheme for analyzing electromagnetic field interactions on nonlinear scatterers

    KAUST Repository

    Ulku, Huseyin Arda

    2015-02-01

    An explicit marching on-in-time (MOT) based time domain electric field volume integral equation (TDVIE) solver for characterizing electromagnetic wave interactions on scatterers with nonlinear material properties is proposed. Discretization of the unknown electric field intensity and flux density is carried out by half and full Schaubert-Wilton-Glisson basis functions, respectively. Coupled system of spatially discretized TDVIE and the nonlinear constitutive relation between the field intensity and the flux density is integrated in time to compute the samples of the unknowns. An explicit PE(CE)m scheme is used for this purpose. Explicitness allows for \\'easy\\' incorporation of the nonlinearity as a function only to be evaluated on the right hand side of the coupled system of equations. A numerical example that demonstrates the applicability of the proposed MOT scheme to analyzing electromagnetic interactions on Kerr-nonlinear scatterers is presented. © 2015 IEEE.

  1. An explicit marching on-in-time solver for the time domain volume magnetic field integral equation

    KAUST Repository

    Sayed, Sadeed Bin

    2014-07-01

    Transient scattering from inhomogeneous dielectric objects can be modeled using time domain volume integral equations (TDVIEs). TDVIEs are oftentimes solved using marching on-in-time (MOT) techniques. Classical MOT-TDVIE solvers expand the field induced on the scatterer using local spatio-temporal basis functions. Inserting this expansion into the TDVIE and testing the resulting equation in space and time yields a system of equations that is solved by time marching. Depending on the type of the basis and testing functions and the time step, the time marching scheme can be implicit (N. T. Gres, et al., Radio Sci., 36(3), 379-386, 2001) or explicit (A. Al-Jarro, et al., IEEE Trans. Antennas Propag., 60(11), 5203-5214, 2012). Implicit MOT schemes are known to be more stable and accurate. However, under low-frequency excitation, i.e., when the time step size is large, they call for inversion of a full matrix system at very time step.

  2. Science and Technology Review March 2006

    Energy Technology Data Exchange (ETDEWEB)

    Aufderheide, M B

    2006-01-18

    This month's issue has the following articles: (1) Without Fanfare, Technicians Safely Keep the Laboratory Humming--Commentary by Bruce T. Goodwin; (2) These People Make Things Happen--Technicians at Lawrence Livermore, comprising more than 20 percent of the workforce, are essential to research efforts. March 2006; (3) The Shocking Truth about Detonations and Metals--The multichannel x-ray system Hydra records the changes in metals undergoing a high-explosives shock, revealing phenomena not predicted by material models; (4) Floating into Thin Air--High-flying balloon gathers images from x-ray sources that are out of this world; and (5) Carbon Goes Full Cycle in the Amazon--Recent measurements indicate that the Amazon River basin returns carbon to the atmosphere in only 5 years.

  3. March 2014 Arizona thoracic society notes

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2014-04-01

    Full Text Available No abstract available. Article truncated after 150 words. The March 2014 Arizona Thoracic Society meeting was a special meeting. In conjunction with the Valley Fever Center for Excellence and the Arizona Respiratory Center the Eighteenth Annual Farness Lecture was held in the Sonntag Pavilion at St. Joseph's Hospital at 6 PM on Friday, April 4, 2014. The guest speaker was Antonio "Tony" Catanzaro, MD from the University of California San Diego and current president of the Cocci Study Group. There were 57 in attendance representing the pulmonary, critical care, sleep, and infectious disease communities. After opening remarks by Arizona Thoracic Society president, Lewis Wesselius (a former fellow under Dr. Catanzaro at UCSD, John Galgiani, director of the Valley Fever Center for Excellence, gave a brief history of the Farness lecture before introducing Dr. Catanzaro. The lecture is named for Orin J. Farness, a Tucson physician, who was the first to report culture positive coccidioidomycosis (cocci or Valley Fever. ...

  4. Combining image-processing and image compression schemes

    Science.gov (United States)

    Greenspan, H.; Lee, M.-C.

    1995-01-01

    An investigation into the combining of image-processing schemes, specifically an image enhancement scheme, with existing compression schemes is discussed. Results are presented on the pyramid coding scheme, the subband coding scheme, and progressive transmission. Encouraging results are demonstrated for the combination of image enhancement and pyramid image coding schemes, especially at low bit rates. Adding the enhancement scheme to progressive image transmission allows enhanced visual perception at low resolutions. In addition, further progressing of the transmitted images, such as edge detection schemes, can gain from the added image resolution via the enhancement.

  5. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  6. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  7. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  8. Tidd PFBC Demonstration Project. Final report, March 1, 1994--March 30, 1995

    Energy Technology Data Exchange (ETDEWEB)

    Bauer, D.A.; Hoffman, J.D.; Marrocco, M.; Mudd, M.J.; Reinhart, W.P.; Stogran, H.K. [American Electric Power Service Corp., Columbus, OH (United States)

    1995-08-01

    The Tidd Pressurized Fluidized Bed Combustion (PFBC) Demonstration Plant was the first utility-scale pressurized fluidized bed combustor to operate in combined-cycle mode in the US. The 45-year old pulverized coal plant was repowered with PFBC components in order to demonstrate that PFBC combined-cycle technology is an economic, reliable, and environmentally superior alternative to conventional technology in using high-sulfur coal to generate electricity. The three-year demonstration period started on February 28, 1991 and terminated on February 28, 1994. The fourth year of testing started on March 1, 1994 and terminated on March 30, 1995. This report reviews the experience of the 70-MW(e), Tidd PFBC Demonstration Plant during the fourth year of operation.

  9. Western Gas Sands Project. Status report, 1 March 1979--31 March 1979

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-01-01

    Progress of the government-sponsored projects directed toward increasing gas production from low-permeability gas sands of the western United States is summarized. During March, National Laboratories and Energy Technology Centers generally progressed on schedule. Bartlesville Energy Technology Center continued work on fracture conductivity, rock-fluid interaction, and log evaluation techniques. Theoretical and experimental work on hydraulic fracturing mechanics and analysis of well test data continued at Lawrence Livermore Laboratory. Sandia Laboratories completed preparations for the NTS evaluation test of the borehole seismic system. M.D. Wood, Inc. monitored the formation of a hydraulic fracture in the Wattenburg gas field, Weld County, Colorado. Measurement of bottom-hole pressure in the Miller No. 1 and Sprague No. 1 wells for the CIG cyclic gas injection project continued. The Mitchell Energy Corporation Muse--Duke No. 1 was flowing 4,000 MCFD in March. Efforts to clean out Mobil's PCU F31-13G well continued.

  10. METAPHORIC MECHANISMS IN IMAGE SCHEME DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    Pankratova, S.A.

    2017-06-01

    Full Text Available Problems of knowledge representation by means of images are still cognitively significant and invariably modern. The article deals with the image heuristic potential of a bookish sphere as a donor of meanings, aiding metaphoric scheme development of another modern sphere of cinematography. The key factor here is the differentiation between two basically different metaphor types – heuristic epiphora and image diaphora. The author had offered a unique methodology of counting of quantitative parameters of heuristic potential which opens the possibility of modeling the mechanisms of metaphoric meaning development. In the summary the author underscores that both ways of image scheme development are of importance to cognitive science, both heuristic epiphora and image-based diaphora play a significant role in the explication of image scheme development.

  11. IPCT: A scheme for mobile authentication

    Directory of Open Access Journals (Sweden)

    Vishnu Shankar

    2016-09-01

    Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.

  12. Tradable white certificate schemes : what can we learn from tradable green certificate schemes?

    NARCIS (Netherlands)

    Oikonomou, Vlasis; Mundaca, Luis

    In this paper, we analyze the experiences gained from tradable green certificate (TGC) schemes and extract some policy lessons that can lead to a successful design of a market-based approach for energy efficiency improvement, alias tradable white certificate schemes. We use tradable green

  13. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  14. Carbon trading: Current schemes and future developments

    Energy Technology Data Exchange (ETDEWEB)

    Perdan, Slobodan, E-mail: slobodan.perdan@manchester.ac.uk [School of Chemical Engineering and Analytical Science, Room F30, The Mill, University of Manchester, Sackville Street, Manchester M13 9PL (United Kingdom); Azapagic, Adisa [School of Chemical Engineering and Analytical Science, Room F30, The Mill, University of Manchester, Sackville Street, Manchester M13 9PL (United Kingdom)

    2011-10-15

    This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: > The paper provides an extensive overview of mandatory emissions trading schemes around the world. > Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. > The expansion requires considerable technical fixes and harmonisation of different trading systems. > Clear policy signals, political support and a stable economic environment are needed for the expansion. > A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.

  15. Pseudo-time-reversal symmetry and topological edge states in two-dimensional acoustic crystals

    KAUST Repository

    Mei, Jun

    2016-09-02

    We propose a simple two-dimensional acoustic crystal to realize topologically protected edge states for acoustic waves. The acoustic crystal is composed of a triangular array of core-shell cylinders embedded in a water host. By utilizing the point group symmetry of two doubly degenerate eigenstates at the Î

  16. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  17. An Elaborate Secure Quantum Voting Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-10-01

    An elaborate secure quantum voting scheme is presented in this paper. It is based on quantum proxy blind signature. The eligible voter's voting information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Charlie's supervision in the whole voting process can make the protocol satisfy fairness and un-repeatability so as to avoid Bob's dishonest behaviour. Our scheme uses the physical characteristics of quantum mechanics to achieve voting, counting and immediate supervision. In addition, the program also uses quantum key distribution protocol and quantum one-time pad to guarantee its unconditional security.

  18. A COMPLETE SCHEME FOR A MUON COLLIDER.

    Energy Technology Data Exchange (ETDEWEB)

    PALMER,R.B.; BERG, J.S.; FERNOW, R.C.; GALLARDO, J.C.; KIRK, H.G.; ALEXAHIN, Y.; NEUFFER, D.; KAHN, S.A.; SUMMERS, D.

    2007-09-01

    A complete scheme for production, cooling, acceleration, and ring for a 1.5 TeV center of mass muon collider is presented, together with parameters for two higher energy machines. The schemes starts with the front end of a proposed neutrino factory that yields bunch trains of both muon signs. Six dimensional cooling in long-period helical lattices reduces the longitudinal emittance until it becomes possible to merge the trains into single bunches, one of each sign. Further cooling in all dimensions is applied to the single bunches in further helical lattices. Final transverse cooling to the required parameters is achieved in 50 T solenoids.

  19. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC...

  20. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  1. Droop Scheme With Consideration of Operating Costs

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede

    2014-01-01

    considered even though they are different for different types of DGs. This letter thus proposes an alternative droop scheme, which can better distinguish the different operating characteristics and objectives of the DGs grouped together in a weighted droop expression. The power sharing arrived in the steady......Although many droop schemes have been proposed for distributed generator (DG) control in a microgrid, they mainly focus on achieving proportional power sharing based on the DG kVA ratings. Other factors like generation costs, efficiencies, and emission penalties at different loads have not been...

  2. March 2013 critical care journal club

    Directory of Open Access Journals (Sweden)

    Stander P

    2013-04-01

    Full Text Available No abstract available. Article truncated at 150 words. Brill S. Bitter Pill: Why Medical Bills Are Killing Us. Time. February 20, 2013. PDF available at: http://livingwithmcl.com/BitterPill.pdf (accessed 4/2/13. Editor’s Note: We had a special journal club in March. First, we reviewed an article from Time magazine rather than a traditional medical journal. Second, Paul Stander MD, the chief medical officer at Banner Good Samaritan Regional Medical Center, led the discussion and agreed to author the journal club. This seemed appropriate since much of the article focuses on overbilling and administrative costs of care. The recent lengthy cover story article in Time Magazine described in great deal what many of us practicing physicians have realized for a long time – our health care system is highly dysfunctional and much of that dysfunction is a result of an arcane and outmoded financing mechanism. This payment system has a litany of perverse incentives that encourage wasteful and often ineffective care while not …

  3. Stellarator News, Issue 38, March 1995

    CERN Document Server

    Rome, J A

    1995-01-01

    Stellarator News, an international journal of the stellarator community, is Published by Fusion Energy Division, Oak Ridge National Laboratory, James A. Rome, Editor In the March 1995 issue . . . **** Exerpts from the U.S. Congress Office of Technology Assment report on TPX and Alternate Concepts. **** Edge transport and turbulence studies on U-3M The turbulent-driven particle flow is shown to be comparable with the equilibrium flow at the boundary of the configuration under Alfven-heating conditions in the U-3M torsatron. **** Topological aspects of island divertor studies on W7-AS The structure of the edge plasma in W7-AS, observed with probes, television camera, and H-alpha light agrees at low beta with vacuum field calculations: the low-valued resonances at iotabar=5/m are resolved for m = 8 to 11; external perturbations are not significant at the edge, even for iotabar = 5/10. **** 140-GHz second harmonic O-mode electron cyclotron heating at W7-AS First experimental results are presented of 140-GHz secon...

  4. XL Vavilov readings (30 March 2016)

    Science.gov (United States)

    2016-12-01

    The XL Vavilov readings celebrating 125th anniversary of the birth of Academician S I Vavilov were held in the conference hall of the Lebedev Physical Institute of the Russian Academy of Sciences (RAS) on 30 March 2016. The following reports were heard at the readings: (1) A G Vitukhnovsky (Lebedev Physical Institute, Russian Academy of Sciences, Moscow) "Vavilov and FIAN: a perspective from 2016"; (2) V F Razumov (Institute of Problems of Chemical Physics, Russian Academy of Sciences, Chernogolovka, Moscow region), "Fundamental and applied aspects of luminescence of colloidal quantum dots"; (3) Kazaryan M A (Lebedev Physical Institute, Russian Academy of Sciences, Moscow) "Luminescence and the efficiency of ion dispersion by lasers". Papers written on the basis of oral presentations 1 and 2 are published below. • Vavilov and FIAN: a perspective from 2016, A G Vitukhnovsky Physics-Uspekhi, 2016, Volume 59, Number 12, Pages 1250-1257 • Fundamental and applied aspects of luminescence of colloidal quantum dots, V F Razumov Physics-Uspekhi, 2016, Volume 59, Number 12, Pages 1258-1265

  5. CERN Library | Agnes Chavez @ CERN | 17 March

    CERN Multimedia

    2015-01-01

    Agnes Chavez will present her work on Tuesday, 17 March 2015 at 4 p.m. in the Library (Builidng. 52-1-052) Coffee will be served from 3.30 p.m.   Agnes Chavez is an artist and educator participating in a two-week research stay organised by the ATLAS Experiment at CERN. Chavez is using the stay to develop her art and education project, Projecting pARTicles, which will be exploring particle physics through projection art. Chavez experiments with data visualization, sound and projection art to create participatory environments. She collaborates with programmers to create algorithmic drawings projected on to buildings, walls and spaces. This work explores our relationship with nature and technology, and how these and other sensory experiences determine how we perceive and interpret the world around us. For the Projecting pARTicles series she has formed an interdisciplinary team of programmers, artists, scientists and educators to investigate how we can create art and education interventions inspire...

  6. Safety Training: places available in March

    CERN Multimedia

    HSE Unit

    2012-01-01

    There are places available in the forthcoming Safety courses. For updates and registrations, please refer to the Safety Training Catalogue. MARCH 2012 (alphabetical order, titles of courses in the original language) Echafaudages, réception et conformité (Scaffolding, reception and conformity): From 29-FEB-12 to 02-MAR-12, 09.00 – 17.30, in French (in Domarin, dept. 38) Laser Users : 09-MAR-12, 09.00 – 12.30, in English Self-Rescue Mask training : 08-MAR-12, 08.30 – 10.00, in French 08-MAR-12, 10.30 – 12.00, in English 13-MAR-12, 08.30 – 10.00, in French 13-MAR-12, 10.30 – 12.00, in English 20-MAR-12, 08.30 – 10.00, in French 20-MAR-12, 10.30 – 12.00, in English 22-MAR-12, 08.30 – 10.00, in French 22-MAR-12, 10.30 – 12.00, , in English 27-MAR-12, 08.30 – 10.00, in French 27-MAR-12, 10.30 – 12.00, in English Habilitation électrique pour Electriciens en b...

  7. LLE Review 98 (January-March 2004)

    Energy Technology Data Exchange (ETDEWEB)

    Goncharov, V.N.

    2004-08-10

    This volume of the LLE Review, covering January-March 2004, features ''Performance of 1-THz-Bandwidth, 2-D Smoothing by Spectral Dispersion and Polarization Smoothing of High-Power, Solid-State Laser Beams'', by S. P. Regan, J. A. Marozas, R. S. Craxton, J. H. Kelly, W. R. Donaldson, P. A. Jaanimagi, D. Jacobs-Perkins, R. L. Keck, T. J. Kessler, D. D. Meyerhofer, T. C. Sangster, W. Seka, V.A. Smalyuk, S. Skupsky, and J. D. Zuegel (p. 49). Laser-beam smoothing achieved with 1-THz-bandwidth, two-dimensional smoothing by spectral dispersion and polarization smoothing on the 60-beam, 30-kJ, 351-nm OMEGA laser system is reported. These beam-smoothing techniques are directly applicable to direct-drive ignition target designs for the 192-beam, 1.8-MJ, 351-nm National Ignition Facility. Equivalent-target-plane images for constant-intensity laser pulses of varying duration were used to determine the smoothing. The properties of the phase plates, frequency modulators, and birefringent wedges were simulated and found to be in good agreement with the measurements.

  8. Safety Training: places available in March 2013

    CERN Multimedia

    Isabelle Cusato, HSE Unit

    2013-01-01

    There are places available in the forthcoming Safety courses. For updates and registration, please refer to the Safety Training Catalogue.   March 2013 (alphabetical order) Conduite de plates-formes élévatrices mobiles de personnel (PEMP) (cherry-picker driving) 18-MAR-13 to 19-MAR-13, 8.30 – 17.30, in French with handouts in English First-Aiders – Basic course 14-MAR-13, 8.15 – 17.30, in French 21-MAR-13, 8.15 – 17.30, in English 28-MAR-13, 8.15 – 17.30, in French Habilitation électrique personnel électricien basse et haute tension (habilitation électrique for electricians in low and high voltage) 11-MAR-13 to 22-MAR-13 (total hours : 32), 9.00 – 17.30, in English Habilitation électrique personnel non électricien (electrical habilitation for non electricians) 27-MAR-13 to 28-MAR-13, 9.00 – 17.30, in French Habilitation électrique perso...

  9. Safety Training: places available in March 2014

    CERN Multimedia

    Safety Training team, HSE Unit

    2014-01-01

    There are places available in the forthcoming Safety courses. For updates and registrations, please refer to the Safety Training Catalogue (see here).   March 2014 (alphabetical order) Ergonomics - Worksite and Workshop 24-MAR-14, 9.00 – 17.30, in French Fire Extinguisher 05-MAR-14, 10.30 – 12.00, in French 12-MAR-14, 8.30 – 10.00, in English 12-MAR-14, 10.30 – 12.00, in English First Aider - Level 1 – Initial 27-MAR-14, 8.30 – 17.30, in English First Aider – Refresher 20-MAR-14, 8.30 – 12.30, in French 20-MAR-14, 13.30 – 17.30, in French Habilitation électrique - Electrician Low Voltage – Initial 17-MAR-14 to 19-MAR-14, 9.00 – 17.30, in French 24-MAR-14 to 26-MAR-14, 9.00 – 17.30, in English Habilitation électrique - Electrician Low and High Voltage – Initial 18-MAR-14 to 21-MAR-14, 9.00 – 17.30, in English Habilitation &eacut...

  10. Safety Training: scheduled sessions in March

    CERN Multimedia

    DGS Unit

    2011-01-01

    The following training courses are scheduled in March. You can find the full Safety Training programme on the Safety Training online catalogue. If you are interested in attending any of the below courses, please talk to your supervisor, then apply electronically via EDH from the course description pages, by clicking on SIGN-UP. Registration for all courses is always open – sessions for the less-requested courses are organized on a demand-basis only. Depending on the demand, a session will be organised later in the year. Biocell Training 08-MAR-11 (08.30 – 10.00) in English 08-MAR-11 (10.30 – 12.00) in French 15-MAR-11 (08.30 – 10.00) in French 15-MAR-11 (10.30 – 12.00) in French 17-MAR-11 (08.30 – 10.00) in English 17-MAR-11 (10.30 – 12.00) in English 22-MAR-11 (08.30 – 10.00) in French 22-MAR-11 (10.30 – 12.00) in French 24-MAR-11 (08.30 – 10.00) in French 24-MAR-11 (10.30 – 12.00) in French 29-MAR...

  11. Environmental Management Performance Report March 2000

    Energy Technology Data Exchange (ETDEWEB)

    EDER, D.M.

    2000-03-16

    The purpose of this report is to provide the Department of Energy Richland Operations Office (DOE-RL) a report of the Project Hanford Management Contractors' (PHMC) Environmental Management (EM) performance by Fluor Hanford (FH) and its subcontractors. This report is a monthly publication that summarizes the PHMC EM performance. In addition, it includes some PHMC-level data not detailed elsewhere in the report. Section A, Executive Summary, provides an executive level summary of the cost, schedule, and technical performance described in this report. It summarizes performance for the period covered, highlights areas worthy of management attention, and provides a forward look to some of the upcoming key performance activities as extracted from the PHMC baseline. The remaining sections provide detailed performance data relative to each individual mission area (e.g., Waste Management, Spent Nuclear fuels , etc.), in support of Section A of the report. A glossary of terms is provided at the end of this report for reference purposes. Unless otherwise noted, the Safety, Conduct of Operations, and Cost/schedule data contained herein is as of January 31, 2000. All other information is as of March 1, 2000.

  12. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2014-12-01

    Dec 1, 2014 ... Abstract. We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit ...

  13. Finite-fault analysis of the 1979 March 14 Petatlan, Mexico, earthquake using teleseismic P waveforms

    Science.gov (United States)

    Mendoza, C.

    1995-01-01

    Vertical, teleseismic P waves recorded for the 1979 March 14 Petatlan, Mexico, earthquake were used to derive the distribution of coseismic slip using a linear finite-fault inversion scheme that solves for the amount of slip in each of a series of consecutive time windows. The coseismic slip inferred from the P waves shows a small 70 cm peak near the earthquake hypocentre and a large zone of dislocation (1.2 m maximum) further south-east. The slip pattern covers depths from 3 to 25 km and is located south-east of other recent large interplate ruptures on the Michoacan segment of the Mexican subduction zone. This result indicates that the 1979 Petatlan earthquake broke an independent, adjacent portion of the Cocos-North America plate boundary. -from Author

  14. Marching-on-in-Degree Time-Domain Integral Equation Solver for Transient Electromagnetic Analysis of Graphene

    Directory of Open Access Journals (Sweden)

    Quanquan Wang

    2017-10-01

    Full Text Available The marching-on-in-degree (MOD time-domain integral equation (TDIE solver for the transient electromagnetic scattering of the graphene is presented in this paper. Graphene’s dispersive surface impedance is approximated using rational function expressions of complex conjugate pole-residue pairs with the vector fitting (VF method. Enforcing the surface impedance boundary condition, TDIE is established and solved in the MOD scheme, where the temporal surface impedance is carefully convoluted with the current. Unconditionally stable transient solution in time domain can be ensured. Wide frequency band information is obtained after the Fourier transform of the time domain solution. Numerical results validate the proposed method.

  15. Creating Culturally Sustainable Agri-Environmental Schemes

    Science.gov (United States)

    Burton, Rob J. F.; Paragahawewa, Upananda Herath

    2011-01-01

    Evidence is emerging from across Europe that contemporary agri-environmental schemes are having only limited, if any, influence on farmers' long-term attitudes towards the environment. In this theoretical paper we argue that these approaches are not "culturally sustainable," i.e. the actions are not becoming embedded within farming…

  16. Pay-what-you-want pricing schemes

    DEFF Research Database (Denmark)

    Kahsay, Goytom Abraha; Samahita, Margaret

    Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular in a wide range of industries. We develop a model incorporating self-image into the buyer's utility function and introduce heterogeneity in consumption utility and image-sensitivity, which generates different purchase...

  17. Enhancing Cooperative Loan Scheme Through Automated Loan ...

    African Journals Online (AJOL)

    Enhancing Cooperative Loan Scheme Through Automated Loan Management System. ... Financial transactions through manual system of operation are prone to errors and unimagined complexities, making it so difficult a task maintaining all entries of users account, search records of activities, handle loan deduction errors ...

  18. Geometrical and frequential watermarking scheme using similarities

    Science.gov (United States)

    Bas, Patrick; Chassery, Jean-Marc; Davoine, Franck

    1999-04-01

    Watermarking schemes are more and more robust to classical degradations. The NEC system developed by Cox, using both original and marked images, can detect the mark with a JPEG compression ratio of 30. Nevertheless a very simple geometric attack done by the program Stirmark can remove the watermark. Most of the present watermarking schemes only map a mark on the image without geometric reference and therefore are not robust to geometric transformation. We present a scheme based on the modification of a collage map (issued from a fractal code used in fractal compression). We add a mark introducing similarities in the image. The embedding of the mark is done by selection of points of interest supporting blocks on which similarities are hided. This selection is done by the Stephens-Harris detector. The similarity is embedded locally to be robust to cropping. Contrary to many schemes, the reference mark used for the detection comes from the marked image and thus undergoes geometrical distortions. The detection of the mark is done by searching interest blocks and their similarities. It does not use the original image and the robustness is guaranteed by a key. Our first results show that the similarities-based watermarking is quite robust to geometric transformation such as translations, rotations and cropping.

  19. The Partners in Flight species prioritization scheme

    Science.gov (United States)

    William C. Hunter; Michael F. Carter; David N. Pashley; Keith Barker

    1993-01-01

    The prioritization scheme identifies those birds at any locality on several geographic scales most in need of conservation action. Further, it suggests some of those actions that ought to be taken. Ranking criteria used to set priorities for Neotropical migratory landbirds measure characteristics of species that make them vulnerable to local and global extinction....

  20. Shanghai : Developing a Green Electricity Scheme

    OpenAIRE

    Heijndermans, Enno; Berrah, Noureddine; Crowdis, Mark D.

    2006-01-01

    This report documents the experience of developing a green electricity scheme in Shanghai, China. It is intended to be a resource when replicating this effort in another city or country. The study consists of two parts. In Part 1, the general characteristics of both the framework for green electricity products and the market for green electricity products are presented. It also presents a ...

  1. EXPERIMENTAL EVALUATION OF LIDAR DATA VISUALIZATION SCHEMES

    Directory of Open Access Journals (Sweden)

    S. Ghosh

    2012-07-01

    Full Text Available LiDAR (Light Detection and Ranging has attained the status of an industry standard method of data collection for gathering three dimensional topographic information. Datasets captured through LiDAR are dense, redundant and are perceivable from multiple directions, which is unlike other geospatial datasets collected through conventional methods. This three dimensional information has triggered an interest in the scientific community to develop methods for visualizing LiDAR datasets and value added products. Elementary schemes of visualization use point clouds with intensity or colour, triangulation and tetrahedralization based terrain models draped with texture. Newer methods use feature extraction either through the process of classification or segmentation. In this paper, the authors have conducted a visualization experience survey where 60 participants respond to a questionnaire. The questionnaire poses six different questions on the qualities of feature perception and depth for 12 visualization schemes. The answers to these questions are obtained on a scale of 1 to 10. Results are thus presented using the non-parametric Friedman's test, using post-hoc analysis for hypothetically ranking the visualization schemes based on the rating received and finally confirming the rankings through the Page's trend test. Results show that a heuristic based visualization scheme, which has been developed by Ghosh and Lohani (2011 performs the best in terms of feature and depth perception.

  2. The data cyclotron query processing scheme

    NARCIS (Netherlands)

    R.A. Goncalves (Romulo); M.L. Kersten (Martin)

    2010-01-01

    htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot

  3. Value constraints in the CLP scheme

    NARCIS (Netherlands)

    M.H. van Emden

    1996-01-01

    textabstractThis paper addresses the question of how to incorporate constraint propagation into logic programming. A likely candidate is the CLP scheme, which allows one to exploit algorithmic opportunities while staying within logic programming semantics. CLP($cal R$) is an example: it combines

  4. Benefit Reentitlement Conditions in Unemployment Insurance Schemes

    DEFF Research Database (Denmark)

    Andersen, Torben M.; Christoffersen, Mark Strøm; Svarer, Michael

    Unemployment insurance schemes include conditions on past employment history as part of the eligibility conditions. This aspect is often neglected in the literature which primarily focuses on benefit levels and benefit duration. In a search-matching framework we show that benefit duration and emp...

  5. External quality assessment schemes for toxicology.

    Science.gov (United States)

    Wilson, John

    2002-08-14

    A variety of external quality assurance (EQA) schemes monitor quantitative performance for routine biochemical analysis of agents such as paracetamol, salicylate, ethanol and carboxyhaemoglobin. Their usefulness for toxicologists can be lessened where the concentrations monitored do not extend fully into the toxic range or where the matrix is synthetic, of animal origin or serum as opposed to whole human blood. A scheme for quantitative determinations of a wider range of toxicological analytes such as opioids, benzodiazepines and tricyclics in human blood has been piloted by the United Kingdom National External Quality Assessment Scheme (UKNEQAS). Specialist schemes are available for drugs of abuse testing in urine and for hair analysis. Whilst these programmes provide much useful information on the performance of analytical techniques, they fail to monitor the integrated processes that are needed in investigation of toxicological cases. In practice, both qualitative and quantitative tests are used in combination with case information to guide the evaluation of the samples and to develop an interpretation of the analytical findings that is used to provide clinical or forensic advice. EQA programs that combine the analytical and interpretative aspects of case studies are available from EQA providers such as UKNEQAS and the Dutch KKGT program (Stichting Kwaliteitsbewaking Klinische Geneesmiddelanalyse en Toxicologie).

  6. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  7. Voluntary Certification Schemes and Legal Minimum Standards

    NARCIS (Netherlands)

    Herzfeld, T.; Jongeneel, R.A.

    2012-01-01

    EU farmers face increasing requests to comply with legal as well as private agribusiness and retail standards. Both requests potentially raise farmer’s administrative burden. This paper discusses the potential synergies between cross-compliance and third-party certification schemes. In selected

  8. Traffic calming schemes : opportunities and implementation strategies.

    NARCIS (Netherlands)

    Schagen, I.N.L.G. van (ed.)

    2003-01-01

    Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and

  9. A Presuppositional Approach to Conceptual Schemes | Wang ...

    African Journals Online (AJOL)

    ; for they have been focused too much on the truth-conditional notions of meaning/concepts and translation/interpretation in Tarski's style. It is exactly due to such a Quinean interpretation of the notion of conceptual schemes that the very notion ...

  10. Observations and comments on the classification schemes ...

    African Journals Online (AJOL)

    Reviews of the classification schemes proposed by various geologists are basically similar. However, general discrepancies, inconsistencies and contradictions in the stratigraphic positions of some of the rock units have been observed, as well as terminologies to describe rock units which are inconsistent with stratigraphic ...

  11. The Arctic Vortex in March 2011: A Dynamical Perspective

    Science.gov (United States)

    Hurwitz, Margaret M.; Newman, Paul A.; Garfinkel,Chaim I.

    2011-01-01

    Despite the record ozone loss observed in March 2011, dynamical conditions in the Arctic stratosphere were unusual but not unprecedented. Weak planetary wave driving in February preceded cold anomalies in t he polar lower stratosphere in March and a relatively late breakup of the Arctic vortex in April. La Nina conditions and the westerly phas e of the quasi-biennial oscillation (QBO) were observed in March 201 1. Though these conditions are generally associated with a stronger vortex in mid-winter, the respective cold anomalies do not persist t hrough March. Therefore, the La Nina and QBO-westerly conditions cannot explain the observed cold anomalies in March 2011. In contrast, po sitive sea surface temperature anomalies in the North Pacific may ha ve contributed to the unusually weak tropospheric wave driving and s trong Arctic vortex in late winter 2011.

  12. Energy decomposition scheme based on the generalized Kohn-Sham scheme.

    Science.gov (United States)

    Su, Peifeng; Jiang, Zhen; Chen, Zuochang; Wu, Wei

    2014-04-03

    In this paper, a new energy decomposition analysis scheme based on the generalized Kohn-Sham (GKS) and the localized molecular orbital energy decomposition analysis (LMO-EDA) scheme, named GKS-EDA, is proposed. The GKS-EDA scheme has a wide range of DFT functional adaptability compared to LMO-EDA. In the GKS-EDA scheme, the exchange, repulsion, and polarization terms are determined by DFT orbitals; the correlation term is defined as the difference of the GKS correlation energy from monomers to supermolecule. Using the new definition, the GKS-EDA scheme avoids the error of LMO-EDA which comes from the separated treatment of EX and EC functionals. The scheme can perform analysis both in the gas and in the condensed phases with most of the popular DFT functionals, including LDA, GGA, meta-GGA, hybrid GGA/meta-GGA, double hybrid, range-separated (long-range correction), and dispersion correction. By the GKS-EDA scheme, the DFT functionals assessment for hydrogen bonding, vdW interaction, symmetric radical cation, charge-transfer, and metal-ligand interaction is performed.

  13. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  14. Electricity storage using a thermal storage scheme

    Science.gov (United States)

    White, Alexander

    2015-01-01

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on "sensible heat" storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  15. Liver Tumor Segmentation from MR Images Using 3D Fast Marching Algorithm and Single Hidden Layer Feedforward Neural Network

    Directory of Open Access Journals (Sweden)

    Trong-Ngoc Le

    2016-01-01

    Full Text Available Objective. Our objective is to develop a computerized scheme for liver tumor segmentation in MR images. Materials and Methods. Our proposed scheme consists of four main stages. Firstly, the region of interest (ROI image which contains the liver tumor region in the T1-weighted MR image series was extracted by using seed points. The noise in this ROI image was reduced and the boundaries were enhanced. A 3D fast marching algorithm was applied to generate the initial labeled regions which are considered as teacher regions. A single hidden layer feedforward neural network (SLFN, which was trained by a noniterative algorithm, was employed to classify the unlabeled voxels. Finally, the postprocessing stage was applied to extract and refine the liver tumor boundaries. The liver tumors determined by our scheme were compared with those manually traced by a radiologist, used as the “ground truth.” Results. The study was evaluated on two datasets of 25 tumors from 16 patients. The proposed scheme obtained the mean volumetric overlap error of 27.43% and the mean percentage volume error of 15.73%. The mean of the average surface distance, the root mean square surface distance, and the maximal surface distance were 0.58 mm, 1.20 mm, and 6.29 mm, respectively.

  16. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  17. Annual Report of Drug and Poison Information in Iran From March 2012 to March 2013

    Directory of Open Access Journals (Sweden)

    Talat Ghane

    2016-09-01

    Full Text Available Drug and Poison Information Centers (DPICs have a critical role in the fulfillment of rational drug use programs and provide services to the scientific community with the aim of improving the health and safety of drug use. This was a retrospective study on recorded calls of DPICs in Iran from March 2012 to March 2013. Data consisted of general information; drug and poisoning information, medical history and also the distribution of a number of calls collected by DPICs in Iran. The centers received a total of 171769 calls. Most calls were made by the patients (56.1% and then the patients’ relatives (38%. Also, 67% of the patients were determined as female. The calls mostly were focused on Adverse Drug Reactions (ADR (15.3%, indications (14.0% and drug evaluations (11.8%. Anti-infective agents, non-steroidal anti-inflammatory drugs (NSAIDs and vitamins with 9.6%, 7%, and 6.8% frequencies were the highest frequently asked questions, respectively. Based on the results, patients do not receive enough information about their medications, from physicians and pharmacists. The DPICs have an important role to guide the people and provide the accurate drug and poison information and fill the absence of information that is not provided by medical staff. So, based on the important role of these centers, it is worth the Iran DPICs being introduced more to people, and we need more advertising around the country.

  18. Workshop proceedings : Emergency preparedness and response : March 4, 2003 (Grande Prairie) and March 6, 2003 (Calgary)

    Energy Technology Data Exchange (ETDEWEB)

    Hunt, K. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Gibson, T. [Gecko Management Consultants, Calgary, AB (Canada)

    2003-03-01

    Several issues had been identified during the stakeholder consultation program for Guide 71: Emergency Preparedness and Response Requirements For the Upstream Petroleum Industry, and the Alberta Energy and Utilities Board (EUB) conducted, in May 2002, a workshop to address these issues. In addition, two subsequent workshops were held, one in Grande Prairie on March 4, 2003, and another in Calgary on March 6, 2003. They were held to gather additional information concerning the requirements for testing and exercising emergency preparedness and response capabilities for sour gas facilities. Representatives from a variety of organizations were present, including: energy companies, Emergency Management Alberta, local municipalities, Alberta Health and Wellness and Regional Health Authorities, general public, other regulators, as well as emergency response planning consultants. Special emphasis was placed on the following topics in support of Public Safety and Sour Gas Provincial Advisory Committee recommendations: exercise criteria, EUB participation, and the role of the public in the exercises. The present document contains the opening slide presentation to the workshops, a list of attendees, notes taken throughout the course of the workshops, as well as the written submission from the City of Calgary, Disaster Services.

  19. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  20. Simple and High-Accurate Schemes for Hyperbolic Conservation Laws

    Directory of Open Access Journals (Sweden)

    Renzhong Feng

    2014-01-01

    Full Text Available The paper constructs a class of simple high-accurate schemes (SHA schemes with third order approximation accuracy in both space and time to solve linear hyperbolic equations, using linear data reconstruction and Lax-Wendroff scheme. The schemes can be made even fourth order accurate with special choice of parameter. In order to avoid spurious oscillations in the vicinity of strong gradients, we make the SHA schemes total variation diminishing ones (TVD schemes for short by setting flux limiter in their numerical fluxes and then extend these schemes to solve nonlinear Burgers’ equation and Euler equations. The numerical examples show that these schemes give high order of accuracy and high resolution results. The advantages of these schemes are their simplicity and high order of accuracy.

  1. Aquatic environment as an occupational therapeutic scenario for the development of body scheme in Down syndrome

    Directory of Open Access Journals (Sweden)

    Chrystiane Maria Veras Pôrto

    2010-12-01

    Full Text Available Objective: To assess the effect of aquatic environment while an occupational therapeutic scenario in the development of body scheme of a child with Down Syndrome, considering the therapeutic properties of water. Description of the case: An interventionist research, with a qualitative and descriptive approach, conducted in an adapted pool of the Núcleo de Atenção Médica Integrada (NAMI of Fortaleza University (UNIFOR, Ceara, during the period of March to May, 2005. The subject of the study was a female child, aged 10 years old, diagnosed with Down Syndrome. Data collection had as instruments an interview guide for anamnesis, an evaluation form of psychomotor development, besides a field diary to record clinical observations during the sessions. This information was organized and analyzed based on clinical reasoning of occupational therapists and then described as a case study. We observed an evolution in the development of skills related to body scheme, such as the perception of fine parts of her own body, as well as large parts in someone else’s body, the imitation of positions, finishing with more active participation in activities of daily living. Final Considerations: We verified the effectiveness of occupational therapeutic activities conducted in aquatic environment for the development of the body scheme of the child in the study. This may be useful for conducting further research on the subject – whose literature is scarce – and contributing to the crescent update of occupational therapy practices.

  2. Transverse Hilbert schemes and completely integrable systems

    Directory of Open Access Journals (Sweden)

    Donin Niccolò Lora Lamia

    2017-12-01

    Full Text Available In this paper we consider a special class of completely integrable systems that arise as transverse Hilbert schemes of d points of a complex symplectic surface S projecting onto ℂ via a surjective map p which is a submersion outside a discrete subset of S. We explicitly endow the transverse Hilbert scheme Sp[d] with a symplectic form and an endomorphism A of its tangent space with 2-dimensional eigenspaces and such that its characteristic polynomial is the square of its minimum polynomial and show it has the maximal number of commuting Hamiltonians.We then provide the inverse construction, starting from a 2ddimensional holomorphic integrable system W which has an endomorphism A: TW → TW satisfying the above properties and recover our initial surface S with W ≌ Sp[d].

  3. A hybrid Lagrangian Voronoi-SPH scheme

    Science.gov (United States)

    Fernandez-Gutierrez, D.; Souto-Iglesias, A.; Zohdi, T. I.

    2017-11-01

    A hybrid Lagrangian Voronoi-SPH scheme, with an explicit weakly compressible formulation for both the Voronoi and SPH sub-domains, has been developed. The SPH discretization is substituted by Voronoi elements close to solid boundaries, where SPH consistency and boundary conditions implementation become problematic. A buffer zone to couple the dynamics of both sub-domains is used. This zone is formed by a set of particles where fields are interpolated taking into account SPH particles and Voronoi elements. A particle may move in or out of the buffer zone depending on its proximity to a solid boundary. The accuracy of the coupled scheme is discussed by means of a set of well-known verification benchmarks.

  4. Cryptanalysis of Two Fault Countermeasure Schemes

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey

    2015-01-01

    is meant for the protection of block ciphers like AES. The second countermeasure was proposed in IEEE-HOST 2015 and protects the Grain-128 stream cipher. The design divides the output function used in Grain-128 into two components. The first called the masking function, masks the input bits to the output...... use the internally generated random bits which make these designs vulnerable. We will outline attacks that cryptanalyze the above schemes using 66 and 512 faults respectively....... function with some additional randomness and computes the value of the function. The second called the unmasking function, is computed securely using a different register and undoes the effect of the masking with random bits. We will show that there exists a weakness in the way in which both these schemes...

  5. Fixed Wordsize Implementation of Lifting Schemes

    Directory of Open Access Journals (Sweden)

    Tanja Karp

    2007-01-01

    Full Text Available We present a reversible nonlinear discrete wavelet transform with predefined fixed wordsize based on lifting schemes. Restricting the dynamic range of the wavelet domain coefficients due to a fixed wordsize may result in overflow. We show how this overflow has to be handled in order to maintain reversibility of the transform. We also perform an analysis on how large a wordsize of the wavelet coefficients is needed to perform optimal lossless and lossy compressions of images. The scheme is advantageous to well-known integer-to-integer transforms since the wordsize of adders and multipliers can be predefined and does not increase steadily. This also results in significant gains in hardware implementations.

  6. New communication schemes based on adaptive synchronization.

    Science.gov (United States)

    Yu, Wenwu; Cao, Jinde; Wong, Kwok-Wo; Lü, Jinhu

    2007-09-01

    In this paper, adaptive synchronization with unknown parameters is discussed for a unified chaotic system by using the Lyapunov method and the adaptive control approach. Some communication schemes, including chaotic masking, chaotic modulation, and chaotic shift key strategies, are then proposed based on the modified adaptive method. The transmitted signal is masked by chaotic signal or modulated into the system, which effectively blurs the constructed return map and can resist this return map attack. The driving system with unknown parameters and functions is almost completely unknown to the attackers, so it is more secure to apply this method into the communication. Finally, some simulation examples based on the proposed communication schemes and some cryptanalysis works are also given to verify the theoretical analysis in this paper.

  7. Optimization of Train Trip Package Operation Scheme

    Directory of Open Access Journals (Sweden)

    Lu Tong

    2015-01-01

    Full Text Available Train trip package transportation is an advanced form of railway freight transportation, realized by a specialized train which has fixed stations, fixed time, and fixed path. Train trip package transportation has lots of advantages, such as large volume, long distance, high speed, simple forms of organization, and high margin, so it has become the main way of railway freight transportation. This paper firstly analyzes the related factors of train trip package transportation from its organizational forms and characteristics. Then an optimization model for train trip package transportation is established to provide optimum operation schemes. The proposed model is solved by the genetic algorithm. At last, the paper tests the model on the basis of the data of 8 regions. The results show that the proposed method is feasible for solving operation scheme issues of train trip package.

  8. A numerical relativity scheme for cosmological simulations

    Science.gov (United States)

    Daverio, David; Dirian, Yves; Mitsou, Ermis

    2017-12-01

    Cosmological simulations involving the fully covariant gravitational dynamics may prove relevant in understanding relativistic/non-linear features and, therefore, in taking better advantage of the upcoming large scale structure survey data. We propose a new 3  +  1 integration scheme for general relativity in the case where the matter sector contains a minimally-coupled perfect fluid field. The original feature is that we completely eliminate the fluid components through the constraint equations, thus remaining with a set of unconstrained evolution equations for the rest of the fields. This procedure does not constrain the lapse function and shift vector, so it holds in arbitrary gauge and also works for arbitrary equation of state. An important advantage of this scheme is that it allows one to define and pass an adaptation of the robustness test to the cosmological context, at least in the case of pressureless perfect fluid matter, which is the relevant one for late-time cosmology.

  9. Optimizing multiplexing scheme in interferometric microscopy

    Science.gov (United States)

    Tayebi, Behnam; Jaferzadeh, Keyvan; Sharif, Farnaz; Han, Jae-Ho

    2016-08-01

    In single exposure off-axis interferometry, multiple information can be recorded by spatial frequency multiplexing. We investigate optimum conditions for designing 2D sampling schemes to record larger field of view in off-axis interferometry multiplexing. The spatial resolution of the recorded image is related to the numerical aperture of the system and sensor pixel size. The spatial resolution should preserve by avoiding crosstalk in the frequency domain. Furthermore, the field of view depends on the sensor size and magnification of the imaging system. In order to preserve resolution and have a larger field of view, the frequency domain should be designed correctly. The experimental results demonstrate that selecting the wrong geometrical scheme in frequency domain decrease the recorded image area.

  10. Exclusion from the Health Insurance Scheme

    CERN Multimedia

    2003-01-01

    A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635

  11. METAPHORIC MECHANISMS IN IMAGE SCHEME DEVELOPMENT

    OpenAIRE

    Pankratova, S.A.

    2017-01-01

    Problems of knowledge representation by means of images are still cognitively significant and invariably modern. The article deals with the image heuristic potential of a bookish sphere as a donor of meanings, aiding metaphoric scheme development of another modern sphere of cinematography. The key factor here is the differentiation between two basically different metaphor types – heuristic epiphora and image diaphora. The author had offered a unique methodology of counting of quantitative par...

  12. [A scheme to support teenagers in care].

    Science.gov (United States)

    Maldera, David

    In some family situations, the placement of a teenager, even in the case of a court decision, proves ineffective. The accumulation of all kinds of difficulties requires a different type of support, based on responsiveness, attention and above all time to come together. A dedicated scheme helps to prevent situations of waywardness or marginalisation among these teenagers and to support the families. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  13. The Emergent Universe scheme and tunneling

    Energy Technology Data Exchange (ETDEWEB)

    Labraña, Pedro [Departamento de Física, Universidad del Bío-Bío, Avenida Collao 1202, Casilla 5-C, Concepción, Chile and Departament d' Estructura i Constituents de la Matèria and Institut de Ciències del Cosmos, Universitat (Spain)

    2014-07-23

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.

  14. Failure of a proposed superluminal scheme

    Science.gov (United States)

    Furuya, K.; Milonni, P. W.; Steinberg, A. M.; Wolinsky, M.

    1999-02-01

    We consider a “superluminal quantum Morse telegraph”, recently proposed by Garuccio, involving a polarization-correlated photon pair and a Michelson interferometer in which one of the mirrors is replaced by a phase-conjugating mirror (PCM). Superluminal information transfer in this scheme is precluded by the impossibility of distinguishing between unpolarized photons prepared by mixing linear polarization states or by mixing circular polarization states.

  15. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  16. A Scatter Storage Scheme for Dictionary Lookups

    Directory of Open Access Journals (Sweden)

    D. M. Murray

    1970-09-01

    Full Text Available Scatter storage schemes are examined with respect to their applicability to dictionary lookup procedures. Of particular interest are virtual scatter methods which combine the advantages of rapid search speed and reasonable storage requirements. The theoretical aspects of computing hash addresses are developed, and several algorithms are evaluated. Finally, experiments with an actual text lookup process are described, and a possible library application is discussed.

  17. Modelling Detailed-Chemistry Effects on Turbulent Diffusion Flames using a Parallel Solution-Adaptive Scheme

    Science.gov (United States)

    Jha, Pradeep Kumar

    Capturing the effects of detailed-chemistry on turbulent combustion processes is a central challenge faced by the numerical combustion community. However, the inherent complexity and non-linear nature of both turbulence and chemistry require that combustion models rely heavily on engineering approximations to remain computationally tractable. This thesis proposes a computationally efficient algorithm for modelling detailed-chemistry effects in turbulent diffusion flames and numerically predicting the associated flame properties. The cornerstone of this combustion modelling tool is the use of parallel Adaptive Mesh Refinement (AMR) scheme with the recently proposed Flame Prolongation of Intrinsic low-dimensional manifold (FPI) tabulated-chemistry approach for modelling complex chemistry. The effect of turbulence on the mean chemistry is incorporated using a Presumed Conditional Moment (PCM) approach based on a beta-probability density function (PDF). The two-equation k-w turbulence model is used for modelling the effects of the unresolved turbulence on the mean flow field. The finite-rate of methane-air combustion is represented here by using the GRI-Mech 3.0 scheme. This detailed mechanism is used to build the FPI tables. A state of the art numerical scheme based on a parallel block-based solution-adaptive algorithm has been developed to solve the Favre-averaged Navier-Stokes (FANS) and other governing partial-differential equations using a second-order accurate, fully-coupled finite-volume formulation on body-fitted, multi-block, quadrilateral/hexahedral mesh for two-dimensional and three-dimensional flow geometries, respectively. A standard fourth-order Runge-Kutta time-marching scheme is used for time-accurate temporal discretizations. Numerical predictions of three different diffusion flames configurations are considered in the present work: a laminar counter-flow flame; a laminar co-flow diffusion flame; and a Sydney bluff-body turbulent reacting flow

  18. A rational function based scheme for solving advection equation

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, Feng [Gunma Univ., Kiryu (Japan). Faculty of Engineering; Yabe, Takashi

    1995-07-01

    A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author).

  19. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  20. A weak blind signature scheme based on quantum cryptography

    Science.gov (United States)

    Wen, Xiaojun; Niu, Xiamu; Ji, Liping; Tian, Yuan

    2009-02-01

    In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein-Padolsky-Rosen) pairs. Different from classical blind signature schemes and current quantum signature schemes, our quantum blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Experimental analysis proved that our scheme have the characteristics of non-counterfeit, non-disavowal, blindness and traceability. It has a wide application to E-payment system, E-government, E-business, and etc.

  1. Fractal-based image sequence compression scheme

    Science.gov (United States)

    Li, Haibo; Novak, Mirek; Forchheimer, Robert

    1993-07-01

    The dominant image transformation used in the existing fractal coding schemes is the affine function. Although an affine transformation is easy to compute and understand, its linear approximation ability limits the employment of larger range blocks, that is, it limits further improvement in compression efficiency. We generalize the image transformation from the usual affine form to the more general quadratic form, and provide theoretical requirements for the generalized transformation to be contractive. Based on the self-transformation system (STS) model, an image sequence coding scheme--fractal-based image sequence coding--is proposed. In this coding scheme, our generalized transformation is used to model the self- transformation is used to model the self-transformation from the domain block to its range blocks. Experimental results on a real image sequence show that for the same size of blocks, the SNR can be improved by 10 dB, or, for the same SNR of the decoded image sequence, the compression ratio is raised twofold when the new generalized transformation is used to replace the usual affine transformation. In addition, due to the utilization of the STS model, the computational complexity is only linearly related to the size of the 3-D blocks. This provides for fast encoding and decoding.

  2. Doppler Shift Compensation Schemes in VANETs

    Directory of Open Access Journals (Sweden)

    F. Nyongesa

    2015-01-01

    Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.

  3. Progress on Implementing Additional Physics Schemes into ...

    Science.gov (United States)

    The U.S. Environmental Protection Agency (USEPA) has a team of scientists developing a next generation air quality modeling system employing the Model for Prediction Across Scales – Atmosphere (MPAS-A) as its meteorological foundation. Several preferred physics schemes and options available in the Weather Research and Forecasting (WRF) model are regularly used by the USEPA with the Community Multiscale Air Quality (CMAQ) model to conduct retrospective air quality simulations. These include the Pleim surface layer, the Pleim-Xiu (PX) land surface model with fractional land use for a 40-class National Land Cover Database (NLCD40), the Asymmetric Convective Model 2 (ACM2) planetary boundary layer scheme, the Kain-Fritsch (KF) convective parameterization with subgrid-scale cloud feedback to the radiation schemes and a scale-aware convective time scale, and analysis nudging four-dimensional data assimilation (FDDA). All of these physics modules and options have already been implemented by the USEPA into MPAS-A v4.0, tested, and evaluated (please see the presentations of R. Gilliam and R. Bullock at this workshop). Since the release of MPAS v5.1 in May 2017, work has been under way to implement these preferred physics options into the MPAS-A v5.1 code. Test simulations of a summer month are being conducted on a global variable resolution mesh with the higher resolution cells centered over the contiguous United States. Driving fields for the FDDA and soil nudging are

  4. INFORMATION FROM THE CERN HEALTH INSURANCE SCHEME

    CERN Multimedia

    Tel : 7-3635

    2002-01-01

    Please note that, from 1 July 2002, the tariff agreement between CERN and the Hôpital de la Tour will no longer be in force. As a result the members of the CERN Health Insurance Scheme will no longer obtain a 5% discount for quick payment of bills. More information on the termination of the agreement and the implications for our Health Insurance Scheme will be provided in the next issue of the CHIS Bull', due for publication in the first half of July. It will be sent to your home address, so, if you have moved recently, please check that your divisional secretariat has your current address. Tel.: 73635 The Organization's Health Insurance Scheme (CHIS) has launched its own Web pages, located on the Website of the Social & Statutory Conditions Group of HR Division (HR-SOC). The address is short and easy-to-remember www.cern.ch/chis The pages currently available concentrate on providing basic information. Over the coming months it is planned to fill out the details and introduce new topics. Please give us ...

  5. Dynamical decoupling schemes derived from Hamilton cycles

    Science.gov (United States)

    Rötteler, Martin

    2008-04-01

    We address the problem of decoupling the interactions in a spin network governed by a pair-interaction Hamiltonian. Combinatorial schemes for decoupling and for manipulating the couplings of Hamiltonians have been developed, which use selective pulses. In this paper, we consider an additional requirement on these pulse sequences: as few different control operations as possible should be used. This requirement is motivated by the fact that to find an optimal implementation of each individual selective pulse will be expensive since it requires to solve a pulse shaping problem. Hence, it is desirable to use as few different selective pulses as possible. As a first result, we show that for d-dimensional systems, where d ⩾2, the ability to implement only two control operations is sufficient to turn off the time evolution. Next, we address the case of a bipartite system with local control and show that four different control operations are sufficient. Finally, turning to networks consisting of several d-dimensional nodes, we show that decoupling can be achieved if one is able to control a number of different control operations, which is logarithmic in the number of nodes. We give an explicit family of efficient decoupling schemes with logarithmic number of different pulses based on the classic Hamming codes. We also provide a table of the best known decoupling schemes for small networks of qubits.

  6. Uncertainty of Microphysics Schemes in CRMs

    Science.gov (United States)

    Tao, W. K.; van den Heever, S. C.; Wu, D.; Saleeby, S. M.; Lang, S. E.

    2015-12-01

    Microphysics is the framework through which to understand the links between interactive aerosol, cloud and precipitation processes. These processes play a critical role in the water and energy cycle. CRMs with advanced microphysics schemes have been used to study the interaction between aerosol, cloud and precipitation processes at high resolution. But, there are still many uncertainties associated with these microphysics schemes. This has arisen, in part, from the fact microphysical processes cannot be measured directly; instead, cloud properties, which can be measured, are and have been used to validate model results. The utilization of current and future global high-resolution models is rapidly increasing and are at what has been traditional CRM resolutions and are using microphysics schemes that were developed in traditional CRMs. A potential NASA satellite mission called the Cloud and Precipitation Processes Mission (CaPPM) is currently being planned for submission to the NASA Earth Science Decadal Survey. This mission could provide the necessary global estimates of cloud and precipitation properties with which to evaluate and improve dynamical and microphysical parameterizations and the feedbacks. In order to facilitate the development of this mission, CRM simulations have been conducted to identify microphysical processes responsible for the greatest uncertainties in CRMs. In this talk, we will present results from numerical simulations conducted using two CRMs (NU-WRF and RAMS) with different dynamics, radiation, land surface and microphysics schemes. Specifically, we will conduct sensitivity tests to examine the uncertainty of the some of the key ice processes (i.e. riming, melting, freezing and shedding) in these two-microphysics schemes. The idea is to quantify how these two different models' respond (surface rainfall and its intensity, strength of cloud drafts, LWP/IWP, convective-stratiform-anvil area distribution) to changes of these key ice

  7. Hanford Laboratories Operation monthly activities report, March 1957

    Energy Technology Data Exchange (ETDEWEB)

    Albaugh, E.W.

    1957-04-15

    This is the monthly report of the Hanford Laboratories Operation, March, 1957. Metallurgy, reactor fuels, chemistry, dosimetry, separation processes, reactor technology, financial activities, visits, biology operation, physics and instrumentation research, and employee relations are discussed.

  8. Topography data from the Elwha River delta, Washington, March 2013

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This part of the data release presents topography data from the Elwha River delta collected in March 2013. Topography data were collected on foot with global...

  9. Chemical Processing Department monthly report for March 1962

    Energy Technology Data Exchange (ETDEWEB)

    1962-04-20

    This report, for March 1962 from the Chemical Processing Department at HAPO, discusses the following: Production operation; Purex and Redox operation; Finished products operation; maintenance; Financial operations; facilities engineering; research; employee relations; weapons manufacturing operation; and safety and security.

  10. Hanford Laboratories Operation monthly activities report, March 1962

    Energy Technology Data Exchange (ETDEWEB)

    1962-04-16

    This is the monthly report for the Hanford Laboratories Operation March 1962. Reactor fuels, chemistry, dosimetry, separation processes, reactor technology, financial activities, biology operation, physics and instrumentation research, operations research and synthesis, programming, and radiation protection operation are discussed.

  11. EXTREME WEATHER EVENTS OF MARCH 2013 IN OLTENIA

    National Research Council Canada - National Science Library

    F. SFÎRLEAZĂ; C. MĂNESCU; A. BĂCESCU; M. IORDĂCHESCU; M. BĂCESCU

    2016-01-01

    .... The occurrence of such events in the last decade of the month of March, when spring should already be installed, generates severe weather episodes with negative impact on the socio-economic activity...

  12. Hanford Atomic Products Operation monthly report for March 1956

    Energy Technology Data Exchange (ETDEWEB)

    1956-04-20

    This is the monthly report for the Hanford Laboratories Operation, March, 1956. Metallurgy, reactor fuels, chemistry, dosimetry, separation processes, reactor technology; financial activities, visits, biology operation, physics and instrumentation research, employee relations, pile technology, safety and radiological sciences are discussed.

  13. Whooping crane recovery activities : October, 2004 - March, 2005

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Summary of whooping crane recovery activities from October, 2004 to March, 2005 for the Aransas/Wood Buffalo flock, the Florida non-migratory flock, and captive...

  14. Hanford Laboratories Operation monthly activities report, March 1958

    Energy Technology Data Exchange (ETDEWEB)

    Parker, H.M.

    1958-04-15

    This is the monthly report for the Hanford Laboratories Operation, March, 1958. Metallurgy, reactor fuels, chemistry, dosimetry, separation processes, reactor technology, financial activities, visits, biology operation, physics and instrumentation research, and employee relations are discussed.

  15. Narrative report: March 1937: Medicine Lake Migratory Waterfowl Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This monthly narrative report for Medicine Lake NWR summarizes Works Progress Administration (WPA) projects and water conditions during March, 1937. Photographs are...

  16. Sand Lake Migratory Waterfowl Refuge : Monthly report : March, 1938

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This report describes activities on Sand Lake Migratory Waterfowl Refuge during March of 1938. Weather conditions, waterfowl, upland game, fur and predator control,...

  17. Modernisation des marchés agroalimentaires - inclusion des petits ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Les marchés agroalimentaires connaissent de rapides changements dans les pays en développement et les pays en transition. Sous l'influence de la libéralisation du commerce et des nouvelles technologies de transformation des aliments et de commerce de détail, les marchés agroalimentaires évoluent vers une plus ...

  18. Le marche financier en Algerie : Situation et perspectives | Koudri ...

    African Journals Online (AJOL)

    occurrence le marché financier ne représente pas un problème strictement technique économique et financier; c'est également un fait culturel, moral, juridique et comptable. La transition à l'économie de marché s'est réalisée à des degrés et à ...

  19. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  20. A New Adaptive Hungarian Mating Scheme in Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chanju Jung

    2016-01-01

    Full Text Available In genetic algorithms, selection or mating scheme is one of the important operations. In this paper, we suggest an adaptive mating scheme using previously suggested Hungarian mating schemes. Hungarian mating schemes consist of maximizing the sum of mating distances, minimizing the sum, and random matching. We propose an algorithm to elect one of these Hungarian mating schemes. Every mated pair of solutions has to vote for the next generation mating scheme. The distance between parents and the distance between parent and offspring are considered when they vote. Well-known combinatorial optimization problems, the traveling salesperson problem, and the graph bisection problem are used for the test bed of our method. Our adaptive strategy showed better results than not only pure and previous hybrid schemes but also existing distance-based mating schemes.

  1. 7 CFR 400.458 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  2. Scanning schemes in white light photoelasticity - Part II: Novel fringe resolution guided scanning scheme

    Science.gov (United States)

    Ramakrishnan, Vivek; Ramesh, K.

    2017-05-01

    Varied spatial resolution of isochromatic fringes over the domain influences the accuracy of fringe order estimation using TFP/RGB photoelasticity. This has been brought out in the first part of the work. The existing scanning schemes do not take this into account, which leads to the propagation of noise from the low spatial resolution zones. In this paper, a method is proposed for creating a whole field map which represents the spatial resolution of the isochromatic fringe pattern. A novel scanning scheme is then proposed whose progression is guided by the spatial resolution of the fringes in the isochromatic image. The efficacy of the scanning scheme is demonstrated using three problems - an inclined crack under bi-axial loading, a thick ring subjected to internal pressure and a stress frozen specimen of an aerospace component. The proposed scheme has use in a range of applications. The scanning scheme is effective even if the model has random zones of noise which is demonstrated using a plate subjected to concentrated load. This aspect is well utilised to extract fringe data from thin slices cut from a stereo-lithographic model that has characteristic random noise due to layered manufacturing.

  3. A Fuzzy Commitment Scheme with McEliece's Cipher

    Directory of Open Access Journals (Sweden)

    Deo Brat Ojha

    2010-04-01

    Full Text Available In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. This scheme is one of the interesting candidates for post quantum cryptography. Hence our interest to deal with this system with fuzzy commitment scheme. The concept itself is illustrated with the help of a simple situation and the validation of mathematical experimental verification is provided.

  4. Application of a global probabilistic hydrologic forecast scheme to the Ohio River Basin

    Science.gov (United States)

    Voisin, Nathalie; Pappenberger, Florian; Lettenmaier, Dennis; Buizza, Roberto; Schaake, John

    2010-05-01

    We evaluate a 10-day globally applicable flood prediction scheme over the Ohio River basin for the period 2003-2007. The hydrological core of the scheme is the Variable Infiltration Capacity (VIC) hydrology model, which we forced with the European Centre for Medium Range Weather Forecasts (ECMWF) temperature and wind analyses, and Tropical Rainfall Monitoring Mission (TRMM) precipitation up to each forecast starting day. In forecast mode, the VIC model was then forced with calibrated and downscaled 10-day forecasts from the ECMWF ensemble prediction system (EPS). We also tested a parallel setup where the EPS ensemble forecasts were interpolated to the spatial scale of the hydrology model. Each set of forecasts was extended by 5 days using monthly mean climatological variables and zero precipitation in order to account for the effect of initial conditions (the EPS was extended to 15 days only in March 2008). The 15-day spatially distributed ensemble runoff forecasts were then routed to four locations in the basin. Surrogates for observed daily runoff and streamflow were provided by the reference run, i.e. the VIC simulations forced with ECMWF analysis fields and TRMM precipitation. Mean forecast errors and skills for the two sets of forecasts were evaluated with respect to the reference. The flood prediction scheme using the calibrated and downscaled ECMWF EPS forecasts was generally more accurate and reliable than interpolated forecasts for both daily distributed runoff forecasts and daily flow forecasts. The streamflow forecasts were dominated by initial conditions for 1 to 5 days depending on forecasted precipitation amounts and drainage area of the sub-basins. The flood prediction scheme generally had useful skill for at least 10 days at all sites. Relative biases and ensemble reliabilities for high and average flow forecasts were similar. Relative RMSEs were lower for high flow forecasts than for average flow forecasts and so was correlation.

  5. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    The point of contention in this case was whether the illegality of the business of the scheme was a relevant consideration in determining whether the pay-outs were made in the ordinary course of business of the scheme. This paper discusses pyramid schemes in the context of impeachable dispositions in terms of the ...

  6. a comparative study of prioritized handoff schemes with guard

    African Journals Online (AJOL)

    eobe

    A COMPARATIVE STUDY OF PRIORITIZED HANDOFF SCHEMES WITH GUARD CHANNELS IN WIRELESS NETWORKS. D. U. Onyishi. D. U. Onyishi, et al. Nigerian Journal of Technology. Vol. 34, No. 3, July 2015 600 application of resource allocation schemes.This gives precedence to handoff calls. Such schemes ...

  7. Matters of Coercion-Resistance in Cryptographic Voting Schemes

    OpenAIRE

    Kempka, Carmen

    2014-01-01

    This work addresses coercion-resistance in cryptographic voting schemes. It focuses on three particularly challenging cases: write-in candidates, internet elections and delegated voting. Furthermore, this work presents a taxonomy for analyzing and comparing a huge variety of voting schemes, and presents practical experiences with the voting scheme Bingo Voting.

  8. Efficient rate control scheme using modified inter-layer dependency ...

    Indian Academy of Sciences (India)

    In this paper, a spatial-resolutionratio-based MB mode decision scheme is proposed for spatially enhanced layers. The scheme uses the motion estimated at the base layer, to encode the respective MBs in the enhancement layers. The spatial–temporalsearch schemes at the enhancement layers are used to derive motion ...

  9. 7 CFR 623.21 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture... AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it is determined by NRCS that a landowner has employed a scheme or device to defeat the purposes of this part, any...

  10. 7 CFR 1421.305 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1421.305... scheme or device. (a) A producer shall be ineligible to receive payments under this subpart if it is determined by DAFP, the State committee, or the county committee to have: (1) Adopted any scheme or device...

  11. 7 CFR 1430.310 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.310... Disaster Assistance Payment Program § 1430.310 Misrepresentation and scheme or device. (a) In addition to... assistance under this program if the producer is determined by FSA or CCC to have: (1) Adopted any scheme or...

  12. 7 CFR 795.17 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...

  13. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to defeat...

  14. 7 CFR 784.9 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 784.9 Section... Misrepresentation and scheme or device. (a) A sheep and lamb operation shall be ineligible to receive assistance...) Adopted any scheme or device that tends to defeat the purpose of this program; (2) Made any fraudulent...

  15. 7 CFR 636.14 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 636.14 Section....14 Misrepresentation and scheme or device. (a) A participant who is determined to have erroneously... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  16. Developing and Rewarding Excellent Teachers: The Scottish Chartered Teacher Scheme

    Science.gov (United States)

    Ingvarson, Lawrence

    2009-01-01

    The Scottish Chartered Teacher Scheme was designed to recognise and reward teachers who attained high standards of practice. The scheme emerged in 2001 as part of an agreement between government, local employing authorities and teacher organisations. Policies such as the chartered teacher scheme aim to benefit students in two main ways: by…

  17. 7 CFR 1470.36 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1470.36... General Administration § 1470.36 Misrepresentation and scheme or device. (a) If NRCS determines that an... to have: (1) Adopted any scheme or device that tends to defeat the purpose of the program; (2) Made...

  18. 7 CFR 1430.610 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.610... Disaster Assistance Payment Program II (DDAP-II) § 1430.610 Misrepresentation and scheme or device. (a) In... receive assistance under this program if the producer is determined by CCC to have: (1) Adopted any scheme...

  19. 7 CFR 786.110 - Misrepresentation, scheme, or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 786.110 Section... Misrepresentation, scheme, or device. (a) In addition to other penalties, sanctions, or remedies that may apply, a... FSA to have: (1) Adopted any scheme or device that tends to defeat the purpose of this program, (2...

  20. 7 CFR 1430.220 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.220... Contract Program § 1430.220 Misrepresentation and scheme or device. (a) A dairy operation shall be ineligible for the MILC program if FSA determines that it knowingly: (1) Adopted a scheme or device that...

  1. 7 CFR 1415.20 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a) If it is determined by USDA that a participant has employed a scheme or device to defeat the purposes...

  2. 7 CFR 760.109 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 760.109... Agricultural Disaster Assistance Programs § 760.109 Misrepresentation and scheme or device. (a) A participant... in accordance with this part, or otherwise used a scheme or device with the intent to receive...

  3. 7 CFR 1463.110 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1463.110... PROGRAM Tobacco Transition Payment Program § 1463.110 Misrepresentation and scheme or device. A person... program determination made in accordance with this subpart; (b) Adopted any scheme or device that tends to...

  4. 7 CFR 633.18 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 633.18 Section 633.18 Agriculture... AGRICULTURE LONG TERM CONTRACTING WATER BANK PROGRAM § 633.18 Scheme and device. (a) If it is determined by the NRCS that a person has employed a scheme or device to defeat the purposes of this part, any part...

  5. 7 CFR 1430.507 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.507... Assistance Program § 1430.507 Misrepresentation and scheme or device. (a) A dairy operation shall be... committee to have: (1) Adopted any scheme or device which tends to defeat the purpose of this program; (2...

  6. 7 CFR 1469.36 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1469.36... General Administration § 1469.36 Misrepresentation and scheme or device. (a) If the Department determines... who is determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the purpose...

  7. 7 CFR 760.1310 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 760.1310... Program § 760.1310 Misrepresentation and scheme or device. (a) In addition to other penalties, sanctions... this subpart if the producer or operation is determined by FSA to have: (1) Adopted any scheme or...

  8. 7 CFR 625.19 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 625.19 Section 625.19 Agriculture... AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.19 Scheme and device. (a) If it is determined by NRCS that a person has employed a scheme or device to defeat the purposes of this part, any...

  9. 7 CFR 1465.35 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1465.35... ASSISTANCE General Administration § 1465.35 Misrepresentation and scheme or device. (a) A participant who is... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  10. 7 CFR 1467.19 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme and device. 1467.19 Section 1467.19... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme and device. (a) If it is determined by the NRCS that a participant has employed a scheme or device to defeat...

  11. 7 CFR 1468.35 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1468.35... Administration § 1468.35 Misrepresentation and scheme or device. (a) A participant who is determined to have... knowingly adopted any scheme or device that tends to defeat the purpose of the program; made any fraudulent...

  12. 7 CFR 1410.60 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1410.60 Section 1410.60 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION RESERVE PROGRAM § 1410.60 Scheme or device. (a) If CCC determines that a person has employed a scheme or device to defeat the purposes of this part...

  13. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1424.13... Misrepresentation and scheme or device. (a) A producer shall be ineligible to receive payments under this program if CCC determines the producer: (1) Adopted any scheme or device that tends to defeat the purpose of the...

  14. 7 CFR 1466.35 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1466.35... PROGRAM General Administration § 1466.35 Misrepresentation and scheme or device. (a) A person, joint.... (b) A producer who is determined to have knowingly: (1) Adopted any scheme or device that tends to...

  15. 7 CFR 1491.32 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... Administration § 1491.32 Scheme or device. (a) If it is determined by the NRCS that a cooperating entity has employed a scheme or device to defeat the purposes of this part, any part of any program payment otherwise...

  16. Nigeria's National Health Insurance Scheme: a critical reappraisal ...

    African Journals Online (AJOL)

    For well over four decades, the National Health Insurance Scheme (NHIS) remained on the drawing board. It is now a little over half a decade since the actual commencement of the implementation of the scheme. This review, therefore, chronicles the historical background to the introduction of the scheme, highlighting the ...

  17. On the strong monotonicity of the CABARET scheme

    Science.gov (United States)

    Ostapenko, V. V.

    2012-03-01

    The strong monotonicity of the CABARET scheme with single flux correction is analyzed as applied to the linear advection equation. It is shown that the scheme is strongly monotone (has the NED property) at Courant numbers r ∈ (0,0,5), for which it is monotone. Test computations illustrating this property of the CABARET scheme are presented.

  18. A dynamic digital signature scheme without third parties

    NARCIS (Netherlands)

    Van Elsas, M.; Van der Lubbe, J.C.A.; Weber, J.H.

    2015-01-01

    We propose a digital signature scheme for dynamic coalitions. Particularly, we enable members to join and leave. Our scheme does not need trusted or oblivious third parties (TTPs or OTPs). In this distributed scheme there is a changing secret group key dependent on the members in the group. Each

  19. An Annotation Scheme for Social Interaction in Digital Playgrounds

    NARCIS (Netherlands)

    Moreno Celleri, Alejandro Manuel; van Delden, Robertus Wilhelmus; Reidsma, Dennis; Poppe, Ronald Walter; Heylen, Dirk K.J.; Herrlich, Marc; Malaka, Rainer; Masuch, Maic

    This paper introduces a new annotation scheme, designed specifically to study children's social interactions during play in digital playgrounds. The scheme is motivated by analyzing relevant literature, combined with observations from recordings of play sessions. The scheme allows us to analyze how

  20. Fissioned Triangular Schemes Via the Cross-Ratio

    NARCIS (Netherlands)

    van Dam, E.R.; de Caen, D.

    1999-01-01

    A construction of association schemes is presented; these are fission schemes of the triangular schemes T(n) where n=q + 1with q any prime power. The key observation is quite elementary, being that the natural action of PGL(2,q) on the 2-element subsets of the projective line PG(1,q) is generously

  1. A combined spectrum sensing and OFDM demodulation scheme

    NARCIS (Netherlands)

    Heskamp, M.; Slump, Cornelis H.

    2009-01-01

    In this paper we propose a combined signaling and spectrum sensing scheme for cognitive radio that can detect in-band primary users while the networks own signal is active. The signaling scheme uses OFDM with phase shift keying modulated sub-carriers, and the detection scheme measures the deviation

  2. throughput analysis of arq schemes using state transition diagrams

    African Journals Online (AJOL)

    User

    ST2) scheme having variable selective repeat mode retransmissions and the Selective Repeat-Stutter-Go Back N (SR-ST-GBN) scheme having variable stutter mode retransmissions. Using the SR-ST-GBN scheme, it is also shown that it is pos-.

  3. Throughput Analysis of Arq Schemes Using State Transition Diagrams

    African Journals Online (AJOL)

    ST2) scheme having variable selective repeat mode retransmissions and the Selective Repeat-Stutter-Go Back N (SR-ST-GBN) scheme having variable stutter mode retransmissions. Using the SR-ST-GBN scheme, it is also shown that it is ...

  4. Forgery attack to Kang-Tang digital signature scheme

    Science.gov (United States)

    Fang, Jie; Guo, Yongning; Liu, Chenglian

    2014-10-01

    In 2006, Kang and Tang proposed a digital signature scheme without hash functions and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Kang-Tang scheme is insecure.

  5. A Highly Stable Marching-on-in-Time Volume Integral Equation Solver for Analyzing Transient Wave Interactions on High-Contrast Scatterers

    KAUST Repository

    Bagci, Hakan

    2014-01-06

    Time domain integral equation (TDIE) solvers represent an attractive alternative to finite difference (FDTD) and finite element (FEM) schemes for analyzing transient electromagnetic interactions on composite scatterers. Current induced on a scatterer, in response to a transient incident field, generates a scattered field. First, the scattered field is expressed as a spatio-temporal convolution of the current and the Green function of the background medium. Then, a TDIE is obtained by enforcing boundary conditions and/or fundamental field relations. TDIEs are often solved for the unknown current using marching on-in-time (MOT) schemes. MOT-TDIE solvers expand the current using local spatio-temporal basis functions. Inserting this expansion into the TDIE and testing the resulting equation in space and time yields a lower triangular system of equations (termed MOT system), which can be solved by marching in time for the coefficients of the current expansion. Stability of the MOT scheme often depends on how accurately the spatio-temporal convolution of the current and the Green function is discretized. In this work, band-limited prolate-based interpolation functions are used as temporal bases in expanding the current and discretizing the spatio-temporal convolution. Unfortunately, these functions are two sided, i.e., they require ”future” current samples for interpolation, resulting in a non-causal MOT system. To alleviate the effect of non-causality and restore the ability to march in time, an extrapolation scheme can be used to estimate the future values of the currents from their past values. Here, an accurate, stable and band-limited extrapolation scheme is developed for this purpose. This extrapolation scheme uses complex exponents, rather than commonly used harmonics, so that propagating and decaying mode fields inside the dielectric scatterers are accurately modeled. The resulting MOT scheme is applied to solving the time domain volume integral equation (VIE

  6. Dynamics of iterative schemes for quadratic polynomial

    Science.gov (United States)

    Goyal, Komal; Prasad, Bhagwati

    2017-10-01

    Most of the fractals are generated by applying a map recursively to an initial point or a set of the space such as complex plane. An orbit of a point is a sequence of iteratively obtained points from it and the orbit is said to be diverging when its points grow unbounded. A set of all the points whose orbits are not diverging may be termed as a fractal. The fractal dynamics of the orbits depends on the rule of iteration also. In this paper, we study the dynamics of iterations for a number of iterative schemes. The results regarding the escape criteria for quadratic complex polynomials under various iteration procedures are established.

  7. Rural poverty reduction through centrally sponsored schemes.

    Science.gov (United States)

    Saxena, N C

    2007-10-01

    This paper discusses the evolving profile of poverty in India and reviews the national performance of selected anti-poverty programmes between 1997-1998 and 2005. For each programme, it outlines the budgetary allocation principle used for the States and districts and analyzes budgetary performance over the period. The main objective is to explore the extent to which the anti-poverty programmes are reaching their target groups effectively. Finally, it identifies the specific factors responsible for under-performance and provides a set of recommendations for policy makers and programme implementers which could help improve the outcomes of the schemes.

  8. New Financing Schemes of Public Infrastructure

    Directory of Open Access Journals (Sweden)

    Ignacio de la Riva

    2017-01-01

    Full Text Available Public works procurements and concessions are traditional legal techniques used to shape the financing of public infrastructure. Fiscal constraints faced by public administrations at the end of the 20th century, and the subsequent increase of private participation in the provision of public goods and services, encouraged the development of new legal schemes allowing a higher degree of private investment in public infrastructure; such as Public Private Partnerships, project finance, securitizations, the shadow toll, turn-key agreements, public leasing and public trusts.

  9. A Ponzi scheme exposed to volatile markets

    OpenAIRE

    Parodi, Bernhard R.

    2014-01-01

    The PGBM model for a couple of counteracting, exponentially growing capital flows is presented: the available capital stock X(t) evolves according to a variant of inhomogeneous geometric Brownian motion (GBM) with time-dependent drift, in particular, to the stochastic differential equation dX(t)=[pX(t) + rho1*exp(q1*t)+rho2*exp(q2*t)]dt + sigma*X(t)*dW(t), where W(t) is a Wiener process. As a paragon, we study a continuous-time model for a nine-parameter Ponzi scheme with an exponentially gro...

  10. Pay-what-you-want pricing schemes

    DEFF Research Database (Denmark)

    Kahsay, Goytom Abraha; Samahita, Margaret

    2015-01-01

    Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular. We develop a model incorporating self-image into the buyer’s utility function and introduce heterogeneity in consumption utility and image-sensitivity, generating different purchase decisions and optimal prices across...... individuals. When a good’s fixed price is lower than a threshold fair value, PWYW can lead to a lower utility. This may result in a lower purchase rate and higher average price, accounting for previously unexplained field experimental evidence. An increase in the threshold value decreases the buyer’s utility...... and may further lower the purchase rate, resulting in a further increase in purchase price....

  11. A Distributed Quaternary Turbo Coded Cooperative Scheme

    Directory of Open Access Journals (Sweden)

    BALDINI FILHO, R.

    2014-12-01

    Full Text Available Cooperative communications achieve MIMO-like diversity gains by introducing a relay that creates an independent faded path between the source and the destination. Coded cooperation integrates cooperation with channel coding in order to increase the bit error rate (BER performance of cooperative communications. Turbo codewords can be built efficiently at the destination using encoded portions of the information sent by the source and the relay. This paper presents a distributed turbo cooperative coding scheme that utilizes convolutional codes defined over the finite ring of integers Z4 that performs better than its equivalent binary counterparts.

  12. ATLAS PhD Grant Scheme

    CERN Multimedia

    2016-01-01

    In this #CERNandSociety video, the 3 PhD students, awarded the ATLAS PhD Grant in 2015, talk about their research work within the ATLAS Collaboration and how this experience has shaped their future. Find out more about the ATLAS PhD Grant Scheme: cern.ch/ATLASPhDGrant This programme is just one of the many #CERNandSociety projects at CERN. Find out more and how you can be involved: http://cern.ch/go/pBt7

  13. A simple data compression scheme for binary images of bacteria compared with commonly used image data compression schemes

    NARCIS (Netherlands)

    Wilkinson, M.H.F.

    A run length code compression scheme of extreme simplicity, used for image storage in an automated bacterial morphometry system, is compared with more common compression schemes, such as are used in the tag image file format. These schemes are Lempel-Ziv and Welch (LZW), Macintosh Packbits, and

  14. Computational evaluation of convection schemes in fluid dynamics problems

    Directory of Open Access Journals (Sweden)

    Paulo Laerte Natti

    2012-11-01

    Full Text Available This article provides a computational evaluation of the popular high resolution upwind WACEB, CUBISTA and ADBQUICKEST schemes for solving non-linear fluid dynamics problems. By using the finite difference methodology, the schemes are analyzed and implemented in the context of normalized variables of Leonard. In order to access the performance of the schemes, Riemann problems for 1D Burgers, Euler and shallow water equations are considered. From the numerical results, the schemes are ranked according to their performance in solving these non-linear equations. The best scheme is then applied in the numerical simulation of tridimensional incompressible moving free surface flows.

  15. On the monotonicity of multidimensional finite difference schemes

    Science.gov (United States)

    Kovyrkina, O.; Ostapenko, V.

    2016-10-01

    The classical concept of monotonicity, introduced by Godunov for linear one-dimensional difference schemes, is extended to multidimensional case. Necessary and sufficient conditions of monotonicity are obtained for linear multidimensional difference schemes of first order. The constraints on the numerical viscosity are given that ensure the monotonicity of a difference scheme in the multidimensional case. It is proposed a modification of the second order multidimensional CABARET scheme that preserves the monotonicity of one-dimensional discrete solutions and, as a result, ensures higher smoothness in the computation of multidimensional discontinuous solutions. The results of two-dimensional test computations illustrating the advantages of the modified CABARET scheme are presented.

  16. Scheme Transformations in the Vicinity of an Infrared Fixed Point

    DEFF Research Database (Denmark)

    Ryttov, Thomas; Shrock, Robert

    2012-01-01

    We analyze the effect of scheme transformations in the vicinity of an exact or approximate infrared fixed point in an asymptotically free gauge theory with fermions. We show that there is far less freedom in carrying out such scheme transformations in this case than at an ultraviolet fixed point....... We construct a transformation from the $\\bar{MS}$ scheme to a scheme with a vanishing three-loop term in the $\\beta$ function and use this to assess the scheme dependence of an infrared fixed point in SU($N$) theories with fermions. Implications for the anomalous dimension of the fermion bilinear...

  17. A group signature scheme based on quantum teleportation

    Science.gov (United States)

    Wen, Xiaojun; Tian, Yuan; Ji, Liping; Niu, Xiamu

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  18. A subgrid parameterization scheme for precipitation

    Directory of Open Access Journals (Sweden)

    S. Turner

    2012-04-01

    Full Text Available With increasing computing power, the horizontal resolution of numerical weather prediction (NWP models is improving and today reaches 1 to 5 km. Nevertheless, clouds and precipitation formation are still subgrid scale processes for most cloud types, such as cumulus and stratocumulus. Subgrid scale parameterizations for water vapor condensation have been in use for many years and are based on a prescribed probability density function (PDF of relative humidity spatial variability within the model grid box, thus providing a diagnosis of the cloud fraction. A similar scheme is developed and tested here. It is based on a prescribed PDF of cloud water variability and a threshold value of liquid water content for droplet collection to derive a rain fraction within the model grid. Precipitation of rainwater raises additional concerns relative to the overlap of cloud and rain fractions, however. The scheme is developed following an analysis of data collected during field campaigns in stratocumulus (DYCOMS-II and fair weather cumulus (RICO and tested in a 1-D framework against large eddy simulations of these observed cases. The new parameterization is then implemented in a 3-D NWP model with a horizontal resolution of 2.5 km to simulate real cases of precipitating cloud systems over France.

  19. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  20. IMPLEMENTATION OF THE NEW CAREER STRUCTURE SCHEME

    CERN Multimedia

    Human Resources Division

    2001-01-01

    CERN's new Merit Advancement and Promotion Scheme, MAPS, comes into force on 1 September, and all members of staff will soon be receiving the official letter of notification of their assimilation into the new scheme. In this announcement, we take a look at where you can learn about the new system. There will also be an article in the Weekly Bulletin at the end of the month, which will summarise the main changes. During the early summer, HR Division presented the new structure to the staff in the Laboratory via Divisional Information Meetings. The transparencies used in these meetings, along with a list of the most relevant questions and answers, a Career Path Guide as well as a general overview document are available on the HR Division web site http://cern.ch/CERN/Divisions/PE/. Hard copies of the latter document are also available from the Divisional secretariats. The first question most staff members will ask is how they will fit into the new career path structure. Via the same web page, they can type in th...

  1. Extended lattice Boltzmann scheme for droplet combustion.

    Science.gov (United States)

    Ashna, Mostafa; Rahimian, Mohammad Hassan; Fakhari, Abbas

    2017-05-01

    The available lattice Boltzmann (LB) models for combustion or phase change are focused on either single-phase flow combustion or two-phase flow with evaporation assuming a constant density for both liquid and gas phases. To pave the way towards simulation of spray combustion, we propose a two-phase LB method for modeling combustion of liquid fuel droplets. We develop an LB scheme to model phase change and combustion by taking into account the density variation in the gas phase and accounting for the chemical reaction based on the Cahn-Hilliard free-energy approach. Evaporation of liquid fuel is modeled by adding a source term, which is due to the divergence of the velocity field being nontrivial, in the continuity equation. The low-Mach-number approximation in the governing Navier-Stokes and energy equations is used to incorporate source terms due to heat release from chemical reactions, density variation, and nonluminous radiative heat loss. Additionally, the conservation equation for chemical species is formulated by including a source term due to chemical reaction. To validate the model, we consider the combustion of n-heptane and n-butanol droplets in stagnant air using overall single-step reactions. The diameter history and flame standoff ratio obtained from the proposed LB method are found to be in good agreement with available numerical and experimental data. The present LB scheme is believed to be a promising approach for modeling spray combustion.

  2. Dynamic balancing scheme for motor armatures

    Science.gov (United States)

    Tseng, Chyuan-Yow; Shih, Ting-Wei; Lin, Jun-Tsun

    2007-07-01

    This paper presents a novel approach based on an adaptive parameter estimation technique for the dynamic balancing of the armature in an automobile starting motor. The proposed scheme is implemented on an experimental system comprising an unbalance measurement machine and a milling machine. Applying the influence coefficient method, two matrices, namely the unbalance calculation matrix and the milling vector calculation matrix, are constructed. The unbalance calculation matrix computes the armature unbalance based on vibration measurements, while the milling vector calculation matrix establishes the position and magnitude of the required unbalance correction. To compensate for the wear of the milling cutter following repeated machining operations, an algorithm is formulated to generate on-line estimates of the parameter settings required in the milling vector calculation matrix. A series of balancing experiments are performed to evaluate the feasibility and performance of the proposed scheme. The results show that the balancing system achieves a better balancing performance than a system based on the conventional influence coefficient method.

  3. Multiplexing schemes for quantum repeater networks

    Science.gov (United States)

    Aparicio, Luciano; Van Meter, Rodney

    2011-08-01

    When built, quantum repeaters will allow the distribution of entangled quantum states across large distances, playing a vital part in many proposed quantum technologies. Enabling multiple users to connect through the same network will be key to their real-world deployment. Previous work on repeater technologies has focussed only on simple entanglment production, without considering the issues of resource scarcity and competition that necessarily arise in a network setting. In this paper we simulated a thirteen-node network with up to five flows sharing different parts of the network, measuring the total throughput and fairness for each case. Our results suggest that the Internet-like approach of statistical multiplexing use of a congested link gives the highest aggregate throughput. Time division multiplexing and buffer space multiplexing were slightly less effective, but all three schemes allow the sum of multiple flows to substantially exceed that of any one flow, improving over circuit switching by taking advantage of resources that are forced to remain idle in circuit switching. All three schemes proved to have excellent fairness. The high performance, fairness and simplicity of implementation support a recommendation of statistical multiplexing for shared quantum repeater networks.

  4. Finite-difference schemes for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: es@cwi.nl [Centrum Wiskunde and Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands)

    2014-09-01

    In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.

  5. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  6. Spatial dimming scheme for optical OFDM based visible light communication.

    Science.gov (United States)

    Yang, Yang; Zeng, Zhimin; Cheng, Julian; Guo, Caili

    2016-12-26

    A new dimming control scheme termed spatial dimming orthogonal frequency division multiplexing (SD-OFDM) is proposed for multiple-input and multiple output OFDM based visible light communication. The basic idea of SD-OFDM is that the illumination can be represented by the number of glared light emitting diodes (LEDs) in an LED lamp. As the biasing level of LEDs does not adjust to represent the required illumination level, the proposed scheme can significantly mitigate the clipping noise compared to analogue dimming schemes. Furthermore, unlike digital dimming schemes that control illumination levels by setting different duty cycles of pulse width modulation, the proposed scheme is always in the "on-state" for varied illumination levels. Both analytical and simulation results indicate that the proposed scheme is an efficient and feasible dimmable scheme.

  7. A numerical scheme for the generalized Burgers–Huxley equation

    Directory of Open Access Journals (Sweden)

    Brajesh K. Singh

    2016-10-01

    Full Text Available In this article, a numerical solution of generalized Burgers–Huxley (gBH equation is approximated by using a new scheme: modified cubic B-spline differential quadrature method (MCB-DQM. The scheme is based on differential quadrature method in which the weighting coefficients are obtained by using modified cubic B-splines as a set of basis functions. This scheme reduces the equation into a system of first-order ordinary differential equation (ODE which is solved by adopting SSP-RK43 scheme. Further, it is shown that the proposed scheme is stable. The efficiency of the proposed method is illustrated by four numerical experiments, which confirm that obtained results are in good agreement with earlier studies. This scheme is an easy, economical and efficient technique for finding numerical solutions for various kinds of (nonlinear physical models as compared to the earlier schemes.

  8. DECISIONS ET COMPETITIVITE SUR LE MARCHE UNIQUE EUROPEEN

    Directory of Open Access Journals (Sweden)

    Sirghi Nicoleta

    2008-05-01

    Full Text Available L’un des traits importants du marché unique européen, a comme source le męme énoncé du principal objectif de l’intégration européenne ainsi que: l’harmonisation des niveaux du développement des Etats Membres et l’augmentation du niveau de vie dans l’ensemble de la communauté. Pour le marché unique européen, cet aspect se traduit par une permanente et soutenue augmentation de la demande. Cet ouvrage présente au début une analyse des éléments spécifiques du marché européen. Ensuite on identifie les opportunités et les risques au niveau macroéconomique adjointes aux perspectives du marché unique européen. Comme fondement on présente des stratégies du développement réalisables au niveau microéconomique que puissent assurer l’augmentation du niveau sur la compétitivité des sociétés sur le marché unique européen.

  9. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  10. Why sampling scheme matters: the effect of sampling scheme on landscape genetic results

    Science.gov (United States)

    Michael K. Schwartz; Kevin S. McKelvey

    2008-01-01

    There has been a recent trend in genetic studies of wild populations where researchers have changed their sampling schemes from sampling pre-defined populations to sampling individuals uniformly across landscapes. This reflects the fact that many species under study are continuously distributed rather than clumped into obvious "populations". Once individual...

  11. Collective agri-environment schemes: How can regionalenvironmental cooperatives enhance farmers’ intentions foragri-environment schemes?

    NARCIS (Netherlands)

    Dijk, van W.F.A.; Lokhorst, A.M.; Berendse, F.; Snoo, de G.R.

    2015-01-01

    The effectiveness of agri-environment schemes (AES) in enhancing biodiversity on farmland and creating a long-lasting change in farmers’ motivation towards a more environmental-friendly practice is still strongly debated. Applying a regional approach has been advocated widely to make AES more

  12. A simple language to script and simulate breeding schemes: the breeding scheme language

    Science.gov (United States)

    It is difficult for plant breeders to determine an optimal breeding strategy given that the problem involves many factors, such as target trait genetic architecture and breeding resource availability. There are many possible breeding schemes for each breeding program. Although simulation study may b...

  13. European air quality modelled by CAMx including the volatility basis set scheme

    Science.gov (United States)

    Ciarelli, G.; Aksoyoglu, S.; Crippa, M.; Jimenez, J. L.; Nemitz, E.; Sellegri, K.; Äijälä, M.; Carbone, S.; Mohr, C.; O'Dowd, C.; Poulain, L.; Baltensperger, U.; Prévôt, A. S. H.

    2015-12-01

    Four periods of EMEP (European Monitoring and Evaluation Programme) intensive measurement campaigns (June 2006, January 2007, September-October 2008 and February-March 2009) were modelled using the regional air quality model CAMx with VBS (Volatility Basis Set) approach for the first time in Europe within the framework of the EURODELTA-III model intercomparison exercise. More detailed analysis and sensitivity tests were performed for the period of February-March 2009 and June 2006 to investigate the uncertainties in emissions as well as to improve the modelling of organic aerosols (OA). Model performance for selected gas phase species and PM2.5 was evaluated using the European air quality database Airbase. Sulfur dioxide (SO2) and ozone (O3) were found to be overestimated for all the four periods with O3 having the largest mean bias during June 2006 and January-February 2007 periods (8.93 and 12.30 ppb mean biases, respectively). In contrast, nitrogen dioxide (NO2) and carbon monoxide (CO) were found to be underestimated for all the four periods. CAMx reproduced both total concentrations and monthly variations of PM2.5 very well for all the four periods with average biases ranging from -2.13 to 1.04 μg m-3. Comparisons with AMS (Aerosol Mass Spectrometer) measurements at different sites in Europe during February-March 2009, showed that in general the model over-predicts the inorganic aerosol fraction and under-predicts the organic one, such that the good agreement for PM2.5 is partly due to compensation of errors. The effect of the choice of volatility basis set scheme (VBS) on OA was investigated as well. Two sensitivity tests with volatility distributions based on previous chamber and ambient measurements data were performed. For February-March 2009 the chamber-case reduced the total OA concentrations by about 43 % on average. On the other hand, a test based on ambient measurement data increased OA concentrations by about 47 % for the same period bringing model

  14. Evaluation of European air quality modelled by CAMx including the volatility basis set scheme

    Directory of Open Access Journals (Sweden)

    G. Ciarelli

    2016-08-01

    Full Text Available Four periods of EMEP (European Monitoring and Evaluation Programme intensive measurement campaigns (June 2006, January 2007, September–October 2008 and February–March 2009 were modelled using the regional air quality model CAMx with VBS (volatility basis set approach for the first time in Europe within the framework of the EURODELTA-III model intercomparison exercise. More detailed analysis and sensitivity tests were performed for the period of February–March 2009 and June 2006 to investigate the uncertainties in emissions as well as to improve the modelling of organic aerosol (OA. Model performance for selected gas phase species and PM2.5 was evaluated using the European air quality database AirBase. Sulfur dioxide (SO2 and ozone (O3 were found to be overestimated for all the four periods, with O3 having the largest mean bias during June 2006 and January–February 2007 periods (8.9 pbb and 12.3 ppb mean biases respectively. In contrast, nitrogen dioxide (NO2 and carbon monoxide (CO were found to be underestimated for all the four periods. CAMx reproduced both total concentrations and monthly variations of PM2.5 for all the four periods with average biases ranging from −2.1 to 1.0 µg m−3. Comparisons with AMS (aerosol mass spectrometer measurements at different sites in Europe during February–March 2009 showed that in general the model overpredicts the inorganic aerosol fraction and underpredicts the organic one, such that the good agreement for PM2.5 is partly due to compensation of errors. The effect of the choice of VBS scheme on OA was investigated as well. Two sensitivity tests with volatility distributions based on previous chamber and ambient measurements data were performed. For February–March 2009 the chamber case reduced the total OA concentrations by about 42 % on average. In contrast, a test based on ambient measurement data increased OA concentrations by about 42 % for the same period bringing

  15. An efficient compression scheme for bitmap indices

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2004-04-13

    When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time

  16. Design of Infusion Schemes for Neuroreceptor Imaging

    DEFF Research Database (Denmark)

    Feng, Ling; Svarer, Claus; Madsen, Karine

    2016-01-01

    for bolus infusion (BI) or programmed infusion (PI) experiments. Steady-state quantitative measurements can be made with one short scan and venous blood samples. The GABAA receptor ligand [(11)C]Flumazenil (FMZ) was chosen for this purpose, as it lacks a suitable reference region. Methods. Five bolus [(11)C...... state was attained within 40 min, which was 8 min earlier than the optimal BI (B/I ratio = 55 min). Conclusions. The system can design both BI and PI schemes to attain steady state rapidly. For example, subjects can be [(11)C]FMZ-PET scanned after 40 min of tracer infusion for 40 min with venous...

  17. Combined Control Scheme for Monitoring Quality Characteristics

    Directory of Open Access Journals (Sweden)

    Adekeye K.S.

    2014-07-01

    Full Text Available In the literature, the Exponentially Weighted Moving Average (EWMA and Exponentially Weighted Moving Variance (EMWV control schemes have been used separately to monitor the process average and process variability respectively. Here the two are combined and applied on simulated process with different level of variation. The control limit interval (CLI and the average run length (ARL were evaluated for the combined chart. The combined chart performed better than the two independently. Furthermore, an algorithm was developed for the two control charts and implemented on visual basic VB6.0. The obtained results show that the combined EWMA and EWMV control chart is very sensitive in detecting shift in production process and every shift in the process mean is always preceded by shift in the process variability.

  18. Parasitology: United Kingdom National Quality Assessment Scheme.

    Science.gov (United States)

    Hawthorne, M.; Chiodini, P. L.; Snell, J. J.; Moody, A. H.; Ramsay, A.

    1992-01-01

    AIMS: To assess the results from parasitology laboratories taking part in a quality assessment scheme between 1986 and 1991; and to compare performance with repeat specimens. METHODS: Quality assessment of blood parasitology, including tissue parasites (n = 444; 358 UK, 86 overseas), and faecal parasitology, including extra-intestinal parasites (n = 205; 141 UK, 64 overseas), was performed. RESULTS: Overall, the standard of performance was poor. A questionnaire distributed to participants showed that a wide range of methods was used, some of which were considered inadequate to achieve reliable results. Teaching material was distributed to participants from time to time in an attempt to improve standards. CONCLUSIONS: Since the closure of the IMLS fellowship course in 1972, fewer opportunities for specialised training in parasitology are available: more training is needed. Poor performance in the detection of malarial parasites is mainly attributable to incorrect speciation, misidentification, and lack of equipment such as an eyepiece graticule. PMID:1452791

  19. Auction dynamics: A volume constrained MBO scheme

    Science.gov (United States)

    Jacobs, Matt; Merkurjev, Ekaterina; Esedoǧlu, Selim

    2018-02-01

    We show how auction algorithms, originally developed for the assignment problem, can be utilized in Merriman, Bence, and Osher's threshold dynamics scheme to simulate multi-phase motion by mean curvature in the presence of equality and inequality volume constraints on the individual phases. The resulting algorithms are highly efficient and robust, and can be used in simulations ranging from minimal partition problems in Euclidean space to semi-supervised machine learning via clustering on graphs. In the case of the latter application, numerous experimental results on benchmark machine learning datasets show that our approach exceeds the performance of current state-of-the-art methods, while requiring a fraction of the computation time.

  20. Efficient Conservative Reformulation Schemes for Lithium Intercalation

    Energy Technology Data Exchange (ETDEWEB)

    Urisanga, PC; Rife, D; De, S; Subramanian, VR

    2015-02-18

    Porous electrode theory coupled with transport and reaction mechanisms is a widely used technique to model Li-ion batteries employing an appropriate discretization or approximation for solid phase diffusion with electrode particles. One of the major difficulties in simulating Li-ion battery models is the need to account for solid phase diffusion in a second radial dimension r, which increases the computation time/cost to a great extent. Various methods that reduce the computational cost have been introduced to treat this phenomenon, but most of them do not guarantee mass conservation. The aim of this paper is to introduce an inherently mass conserving yet computationally efficient method for solid phase diffusion based on Lobatto III A quadrature. This paper also presents coupling of the new solid phase reformulation scheme with a macro-homogeneous porous electrode theory based pseudo 20 model for Li-ion battery. (C) The Author(s) 2015. Published by ECS. All rights reserved.

  1. Foil Bearing Stiffness Estimation with Pseudospectral Scheme

    Directory of Open Access Journals (Sweden)

    Sankar Balaji

    2016-01-01

    Full Text Available Compliant foil gas lubricated bearings are used for the support of light loads in the order of few kilograms at high speeds, in the order of 50,000 RPM. The stiffness of the foil bearings depends both on the stiffness of the compliant foil and on the lubricating gas film. The stiffness of the bearings plays a crucial role in the stable operation of the supported rotor over a range of speeds. This paper describes a numerical approach to estimate the stiffness of the bearings using pseudo spectral scheme. Methodology to obtain the stiffness of the foil bearing as a function of weight of the shaft is given and the results are presented.

  2. State Of Art in Homomorphic Encryption Schemes

    Directory of Open Access Journals (Sweden)

    S. Sobitha Ahila

    2014-02-01

    Full Text Available The demand for privacy of digital data and of algorithms for handling more complex structures have increased exponentially over the last decade. However, the critical problem arises when there is a requirement for publicly computing with private data or to modify functions or algorithms in such a way that they are still executable while their privacy is ensured. This is where homomorphic cryptosystems can be used since these systems enable computations with encrypted data. A fully homomorphic encryption scheme enables computation of arbitrary functions on encrypted data.. This enables a customer to generate a program that can be executed by a third party, without revealing the underlying algorithm or the processed data. We will take the reader through a journey of these developments and provide a glimpse of the exciting research directions that lie ahead. In this paper, we propose a selection of the most important available solutions, discussing their properties and limitations.

  3. New CERN Health Insurance Scheme (CHIS) forms

    CERN Multimedia

    HR Department

    2015-01-01

    New versions of the following forms for claims and requests to the CERN Health Insurance Scheme (CHIS) have been released:   form for claiming reimbursement of medical expenses,   form for requesting advance reimbursement, and   dental estimate form (for treatments foreseen to exceed 800 CHF).   The new forms are available in French and English. They can either be completed electronically before being printed and signed, or completed in paper form. New detailed instructions can be found at the back of the claim form; CHIS members are invited to read them carefully. The electronic versions (PDF) of all the forms are available on the CHIS website and on the UNIQA Member Portal. CHIS Members are requested to use these new forms forthwith and to discard any previous version. Questions regarding the above should be addressed directly to UNIQA (72730 or 022.718 63 00 or uniqa.assurances@cern.ch).

  4. New scheme for braiding Majorana fermions

    Science.gov (United States)

    Wu, Long-Hua; Liang, Qi-Feng; Hu, Xiao

    2014-01-01

    Non-Abelian statistics can be achieved by exchanging two vortices in topological superconductors with each grabbing a Majorana fermion (MF) as zero-energy quasi-particle at the cores. However, in experiments it is difficult to manipulate vortices. In the present work, we propose a way to braid MFs without moving vortices. The only operation required in the present scheme is to turn on and off local gate voltages, which liberates a MF from its original host vortex and transports it along the prepared track. We solve the time-dependent Bogoliubov–de Gennes equation numerically, and confirm that the MFs are protected provided the switching of gate voltages for exchanging MFs are adiabatic, which takes only several nano seconds given reasonable material parameters. By monitoring the time evolution of MF wave-functions, we show that non-Abelian statistics is achieved. PMID:27877725

  5. An efficient training scheme for supermodels

    Science.gov (United States)

    Schevenhoven, Francine J.; Selten, Frank M.

    2017-06-01

    Weather and climate models have improved steadily over time as witnessed by objective skill scores, although significant model errors remain. Given these imperfect models, predictions might be improved by combining them dynamically into a so-called supermodel. In this paper a new training scheme to construct such a supermodel is explored using a technique called cross pollination in time (CPT). In the CPT approach the models exchange states during the prediction. The number of possible predictions grows quickly with time, and a strategy to retain only a small number of predictions, called pruning, needs to be developed. The method is explored using low-order dynamical systems and applied to a global atmospheric model. The results indicate that the CPT training is efficient and leads to a supermodel with improved forecast quality as compared to the individual models. Due to its computational efficiency, the technique is suited for application to state-of-the art high-dimensional weather and climate models.

  6. European Influenza Surveillance Scheme on the Internet.

    Science.gov (United States)

    Snacken, R; Manuguerra, J C; Taylor, P

    1998-09-01

    In 1995, The European Influenza Surveillance Scheme was created with the participation of eight networks from seven countries. The main objectives were to continue the previous CARE Telematics Network and to adapt the project to the Internet environment as well as to improve substantially the quality of the surveillance according to new epidemiological requirements. Clinical and virological data from the general population and hospitals are collected in an interactive real-time database which can then be used for data entry, queries and consultations. Research programmes have been undertaken in various fields such as standardisation of clinical data and comparability between countries. Validation and security processes guarantee the quality assurance as well as regular assessment by the steering committee. Two additional countries will participate during the next influenza season (1997-98). This will represent an early warning system in a region of approximately 264 million inhabitants.

  7. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  8. MIMO transmit scheme based on morphological perceptron with competitive learning.

    Science.gov (United States)

    Valente, Raul Ambrozio; Abrão, Taufik

    2016-08-01

    This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. Security analysis and improvements of arbitrated quantum signature schemes

    Science.gov (United States)

    Zou, Xiangfu; Qiu, Daowen

    2010-10-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  10. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  11. Temperature profile data from XBT casts in a world wide distribution from multiple platforms from 01 March 2002 to 29 March 2003 (NODC Accession 0000976)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profile data were collected using CTD casts from LYKES COMMANDER and other platforms in a world wide distribution from 01 March 2002 to 29 March 2003....

  12. [Regulation of terpene metabolism]. Annual progress report, March 15, 1989--March 14, 1990

    Energy Technology Data Exchange (ETDEWEB)

    Croteau, R.

    1989-11-09

    Terpenoid oils, resins, and waxes from plants are important renewable resources. The objective of this project is to understand the regulation of terpenoid metabolism using the monoterpenes (C{sub 10}) as a model. The pathways of monoterpene biosynthesis and catabolism have been established, and the relevant enzymes characterized. Developmental studies relating enzyme levels to terpene accumulation within the oil gland sites of synthesis, and work with bioregulators, indicate that monoterpene production is controlled by terpene cyclases, the enzymes catalyzing the first step of the monoterpene pathway. As the leaf oil glands mature, cyclase levels decline and monoterpene biosynthesis ceases. Yield then decreases as the monoterpenes undergo catabolism by a process involving conversion to a glycoside and transport from the leaf glands to the root. At this site, the terpenoid is oxidatively degraded to acetate that is recycled into other lipid metabolites. During the transition from terpene biosynthesis to catabolism, the oil glands undergo dramatic ultrastructural modification. Degradation of the producing cells results in mixing of previously compartmentized monoterpenes with the catabolic enzymes, ultimately leading to yield decline. This regulatory model is being applied to the formation of other terpenoid classes (C{sub 15} C{sub 20}, C{sub 30}, C{sub 40}) within the oil glands. Preliminary investigations on the formation of sesquiterpenes (C{sub 15}) suggest that the corresponding cyclases may play a lesser role in determining yield of these products, but that compartmentation effects are important. From these studies, a comprehensive scheme for the regulation of terpene metabolism is being constructed. Results from this project wail have important consequences for the yield and composition of terpenoid natural products that can be made available for industrial exploitation.

  13. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  14. An Efficient Remote Authentication Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen

    2017-02-01

    Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.

  15. International proposal for an acoustic classification scheme for dwellings

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2014-01-01

    Acoustic classification schemes specify different quality levels for acoustic conditions. Regulations and classification schemes for dwellings typically include criteria for airborne and impact sound insulation, façade sound insulation and service equipment noise. However, although important...... European countries have introduced classification schemes. The schemes typically include four classes. Comparative studies have shown significant discrepancies between countries due to national development of schemes. The diversity is an obstacle for exchange of construction experience for different...... classes, implying also trade barriers. Thus, a harmonized classification scheme would be useful, and the European COST Action TU0901 "Integrating and Harmonizing Sound Insulation Aspects in Sustainable Urban Housing Constructions", running 2009-2013 with members from 32 countries, including three overseas...

  16. DIKU-LASMEA Workshop on Computer Vision, Copenhagen, March, 2009

    DEFF Research Database (Denmark)

    Fihl, Preben

    This report will cover the participation in the DIKU-LASMEA Workshop on Computer Vision held at the department of computer science, University of Copenhagen, in March 2009. The report will give a concise description of the topics presented at the workshop, and briefly discuss how the work relates...

  17. The Hachirogata Polder : Site Visit Report February/March 2017

    NARCIS (Netherlands)

    Nijhuis, S.

    2017-01-01

    This is a report on the visit of the Hachirogata polder of the author from 28 February 2017 to 2 March 2017. The land reclamation is located in the prefecture of Akita in Japan. The visit consisted of a field trip to the polder accompanied by Prof. Yasunori Kitao (Kyoto Women’s University) with

  18. Irradiation Processing Department monthly record report, March 1958

    Energy Technology Data Exchange (ETDEWEB)

    Greninger, A.B.

    1958-04-21

    This document details activities of the irradiation processing department during the month of March, 1958. A general summary is included at the start of the report, after which the report is divided into the following sections: Research and Engineering Operations; Production and Reactor Operations; Facilities Engineering Operation; Employee Relations Operation; and Financial Operation.

  19. Hanford Laboratories Operation monthly activities report, March 1960

    Energy Technology Data Exchange (ETDEWEB)

    1960-04-15

    This is the monthly report for the Hanford Laboratories Operation. Metallurgy, reactor fuels, physics and instrumentation, reactor technology, chemistry, separation processes, biology, financial activities, employee relations, laboratories auxiliaries, radiation protection, operation research, inventions, visits, and personnel status are discussed. This report is for March 1960.

  20. Fusion Power Program. Quarterly progress report, January-March 1979

    Energy Technology Data Exchange (ETDEWEB)

    1979-08-01

    This quarterly report summarizes the Argonne National Laboratory work performed for the Office of Fusion Energy during the January-March 1979 quarter in the following research and development areas: materials; energy storage and transfer; tritium containment, recovery and control; advanced reactor design; atomic data; reactor safety; fusion-fission hybrid systems; alternate applications of fusion energy; and other work related to fusion power.

  1. Thermal Energy Storage technical progress report, April 1984-March 1985

    Energy Technology Data Exchange (ETDEWEB)

    Martin, J.F.

    1986-01-01

    Progress in the development of Thermal Energy Storage (TES) technology under the Oak Ridge National Laboratory Thermal Energy Storage Program for the period April 1984-March 1985 is reported. The program goals and project structure are presented. Each of the areas of TES research active in the program is discussed, and a discussion of technology efforts is included.

  2. Environmental surveillance in the vicinity of Hanford for March 1968

    Energy Technology Data Exchange (ETDEWEB)

    Wooldridge, C.B. (ed.)

    1968-06-07

    This report contains information related to radioactive materials in the Columbia River, the atmosphere, and selected foods for March, 1968. Measurements of the Columbia River flow rate, temperature, and chemical characteristics are also shown. Data for the previous twelve months is included.

  3. LLE Review Quarterly Report (January-March 1985). Volume 22

    Energy Technology Data Exchange (ETDEWEB)

    Kim, H. [Univ. of Rochester, NY (United States)

    1985-03-01

    This volume of the LLE Review contains articles on completion of frequency conversion of the OMEGA system, recent progress in the laser-fusion effort, certain aspects of the LLE advanced technology program, and the National Laser Users Facility activities for January-March 1985.

  4. 2012 BATTERIES GORDON RESEARCH CONFERENCE, MARCH 4-9, 2012

    Energy Technology Data Exchange (ETDEWEB)

    Stephen Harris

    2012-03-09

    The Gordon Research Conference on BATTERIES was held at Four Points Sheraton / Holiday Inn Express, Ventura, California, March 4-9, 2012. The Conference was well-attended with 176 participants. Gordon Research Conferences does not permit publication of meeting proceedings.

  5. "March of the Penguins": Building Knowledge in a Kindergarten Classroom

    Science.gov (United States)

    Fingeret, Lauren

    2008-01-01

    In this study, the author followed a kindergarten class that watched the film and used the book "March of the Penguins" in order to find out how much information the students learned from the film and how the teacher integrated the texts into her unit on penguins in order to maximize their impact. The students were given an oral assessment prior…

  6. An Episode of Late Blizzard, 25-26 March 2013

    Directory of Open Access Journals (Sweden)

    Danciu-Ciurlãu Doruţa

    2014-05-01

    Full Text Available Climatologically speaking, March is a month of transition, from the cold season to a less cold season, and, therefore, weather phenomena occur in a different way from how they usually do during the cold season. The transition between seasons or a late winter can sometimes cause phenomena that usually happened in January or February, at the end of March. Such a case was the snowstorm occurred in two episodes (22nd - 24th and 25th - 27th of March 2013 in Romania in March 2013. In this paper is analyzed the first episode which affected southeastern Romania from different points of view: climatologically, synoptically, economically and social. It was used climatologically data over a period of 112 years, as well as a data for the first 3 month of 2013 which were provided by the National Meteorological Administration (NMA. It has been used synoptic maps, different pressure levels maps, and satellite data, radar data, soundings, all provided by the National Center of Weather Forecast of the NMA. Other type of information from the General Inspectorate for Emergency Situation (IGSU or other ministries and media were also taken into consideration.

  7. Energy situation - March 2008; Conjoncture energetique - mars 2008

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-07-01

    This report makes a status of the French energy expenses, prices, production, consumption, demand, import and export since January 2006 and up to February-March 2008. Details are given separately for primary energy, solid mineral fuels, petroleum products, natural gas and electricity. (J.S.)

  8. Demolition Notification for Quarter Ending March 30, 2014

    Energy Technology Data Exchange (ETDEWEB)

    Juarez, Catherine L. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-01-06

    The National Nuclear Administration (NNSA) and Los Alamos National Security, LLC (LANS), (collectively the Permittees) are submitting notice of demolition activities for quarter ending March 30, 2014 in accordance with Permit Section 1.17.2 of the Los Alamos National Laboratory (LANL) Hazardous Waste Facility Permit to the New Mexico Environment Department Hazardous Waste Bureau (NMED_HWB).

  9. Ceramic Technology Project database: March 1990 summary report

    Energy Technology Data Exchange (ETDEWEB)

    Keyes, B.L.P.

    1992-07-01

    This report is the fifth in a series of semiannual data summary reports on information being stored in the Ceramic Technology Project (CTP) database. The overall system status as of March 31, 1990, is summarized, and the latest additions of ceramic mechanical properties data are given for zirconia, silicon carbide, and silicon nitride ceramic mechanical properties data, including some properties on brazed specimens.

  10. Irradiation Processing Department monthly record report, March 1957

    Energy Technology Data Exchange (ETDEWEB)

    1957-04-19

    This document details activities of the irradiation processing department during the month of March, 1957. A general summary is included at the start of the report, after which the report is divided into the following sections: Research and Engineering Operations; Production and Reactor Operations; Facilities Engineering Operation; Employee Relations Operation; and Financial Operation.

  11. Great Alaska Earthquake, Prince William Sound, March 28, 1964

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Prince William Sound magnitude 8.4 earthquake at 03:36 UT on March 28, 1964, was one of the largest shocks ever recorded on the North American Continent. The...

  12. Irradiation Processing Department monthly record report, March 1960

    Energy Technology Data Exchange (ETDEWEB)

    1960-04-21

    This document details activities of the Irradiation Processing Department during the month of March, 1960. A general summary is included at the start of the report, after which the report is divided into the following sections: Research and Engineering Operations; Production and Reactor Operations; Facilities Engineering Operation; Employee Relations Operation; and Financial Operation.

  13. Irradiation Processing Department monthly record report, March 1959

    Energy Technology Data Exchange (ETDEWEB)

    Greninger, A.B.

    1959-04-21

    This document details activities of the irradiation processing department during the month of March, 1959. A general summary is included at the start of the report, after which the report is divided into the following sections: Research and Engineering Operations; Production and Reactor Operations; Facilities Engineering Operation; Employee Relations Operation; and Financial Operation.

  14. Simulation of the Tornado Event of 22 March, 2013 over ...

    Indian Academy of Sciences (India)

    An attempt has been made to simulate this rare event using the Weather Research and Forecasting (WRF) model. The model was run in a single domain at 9 km resolution for a period of 24 hrs, starting at 0000 UTC on 22 March, 2013. The meteorological conditions that led to form this tornado have been analyzed.

  15. Project quarterly report-8, January 1978--March 1978

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-01

    Progress made by the Low-Cost Silicon Solar Array Project during the period January through March 1978 is described. Task reports on silicon material processing, large-area silicon sheet development, encapsulation materials testing and development, project engineering and operations, and manufacturing techniques, plus the steps taken to integrate these efforts are included.

  16. 100 Areas technical activities report, engineers - March 1951

    Energy Technology Data Exchange (ETDEWEB)

    1951-04-01

    This is the monthly 100 areas technical activities report from the engineering division for the month of March 1951. It reports on engineering activities related directly to the different production reactors, and gives progress reports on various engineering projects which are in development by the engineering group.

  17. Hanford Atomic Products Operation monthly report, March 1953

    Energy Technology Data Exchange (ETDEWEB)

    McCune, F.K.

    1953-04-22

    This is a progress report of the production reactors on the Hanford Reservation for the month of March 1953. This report takes each division (e.g., manufacturing, medical, accounting, occupational safety, security, reactor operations, etc.) of the site and summarizes its accomplishments and employee relations for that month.

  18. Decentralized Economic Dispatch Scheme With Online Power Reserve for Microgrids

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Wang, P.

    2017-01-01

    Decentralized economic operation schemes have several advantages when compared with the traditional centralized management system for microgrids. Specifically, decentralized schemes are more flexible, less computationally intensive, and easier to implement without relying on communication...... costs, their power ratings, and other necessary constraints, before deciding the DG dispatch priorities and droop characteristics. The proposed scheme also allows online power reserve to be set and regulated within the microgrid. This, together with the generation cost saved, has been verified...

  19. 7 CFR 12.10 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...

  20. A repeat-until-success quantum computing scheme

    Energy Technology Data Exchange (ETDEWEB)

    Beige, A [School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT (United Kingdom); Lim, Y L [DSO National Laboratories, 20 Science Park Drive, Singapore 118230, Singapore (Singapore); Kwek, L C [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542, Singapore (Singapore)

    2007-06-15

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes.

  1. A Comparative Analysis of Schemes for Correlated Branch Prediction

    OpenAIRE

    Young, Cliff; Gloy, Nicolas; Smith, Michael D.

    1995-01-01

    Modern high-performance architectures require extremely accurate branch prediction to overcome the performance limitations of conditional branches. We present a framework that categorizes branch prediction schemes by the way in which they partition dynamic branches and by the kind of predictor that they use. The framework allows us to compare and contrast branch prediction schemes, and to analyze why they work. We use the framework to show how a static correlated branch prediction scheme incr...

  2. An ASI Suppression Scheme Based on Array Synthesis

    Science.gov (United States)

    Zhu, Jinhua; Liu, Peixi; Luo, Wu

    2017-10-01

    An adjacent satellite interference (ASI) suppression scheme based on transmitting antennas array synthesis is proposed in this paper. The scheme ensures the ASI under the upper bound specified by international regulations, and simultaneously maximize the main-axis radiated power. Specifically, the interference suppression problem is converted into a uniform linear array (ULA) synthesis problem, and then solved by two algorithms. Numerical results are presented to illustrate the performance of the scheme.

  3. Two Conservative Difference Schemes for Rosenau-Kawahara Equation

    Directory of Open Access Journals (Sweden)

    Jinsong Hu

    2014-01-01

    Full Text Available Two conservative finite difference schemes for the numerical solution of the initialboundary value problem of Rosenau-Kawahara equation are proposed. The difference schemes simulate two conservative quantities of the problem well. The existence and uniqueness of the difference solution are proved. It is shown that the finite difference schemes are of second-order convergence and unconditionally stable. Numerical experiments verify the theoretical results.

  4. Equity and service innovation: the implementation of a bibliotherapy scheme in Wales.

    Science.gov (United States)

    Porter, Alison; Peconi, Julie; Evans, Angela; Snooks, Helen; Lloyd, Keith; Russell, Ian

    2008-04-01

    Book Prescription Wales (BPW) is a pilot bibiliotherapy scheme launched in July 2005 as a primary care treatment option for people with mild to moderate mental health problems. In an innovative model, patients are prescribed self-help books from a list, to borrow from local libraries. Our objective was to evaluate its implementation, focusing on the issue of equity of service delivery. Data were gathered from Welsh Assembly Government concerning project set-up and borrowing rates. Mailed questionnaires were completed by 21/22 (95.4%) Local Health Boards and 44/64 (68.8%) Community Mental Health Teams. In addition, 327 out of 497 (66%) primary care practices were surveyed by telephone, 20 prescribers took part in in-depth telephone interviews and three focus groups were conducted with library staff. From July 2005-March 2006, books were borrowed 15,236 times. There was a 10-fold variation in borrowing rates across local authorities (1.07 to 10.18 loans/1000 people). The priority which Local Health Board staff reported giving to the scheme varied. Uptake among prescribers was mixed: in 35% of general practices (n = 116) no-one participated. Prescribers reported different ways of using the bibliotherapy scheme. Library staff reported issues of patchy uptake. Variation in usage of bibliotherapy raises questions about equity; it is unlikely to reflect the distribution of people who could potentially benefit. Factors influencing variation existed all along the implementation chain. It is not always possibly to separate demand-side and supply-side factors when considering equity and service innovation in health care.

  5. Scheme for achieving coherent perfect absorption by anisotropic metamaterials

    KAUST Repository

    Zhang, Xiujuan

    2017-02-22

    We propose a unified scheme to achieve coherent perfect absorption of electromagnetic waves by anisotropic metamaterials. The scheme describes the condition on perfect absorption and offers an inverse design route based on effective medium theory in conjunction with retrieval method to determine practical metamaterial absorbers. The scheme is scalable to frequencies and applicable to various incident angles. Numerical simulations show that perfect absorption is achieved in the designed absorbers over a wide range of incident angles, verifying the scheme. By integrating these absorbers, we further propose an absorber to absorb energy from two coherent point sources.

  6. Nested Hilbert schemes on surfaces: Virtual fundamental class

    DEFF Research Database (Denmark)

    Gholampour, Amin; Sheshmani, Artan; Yau, Shing-Tung

    We construct natural virtual fundamental classes for nested Hilbert schemes on a nonsingular projective surface S. This allows us to define new invariants of S that recover some of the known important cases such as Poincare invariants of Durr-Kabanov-Okonek and the stable pair invariants of Kool......-Thomas. In the case of the nested Hilbert scheme of points, we can express these invariants in terms of integrals over the products of Hilbert scheme of points on S, and relate them to the vertex operator formulas found by Carlsson-Okounkov. The virtual fundamental classes of the nested Hilbert schemes play a crucial...

  7. A chaos secure communication scheme based on multiplication modulation

    Science.gov (United States)

    Fallahi, Kia; Leung, Henry

    2010-02-01

    A secure spread spectrum communication scheme using multiplication modulation is proposed. The proposed system multiplies the message by chaotic signal. The scheme does not need to know the initial condition of the chaotic signals and the receiver is based on an extended Kalman filter (EKF). This signal encryption scheme lends itself to cheap implementation and can therefore be used effectively for ensuring security and privacy in commercial consumer electronics products. To illustrate the effectiveness of the proposed scheme, a numerical example based on Genesio-Tesi system and also Chen dynamical system is presented and the results are compared.

  8. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  9. Comparison of two SVD-based color image compression schemes.

    Science.gov (United States)

    Li, Ying; Wei, Musheng; Zhang, Fengxia; Zhao, Jianli

    2017-01-01

    Color image compression is a commonly used process to represent image data as few bits as possible, which removes redundancy in the data while maintaining an appropriate level of quality for the user. Color image compression algorithms based on quaternion are very common in recent years. In this paper, we propose a color image compression scheme, based on the real SVD, named real compression scheme. First, we form a new real rectangular matrix C according to the red, green and blue components of the original color image and perform the real SVD for C. Then we select several largest singular values and the corresponding vectors in the left and right unitary matrices to compress the color image. We compare the real compression scheme with quaternion compression scheme by performing quaternion SVD using the real structure-preserving algorithm. We compare the two schemes in terms of operation amount, assignment number, operation speed, PSNR and CR. The experimental results show that with the same numbers of selected singular values, the real compression scheme offers higher CR, much less operation time, but a little bit smaller PSNR than the quaternion compression scheme. When these two schemes have the same CR, the real compression scheme shows more prominent advantages both on the operation time and PSNR.

  10. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  11. Error function attack of chaos synchronization based encryption schemes.

    Science.gov (United States)

    Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu

    2004-03-01

    Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor. Copyright 2004 American Institute of Physics.

  12. Consistent Algorithms Marching Along Characteristics for the Numerical Solution of the Boltzmann Equation

    Directory of Open Access Journals (Sweden)

    Nilson C. Roberty

    2011-01-01

    Full Text Available We introduce algorithms marching over a polygonal mesh with elements consistent with the propagation directions of the particle (radiation flux. The decision for adopting this kind of mesh to solve the one-speed Boltzmann transport equation is due to characteristics of the domain of the transport operator which controls derivatives only in the direction of propagation of the particles (radiation flux in the absorbing and scattering media. This a priori adaptivity has the advantages that it formulates a consistent scheme which makes appropriate the application of the Lax equivalence theorem framework to the problem. In this work, we present the main functional spaces involved in the formalism and a description of the algorithms for the mesh generation and the transport equation solution. Some numerical examples related to the solution of a transmission problem in a high-contrast model with absorption and scattering are presented. Also, a comparison with benchmarks problems for source and reactor criticality simulations shows the compatibility between calculations with the algorithms proposed here and theoretical results.

  13. Separation science and technology. Semiannual progress report, October 1993--March 1994

    Energy Technology Data Exchange (ETDEWEB)

    Vandegrift, G.F.; Aase, S.B.; Buchholz, B. [and others

    1997-12-01

    This document reports on the work done by the Separations Science and Technology Programs of the Chemical Technology Division, Argonne National Laboratory (ANL), in the period October 1993-March 1994. This effort is mainly concerned with developing the TRUEX process for removing and concentrating actinides from acidic waste streams contaminated with transuranic (TRU) elements. The objectives of TRUEX processing are to recover valuable TRU elements and to lower disposal costs for the nonTRU waste product of the process. Other projects are underway with the objective of developing (1) evaporation technology for concentrating radioactive waste and product streams such as those generated by the TRUEX process, (2) treatment schemes for liquid wastes stored are being generated at ANL, (3) a process based on sorbing modified TRUEX solvent on magnetic beads to be used for separation of contaminants from radioactive and hazardous waste streams, and (4) a process that uses low-enriched uranium targets for production of {sup 99}Mo for nuclear medicine uses.

  14. Date Attachable Offline Electronic Cash Scheme

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2014-01-01

    Full Text Available Electronic cash (e-cash is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  15. Date Attachable Offline Electronic Cash Scheme

    Science.gov (United States)

    Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  16. Date attachable offline electronic cash scheme.

    Science.gov (United States)

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  17. Predicting FLDs Using a Multiscale Modeling Scheme

    Science.gov (United States)

    Wu, Z.; Loy, C.; Wang, E.; Hegadekatte, V.

    2017-09-01

    The measurement of a single forming limit diagram (FLD) requires significant resources and is time consuming. We have developed a multiscale modeling scheme to predict FLDs using a combination of limited laboratory testing, crystal plasticity (VPSC) modeling, and dual sequential-stage finite element (ABAQUS/Explicit) modeling with the Marciniak-Kuczynski (M-K) criterion to determine the limit strain. We have established a means to work around existing limitations in ABAQUS/Explicit by using an anisotropic yield locus (e.g., BBC2008) in combination with the M-K criterion. We further apply a VPSC model to reduce the number of laboratory tests required to characterize the anisotropic yield locus. In the present work, we show that the predicted FLD is in excellent agreement with the measured FLD for AA5182 in the O temper. Instead of 13 different tests as for a traditional FLD determination within Novelis, our technique uses just four measurements: tensile properties in three orientations; plane strain tension; biaxial bulge; and the sheet crystallographic texture. The turnaround time is consequently far less than for the traditional laboratory measurement of the FLD.

  18. Nonlinear inversion schemes for fluorescence optical tomography.

    Science.gov (United States)

    Freiberger, Manuel; Egger, Herbert; Scharfetter, Hermann

    2010-11-01

    Fluorescence optical tomography is a non-invasive imaging modality that employs the absorption and re-emission of light by fluorescent dyes. The aim is to reconstruct the fluorophore distribution in a body from measurements of light intensities at the boundary. Due to the diffusive nature of light propagation in tissue, fluorescence tomography is a nonlinear and severely ill-posed problem, and some sort of regularization is required for a stable solution. In this paper we investigate reconstruction methods based on Tikhonov regularization with nonlinear penalty terms, namely total-variation regularization and a levelset-type method using a nonlinear parameterization of the unknown function. Moreover, we use the full threedimensional nonlinear forward model, which arises from the governing system of partial differential equations. We discuss the numerical realization of the regularization schemes by Newtontype iterations, present some details of the discretization by finite element methods, and outline the efficient implementation of sensitivity systems via adjoint methods. As we will demonstrate in numerical tests, the proposed nonlinear methods provide better reconstructions than standard methods based on linearized forward models and linear penalty terms. We will additionally illustrate, that the careful discretization of the methods derived on the continuous level allows to obtain reliable, mesh independent reconstruction algorithms.

  19. Design and comparison of gene-pyramiding schemes in animals.

    Science.gov (United States)

    Zhao, F P; Jiang, L; Gao, H J; Ding, X D; Zhang, Q

    2009-08-01

    Marker-assisted gene pyramiding provides a promising way to develop new animal breeds or lines, in which genes responsible for certain favorable characters identified in different breeds or lines are incorporated. In consideration of features of animal populations, we proposed five schemes for pyramiding three genes, denoted Scheme A-E, and five schemes for pyramiding four genes, denoted Scheme F-J. These schemes are representative of the possible alternatives. We also provided an algorithm to compute the population sizes needed in each generation. We compared these schemes with respect to the total population size and the number of generations required under different situations. The results show that there is no scheme that is optimal in all cases. Among the schemes for pyramiding three genes from three lines (L1, L2 and L3), Scheme D (a three-way cross between the three lines are first performed, followed by a backcross to L1 and a subsequent intercross to obtain the desired genotype) has a significant advantage over the other schemes when the recombination rate between adjacent genes ranges from 0.1 to 0.4, while Scheme A (a two-way cross between L1 and L2 and a subsequent intercross are performed, followed by a cross with L3 and a subsequent intercross to obtain the desired genotype) is optimal when recombination rate is 0.5. Among schemes for pyramiding four genes from four lines (L1, L2, L3 and L4), Scheme I (seperately, a two-way cross between L1 and L2 (L3 and L4) followed by a backcross to L1 (L3) and a subsequent intercross are performed, then the offspring from the two sides are crossed and followed by a backcross to L1 and a subsequent intercross to obtain the desired genotype) is optimal when the recombination rate ranges from 0.1 to 0.4, while Scheme F (cross and subsequent intercross between the four lines are performed successively) is the optimal when the recombination rate is 0.5. We also disscuss how the animals' reproductive capacity, the

  20. Dynamic downscaling over western Himalayas: Impact of cloud microphysics schemes

    Science.gov (United States)

    Tiwari, Sarita; Kar, Sarat C.; Bhatla, R.

    2018-03-01

    Due to lack of observation data in the region of inhomogeneous terrain of the Himalayas, detailed climate of Himalayas is still unknown. Global reanalysis data are too coarse to represent the hydroclimate over the region with sharp orography gradient in the western Himalayas. In the present study, dynamic downscaling of the European Centre for Medium-Range Weather Forecast (ECMWF) Reanalysis-Interim (ERA-I) dataset over the western Himalayas using high-resolution Weather Research and Forecast (WRF) model has been carried out. Sensitivity studies have also been carried out using convection and microphysics parameterization schemes. The WRF model simulations have been compared against ERA-I and available station observations. Analysis of the results suggests that the WRF model has simulated the hydroclimate of the region well. It is found that in the simulations that the impact of convection scheme is more during summer months than in winter. Examination of simulated results using various microphysics schemes reveal that the WRF single-moment class-6 (WSM6) scheme simulates more precipitation on the upwind region of the high mountain than that in the Morrison and Thompson schemes during the winter period. Vertical distribution of various hydrometeors shows that there are large differences in mixing ratios of ice, snow and graupel in the simulations with different microphysics schemes. The ice mixing ratio in Morrison scheme is more than WSM6 above 400 hPa. The Thompson scheme favors formation of more snow than WSM6 or Morrison schemes while the Morrison scheme has more graupel formation than other schemes.

  1. Effect of national open apprenticeship scheme on youth employment ...

    African Journals Online (AJOL)

    % response and welding and fabrication with 10.0% response. Socio-economic effect of the scheme was more on employment generation with 87.5% response. Major problems of respondents in the scheme were, exclusion of some participants ...

  2. Evaluating an Earlybird Scheme: Encouraging Early Assignment Writing and Revising

    Science.gov (United States)

    Unsworth, Kerrie; Kauter, Katherine

    2008-01-01

    It is widely suggested that feedback on assignments is useful to students' learning, however, little research has examined how this feedback may be provided in large classes or the actual effects of such a scheme. We designed and implemented a voluntary "earlybird scheme" that provided detailed feedback to undergraduate Business students on a…

  3. A Scale of Cognitive Development: Validating Perry's Scheme.

    Science.gov (United States)

    Fago, George C.

    When William G. Perry (1968) developed his scheme of nine stages of cognitive development, most of which are experienced during the college years, he did not attempt to quantify it. Subsequently, T. D. Erwin (1983) constructed a scale that attempted to quantify the Perry scheme. His findings supported the overall conception of student development…

  4. Awareness and Coverage of the National Health Insurance Scheme ...

    African Journals Online (AJOL)

    A prepayment scheme for health through the National Health Insurance Scheme (NHIS) was commenced in Nigeria about ten years ago. Nigeria operates a federal system of government. Sub- national levels possess a high degree of autonomy in a number of sectors including health. It is important to assess the level of ...

  5. Review of pension schemes of Ukraine and Argentina in ...

    African Journals Online (AJOL)

    The effectiveness of a pension plan or scheme is a function of its contents, structure and management. Over the years, the non-contributory pension scheme in Nigeria was confronted with daunting challenges. As alternative to these challenges, the 2004 Pension Reform Act came into force. The 2004 Pension Reform Act ...

  6. REVIEW OF PENSION SCHEMES OF UKRAINE AND ARGENTINA ...

    African Journals Online (AJOL)

    GRACE

    Abstract. The effectiveness of a pension plan or scheme is a function of its contents, structure and management. Over the years, the non-contributory pension scheme in Nigeria was confronted with daunting challenges. As alternative to these challenges, the 2004 Pension Reform Act came into force. The 2004. Pension ...

  7. Efficient schemes for deterministic joint remote preparation of an ...

    Indian Academy of Sciences (India)

    We present three schemes for the joint remote state preparation (JRSP) of an arbitrary four-qubit W-type entangled state with complex coefficients via four and two three-qubit GHZ states as the quantum channel. In these schemes, two senders (or N senders) share the original state which they wish to help the receiver to ...

  8. Pseudorandomness analysis of the (extended) Lai–Massey scheme

    NARCIS (Netherlands)

    Luo, Yiyuan; Desmedt, Y.; Lai, Xuejia; Gong, Zheng

    2010-01-01

    In this paper we find that the two-round (extended) Lai–Massey scheme is not pseudorandom and three-round (extended) Lai–Massey scheme is not strong pseudorandom. Combined with previous work, we prove that three rounds are necessary and sufficient for the pseudorandomness and four rounds are

  9. Hybrid Modulation Scheme for Cascaded H-Bridge Inverter Cells ...

    African Journals Online (AJOL)

    This work proposes a switching technique for cascaded H-Bridge (CHB) cells. Single carrier Sinusoidal PWM (SCSPWM) scheme is employed in the generation of the gating signals. A sequential switching and base PWM circulation schemes are presented for this fundamental cascaded multilevel inverter topology.

  10. Lattice Boltzmann scheme for diffusion on triangular grids

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2003-01-01

    In this paper we present a Lattice Boltzmann scheme for diffusion on it unstructured triangular grids. In this formulation of a LB for irregular grids there is no need for interpolation, which is required in other LB schemes on irregular grids. At the end of the propagation step the lattice gas

  11. Convection-diffusion lattice Boltzmann scheme for irregular lattices

    NARCIS (Netherlands)

    Sman, van der R.G.M.; Ernst, M.H.

    2000-01-01

    In this paper, a lattice Boltzmann (LB) scheme for convection diffusion on irregular lattices is presented, which is free of any interpolation or coarse graining step. The scheme is derived using the axioma that the velocity moments of the equilibrium distribution equal those of the

  12. An Adaptive Coding Scheme For Effective Bandwidth And Power ...

    African Journals Online (AJOL)

    An adaptive coding scheme that utilizes the different merits of more than one fixed rate codes and the noise level variations on a communication channel to achieve an increased throughput has been implemented in this work. An adaptive coding scheme using three fixed-rate BCH codes was developed and implemented ...

  13. State of the Art in the Cramer Classification Scheme and ...

    Science.gov (United States)

    Slide presentation at the SOT FDA Colloquium on State of the Art in the Cramer Classification Scheme and Threshold of Toxicological Concern in College Park, MD. Slide presentation at the SOT FDA Colloquium on State of the Art in the Cramer Classification Scheme and Threshold of Toxicological Concern in College Park, MD.

  14. Sensor scheme design for active structural acoustic control

    NARCIS (Netherlands)

    Berkhoff, Arthur P.

    Efficient sensing schemes for the active reduction of sound radiation from plates are presented based on error signals derived from spatially weighted plate velocity or near-field pressure. The schemes result in near-optimal reductions as compared to weighting procedures derived from eigenvector or

  15. A robust and secure watermarking scheme based on singular ...

    Indian Academy of Sciences (India)

    In this work, we propose a blind watermarking scheme based on the discrete wavelet transform (DWT) and singular value decomposition (SVD). Singular values (SV's) of high frequency (HH) band are used to optimize perceptual transparency and robustness constraints. Although most of the SVD-based schemes prove to ...

  16. Investigation of schemes for incorporating generator Q limits in the ...

    Indian Academy of Sciences (India)

    ... to avoid the possibility of anomalous solutions encountered while using the conventional schemes is also proposed and evaluated. Results from extensive simulation studies are provided to highlight the strengths and weaknesses of these existing and proposed schemes, especially from the point of view of reliability.

  17. Design Scheme of Remote Monitoring System Based on Qt

    Directory of Open Access Journals (Sweden)

    Xu Dawei

    2015-01-01

    Full Text Available This paper introduces a design scheme of remote monitoring system based on Qt, the scheme of remote monitoring system based on S3C2410 and Qt, with the aid of cross platform development tools Qt and powerful ARM platform design and implementation. The development of remote video surveillance system based on embedded terminal has practical significance and value.

  18. LDPC-PPM Coding Scheme for Optical Communication

    Science.gov (United States)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  19. Scheme on the Web and in the Classroom

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2012-01-01

    LAML is a software system that brings XML languages into Scheme as a collection of Scheme functions. The XML languages are defined by XML document type definitions (DTDs). We review the development of LAML during more than a decade, and we collect the experiences from these efforts. The paper des...

  20. Adaptive guard channel allocation scheme with buffer for mobile ...

    African Journals Online (AJOL)

    A simulation program written in Java programming language evaluates the performance of the scheme based on blocking/dropping probabilities of both calls. Results of the evaluation is described using descriptive statistics such as bar charts. The proposed scheme would reduce congestion and improve quality of service ...

  1. Gaps in the implementation of Uganda's students' loan scheme ...

    African Journals Online (AJOL)

    This study was conducted to examine the performance of the student loan scheme in Uganda. Making reference to related literature, views of selected stakeholders, and the performance of government's earlier lending programmes, the study identifies gaps in the performance of the scheme. These are in the areas of ...

  2. An accurate scheme by block method for third order ordinary ...

    African Journals Online (AJOL)

    A block linear multistep method for solving special third order initial value problems of ordinary differential equations is presented in this paper. The approach of collocation approximation is adopted in the derivation of the scheme and then the scheme is applied as simultaneous integrator to special third order initial value ...

  3. A Heuristic Hierarchical Scheme for Academic Search and Retrieval

    DEFF Research Database (Denmark)

    Amolochitis, Emmanouil; Christou, Ioannis T.; Tan, Zheng-Hua

    2013-01-01

    We present PubSearch, a hybrid heuristic scheme for re-ranking academic papers retrieved from standard digital libraries such as the ACM Portal. The scheme is based on the hierarchical combination of a custom implementation of the term frequency heuristic, a time-depreciated citation score...

  4. A FRACTAL-BASED STOCHASTIC INTERPOLATION SCHEME IN SUBSURFACE HYDROLOGY

    Science.gov (United States)

    The need for a realistic and rational method for interpolating sparse data sets is widespread. Real porosity and hydraulic conductivity data do not vary smoothly over space, so an interpolation scheme that preserves irregularity is desirable. Such a scheme based on the properties...

  5. Valuation and Hedging of Variable Annuities in Pension Schemes

    NARCIS (Netherlands)

    Bovenberg, A.L.; van Bilsen, S.; Laeven, R.J.A.

    2016-01-01

    This paper explores defined ambition pension schemes that provide (deferred) variable annuities. These pension schemes allocate various risks (i.e., real interest rate, expected inflation and stock market risk) to the policyholders on the basis of complete contracts. We show how these variable

  6. Practical schemes for privacy and security enhanced RFID

    NARCIS (Netherlands)

    Hoepman, J.H.; Joosten, R.

    2010-01-01

    Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key

  7. A toolbox for the lifting scheme on quincunx grids (LISQ)

    NARCIS (Netherlands)

    P.M. de Zeeuw (Paul)

    2002-01-01

    textabstractA collection of functions written in MATLAB is presented. The functions include second generation wavelet decomposition and reconstruction tools for images as well as functions for the computation of moments. The wavelet schemes rely on the lifting scheme of Sweldens and use the

  8. Comparing interpolation schemes in dynamic receive ultrasound beamforming

    DEFF Research Database (Denmark)

    Kortbek, Jacob; Andresen, Henrik; Nikolov, Svetoslav

    2005-01-01

    In medical ultrasound interpolation schemes are of- ten applied in receive focusing for reconstruction of image points. This paper investigates the performance of various interpolation scheme by means of ultrasound simulations of point scatterers in Field II. The investigation includes conventional...

  9. An efficient entire chaos-based scheme for deniable authentication

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Di [College of Computer Science and Engineering, Chongqing University, Chongqing, 400044 (China) and College of Mechanical Engineering, Chongqing University, Chongqing, 400044 (China)]. E-mail: xiaodi_cqu@hotmail.com; Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing, 400044 (China); Wong, K.W. [Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong (China)

    2005-02-01

    By using a chaotic encryption-hash parallel algorithm and the semi-group property of Chebyshev chaotic map, we propose a secure and efficient scheme for the deniable authentication. The scheme is efficient, practicable and reliable, with high potential to be adopted for e-commerce.

  10. Convexity-preserving Bernstein–Bézier quartic scheme

    Directory of Open Access Journals (Sweden)

    Maria Hussain

    2014-07-01

    Full Text Available A C1 convex surface data interpolation scheme is presented to preserve the shape of scattered data arranged over a triangular grid. Bernstein–Bézier quartic function is used for interpolation. Lower bound of the boundary and inner Bézier ordinates is determined to guarantee convexity of surface. The developed scheme is flexible and involves more relaxed constraints.

  11. Group schemes with additional structures and Weyl group cosets

    NARCIS (Netherlands)

    Moonen, B.

    2000-01-01

    Let Y be an abelian variety of dimension g over an algebraically closed eld k of characteristic p To Y we can associate its pkernel Y p which is a nite commutative kgroup scheme of rank pg In the unpublished manuscript Kraft showed that xing g there are only nitely many such group schemes

  12. Smallholder irrigation schemes in South Africa: A review of ...

    African Journals Online (AJOL)

    The status and characteristics of the 302 smallholder irrigation schemes found in South Africa are discussed and knowledge on South African smallholder irrigation schemes generated by the Water Research Commission (WRC) over a period of nearly 20 years is reviewed. Themes covered include planning, design and ...

  13. Review of the Assistance for Isolated Children Scheme.

    Science.gov (United States)

    Tomlinson, D. G.; Tannock, P. D.

    A total of 3,732 recipients of Assistance for Isolated Children (AIC) allowances during 1979 and 1980 received questionnaires and parents of 313 families were interviewed to determine who benefitted from the AIC Scheme, what use was made of the AIC allowance, what effect did the AIC Scheme appear to have had, and what anomalies existed in relation…

  14. Some Comments on the Scheme of Arrangement as an "Affected ...

    African Journals Online (AJOL)

    Some Comments on the Scheme of Arrangement as an "Affected Transaction" as Defined in the Companies Act 71 of 2008. ... revisited by the legislature for clarification. KEYWORDS: Scheme of arrangement; affected transaction; Companies Act; company takeover; re-acquisition of companies; south african company law ...

  15. The Defunct Rivers State 'School to Land' Scheme: A Dream ...

    African Journals Online (AJOL)

    Ensuring food security and self-reliance through farming made many countries to embark on farming schemes such as the Gezira in Sudan, Alto Beni in Bolivia, Nyakashaka of Uganda, farming settlements of Eastern and Western Nigeria and the ―School to Land‖ scheme. The initial euphoria that welcomed these ...

  16. AN EFFECTIVE SCHEDULING SCHEME FOR LIFT CLUBS

    Directory of Open Access Journals (Sweden)

    W. Van Wijck

    2012-01-01

    Full Text Available

    ENGLISH ABSTRACT: This paper describes a formula for scheduling the day-to-day operation of a lift club. The formula is remarkably simple, and can easily be implemented on a spreadsheet. It is also extremely flexible and can cater for almost any peculiarity that may arise. Much like a business, the lift club is viewed as an entity in its own right, rather than as a collection of individuals. The scheme can be used to generate interesting statistics such as percentage utilization of each member, average percentage utilization of all members, effective size of the lift club, etc. In addition, a graph, depicting each member's liability towards the club against time, can be generated. Finally, every member can obtain a record of his/her trip data over any specific period, which may be handy for income tax purposes.

    AFRIKAANSE OPSOMMING: Hierdie artikel beskryf 'n fonnule vir die dag-tot-dag skedulering van 'n saamryklub. Die fonnule is merkwaardig eenvoudig en kan maklik op 'n sigblad geimplementeer word. Dit is ook besonder buigsaam deurdat dit vir bykans enige gebeurlikheid voorsienning maak. Die voorgestelde skeduleringsmetode beskou die saamryklub as 'n entiteit in eie reg, en skeduleing word vanuit die saamryklub se oogpunt gedoen. Die skema kan gebruik word om interesante statistieke soos byvoorbeeld die persentasie benutting deur enige lid, die gemiddelde persentasie benutting deur aIle lede, die effektiewe grootte van die klub, ens., te genereer. Voorts kan 'n grafiek gegenereer word wat elke lid se aanspreeklikheid teenoor die klub as 'n funksie van tyd grafies vertoon. Laastens kan enige lid op enige stadium 'n rekord trek van die aantal saamrygeleenthede wat hy oor 'n bepaalde periode voorsien en ontvang het. Dit mag handig wees vir belasting doeleindes.

  17. Evaluation of the Norwegian R&D Tax Credit Scheme

    Directory of Open Access Journals (Sweden)

    Ådne Cappelen

    2010-11-01

    Full Text Available We find that the Norwegian R&D tax credit scheme introduced in 2002 mainly works as intended. The scheme is cost-effective and it is used by a large number of firms. It stimulates these firms to invest more in R&D, and, in particular, the effect is positive for small firms with little R&D experience. The returns on the R&D investments supported by the scheme are positive and generally not different from the returns to other R&D investments. We have found examples of what can be interpreted as tax motivated adjustments to the scheme, but to some extent this must be accepted as a cost to subsidy and support schemes intended for use by a large number of economic agents. This is particularly so when attempts are made to keep administrative expenditures and control routines at a low level.

  18. Robust Model Predictive Control Schemes for Tracking Setpoints

    Directory of Open Access Journals (Sweden)

    Vu Trieu Minh

    2010-01-01

    Full Text Available This paper briefly reviews the development of nontracking robust model predictive control (RMPC schemes for uncertain systems using linear matrix inequalities (LMIs subject to input saturated and softened state constraints. Then we develop two new tracking setpoint RMPC schemes with common Lyapunov function and with zero terminal equality subject to input saturated and softened state constraints. The novel tracking setpoint RMPC schemes are able to stabilize uncertain systems once the output setpoints lead to the violation of the state constraints. The state violation can be regulated by changing the value of the weighting factor. A brief comparative simulation study of the two tracking setpoint RMPC schemes is done via simple examples to demonstrate the ability of the softened state constraint schemes. Finally, some features of future research from this study are discussed.

  19. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    -theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  20. A simplification of the unified gas kinetic scheme

    CERN Document Server

    Chen, Songze; Xu, Kun

    2016-01-01

    Unified gas kinetic scheme (UGKS) is an asymptotic preserving scheme for the kinetic equations. It is superior for transition flow simulations, and has been validated in the past years. However, compared to the well known discrete ordinate method (DOM) which is a classical numerical method solving the kinetic equations, the UGKS needs more computational resources. In this study, we propose a simplification of the unified gas kinetic scheme. It allows almost identical numerical cost as the DOM, but predicts numerical results as accurate as the UGKS. Based on the observation that the equilibrium part of the UGKS fluxes can be evaluated analytically, the equilibrium part in the UGKS flux is not necessary to be discretized in velocity space. In the simplified scheme, the numerical flux for the velocity distribution function and the numerical flux for the macroscopic conservative quantities are evaluated separately. The simplification is equivalent to a flux hybridization of the gas kinetic scheme for the Navier-S...

  1. Near-optimal labeling schemes for nearest common ancestors

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Bistrup Halvorsen, Esben; Larsen, Kasper Green

    2014-01-01

    and Korman (STOC'10) established that labels in ancestor labeling schemes have size log n + Θ(log log n), our new lower bound separates ancestor and NCA labeling schemes. Our upper bound improves the 10 log n upper bound by Alstrup, Gavoille, Kaplan and Rauhe (TOCS'04), and our theoretical result even......We consider NCA labeling schemes: given a rooted tree T, label the nodes of T with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the label of their nearest common ancestor. For trees with n nodes we present upper and lower bounds...... establishing that labels of size (2 ± ε)log n, ε schemes have labels of size log n + Ω(log log n). Our lower bound increases this to log n + Ω(log n) for NCA labeling schemes. Since Fraigniaud...

  2. Sound classification of dwellings - Comparison of schemes in Europe

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2009-01-01

    , facade sound insulation and installation noise. The quality classes reflect dierent levels of acoustical comfort. The paper presents and compares the sound classification schemes in Europe. The schemes have been implemented and revised gradually since the 1990es. However, due to lack of coordination......, there are significant discrepancies. Descriptors, number of quality classes, class intervals, class levels and status of the classification schemes in relation to legal requirements vary. In some countries the building code and the classification standard are incoherent. In other countries, they are strongly......National sound classification schemes for dwellings exist in nine countries in Europe, and proposals are under preparation in more countries. The schemes specify class criteria concerning several acoustic aspects, the main criteria being about airborne and impact sound insulation between dwellings...

  3. Hybrid update / invalidate schemes for cache coherence protocols

    Directory of Open Access Journals (Sweden)

    R. V. Dovgopol

    2015-01-01

    Full Text Available In general when considering cache coherence, write back schemes are the default. These schemes invalidate all other copies of a data block during a write. In this paper we propose several hybrid schemes that will switch between updating and invalidating on processor writes at runtime, depending on program conditions. This kind of approaches tend to improve the overall performance of systems in numerous fields ranging from the Information Security to the Civil Aviation. We created our own cache simulator on which we could implement our schemes, and generated data sets from both commercial benchmarks and through artificial methods to run on the simulator. We analyze the results of running the benchmarks with various schemes, and suggest further research that can be done in this area.

  4. Management & Communication: Programme of Seminars January to March 2004

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. MANAGEMENT & COMMUNICATION Nathalie Dumeaux tel. 78144 management.communication@cern.ch Situation : 20.01.2004 DatesDaysPlaces Available** Bilingual seminars Communication Techniques-1/Techniques de communication-1 16, 17, 18 March 3 non Project Management/Gestion de projet 17, 18, 19 March 3 oui Seminars in English Communicating effectively 22, 23 January & 19, 20 February 4 yes Performance Appraisal MAPS 4, 5, 6 February 3 yes Performance Appraisal -MAPS 11, 12, 13 February 3 yes Séminaires en Français Formation à l'entreti...

  5. Analyse economique des contraintes au developpement du marche ...

    African Journals Online (AJOL)

    Le niveau d'instruction de ces femmes est faible. Très peu d'entres-elles ont fini le primaire. Plus de 33% d'entres elles ne sont pas instruites. Tous ces facteurs peuvent expliquer l'influence de leur comportement sur le développement du marché. Des mesures pour lever ces contraintes vont améliorer le développement de ...

  6. La question fonciere au Maghreb : La longue marche vers la ...

    African Journals Online (AJOL)

    ... de la ressource foncière dans des dynamiques de marché – outre les risques environnementaux - se fait toutefois au prix d'un bouleversement social des campagnes et d'une perte de contrôle sur les terres par une fraction paupérisée de la paysannerie. MOTS CLEFS: Propriété foncière, agriculture, capital social ...

  7. Germany at CERN, from 1 to 2 March 2005

    CERN Multimedia

    Patrice Loïez

    2005-01-01

    On 1 March the exhibition was visited by a German delegation headed by Dr Hermann Schunck, Director at BMBF.From left to right: Maximilian Metzger, CERN's Secretary-General, Hermann Schunck, Director at the German Federal Ministry of Education and Research, and Robert Aymar, CERN's Director-General, talking to Wolfgang Holler from Butting, one of the companies at the "Germany at CERN" exhibition. Far right : Susanne-Corinna Langer-Greipl from BMBF, delegate to the CERN Finance Committee.

  8. Military Review, March 1992. Volume 72, Number 3

    Science.gov (United States)

    1992-03-01

    pressure and vehicle configuration conditions in the Persian Gulf. It stepped up its on desert mohilIty, research on dust palliatives in a desert environ ...11 million maps, development of the the- ness owners could not get workers to continue ater plan for environmental cleanup, prime pow- to work during...quality Globil Positioning System (GPS) As this data became available, TEC transformed 30 March 1992 * MILITARY REVIEW Seven Topographic Support System

  9. The United States Army Medical Department Journal, January - March 2009

    Science.gov (United States)

    2009-03-01

    postdoctoral-level fellowship, with most officers* holding PhDs or doctoral degrees in medicine, veterinary science, or dentistry . The program...jj^HH^ THE UNITED STATES ARMY VETERINARY (1ORPS January - March 2009 Perspective M(i Russell J. Czerw A Corps Challenged, Capable, and Committed...otworking, and Collaboration Actions by the DoD Veterinary Food Analyst and Diagnostic Laboratory IK koge^MLMfl reats Squaa Deployment in Support

  10. Le marché sociolinguistique contemporain du Maroc

    NARCIS (Netherlands)

    de Ruiter, A.C.J.; Ziamari, Karima

    2014-01-01

    Au Maroc, les langues sont l’objet des polémiques les plus passionnées. Ce livre s’inscrit ainsi dans la continuité du débat concernant les politiques linguistiques adoptées et met à jour les évolutions récentes du marché sociolinguistique après l’adoption de la nouvelle constitution, approuvée par

  11. Physics Division annual report, April 1, 1993--March 31, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Thayer, K.J. [ed.; Henning, W.F.

    1994-08-01

    This is the Argonne National Laboratory Physics Division Annual Report for the period April 1, 1993 to March 31, 1994. It summarizes work done in a number of different fields, both on site, and at other facilities. Chapters describe heavy ion nuclear physics research, operation and development of the ATLAS accelerator, medium-energy nuclear physics research, theoretical physics, and atomic and molecular physics research.

  12. An Image Inpainting Technique Based on the Fast Marching Method

    OpenAIRE

    Telea*, Alexandru

    2004-01-01

    Digital inpainting provides a means for reconstruction of small damaged portions of an image. Although the inpainting basics are straightforward, most inpainting techniques published in the literature are complex to understand and implement. We present here a new algorithm for digital inpainting based on the fast marching method for level set applications. Our algorithm is very simple to implement, fast, and produces nearly identical results to more complex, and usually slower, known methods....

  13. High order accurate finite difference schemes based on symmetry preservation

    Science.gov (United States)

    Ozbenli, Ersin; Vedula, Prakash

    2017-11-01

    In this paper, we present a mathematical approach that is based on modified equations and the method of equivariant moving frames for construction of high order accurate invariant finite difference schemes that preserve Lie symmetry groups of underlying partial differential equations (PDEs). In the proposed approach, invariant (or symmetry preserving) numerical schemes with a desired (or fixed) order of accuracy are constructed from some non-invariant (base) numerical schemes. Modified forms of PDEs are used to improve the order of accuracy of existing schemes and these modified forms are obtained through addition of defect correction terms to the original forms of PDEs. These defect correction terms of modified PDEs that are noted from truncation error analysis are either completely removed from schemes or their representation is significantly simplified by considering convenient moving frames. This feature of the proposed method can especially be useful to avoid cumbersome numerical representations when high order schemes are developed from low order ones via the method of modified equations. The proposed method is demonstrated via construction of invariant numerical schemes with fixed (and higher) order of accuracy for some common linear and nonlinear problems (including the linear advection-diffusion equation in 1D and 2D, inviscid Burgers' equation, and viscous Burgers' equation) and the performance of these invariant numerical schemes is further evaluated. Our results indicate that such invariant numerical schemes obtained from existing base numerical schemes have the potential to significantly improve the quality of results not only in terms of desired higher order accuracy but also in the context of preservation of appropriate symmetry properties of underlying PDEs.

  14. Generalized energy and potential enstrophy conserving finite difference schemes for the shallow water equations

    Science.gov (United States)

    Abramopoulos, Frank

    1988-01-01

    The conditions under which finite difference schemes for the shallow water equations can conserve both total energy and potential enstrophy are considered. A method of deriving such schemes using operator formalism is developed. Several such schemes are derived for the A-, B- and C-grids. The derived schemes include second-order schemes and pseudo-fourth-order schemes. The simplest B-grid pseudo-fourth-order schemes are presented.

  15. Sparse Reconstruction Schemes for Nonlinear Electromagnetic Imaging

    KAUST Repository

    Desmal, Abdulla

    2016-03-01

    Electromagnetic imaging is the problem of determining material properties from scattered fields measured away from the domain under investigation. Solving this inverse problem is a challenging task because (i) it is ill-posed due to the presence of (smoothing) integral operators used in the representation of scattered fields in terms of material properties, and scattered fields are obtained at a finite set of points through noisy measurements; and (ii) it is nonlinear simply due the fact that scattered fields are nonlinear functions of the material properties. The work described in this thesis tackles the ill-posedness of the electromagnetic imaging problem using sparsity-based regularization techniques, which assume that the scatterer(s) occupy only a small fraction of the investigation domain. More specifically, four novel imaging methods are formulated and implemented. (i) Sparsity-regularized Born iterative method iteratively linearizes the nonlinear inverse scattering problem and each linear problem is regularized using an improved iterative shrinkage algorithm enforcing the sparsity constraint. (ii) Sparsity-regularized nonlinear inexact Newton method calls for the solution of a linear system involving the Frechet derivative matrix of the forward scattering operator at every iteration step. For faster convergence, the solution of this matrix system is regularized under the sparsity constraint and preconditioned by leveling the matrix singular values. (iii) Sparsity-regularized nonlinear Tikhonov method directly solves the nonlinear minimization problem using Landweber iterations, where a thresholding function is applied at every iteration step to enforce the sparsity constraint. (iv) This last scheme is accelerated using a projected steepest descent method when it is applied to three-dimensional investigation domains. Projection replaces the thresholding operation and enforces the sparsity constraint. Numerical experiments, which are carried out using

  16. Three-level schemes of the alternating triangular method

    Science.gov (United States)

    Vabishchevich, P. N.

    2014-06-01

    In this paper, the schemes of the alternating triangular method are set out in the class of splitting methods used for the approximate solution of Cauchy problems for evolutionary problems. These schemes are based on splitting the problem operator into two operators that are conjugate transposes of each other. Economical schemes for the numerical solution of boundary value problems for parabolic equations are designed on the basis of an explicit-implicit splitting of the problem operator. The alternating triangular method is also of interest for the construction of numerical algorithms that solve boundary value problems for systems of partial differential equations and vector systems. The conventional schemes of the alternating triangular method used for first-order evolutionary equations are two-level ones. The approximation properties of such splitting methods can be improved by transiting to three-level schemes. Their construction is based on a general principle for improving the properties of difference schemes, namely, on the regularization principle of A.A. Samarskii. The analysis conducted in this paper is based on the general stability (or correctness) theory of operator-difference schemes.

  17. Design of an extensive information representation scheme for clinical narratives.

    Science.gov (United States)

    Deléger, Louise; Campillos, Leonardo; Ligozat, Anne-Laure; Névéol, Aurélie

    2017-09-11

    Knowledge representation frameworks are essential to the understanding of complex biomedical processes, and to the analysis of biomedical texts that describe them. Combined with natural language processing (NLP), they have the potential to contribute to retrospective studies by unlocking important phenotyping information contained in the narrative content of electronic health records (EHRs). This work aims to develop an extensive information representation scheme for clinical information contained in EHR narratives, and to support secondary use of EHR narrative data to answer clinical questions. We review recent work that proposed information representation schemes and applied them to the analysis of clinical narratives. We then propose a unifying scheme that supports the extraction of information to address a large variety of clinical questions. We devised a new information representation scheme for clinical narratives that comprises 13 entities, 11 attributes and 37 relations. The associated annotation guidelines can be used to consistently apply the scheme to clinical narratives and are https://cabernet.limsi.fr/annotation_guide_for_the_merlot_french_clinical_corpus-Sept2016.pdf . The information scheme includes many elements of the major schemes described in the clinical natural language processing literature, as well as a uniquely detailed set of relations.

  18. Building Secure Public Key Encryption Scheme from Hidden Field Equations

    Directory of Open Access Journals (Sweden)

    Yuan Ping

    2017-01-01

    Full Text Available Multivariate public key cryptography is a set of cryptographic schemes built from the NP-hardness of solving quadratic equations over finite fields, amongst which the hidden field equations (HFE family of schemes remain the most famous. However, the original HFE scheme was insecure, and the follow-up modifications were shown to be still vulnerable to attacks. In this paper, we propose a new variant of the HFE scheme by considering the special equation x2=x defined over the finite field F3 when x=0,1. We observe that the equation can be used to further destroy the special structure of the underlying central map of the HFE scheme. It is shown that the proposed public key encryption scheme is secure against known attacks including the MinRank attack, the algebraic attacks, and the linearization equations attacks. The proposal gains some advantages over the original HFE scheme with respect to the encryption speed and public key size.

  19. How Governance Regimes Shape the Implementation of Water Reuse Schemes

    Directory of Open Access Journals (Sweden)

    Jos Frijns

    2016-12-01

    Full Text Available The governance dimensions of water reuse scheme development and operation, such as policies and regulatory frameworks, and public involvement and stakeholder collaboration, can serve to both facilitate and constrain wider adoption of water reuse practices. This paper explores the significance and underlying structure of the key governance challenges facing the water reuse sector in Europe. It presents empirical evidence from interviews and focus group sessions conducted at four water reuse schemes: an indirect potable reuse scheme at Torreele (Belgium, the urban reuse of treated municipal wastewater at the London Olympic Park (United Kingdom and at Sabadell (Spain, and the reuse of agro-industrial effluent for irrigation at Capitanata (Italy. The findings underscore the importance of clarity in policy arrangements around water reuse, as well as of the financial competitiveness of reuse projects compared to alternative water supply options. Operators of water reuse schemes expressed a preference for water quality standards, which focus on appropriateness for use rather than over-emphasise the waters’ origin so that unnecessary treatment and costs can be avoided. Positive public support was widely acknowledged as an important factor in the success or failure of water reuse schemes. We conclude that constructive institutional relationships underpin many of the challenges faced by reuse scheme operators and that greater emphasis should be given to building confidence and gaining trust in water service providers through early identification of how governance regimes shape the viability of new schemes.

  20. Comparative evaluation of remote maintenance schemes for fusion DEMO reactor

    Energy Technology Data Exchange (ETDEWEB)

    Utoh, Hiroyasu, E-mail: uto.hiroyasu@jaea.go.jp; Tobita, Kenji; Someya, Youji; Asakura, Nobuyuki; Sakamoto, Yoshiteru; Hoshino, Kazuo; Nakamura, Makoto

    2015-10-15

    Highlights: • Various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. • The banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme. • The key engineering issues are in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability. - Abstract: Maintenance schemes are one of the critical issues in DEMO design, significantly affecting the configuration of in-vessel components, the size of toroidal field (TF) coil, the arrangement of poloidal field (PF) coils, reactor building, hot cell and so forth. Therefore, the maintenance schemes should satisfy many design requirements and criteria to assure reliable and safe plant operation and to attain reasonable plant availability. The plant availability depends on reliability of remote maintenance scheme, inspection of pipe connection and plasma operation. In this paper, various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. From the view points of the reliability of inspection on hot cell, TF coil size, stored energy of PF coil and portability of segment, the banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme, and it has key engineering issues such as in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability.

  1. Evaluation of classical spatial-analysis schemes of extreme rainfall

    Directory of Open Access Journals (Sweden)

    D. Ceresetti

    2012-11-01

    Full Text Available Extreme rainfall is classically estimated using raingauge data at raingauge locations. An important related issue is to assess return levels of extreme rainfall at ungauged sites. Classical methods consist in interpolating extreme-value models. In this paper, such methods are referred to as regionalization schemes. Our goal is to evaluate three classical regionalization schemes. Each scheme consists of an extreme-value model (block maxima, peaks over threshold taken from extreme-value theory plus a method to interpolate the parameters of the statistical model throughout the Cévennes-Vivarais region. From the interpolated parameters, the 100-yr quantile level can be estimated over this whole region. A reference regionalization scheme is made of the couple block maxima/kriging, where kriging is an optimal interpolation method. The two other schemes differ from the reference by replacing either the extreme-value model block maxima by peaks over threshold or kriging by a neural network interpolation procedure. Hyper-parameters are selected by cross-validation and the three regionalization schemes are compared by double cross-validation. Our evaluation criteria are based on the ability to interpolate the 100-yr return level both in terms of precision and spatial distribution. It turns out that the best results are obtained by the regionalization scheme combining the peaks-over-threshold method with kriging.

  2. Verifiable Rational Secret Sharing Scheme in Mobile Networks

    Directory of Open Access Journals (Sweden)

    En Zhang

    2015-01-01

    Full Text Available With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants’ share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.

  3. Differences exist across insurance schemes in China post-consolidation.

    Science.gov (United States)

    Li, Yang; Zhao, Yinjun; Yi, Danhui; Wang, Xiaojun; Jiang, Yan; Wang, Yu; Liu, Xinchun; Ma, Shuangge

    2017-01-01

    In China, the basic insurance system consists of three schemes: the UEBMI (Urban Employee Basic Medical Insurance), URBMI (Urban Resident Basic Medical Insurance), and NCMS (New Cooperative Medical Scheme), across which significant differences have been observed. Since 2009, the central government has been experimenting with consolidating these schemes in selected areas. This study examines whether differences still exist across schemes after the consolidation. A survey was conducted in the city of Suzhou, collecting data on subjects 45 years old and above with at least one inpatient or outpatient treatment during a period of twelve months. Analysis on 583 subjects was performed comparing subjects' characteristics across insurance schemes. A resampling-based method was applied to compute the predicted gross medical cost, OOP (out-of-pocket) cost, and insurance reimbursement rate. Subjects under different insurance schemes differ in multiple aspects. For inpatient treatments, subjects under the URBMI have the highest observed and predicted gross and OOP costs, while those under the UEBMI have the lowest. For outpatient treatments, subjects under the UEBMI and URBMI have comparable costs, while those under the NCMS have much lower costs. Subjects under the NCMS also have a much lower reimbursement rate. Differences still exist across schemes in medical costs and insurance reimbursement rate post-consolidation. Further investigations are needed to identify the causes, and interventions are needed to eliminate such differences.

  4. Geosat Geodetic Mission Sensor Data Records (SDR) for March 1986 (NODC Accession 0002544)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains one month of sensor data records (SDRs) from the GEOSAT Geodetic Mission (GM) for the time period of March 01, 1986 to March 31, 1986....

  5. Access to exercise referral schemes -- a population based analysis.

    Science.gov (United States)

    Harrison, R A; McNair, F; Dugdill, L

    2005-12-01

    Sedentary behaviour is a public health priority in many countries. Hundreds of community-based exercise referral schemes have been established in Europe and USA, to increase physical activity. Experimental evidence questions the effectiveness of these schemes. No previous evaluations have considered a population approach nor provide detailed information on the types of people accessing these schemes. This is of concern given increasing health inequalities in other areas of care. Our register-based study quantified the numbers and characteristics of patients referred and accessing a district-wide exercise referral scheme. The analysis considers the effectiveness of these schemes to a geographically defined population. Data were collected prospectively from a patient register for referrals made to a district-wide exercise referral scheme in north-west England. Analysis examined referral rates and the influence of practitioner and patient characteristics on access to the scheme. Over 5 years, 6,610 adults were referred from 125 general practices, with 60.8 per cent female and a mean age of 51.3 years (SD 12.6). This represents 4 per cent of the adult sedentary population in that district. The most common reason for referral was musculoskeletal or cardiovascular risk. Overall, 79 per cent attended at least the first appointment, with statistically significant predictors by age and reason for referral. Those referred for 'fitness' or 'mental health' were most likely to attend. Patients in the youngest and oldest age groups were least likely to attend. Patient's sex and deprivation and the number of patients referred by each general practice did not influence attendance. Primary-care patients seem to view the concept of exercise referral schemes positively but practitioners remain reluctant to refer many of their sedentary patients. There is doubt that exercise referral schemes like this will influence population levels of sedentary behaviour, when considered alongside

  6. A robust cloud access scheme with mutual authentication

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2016-01-01

    Full Text Available Due to the progress of network technology, we can access some information through remote servers, and we also can save and access lots of personal data in remote servers. Therefore, to protect these data and resist unauthorized access is an important issue. Some researchers proposed authentication scheme, but there still exist some security weaknesses. This article is based on the concept of HDFS (Hadoop Distributed File System, and offers a robust authentication scheme. The proposed scheme achieves mutual authentication, prevents re-play attack, solves asynchronous issue, and prevents offline password guessing attack.

  7. Evaluation of PBL schemes in WRF for high Arctic conditions

    DEFF Research Database (Denmark)

    Kirova-Galabova, Hristina; Batchvarova, Ekaterina; Gryning, Sven-Erik

    2015-01-01

    was examined through two configurations (25 vertical levels and 4km grid step, 42 vertical levels and 1.33 km grid step). WRF was run with two planetary boundary layer schemes: Mellor –Yamada – Janjic with local vertical closure and non – local Yonsei University scheme. Temporal evolution of planetary boundary...... development in the summer period was documented by up to 4 sounding per day (00, 06, 12, 18 GMT) and with MYJ scheme it was resolved with correlation coefficient above 0.7 (except for the zonal component of the wind). The variability of the correlation coefficient with height showed good agreement above 80 m...

  8. Approximation scheme based on effective interactions for stochastic gene regulation

    CERN Document Server

    Ohkubo, Jun

    2010-01-01

    Since gene regulatory systems contain sometimes only a small number of molecules, these systems are not described well by macroscopic rate equations; a master equation approach is needed for such cases. We develop an approximation scheme for dealing with the stochasticity of the gene regulatory systems. Using an effective interaction concept, original master equations can be reduced to simpler master equations, which can be solved analytically. We apply the approximation scheme to self-regulating systems with monomer or dimer interactions, and a two-gene system with an exclusive switch. The approximation scheme can recover bistability of the exclusive switch adequately.

  9. Airfoil noise computation use high-order schemes

    DEFF Research Database (Denmark)

    Zhu, Wei Jun; Shen, Wen Zhong; Sørensen, Jens Nørkær

    2007-01-01

    ) finite difference schemes and optimized high-order compact finite difference schemes are applied for acoustic computation. Acoustic equations are derived using so-called splitting technique by separating the compressible NS equations into viscous (flow equation) and inviscid (acoustic equation) parts......High-order finite difference schemes with at least 4th-order spatial accuracy are used to simulate aerodynamically generated noise. The aeroacoustic solver with 4th-order up to 8th-order accuracy is implemented into the in-house flow solver, EllipSys2D/3D. Dispersion-Relation-Preserving (DRP...

  10. Lattice design for the CEPC double ring scheme

    Science.gov (United States)

    Wang, Yiwei; Su, Feng; Bai, Sha; Zhang, Yuan; Bian, Tianjian; Wang, Dou; Yu, Chenghui; Gao, Jie

    2018-01-01

    A future Circular Electron Positron Collider (CEPC) has been proposed by China with the main goal of studying the Higgs boson. Its baseline design, chosen on the basis of its performance, is a double ring scheme; an alternative design is a partial double ring scheme which reduces the budget while maintaining an adequate performance. This paper will present the collider ring lattice design for the double ring scheme. The CEPC will also work as a W and a Z factory. For the W and Z modes, except in the RF region, compatible lattices were obtained by scaling down the magnet strength with energy.

  11. Towards Shift Tolerant Visual Secret Sharing Schemes without Pixel Expansion

    Directory of Open Access Journals (Sweden)

    Juan Justie Su-Tzu

    2016-01-01

    Full Text Available Naor and Shamir proposed the visual cryptography in 1995, they encrypted secret image into two meaningless random images, called shares, and it can be decrypted by human vision without any calculations. However, there would be problems in alignment when these two shares are staked by hand in practical. Therefore, this paper presents the fault-tolerant schemes of stacking two shares which are acquired from secret image encryption without pixel expansion. The main idea of these schemes is combining several pixels to be a unit, then encrypting every unit into a specific combination of pixels. It makes visual secret sharing scheme more practical.

  12. Design of a Secure RFID Authentication Scheme Preceding Market Transactions

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2011-01-01

    Full Text Available In recent years, as RFID reader equipment is ever more widely deployed in handled devices, the importance of security problems among RFID reader, tags and server have obviously gained increased attention. However, there are still many security issues preceding transactions; these issues are well worth discussing. In this paper, we propose a novel authentication scheme, conforming EPC C1G2 standards, at a low implementation cost for market application. In order to achieve mutual authentication, the proposed scheme integrates fingerprint biometrics, related cryptology and a hash function mechanism to ensure the security of the transmitted messages. The proposed scheme also can resist known attacks.

  13. A new MV bus transfer scheme for nuclear power plants

    Directory of Open Access Journals (Sweden)

    Chang Choong-Koo

    2015-01-01

    Full Text Available Fast bus transfer method is the most popular and residual voltage transfer method that is used as a backup in medium voltage buses in general. The use of the advanced technology like open circuit voltage prediction and digital signal processing algorithms can improve the reliability of fast transfer scheme. However, according to the survey results of the recent operation records in nuclear power plants, there were many instances where the fast transfer scheme has failed. To assure bus transfer in any conditions and circumstances, uninterruptible bus transfer scheme utilizing the state of the art medium voltage UPS is discussed and elaborated.

  14. Fragile watermarking scheme for H.264 video authentication

    Science.gov (United States)

    Wang, Chuen-Ching; Hsu, Yu-Chang

    2010-02-01

    A novel H.264 advanced video coding fragile watermarking method is proposed that enables the authenticity and integrity of the video streams to be verified. The effectiveness of the proposed scheme is demonstrated by way of experimental simulations. The results show that by embedding the watermark information in the last nonzero-quantized coefficient in each discrete cosine transform block, the proposed scheme induces no more than a minor distortion of the video content. In addition, we show that the proposed scheme is able to detect unauthorized changes in the watermarked video content without the original video. The experimental results demonstrate the feasibility of the proposed video authentication system.

  15. Cryptanalysis and improvement of multiparty quantum secret sharing schemes

    Energy Technology Data Exchange (ETDEWEB)

    Wang Tianyin [State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Mathematical Science, Luoyang Normal University, Luoyang 471022 (China)], E-mail: wangtianyin@yahoo.cn; Wen Qiaoyan; Gao Fei; Lin Song [State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, PO Box 810, Chengdu 610041 (China)

    2008-12-22

    A scheme of multiparty quantum secret sharing of classical messages (QSSCM) [Z.J. Zhang et al., Opt. Commun. 269 (2007) 418] was proposed. Lin et al. [S. Lin et al., Opt. Commun. 281 (2008) 4553] showed the last agent can obtain half of the secret in Z.J. Zhang's et al. three-party QSSCM scheme and gave an improved version. We further show the first agent and the last agent can obtain all the secret without introducing any error in Zhang's et al. multiparty QSSCM scheme by a special attack with quantum teleportation. We also present an improved version.

  16. Optimization of Trajectory Correction Scheme for Guided Mortar Projectiles

    Directory of Open Access Journals (Sweden)

    Yongwei Zhang

    2015-01-01

    Full Text Available Guidance with traditional trajectory correction scheme usually starts from the trajectory apex time to reduce drag penalties early in flight; however, this method cannot get the max trajectory correction capability of canards according to our analysis. This paper presents an optimized trajectory correction scheme by taking different control phases of canards in ballistic ascending segment and ballistic descending segment. Simulation indicates that the optimized trajectory correction can improve the trajectory correction capability greatly. The result of an example trajectory and Monte Carlo simulations with the predictive guidance law and the trajectory tracking guidance law testifies the effectiveness of the optimized trajectory correction scheme.

  17. Numerical Comparison of Optimal Charging Schemes for Electric Vehicles

    DEFF Research Database (Denmark)

    You, Shi; Hu, Junjie; Pedersen, Anders Bro

    2012-01-01

    The optimal charging schemes for Electric vehicles (EV) generally differ from each other in the choice of charging periods and the possibility of performing vehicle-to-grid (V2G), and have different impacts on EV economics. Regarding these variations, this paper presents a numerical comparison...... of four different charging schemes, namely night charging, night charging with V2G, 24 hour charging and 24 hour charging with V2G, on the basis of real driving data and electricity price of Denmark in 2003. For all schemes, optimal charging plans with 5 minute resolution are derived through the solving...

  18. Performance comparison of binary modulation schemes for visible light communication

    KAUST Repository

    Park, Kihong

    2015-09-11

    In this paper, we investigate the power spectral density of several binary modulation schemes including variable on-off keying, variable pulse position modulation, and pulse dual slope modulation which were previously proposed for visible light communication with dimming control. We also propose a novel slope-based modulation called differential chip slope modulation (DCSM) and develop a chip-based hard-decision receiver to demodulate the resulting signal, detect the chip sequence, and decode the input bit sequence. We show that the DCSM scheme can exploit spectrum density more efficiently than the reference schemes while providing an error rate performance comparable to them. © 2015 IEEE.

  19. An efficient quantum scheme for Private Set Intersection

    Science.gov (United States)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very suitable for big data services in Cloud or large-scale client-server networks.

  20. Cold War masculinities in Turkish literature : a survey of March 12 novels

    NARCIS (Netherlands)

    Gunay-Erkol, Cimen

    2008-01-01

    The military intervention of 12 March 1971 traumatized 1968 radicalism in Turkey “radically”. March 12 novels offer testimonies of the period disguised in imaginative stories about the sufferings and anxieties of individuals in 1970s Turkey. My hypothesis is that the March 12 novel is not simply a