WorldWideScience

Sample records for random kpd schemes

  1. Ketosis prone type 2 diabetes (KPD)

    National Research Council Canada - National Science Library

    Concha L, Luciana; Durruty A, Pilar; García de Los Ríos A, Manuel

    2015-01-01

    Ketosis prone type 2 diabetes (KPD) is presently a well-defined clinical entity, characterized by a debut with severe hyperglycemia and ketoacidosis similar to the presenting form of Type 1 diabetes mellitus (DM1...

  2. The KPD in the Spanish Civil War and the building of a Popular Front: some reflections

    Directory of Open Access Journals (Sweden)

    Alejandro Andreassi Cieri

    2014-04-01

    Full Text Available The aim of this article is to demonstrate the importance for the Communist German Party (KPD of its participation in the Spanish Civil War, the redefinition of its political line, and the elaboration of a strategy to build in his exile a Front Popular against the Nazi dictatorship, especially in Germany. I have used the documentation from Bundesarchiv (Berlin and Archives Nationales / LE CARAN (Paris. I have analyzed the debates of the exiled International Brigades between German communists and socialists. Besides, I studied some characteristics of the German communists, members of the International Brigades to draw a profile helpful to understand the behaviour of the KPD’s members in Spain. I conclude that the active participation of the German Communists in the civil war allowed, in contrast to the enormous difficulties in the resistance inside Germany, to have a leading role in promoting the front populist line in its fight against fascism, thereby recovering the confidence and self esteem of these militants, to redeem part of the responsibility of the KPD in the inability to stop, with the SPD, the arrival to power of National Socialism.

  3. Studi Deskriptif Penyebab Kejadian Ketuban Pecah Dini (KPD pada Ibu Bersalin

    Directory of Open Access Journals (Sweden)

    Budi Rahayu

    2017-11-01

    Full Text Available Premature Rupture Membranes is a rupture of the membranes prematurely. KPD Cause not known with certainty, but nothing to do with uterine hypermotility, thin membranes, infections, multiparous, maternal age, location of the fetus, and previous history of premature rupture of membranes. Impact of the KPD can cause maternal or neonatal infection, hypoxia or compression of the umbilical cord, fetal deformity syndrome, increased Caesarean labour or normal delivery failure, and increased morbidity and maternal perinatal mortality. This study was to identify the cause of the incident picture premature rupture in women giving birth in hospitals in Yogyakarta. This study uses descriptive design quantitative used retrospective time approach. The population in this study are all mothers who have premature rupture of membranes in hospitals in Yogyakarta in obtained from medical records. Premature rupture of membrane in Yogyakarta Hospital there are 427 cases. A sampling technique that with a total sampling with 427 respondents. Analysis of the data used univariate analysis. The results that most respondents are multipara many as 245 people (57.4%, aged 20-35 years as many as 265 people (62.1%, gestational age ≥37 weeks as many as 343 people (80.3%, over distensi uteri as many as 410 people (96.1%, where the fetus head presentation many as 396 people (92.7. In conclusion, an overview of the causes of premature rupture events on maternal includes multipara, 20-35 years of age, gestational age ≥37 weeks, normal uterine enlargement, and the location of the fetus normal presentation.

  4. The clinical psychological diagnostic system (KPD-38): sensitivity to change and validity of a self-report instrument for outcome monitoring and quality assurance.

    Science.gov (United States)

    Moessner, Markus; Gallas, Christine; Haug, Severin; Kordy, Hand

    2011-01-01

    Monitoring psychotherapeutic progress requires valid and economic measures to detect change of clinical relevance. We addressed validity and sensitivity to change of the 'Klinisch Psychologisches Diagnosesystem 38' (KPD-38, Clinical Psychological Diagnosis System), an instrument for outcome monitoring and quality assurance. Data from an inpatient sample (n = 1.377) were used to investigate the concurrent validity, the sensitivity to change, and the criterion validity of the KPD-38 in comparison to the Outcome Questionnaire (OQ-45) and the Brief Symptom Inventory (BSI). Sensitivity-specificity analyses showed similar sensitivity and higher specificity for the KPD-38 scales compared with the BSI and OQ total scores. Change rates on the KPD-38 distress scale (DIS) were found to be lower than on the BSI (KPD-38 DIS: 36.6%, GSI: 67.7%) and the OQ-45 (KPD-38 DIS: 44.3%, OQ tot: 57.1%) total scores. Concordance was low with the BSI ([κ = 0.24] and moderate with the OQ-45 [κ = 0.45]). Implications for applications in the field of outcome assessment and the challenge of further validation are discussed. The relation between sensitivity to change and criterion validity is highlighted. Copyright © 2010 John Wiley & Sons, Ltd.

  5. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  6. Comparison of kriging interpolation precision between grid sampling scheme and simple random sampling scheme for precision agriculture

    Directory of Open Access Journals (Sweden)

    Jiang Houlong

    2016-01-01

    Full Text Available Sampling methods are important factors that can potentially limit the accuracy of predictions of spatial distribution patterns. A 10 ha tobacco-planted field was selected to compared the accuracy in predicting the spatial distribution of soil properties by using ordinary kriging and cross validation methods between grid sampling and simple random sampling scheme (SRS. To achieve this objective, we collected soil samples from the topsoil (0-20 cm in March 2012. Sample numbers of grid sampling and SRS were both 115 points each. Accuracies of spatial interpolation using the two sampling schemes were then evaluated based on validation samples (36 points and deviations of the estimates. The results suggested that soil pH and nitrate-N (NO3-N had low variation, whereas all other soil properties exhibited medium variation. Soil pH, organic matter (OM, total nitrogen (TN, cation exchange capacity (CEC, total phosphorus (TP and available phosphorus (AP matched the spherical model, whereas the remaining variables fit an exponential model with both sampling methods. The interpolation error of soil pH, TP, and AP was the lowest in SRS. The errors of interpolation for OM, CEC, TN, available potassium (AK and total potassium (TK were the lowest for grid sampling. The interpolation precisions of the soil NO3-N showed no significant differences between the two sampling schemes. Considering our data on interpolation precision and the importance of minerals for cultivation of flue-cured tobacco, the grid-sampling scheme should be used in tobacco-planted fields to determine the spatial distribution of soil properties. The grid-sampling method can be applied in a practical and cost-effective manner to facilitate soil sampling in tobacco-planted field.

  7. Effect of non-random mating on genomic and BLUP selection schemes

    Directory of Open Access Journals (Sweden)

    Nirea Kahsay G

    2012-04-01

    Full Text Available Abstract Background The risk of long-term unequal contribution of mating pairs to the gene pool is that deleterious recessive genes can be expressed. Such consequences could be alleviated by appropriately designing and optimizing breeding schemes i.e. by improving selection and mating procedures. Methods We studied the effect of mating designs, random, minimum coancestry and minimum covariance of ancestral contributions on rate of inbreeding and genetic gain for schemes with different information sources, i.e. sib test or own performance records, different genetic evaluation methods, i.e. BLUP or genomic selection, and different family structures, i.e. factorial or pair-wise. Results Results showed that substantial differences in rates of inbreeding due to mating design were present under schemes with a pair-wise family structure, for which minimum coancestry turned out to be more effective to generate lower rates of inbreeding. Specifically, substantial reductions in rates of inbreeding were observed in schemes using sib test records and BLUP evaluation. However, with a factorial family structure, differences in rates of inbreeding due mating designs were minor. Moreover, non-random mating had only a small effect in breeding schemes that used genomic evaluation, regardless of the information source. Conclusions It was concluded that minimum coancestry remains an efficient mating design when BLUP is used for genetic evaluation or when the size of the population is small, whereas the effect of non-random mating is smaller in schemes using genomic evaluation.

  8. Brownian-motion ensembles of random matrix theory: A classification scheme and an integral transform method

    Energy Technology Data Exchange (ETDEWEB)

    Macedo-Junior, A.F. [Departamento de Fisica, Laboratorio de Fisica Teorica e Computacional, Universidade Federal de Pernambuco, 50670-901 Recife, PE (Brazil)]. E-mail: ailton@df.ufpe.br; Macedo, A.M.S. [Departamento de Fisica, Laboratorio de Fisica Teorica e Computacional, Universidade Federal de Pernambuco, 50670-901 Recife, PE (Brazil)

    2006-09-25

    We study a class of Brownian-motion ensembles obtained from the general theory of Markovian stochastic processes in random-matrix theory. The ensembles admit a complete classification scheme based on a recent multivariable generalization of classical orthogonal polynomials and are closely related to Hamiltonians of Calogero-Sutherland-type quantum systems. An integral transform is proposed to evaluate the n-point correlation function for a large class of initial distribution functions. Applications of the classification scheme and of the integral transform to concrete physical systems are presented in detail.

  9. A novel root-index based prioritized random access scheme for 5G cellular networks

    Directory of Open Access Journals (Sweden)

    Taehoon Kim

    2015-12-01

    Full Text Available Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE. One of the challenging issues is to support the quality of service (QoS during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA procedure and propose a novel root-index based prioritized random access (RIPRA scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.

  10. Interference-aware random beam selection schemes for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed

    2012-10-19

    Spectrum sharing systems have been recently introduced to alleviate the problem of spectrum scarcity by allowing secondary unlicensed networks to share the spectrum with primary licensed networks under acceptable interference levels to the primary users. In this work, we develop interference-aware random beam selection schemes that provide enhanced performance for the secondary network under the condition that the interference observed by the receivers of the primary network is below a predetermined/acceptable value. We consider a secondary link composed of a transmitter equipped with multiple antennas and a single-antenna receiver sharing the same spectrum with a primary link composed of a single-antenna transmitter and a single-antenna receiver. The proposed schemes select a beam, among a set of power-optimized random beams, that maximizes the signal-to-interference-plus-noise ratio (SINR) of the secondary link while satisfying the primary interference constraint for different levels of feedback information describing the interference level at the primary receiver. For the proposed schemes, we develop a statistical analysis for the SINR statistics as well as the capacity and bit error rate (BER) of the secondary link.

  11. Core polarization effects in the Hartree--Fock--random phase approximation schemes

    Energy Technology Data Exchange (ETDEWEB)

    Lipparini, E.; Stringari, S.

    1987-02-01

    Core polarization effects in odd nuclei are investigated in the framework of the Hartree--Fock and random phase approximation schemes. The results of the particle vibration coupling model are recovered by linearizing the equations of motion in the interaction Hamiltonian between the external and the core particles. The formalism is used to study the renormalization of diagonal and off-diagonal M1 matrix elements. It is found that M1 polarization effects exhibit a very strong dependence on the range of the force. Copyright 1987 Academic Press, Inc.

  12. A Certificateless Ring Signature Scheme with High Efficiency in the Random Oracle Model

    Directory of Open Access Journals (Sweden)

    Yingying Zhang

    2017-01-01

    Full Text Available Ring signature is a kind of digital signature which can protect the identity of the signer. Certificateless public key cryptography not only overcomes key escrow problem but also does not lose some advantages of identity-based cryptography. Certificateless ring signature integrates ring signature with certificateless public key cryptography. In this paper, we propose an efficient certificateless ring signature; it has only three bilinear pairing operations in the verify algorithm. The scheme is proved to be unforgeable in the random oracle model.

  13. A coupled well-balanced and random sampling scheme for computing bubble oscillations*

    Directory of Open Access Journals (Sweden)

    Jung Jonathan

    2012-04-01

    Full Text Available We propose a finite volume scheme to study the oscillations of a spherical bubble of gas in a liquid phase. Spherical symmetry implies a geometric source term in the Euler equations. Our scheme satisfies the well-balanced property. It is based on the VFRoe approach. In order to avoid spurious pressure oscillations, the well-balanced approach is coupled with an ALE (Arbitrary Lagrangian Eulerian technique at the interface and a random sampling remap. Nous proposons un schéma de volumes finis pour étudier les oscillations d’une bulle sphérique de gaz dans l’eau. La symétrie sphérique fait apparaitre un terme source géométrique dans les équations d’Euler. Notre schéma est basé sur une approche VFRoe et préserve les états stationnaires. Pour éviter les oscillations de pression, l’approche well-balanced est couplée avec une approche ALE (Arbitrary Lagrangian Eulerian, et une étape de projection basée sur un échantillonage aléatoire.

  14. An Authenticated Key Agreement Scheme Based on Cyclic Automorphism Subgroups of Random Orders

    Directory of Open Access Journals (Sweden)

    Yang Jun

    2017-01-01

    Full Text Available Group-based cryptography is viewed as a modern cryptographic candidate solution to blocking quantum computer attacks, and key exchange protocols on the Internet are one of the primitives to ensure the security of communication. In 2016 Habeeb et al proposed a “textbook” key exchange protocol based on the semidirect product of two groups, which is insecure for use in real-world applications. In this paper, after discarding the unnecessary disguising notion of semidirect product in the protocol, we establish a simplified yet enhanced authenticated key agreement scheme based on cyclic automorphism subgroups of random orders by making hybrid use of certificates and symmetric-key encryption as challenge-and-responses in the public-key setting. Its passive security is formally analyzed, which is relative to the cryptographic hardness assumption of a computational number-theoretic problem. Cryptanalysis of this scheme shows that it is secure against the intruder-in-the-middle attack even in the worst case of compromising the signatures, and provides explicit key confirmation to both parties.

  15. Efficient Graph-Based Resource Allocation Scheme Using Maximal Independent Set for Randomly- Deployed Small Star Networks.

    Science.gov (United States)

    Zhou, Jian; Wang, Lusheng; Wang, Weidong; Zhou, Qingfeng

    2017-11-06

    In future scenarios of heterogeneous and dense networks, randomly-deployed small star networks (SSNs) become a key paradigm, whose system performance is restricted to inter-SSN interference and requires an efficient resource allocation scheme for interference coordination. Traditional resource allocation schemes do not specifically focus on this paradigm and are usually too time consuming in dense networks. In this article, a very efficient graph-based scheme is proposed, which applies the maximal independent set (MIS) concept in graph theory to help divide SSNs into almost interference-free groups. We first construct an interference graph for the system based on a derived distance threshold indicating for any pair of SSNs whether there is intolerable inter-SSN interference or not. Then, SSNs are divided into MISs, and the same resource can be repetitively used by all the SSNs in each MIS. Empirical parameters and equations are set in the scheme to guarantee high performance. Finally, extensive scenarios both dense and nondense are randomly generated and simulated to demonstrate the performance of our scheme, indicating that it outperforms the classical max K-cut-based scheme in terms of system capacity, utility and especially time cost. Its achieved system capacity, utility and fairness can be close to the near-optimal strategy obtained by a time-consuming simulated annealing search.

  16. Modelling response time profiles in the absence of drug concentrations: definition and performance evaluation of the K-PD model.

    Science.gov (United States)

    Jacqmin, P; Snoeck, E; van Schaick, E A; Gieschke, R; Pillai, P; Steimer, J-L; Girard, P

    2007-02-01

    estimate the parameters should be undertaken with great caution (e.g., in case of non-linearity or complex drug distribution). Consequently, it is advised to apply this approach only when the underlying structural PD and PK are well understood. In any case, K-PD model should definitively not be substituted for the gold standard PK-PD model when correct full model can and should be identified.

  17. A Multispectral Photon-Counting Double Random Phase Encoding Scheme for Image Authentication

    Directory of Open Access Journals (Sweden)

    Faliu Yi

    2014-05-01

    Full Text Available In this paper, we propose a new method for color image-based authentication that combines multispectral photon-counting imaging (MPCI and double random phase encoding (DRPE schemes. The sparsely distributed information from MPCI and the stationary white noise signal from DRPE make intruder attacks difficult. In this authentication method, the original multispectral RGB color image is down-sampled into a Bayer image. The three types of color samples (red, green and blue color in the Bayer image are encrypted with DRPE and the amplitude part of the resulting image is photon counted. The corresponding phase information that has nonzero amplitude after photon counting is then kept for decryption. Experimental results show that the retrieved images from the proposed method do not visually resemble their original counterparts. Nevertheless, the original color image can be efficiently verified with statistical nonlinear correlations. Our experimental results also show that different interpolation algorithms applied to Bayer images result in different verification effects for multispectral RGB color images.

  18. A prediction scheme of tropical cyclone frequency based on lasso and random forest

    Science.gov (United States)

    Tan, Jinkai; Liu, Hexiang; Li, Mengya; Wang, Jun

    2017-07-01

    This study aims to propose a novel prediction scheme of tropical cyclone frequency (TCF) over the Western North Pacific (WNP). We concerned the large-scale meteorological factors inclusive of the sea surface temperature, sea level pressure, the Niño-3.4 index, the wind shear, the vorticity, the subtropical high, and the sea ice cover, since the chronic change of these factors in the context of climate change would cause a gradual variation of the annual TCF. Specifically, we focus on the correlation between the year-to-year increment of these factors and TCF. The least absolute shrinkage and selection operator (Lasso) method was used for variable selection and dimension reduction from 11 initial predictors. Then, a prediction model based on random forest (RF) was established by using the training samples (1978-2011) for calibration and the testing samples (2012-2016) for validation. The RF model presents a major variation and trend of TCF in the period of calibration, and also fitted well with the observed TCF in the period of validation though there were some deviations. The leave-one-out cross validation of the model exhibited most of the predicted TCF are in consistence with the observed TCF with a high correlation coefficient. A comparison between results of the RF model and the multiple linear regression (MLR) model suggested the RF is more practical and capable of giving reliable results of TCF prediction over the WNP.

  19. Effectiveness of two ultrasound-guided transrectal biopsy schemes in the diagnosis of prostate cancer. A randomized study.

    Science.gov (United States)

    Herranz Amo, Felipe; Jara Rascón, José; Cancho Gil, María José; Tabares Jiménez, Juan; Molina Escudero, Roberto; Hernández Fernández, Carlos

    2010-03-01

    To determine whether a 10-core prostate biopsy scheme is superior to the sextant scheme in diagnosing prostate cancer in patients programmed for a first biopsy, with negative rectal digital examination and PSA between 3.5-20 ng/ml. A randomized prospective study was performed comparing two prostate biopsy schemes, with randomization stratification according to prostate volume ( 50 ml). Sample size predetermination yielded a minimum of 304 patients in order to achieve the primary objective. Statistical analysis was carried out on an intent-to-treat basis, using the chi-squared test and uni- and multivariate analysis via logistic regression. Cancer was detected in 27.3% of the cases. A significant association was observed between cancer diagnosis and age (p=0.03), prostate volume (p=0.0001) and ultrasound nodule identification (p=0.0001). No correlation was observed with the total number of cores in the series (p=0.37) or with prostate volume 50 ml (p=0.09). In the multivariate analysis, age > 70 years (p=0.005), prostate volume sextant scheme may prove to be insufficient.

  20. Evaluation of alternative schemes for recording body weights in meat-type quails by using random regression.

    Science.gov (United States)

    Silva, L P; Ribeiro, J C; Leite, C D S; Sousa, M F; Bonafé, C M; Caetano, G C; Crispim, A C; Torres, R A

    2013-05-13

    Data from 8759 meat-type quails from the UFV1 strain and 9128 from the UFV2 strain were used to assess the possibility of reducing the number of body weight records in genetic evaluations. The evaluated animals were weighed weekly since hatching to the 6th week of life, with up to 7 records of body weight for each bird. The data were evaluated by random regression models, with 9 alternative schemes of data recording, which included 4 records for each scheme and their covariance functions for additive and permanent environmental effects of order 3, fitting 4 intervals for residual variance, and a complete scheme, with 7 records, order of fit 6 for additive and permanent environmental effects and 7 intervals for residual variance. Estimates of heritability for body weight at the 6th week varied from 0.45 to 0.53 for the UFV1 strain and from 0.28 to 0.54 for UFV2 strain. The schemes that had more records in points at the final extreme of the age range showed better estimates, which was likely due to certain properties of polynomial regression that led to biased results in the final extreme of the age range when data are unbalanced. The reduction of the number of body weight records taken during the growth phase is feasible, with little change to breeding value estimates, when 4 body weight records are used in random regression models.

  1. Local radial basis function meshless scheme for vector radiative transfer in participating media with randomly oriented axisymmetric particles.

    Science.gov (United States)

    Sun, Jie; Yi, Hong-Liang; Tan, He-Ping

    2016-02-20

    A local radial basis function meshless scheme (LRBFM) is developed to solve polarized radiative transfer in participating media containing randomly oriented axisymmetric particles in which radial basis functions augmented with polynomial basis are employed to construct the trial functions, and the vector radiative-transfer equation based on the discrete-ordinates approach is discretized directly by collocation method. The LRBFM belongs to a class of truly meshless methods that do not need any mesh or any numerical integration scheme. Performances of the LRBFM are verified with analytical solutions and other numerical results reported earlier in the literature via five various test cases. The predicted angular distribution of brightness temperature and Stokes vector by the LRBFM agree very well with the benchmark. It is demonstrated that the LRBFM is accurate to solve vector radiative transfer in participating media with randomly oriented axisymmetric particles.

  2. W-Band Millimeter-Wave Vector Signal Generation Based on Precoding-Assisted Random Photonic Frequency Tripling Scheme Enabled by Phase Modulator

    National Research Council Canada - National Science Library

    Li, Xinying; Xu, Yuming; Xiao, Jiangnan; Yu, Jianjun

    2016-01-01

    We propose W-band photonic millimeter-wave (mm-wave) vector signal generation employing a precoding-assisted random frequency tripling scheme enabled by a single phase modulator cascaded with a wavelength selective switch (WSS...

  3. A Novel Read Scheme for Large Size One-Resistor Resistive Random Access Memory Array

    Science.gov (United States)

    Zackriya, Mohammed; Kittur, Harish M.; Chin, Albert

    2017-02-01

    The major issue of RRAM is the uneven sneak path that limits the array size. For the first time record large One-Resistor (1R) RRAM array of 128x128 is realized, and the array cells at the worst case still have good Low-/High-Resistive State (LRS/HRS) current difference of 378 nA/16 nA, even without using the selector device. This array has extremely low read current of 9.7 μA due to both low-current RRAM device and circuit interaction, where a novel and simple scheme of a reference point by half selected cell and a differential amplifier (DA) were implemented in the circuit design.

  4. The influence of wearing schemes and supportive telephone calls on adherence in accelerometry measurement: results of a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    van den Berg N

    2017-03-01

    Full Text Available Neeltje van den Berg,1,2 Sabina Ulbricht,2,3 Thea Schwaneberg,1,2 Kerstin Weitmann,1,2 Franziska Weymar,1–3 Stefan Groß,2,4 Marcus Dörr,2,4 Wolfgang Hoffmann1,2 1Institute for Community Medicine, University Medicine Greifswald, 2German Centre for Cardiovascular Research (DZHK, Partner Site Greifswald, 3Institute of Social Medicine and Prevention, University Medicine Greifswald, 4Department of Internal Medicine B, University Medicine Greifswald, Greifswald, Germany Background: Physical activity (PA can be assessed by accelerometer monitors. However, a high adherence to wearing this device is essential to obtain valid data. In this study, the influence of different wearing schemes and additional supportive phone calls (SPCs on adherence was examined. Methods: A randomized study with four groups was conducted in the context of a health examination program among participants aged 40–75 years without a history of cardiovascular diseases. Participants were recruited in different settings (general medical practices, job center, and health insurance. The participants were asked to wear an accelerometer for 7 consecutive days according to the wearing scheme “day and night” or “day only” and received or did not receive SPCs. Full adherence was defined as a total wearing time of 98 hours (between 8 am and 10 pm during 7 days. A generalized linear model was used to calculate the difference between the maximum possible and the observed adherence. Results: Adherence could be assessed for 249 participants (mean age: 56.40 years; standard deviation [SD] 9.83, 40% males. The mean wearing time was 84.04 hours (SD 20.75. Participants with the wearing scheme day and night were significantly more adherent than participants with the wearing scheme day only (incidence rate ratio [IRR] 0.63; P=0.005. SPCs had no additional effect on adherence (IRR 0.80; P=0.168. Conclusion: To assess PA, the wearing scheme day and night provides the best possible

  5. Threshold-Based Random Charging Scheme for Decentralized PEV Charging Operation in a Smart Grid.

    Science.gov (United States)

    Kwon, Ojin; Kim, Pilkee; Yoon, Yong-Jin

    2016-12-26

    Smart grids have been introduced to replace conventional power distribution systems without real time monitoring for accommodating the future market penetration of plug-in electric vehicles (PEVs). When a large number of PEVs require simultaneous battery charging, charging coordination techniques have become one of the most critical factors to optimize the PEV charging performance and the conventional distribution system. In this case, considerable computational complexity of a central controller and exchange of real time information among PEVs may occur. To alleviate these problems, a novel threshold-based random charging (TBRC) operation for a decentralized charging system is proposed. Using PEV charging thresholds and random access rates, the PEVs themselves can participate in the charging requests. As PEVs with a high battery state do not transmit the charging requests to the central controller, the complexity of the central controller decreases due to the reduction of the charging requests. In addition, both the charging threshold and the random access rate are statistically calculated based on the average of supply power of the PEV charging system that do not require a real time update. By using the proposed TBRC with a tolerable PEV charging degradation, a 51% reduction of the PEV charging requests is achieved.

  6. Effectiveness of a behavioral incentive scheme linked to goal achievement: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Redfern, Julie; Enright, Gemma; Raadsma, Simon; Allman-Farinelli, Margaret; Innes-Hughes, Christine; Khanal, Santosh; Khanal, Santash; Lukeis, Sarah; Rissel, Chris; Gyani, Alex

    2016-01-16

    Childhood obesity is a concern in Australia and across the world. Community-based weight management programs are an important response to address childhood obesity. However, the scientific literature suggests that their effectiveness could potentially be enhanced by providing a structured incentive scheme. This proposal aims to determine the effectiveness of enhanced goal setting linked to a structured incentive scheme designed to improve the sustained health and wellbeing of overweight/obese children within the context of an existing community-based program. This study is a cluster randomized controlled trial delivered within the context of the existing NSW "Go4Fun" program with a 10-week and 6- and 12-month follow-up (n = 40 sites, 570 participants) that compares the effectiveness of small changes to the program in which children were asked to set goals (supported by text messages) and were given rewards for achieving them (intervention). This will be compared to the standard/existing program (control), which did not have the same structured incentive program. Data will be collected for all participants at baseline, end of program, and at 6 and 12 months. The primary outcome is a mean change in body mass index (BMI) z score at the 12-month follow-up. Secondary outcomes include anthropometric measures (body weight, height, and waist circumference) and behavioral measures collected via validated questionnaires. A process evaluation (comprising surveys and focus groups) to determine acceptability and sustainability and to inform downstream translation will also be conducted. This study will inform policy and program delivery as well as the broader evidence base regarding goal achievement and incentive schemes directed at children's health-related behaviors and will provide evidence that is likely to be transferrable across a range of health conditions. ACTRN12615000558527 registered on 29 May 2015.

  7. Generalized Encoding CRDSA: Maximizing Throughput in Enhanced Random Access Schemes for Satellite

    Directory of Open Access Journals (Sweden)

    Manlio Bacco

    2014-12-01

    Full Text Available This work starts from the analysis of the literature about the Random Access protocols with contention resolution, such as Contention Resolution Diversity Slotted Aloha (CRDSA, and introduces a possible enhancement, named Generalized Encoding Contention Resolution Diversity Slotted Aloha (GE-CRDSA. The GE-CRDSA aims at improving the aggregated throughput when the system load is less than 50%, playing on the opportunity of transmitting an optimal combination of information and parity packets frame by frame. This paper shows the improvement in terms of throughput, by performing traffic estimation and adaptive choice of information and parity rates, when a satellite network undergoes a variable traffic load profile.

  8. Cryptographic salting for security enhancement of double random phase encryption schemes

    Science.gov (United States)

    Velez Zea, Alejandro; Fredy Barrera, John; Torroba, Roberto

    2017-10-01

    Security in optical encryption techniques is a subject of great importance, especially in light of recent reports of successful attacks. We propose a new procedure to reinforce the ciphertexts generated in double random phase encrypting experimental setups. This ciphertext is protected by multiplexing with a ‘salt’ ciphertext coded with the same setup. We present an experimental implementation of the ‘salting’ technique. Thereafter, we analyze the resistance of the ‘salted’ ciphertext under some of the commonly known attacks reported in the literature, demonstrating the validity of our proposal.

  9. Biometrics based key management of double random phase encoding scheme using error control codes

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  10. Modeling of α/β for late rectal toxicity from a randomized phase II study: conventional versus hypofractionated scheme for localized prostate cancer

    Directory of Open Access Journals (Sweden)

    Arcangeli Giorgio

    2009-08-01

    Full Text Available Abstract Background Recently, the use of hypo-fractionated treatment schemes for the prostate cancer has been encouraged due to the fact that α/β ratio for prostate cancer should be low. However a major concern on the use of hypofractionation is the late rectal toxicity, it is important to be able to predict the risk of toxicity for alternative treatment schemes, with the best accuracy. The main purpose of this study is to evaluate the response of rectum wall to changes in fractionation and to quantify the α/β ratio for late rectal toxicity Methods 162 patients with localized prostate cancer, treated with conformal radiotherapy, were enrolled in a phase II randomized trial. The patients were randomly assigned to 80 Gy in 40 fractions over 8 weeks (arm A or 62 Gy in 20 fractions over 5 weeks (arm B. The median follow-up was 30 months. The late rectal toxicity was evaluated using the Radiation Therapy Oncology Group (RTOG scale. It was assumed ≥ Grade 2 (G2 toxicity incidence as primary end point. Fit of toxicity incidence by the Lyman-Burman-Kutcher (LKB model was performed. Results The crude incidence of late rectal toxicity ≥ G2 was 14% and 12% for the standard arm and the hypofractionated arm, respectively. The crude incidence of late rectal toxicity ≥ G2 was 14.0% and 12.3% for the arm A and B, respectively. For the arm A, volumes receiving ≥ 50 Gy (V50 and 70 Gy (V70 were 38.3 ± 7.5% and 23.4 ± 5.5%; for arm B, V38 and V54 were 40.9 ± 6.8% and 24.5 ± 4.4%. An α/β ratio for late rectal toxicity very close to 3 Gy was found. Conclusion The ≥ G2 late toxicities in both arms were comparable, indicating the feasibility of hypofractionated regimes in prostate cancer. An α/β ratio for late rectal toxicity very close to 3 Gy was found.

  11. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  12. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  13. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    This paper describes and discusses two different Scheme documentation tools. The first is SchemeDoc, which is intended for documentation of the interfaces of Scheme libraries (APIs). The second is the Scheme Elucidator, which is for internal documentation of Scheme programs. Although the tools...

  14. A 24-Week, Randomized, Controlled Study to Evaluate the Tolerability, Safety and Efficacy of 2 Different Titration Schemes of the Rivastigmine Patch in Japanese Patients with Mild to Moderate Alzheimer's Disease.

    Science.gov (United States)

    Nakamura, Yu; Strohmaier, Christine; Tamura, Kaoru; Kataoka, Naoko; Nakano, Masayuki; Oda, Shoichiro; Nishimura, Kazuma; Homma, Akira

    2015-01-01

    To investigate whether 1-step titration of the rivastigmine patch (initiated at 5 cm(2) and titrated to 10 cm(2) after 4 weeks) is well tolerated in Japanese patients with Alzheimer's disease (AD) as compared to 3-step titration (initiated at 2.5 cm(2) and titrated by 2.5 cm(2) every 4 weeks to 10 cm(2)). A 24-week, multicenter, randomized, double-blind study was conducted in Japan between July 2012 and May 2014. Patients with mild to moderate AD aged 50-85 years were randomized 1:1 to 1-step or 3-step titration of the rivastigmine once-daily patch. The primary endpoint was the proportion of patients with adverse events leading to discontinuation. Of 216 patients randomized, 215 (1-step, n = 107; 3-step, n = 108) were included in the safety analysis. The primary endpoint outcome was 15.0% in the 1-step group and 18.5% in the 3-step group. The observed treatment difference was -3.6% (95% confidence interval: -17.0, 9.6), falling within the prespecified acceptance range. The tolerability of two different titration schemes was similar in Japanese patients with AD.

  15. A 24-Week, Randomized, Controlled Study to Evaluate the Tolerability, Safety and Efficacy of 2 Different Titration Schemes of the Rivastigmine Patch in Japanese Patients with Mild to Moderate Alzheimer's Disease

    Directory of Open Access Journals (Sweden)

    Yu Nakamura

    2015-09-01

    Full Text Available Aim: To investigate whether 1-step titration of the rivastigmine patch (initiated at 5 cm2 and titrated to 10 cm2 after 4 weeks is well tolerated in Japanese patients with Alzheimer's disease (AD as compared to 3-step titration (initiated at 2.5 cm2 and titrated by 2.5 cm2 every 4 weeks to 10 cm2. Methods: A 24-week, multicenter, randomized, double-blind study was conducted in Japan between July 2012 and May 2014. Patients with mild to moderate AD aged 50-85 years were randomized 1:1 to 1-step or 3-step titration of the rivastigmine once-daily patch. The primary endpoint was the proportion of patients with adverse events leading to discontinuation. Results: Of 216 patients randomized, 215 (1-step, n = 107; 3-step, n = 108 were included in the safety analysis. The primary endpoint outcome was 15.0% in the 1-step group and 18.5% in the 3-step group. The observed treatment difference was −3.6% (95% confidence interval: −17.0, 9.6, falling within the prespecified acceptance range. Conclusion: The tolerability of two different titration schemes was similar in Japanese patients with AD.

  16. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  17. Community-applied research of a traditional Chinese medicine rehabilitation scheme on Broca's aphasia after stroke: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Tao, Jing; Fang, Yunhua; Wu, Zhenkai; Rao, Ting; Su, Yusheng; Lin, Lili; Liu, Wei; Wu, Jinsong; Yang, Shanli; Zheng, Guohua; Chen, Lidian

    2014-07-21

    Aphasia is a common and severely disabling complication in stroke patients. It usually brings about lower rates of functional recovery, longer rehabilitation length of stay (LOS), and significantly poorer LOS efficiency (LOS-Eff), resulting in higher rehabilitation costs compared to patients without aphasia. It also decreases the quality of life and increases the mortality of stroke patients. The evidence currently available suggests that the effect of acupuncture combined with language training for apoplectic aphasia is statistically better than speech and language therapy (SLT) alone, but there remains a lack of high-quality randomized controlled trials. Acupuncture combined with language training is relatively low-cost and especially suitable for community-based rehabilitation for aphasia patients after stroke, taking its medical and health facilities which are always deficient in manpower and material resources into account. The aim of the present study is to develop an effective standard therapeutic program for apoplectic aphasia in communities. In a randomized controlled clinical trial with blinded assessment, 290 eligible patients with aphasia due to stroke will be randomly allocated into a control group or an experimental group. The course of this trial will comprise a 4-week intervention and a 12-week follow-up period. Five assessment points, including baseline, 2 and 4 weeks after treatment, 6 and 12 weeks after follow-up, are set to dynamically observe the changes of curative effects. Primary outcome measures are the differences in the score on both the China rehabilitation research center aphasia examination (CRRCAE) and Boston diagnostic aphasia examination - Chinese version (BDAE-C) after intervention and follow-up. The Modified Barthel Index (MBI), 36-Item Short Form Health Survey (SF-36), and results of blood oxygen level dependent-functional magnetic resonance imaging (BOLD-fMRI) examination are considered as the secondary outcome measures. Other

  18. A Combined Random Forest and OBIA Classification Scheme for Mapping Smallholder Agriculture at Different Nomenclature Levels Using Multisource Data (Simulated Sentinel-2 Time Series, VHRS and DEM

    Directory of Open Access Journals (Sweden)

    Valentine Lebourgeois

    2017-03-01

    Full Text Available Sentinel-2 images are expected to improve global crop monitoring even in challenging tropical small agricultural systems that are characterized by high intra- and inter-field spatial variability and where satellite observations are disturbed by the presence of clouds. To overcome these constraints, we analyzed and optimized the performance of a combined Random Forest (RF classifier/object-based approach and applied it to multisource satellite data to produce land use maps of a smallholder agricultural zone in Madagascar at five different nomenclature levels. The RF classifier was first optimized by reducing the number of input variables. Experiments were then carried out to (i test cropland masking prior to the classification of more detailed nomenclature levels, (ii analyze the importance of each data source (a high spatial resolution (HSR time series, a very high spatial resolution (VHSR coverage and a digital elevation model (DEM and data type (spectral, textural or other, and (iii quantify their contributions to classification accuracy levels. The results show that RF classifier optimization allowed for a reduction in the number of variables by 1.5- to 6-fold (depending on the classification level and thus a reduction in the data processing time. Classification results were improved via the hierarchical approach at all classification levels, achieving an overall accuracy of 91.7% and 64.4% for the cropland and crop subclass levels, respectively. Spectral variables derived from an HSR time series were shown to be the most discriminating, with a better score for spectral indices over the reflectances. VHSR data were only found to be essential when implementing the segmentation of the area into objects and not for the spectral or textural features they can provide during classification.

  19. Perry's Intellectual Scheme.

    Science.gov (United States)

    Love, Patrick G.; Guthrie, Victoria L.

    1999-01-01

    Summarizes William Perry's intellectual scheme and places it in the context of the 1990's. Perry's scheme of cognitive development, though more than thirty years old, is still being used by practitioners today to enhance practice in and out of the classroom. It laid a foundation for new research to extend, challenge, and build onto the scheme.…

  20. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  1. Asynchronous Communication Scheme For Hypercube Computer

    Science.gov (United States)

    Madan, Herb S.

    1988-01-01

    Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.

  2. The Mawala irrigation scheme

    OpenAIRE

    de Bont, Chris

    2018-01-01

    This booklet was written to share research results with farmers and practitioners in Tanzania. It gives a summary of the empirical material collected during three months of field work in the Mawala irrigation scheme (Kilimanjaro Region), and includes maps, tables and photos. It describes the history of the irrigation scheme, as well current irrigation and farming practices. It especially focuses on the different kinds of infrastructural improvement in the scheme (by farmers and the government...

  3. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well...

  4. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  5. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  6. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  7. A New Adaptive Hungarian Mating Scheme in Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chanju Jung

    2016-01-01

    Full Text Available In genetic algorithms, selection or mating scheme is one of the important operations. In this paper, we suggest an adaptive mating scheme using previously suggested Hungarian mating schemes. Hungarian mating schemes consist of maximizing the sum of mating distances, minimizing the sum, and random matching. We propose an algorithm to elect one of these Hungarian mating schemes. Every mated pair of solutions has to vote for the next generation mating scheme. The distance between parents and the distance between parent and offspring are considered when they vote. Well-known combinatorial optimization problems, the traveling salesperson problem, and the graph bisection problem are used for the test bed of our method. Our adaptive strategy showed better results than not only pure and previous hybrid schemes but also existing distance-based mating schemes.

  8. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  9. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    It is usual practice to evaluate the success of a labelling scheme by looking at the awareness percentage, but in many cases this is not sufficient. The awareness percentage gives no indication of which of the consumer segments that are aware of and use labelling schemes and which do not....... In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire....... 664 households returned a completed questionnaire. There were five answering categories for each label in the questionnaire: * have not seen the label before. * I have seen the label before but I do not know the precise contents of the labelling scheme. * I have seen the label before, I do not know...

  10. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  11. Random fractional Fourier transform.

    Science.gov (United States)

    Liu, Zhengjun; Liu, Shutian

    2007-08-01

    We propose a novel random fractional Fourier transform by randomizing the transform kernel function of the conventional fractional Fourier transform. The random fractional Fourier transform inherits the excellent mathematical properties from the fractional Fourier transform and can be easily implemented in optics. As a primary application the random fractional Fourier transform can be directly used in optical image encryption and decryption. The double phase encoding image encryption schemes can thus be modeled with cascaded random fractional Fourier transformers.

  12. Cryptanalysis of Two Fault Countermeasure Schemes

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey

    2015-01-01

    is meant for the protection of block ciphers like AES. The second countermeasure was proposed in IEEE-HOST 2015 and protects the Grain-128 stream cipher. The design divides the output function used in Grain-128 into two components. The first called the masking function, masks the input bits to the output...... use the internally generated random bits which make these designs vulnerable. We will outline attacks that cryptanalyze the above schemes using 66 and 512 faults respectively....... function with some additional randomness and computes the value of the function. The second called the unmasking function, is computed securely using a different register and undoes the effect of the masking with random bits. We will show that there exists a weakness in the way in which both these schemes...

  13. Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations

    Directory of Open Access Journals (Sweden)

    Hang Tu

    2014-01-01

    Full Text Available A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first. Then a new certificateless aggregate signature scheme with constant pairing computations based on the new certificateless signature scheme is presented. Security analysis shows that the proposed certificateless aggregate signature scheme is provably secured in the random oracle.

  14. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  15. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  16. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  17. MIT Scheme Reference Manual

    Science.gov (United States)

    1991-01-01

    their Butterfly Scheme Reference, and to Margaret O’Connell for translating it from BBN’s text-formatting language to ours. Special thanks to Richard ... Stallman , Bob Chassell, and Brian Fox, all of the Free Software Foundation, for creating and maintaining the Texinfo formatting language in which this

  18. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  19. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  20. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  1. Scanning schemes in white light photoelasticity - Part II: Novel fringe resolution guided scanning scheme

    Science.gov (United States)

    Ramakrishnan, Vivek; Ramesh, K.

    2017-05-01

    Varied spatial resolution of isochromatic fringes over the domain influences the accuracy of fringe order estimation using TFP/RGB photoelasticity. This has been brought out in the first part of the work. The existing scanning schemes do not take this into account, which leads to the propagation of noise from the low spatial resolution zones. In this paper, a method is proposed for creating a whole field map which represents the spatial resolution of the isochromatic fringe pattern. A novel scanning scheme is then proposed whose progression is guided by the spatial resolution of the fringes in the isochromatic image. The efficacy of the scanning scheme is demonstrated using three problems - an inclined crack under bi-axial loading, a thick ring subjected to internal pressure and a stress frozen specimen of an aerospace component. The proposed scheme has use in a range of applications. The scanning scheme is effective even if the model has random zones of noise which is demonstrated using a plate subjected to concentrated load. This aspect is well utilised to extract fringe data from thin slices cut from a stereo-lithographic model that has characteristic random noise due to layered manufacturing.

  2. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR SOLUTION OF NONLINEAR INITIAL VALUE PROBLEMS OF FIRST ORDER ORDINARY DIFFERENTIAL EQUATIONS. ... Global Journal of Mathematical Sciences ... KEY WORDS: backward differentiation scheme, collocation, initial value problems. Global Jnl ...

  3. A Modified Computational Scheme for the Stochastic Perturbation Finite Element Method

    Directory of Open Access Journals (Sweden)

    Feng Wu

    Full Text Available Abstract A modified computational scheme of the stochastic perturbation finite element method (SPFEM is developed for structures with low-level uncertainties. The proposed scheme can provide second-order estimates of the mean and variance without differentiating the system matrices with respect to the random variables. When the proposed scheme is used, it involves finite analyses of deterministic systems. In the case of one random variable with a symmetric probability density function, the proposed computational scheme can even provide a result with fifth-order accuracy. Compared with the traditional computational scheme of SPFEM, the proposed scheme is more convenient for numerical implementation. Four numerical examples demonstrate that the proposed scheme can be used in linear or nonlinear structures with correlated or uncorrelated random variables.

  4. Bonus Schemes and Trading Activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; Ter Horst, J.R.; Tobler, P.N.

    2013-01-01

    Abstract: Little is known about how different bonus schemes affect traders’ propensity to trade and which bonus schemes improve traders’ performance. We study the effects of linear versus threshold (convex) bonus schemes on traders’ behavior. Traders purchase and sell shares in an experimental stock

  5. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  6. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    -theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  7. Weighted polynomial models and weighted sampling schemes for finite population

    OpenAIRE

    Chen, Sean X.

    1998-01-01

    This paper outlines a theoretical framework for finite population models with unequal sample probabilities, along with sampling schemes for drawing random samples from these models. We first present four exact weighted sampling schemes that can be used for any finite population model to satisfy such requirements as ordered/ unordered samples, with/without replacement, and fixed/nonfixed sample size. We then introduce a new class of finite population models called weighted po...

  8. Towards Shift Tolerant Visual Secret Sharing Schemes without Pixel Expansion

    Directory of Open Access Journals (Sweden)

    Juan Justie Su-Tzu

    2016-01-01

    Full Text Available Naor and Shamir proposed the visual cryptography in 1995, they encrypted secret image into two meaningless random images, called shares, and it can be decrypted by human vision without any calculations. However, there would be problems in alignment when these two shares are staked by hand in practical. Therefore, this paper presents the fault-tolerant schemes of stacking two shares which are acquired from secret image encryption without pixel expansion. The main idea of these schemes is combining several pixels to be a unit, then encrypting every unit into a specific combination of pixels. It makes visual secret sharing scheme more practical.

  9. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements classificat....... This difference between the written requirements specification and the oral discussions at the meetings may help explain software engineers’ general preference for people, rather than documents, as their information sources.......Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements....... While coordination mechanisms focus on how classification schemes enable cooperation among people pursuing a common goal, boundary objects embrace the implicit consequences of classification schemes in situations involving conflicting goals. Moreover, the requirements specification focused on functional...

  10. Two notes about Ponzi schemes

    OpenAIRE

    Honohan, Patrick

    1987-01-01

    A Ponzi scheme is an arrangement whereby a promoter offers an investment opportunity with attractive dividends, but where the only basis for the dividends is the future receipts from new investors. The first of these two notes explores some of the analytical properties of a Ponzi scheme, addressing in particular the question whether it is possible for a Ponzi scheme to exist if all the participants are rational. The second note briefly examines the collapse of the PMPA insurance company whos...

  11. Remarks on quantum duopoly schemes

    Science.gov (United States)

    Fraçkiewicz, Piotr

    2016-01-01

    The aim of this paper is to discuss in some detail the two different quantum schemes for duopoly problems. We investigate under what conditions one of the schemes is more reasonable than the other one. Using the Cournot's duopoly example, we show that the current quantum schemes require a slight refinement so that they output the classical game in a particular case. Then, we show how the amendment changes the way of studying the quantum games with respect to Nash equilibria. Finally, we define another scheme for the Cournot's duopoly in terms of quantum computation.

  12. New Ideas on Labeling Schemes

    DEFF Research Database (Denmark)

    Rotbart, Noy Galil

    times, effectively eliminating the second penalty mentioned. We continue this theoretical study in several ways. First, we dedicate a large part of the thesis to the graph family of trees, for which we provide an overview of labeling schemes supporting several important functions such as ancestry......, routing and especially adjacency. The survey is complemented by novel contributions to this study, among which are the first asymptotically optimal adjacency labeling scheme for bounded degree trees, improved bounds on ancestry labeling schemes, dynamic multifunctional labeling schemes and an experimental...

  13. A real helper data scheme

    NARCIS (Netherlands)

    Shao, X.; Veldhuis, Raymond N.J.

    2013-01-01

    The helper data scheme utilizes a secret key to protect biometric templates. The current helper data scheme requires binary feature representations that introduce quantization error and thus reduce the capacity of biometric channels. For spectral-minutiae based fingerprint recognition systems,

  14. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  15. Multiuser Switched Diversity Scheduling Schemes

    CERN Document Server

    Shaqfeh, Mohammad; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback sys...

  16. An Efficient Heterogeneous Signcryption Scheme from Certificateless to Identity-based Cryptosystem

    Directory of Open Access Journals (Sweden)

    Niu Shufen

    2017-01-01

    Full Text Available The heterogeneous signcryption can not only realize the confidentiality and un-forgeability of the information transmission between different public key cryptography environments, but also reduce the communication cost. The proposed scheme uses bilin-ear pairings between certificateless cryptography and identity-based cryptography to construct a heterogeneous signcryption scheme. In addition, two cryptography systems use different secret master keys. Furthermore, the proposed scheme has the indistin-guishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen-message attacks in the random oracle model. Through the data analysis, this scheme is more effective than other similar types of scheme.

  17. High resolution satellite remote sensing used in a stratified random sampling scheme to quantify the constituent land cover components of the shifting cultivation mosaic of the Democratic Republic of Congo

    Science.gov (United States)

    Molinario, G.; Hansen, M.; Potapov, P.

    2016-12-01

    High resolution satellite imagery obtained from the National Geospatial Intelligence Agency through NASA was used to photo-interpret sample areas within the DRC. The area sampled is a stratifcation of the forest cover loss from circa 2014 that either occurred completely within the previosly mapped homogenous area of the Rural Complex, at it's interface with primary forest, or in isolated forest perforations. Previous research resulted in a map of these areas that contextualizes forest loss depending on where it occurs and with what spatial density, leading to a better understading of the real impacts on forest degradation of livelihood shifting cultivation. The stratified random sampling approach of these areas allows the characterization of the constituent land cover types within these areas, and their variability throughout the DRC. Shifting cultivation has a variable forest degradation footprint in the DRC depending on many factors that drive it, but it's role in forest degradation and deforestation had been disputed, leading us to investigate and quantify the clearing and reuse rates within the strata throughout the country.

  18. A Randomized, Double-Blind, Parallel Study to Evaluate the Dose-Response of Three Different Vitamin D Treatment Schemes on the 25-Hydroxyvitamin D Serum Concentration in Patients with Vitamin D Deficiency

    Directory of Open Access Journals (Sweden)

    Marie-Louise Schleck

    2015-07-01

    Full Text Available Many people worldwide are vitamin D (VTD deficient or insufficient, and there is still no consensus on the dose of VTD that should be administered to achieve a 25(OHD concentration of 20 or 30 ng/mL. In this study, we aimed to determine an adapted supplementation of VTD able to quickly and safely increase the vitamin D status of healthy adults with low 25(OHD. One hundred and fifty (150 subjects were randomized into three groups, each to receive, orally, a loading dose of 50,000, 100,000 or 200,000 IU of VTD3 at Week 0, followed by 25,000, 50,000 or 100,000 IU at Week 4 and Week 8. Whereas 25(OHD baseline values were not different between groups (p = 0.42, a significant increase was observed at Week 12 (p < 0.0001 with a mean change from baseline of 7.72 ± 5.08, 13.3 ± 5.88 and 20.12 ± 7.79 ng/mL. A plateau was reached after eight weeks. No related adverse event was recorded. This study demonstrated a linear dose-response relationship with an increase in 25(OHD levels proportional to the dose administered. In conclusion, a loading dose of 200,000 IU VTD3 followed by a monthly dose of 100,000 IU is the best dosing schedule to quickly and safely correct the VTD status.

  19. A Randomized, Double-Blind, Parallel Study to Evaluate the Dose-Response of Three Different Vitamin D Treatment Schemes on the 25-Hydroxyvitamin D Serum Concentration in Patients with Vitamin D Deficiency

    Science.gov (United States)

    Schleck, Marie-Louise; Souberbielle, Jean-Claude; Jandrain, Bernard; Da Silva, Stéphanie; De Niet, Sophie; Vanderbist, Francis; Scheen, André; Cavalier, Etienne

    2015-01-01

    Many people worldwide are vitamin D (VTD) deficient or insufficient, and there is still no consensus on the dose of VTD that should be administered to achieve a 25(OH)D concentration of 20 or 30 ng/mL. In this study, we aimed to determine an adapted supplementation of VTD able to quickly and safely increase the vitamin D status of healthy adults with low 25(OH)D. One hundred and fifty (150) subjects were randomized into three groups, each to receive, orally, a loading dose of 50,000, 100,000 or 200,000 IU of VTD3 at Week 0, followed by 25,000, 50,000 or 100,000 IU at Week 4 and Week 8. Whereas 25(OH)D baseline values were not different between groups (p = 0.42), a significant increase was observed at Week 12 (p < 0.0001) with a mean change from baseline of 7.72 ± 5.08, 13.3 ± 5.88 and 20.12 ± 7.79 ng/mL. A plateau was reached after eight weeks. No related adverse event was recorded. This study demonstrated a linear dose-response relationship with an increase in 25(OH)D levels proportional to the dose administered. In conclusion, a loading dose of 200,000 IU VTD3 followed by a monthly dose of 100,000 IU is the best dosing schedule to quickly and safely correct the VTD status. PMID:26151178

  20. An Analysis Of Loko Flood Disaster Resettlement Scheme, In Song ...

    African Journals Online (AJOL)

    The study examines the socio-economic and political impediments to the planned resettlement scheme for Loko flood disaster victims. A simple random sampling technique was employed to interview 280 household heads by administering to each a questionnaire schedule. Furthermore, purposeful interviews with the ...

  1. The British American Tobacco out growers scheme: Determinants of ...

    African Journals Online (AJOL)

    The study analyzed the operation and performance of Tobacco Out grower Scheme in Oyo State, Nigeria. The data for the analysis came from a random sample survey of the area of study. The treatment effect model was adopted in analyzing the data. Evidence from the probit analysis indicates that membership of the ...

  2. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    This paper illustrates the effect that can be observed when support schemes for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e.g., the price of power, conditions for conventional power producers, and changes in import and export of power...... RES-E support schemes already has a common liberalised power market. In this case the introduction of a common support scheme for renewable technologies will lead to more efficient sitings of renewable plants, improving economic and environmental performance of the total power system...

  3. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  4. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  5. A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems.

    Science.gov (United States)

    Mir, Omid; van der Weide, Theo; Lee, Cheng-Chi

    2015-09-01

    Telecare medicine information systems (TMIS) have been known as an effective mechanism to increase quality and security of healthcare services. In other to the protection of patient privacy, several authentication schemes have been proposed in TMIS, however, most of them have a security problems. Recently, Das proposed a secure and robust password-based remote user authentication scheme for the integrated EPR information system. However, in this paper, we show that his scheme have some security flaws. Then, we shall propose a secure authentication scheme to overcome their weaknesses. We prove the proposed scheme with random oracle and also use the BAN logic to prove the correctness of the proposed scheme. Furthermore, we simulate our scheme for the formal security analysis using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool.

  6. Attacks on One Designated Verifier Proxy Signature Scheme

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2012-01-01

    Full Text Available In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designated verifier proxy signature schemes have been proposed. However, most of them were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. Recently, by employing Water's hashing technique, Yu et al. proposed a new construction of designated verifier proxy signature. They claimed that the new construction is the first designated verifier proxy signature, whose security does not rely on the random oracles. But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.

  7. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  8. Modulation Schemes for Wireless Access

    Directory of Open Access Journals (Sweden)

    F. Vejrazka

    2000-12-01

    Full Text Available Four modulation schemes, namely minimum shift keying (MSK, Gaussianminimum shift keying (GMSK, multiamplitude minimum shift keying(MAMSK and π/4 differential quadrature phase shift keying (π/4-QPSKare described and their applicability to wireless access is discussedin the paper. Low complexity receiver structures based on differentialdetection are analysed to estimate the performance of the modulationschemes in the additive Gaussian noise and the Rayleigh and Riceenvelope fast fading channel. The bandwidth efficiency is calculated toevaluate the modulation schemes. The results show that the MAMSK schemegives the greatest bandwidth efficiency, but its performance in theRayleigh channel is rather poor. In contrast, the MSK scheme is lessbandwidth efficient, but it is more resistant to Rayleigh fading. Theperformance of π/4-QPSK signal is considerably improved by appropriateprefiltering.

  9. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  10. [Comparison of two gastric cancer screening schemes in a high-risk population].

    Science.gov (United States)

    Lü, Yan-li; Li, Yi; Liu, Guang-shun; Wu, Qi; Liu, Wei-dong; Li, Shi-jie; Cao, Chang-qi; Wu, Xiu-zhen; Liu, Dong-mei; Zhang, Lei; Zhang, Lan-fu; Ma, Jun-ling; Pan, Kai-feng; Zhang, Lian; You, Wei-cheng

    2013-05-01

    To evaluate the effects of two gastric cancer screening schemes for early detection of gastric cancer in a high-risk population. A cluster random sampling method was used to select local residents aged 40-69 years from Linqu County, Shandong Province. "Serum pepsinogen initial screening combined with further endoscopic examination (PG scheme)" and "direct endoscopic examination (endoscopy scheme)" were conducted. The associations between screening schemes and detection rates of gastric cancer, and early gastric cancer/high-grade intraepithelial neoplasia were evaluated by unconditional logistic regression analysis. Overall, 3654 and 2290 participants completed PG and endoscopy schemes, respectively. A total of 11 (0.30%) cases of gastric cancer and 10 (0.27%) cases of high-grade intraepithelial neoplasia were detected by PG scheme, of which 7 (0.19%) cases were early gastric cancer. While, 19 (0.83%) cases of gastric cancer and 10 (0.44%) cases of high-grade intraepithelial neoplasia were detected by endoscopy scheme, with 12 (0.52%) cases of early gastric cancer. Compared with the PG scheme, the endoscopy scheme had a significantly higher detection rates of gastric cancer (OR = 2.83, 95%CI 1.34-5.98), and early gastric cancer/high-grade intraepithelial neoplasia (OR = 2.12, 95%CI 1.12-4.02). The endoscopy scheme is more effective in the detection of gastric cancer in a high-risk population, particularly for early gastric cancer/high-grade intraepithelial neoplasia than the PG scheme.

  11. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... the value of the respective function on the internal state of the respective device (namely, on its secret share, internal randomness, and results of intermediate computations). We present distributed public key encryption (DPKE) and distributed identity based encryption (DIBE) schemes that are secure......-secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol...

  12. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoill...

  13. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    (log(n)) bits for constant ε> 0. (1 + ε)-stretch labeling schemes with polylogarithmic label size have previously been established for doubling dimension graphs by Talwar [Talwar, STOC, 2004]. In addition, we present matching upper and lower bounds for distance labeling for caterpillars, showing that labels...

  14. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  15. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    for promoting combined heat and power and energy from renewable sources. These Directives are to be implemented at the national level by the Member States. Section 3 conceptually presents the spectrum of national support schemes, ranging from investment support to market‐based operational support. The choice...... an introduction to the policy context for mCHP. Section 1 describes the rationale for the promotion of mCHP by explaining its potential contribution to European energy policy goals. Section 2 addresses the policy context at the supranational European level by outlining relevant EU Directives on support schemes......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...

  16. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed...

  17. Subranging scheme for SQUID sensors

    Science.gov (United States)

    Penanen, Konstantin I. (Inventor)

    2008-01-01

    A readout scheme for measuring the output from a SQUID-based sensor-array using an improved subranging architecture that includes multiple resolution channels (such as a coarse resolution channel and a fine resolution channel). The scheme employs a flux sensing circuit with a sensing coil connected in series to multiple input coils, each input coil being coupled to a corresponding SQUID detection circuit having a high-resolution SQUID device with independent linearizing feedback. A two-resolution configuration (course and fine) is illustrated with a primary SQUID detection circuit for generating a fine readout, and a secondary SQUID detection circuit for generating a course readout, both having feedback current coupled to the respective SQUID devices via feedback/modulation coils. The primary and secondary SQUID detection circuits function and derive independent feedback. Thus, the SQUID devices may be monitored independently of each other (and read simultaneously) to dramatically increase slew rates and dynamic range.

  18. Information Security Scheme Based on Computational Temporal Ghost Imaging.

    Science.gov (United States)

    Jiang, Shan; Wang, Yurong; Long, Tao; Meng, Xiangfeng; Yang, Xiulun; Shu, Rong; Sun, Baoqing

    2017-08-09

    An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.

  19. Locally decodable codes and private information retrieval schemes

    CERN Document Server

    Yekhanin, Sergey

    2010-01-01

    Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable reconstruction of an arbitrary bit of a message by looking at only a small number of randomly chosen codeword bits. Local decodability comes with a certain loss in terms of efficiency - specifically, locally decodable codes require longer codeword lengths than their classical counterparts. Private information retrieval (PIR) schemes are cryptographic protocols designed to safeguard the privacy of database users. They allow clients to retrieve rec

  20. Supporting Argumentation Schemes in Argumentative Dialogue Games

    Directory of Open Access Journals (Sweden)

    Wells Simon

    2014-03-01

    Full Text Available This paper reports preliminary work into the exploitation of argumentation schemes within dialogue games. We identify a property of dialogue games that we call “scheme awareness” that captures the relationship between dialogue game systems and argumentation schemes. Scheme awareness is used to examine the ways in which existing dialogue games utilise argumentation schemes and consequently the degree with which a dialogue game can be used to construct argument structures. The aim is to develop a set of guidelines for dialogue game design, which feed into a set of Dialogue Game Description Language (DGDL extensions in turn enabling dialogue games to better exploit argumentation schemes.

  1. An Arbitrated Quantum Signature Scheme without Entanglement*

    Science.gov (United States)

    Li, Hui-Ran; Luo, Ming-Xing; Peng, Dai-Yuan; Wang, Xiao-Jun

    2017-09-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.

  2. A biometric signcryption scheme without bilinear pairing

    Science.gov (United States)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  3. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  4. Markov random fields on triangle meshes

    DEFF Research Database (Denmark)

    Andersen, Vedrana; Aanæs, Henrik; Bærentzen, Jakob Andreas

    2010-01-01

    In this paper we propose a novel anisotropic smoothing scheme based on Markov Random Fields (MRF). Our scheme is formulated as two coupled processes. A vertex process is used to smooth the mesh by displacing the vertices according to a MRF smoothness prior, while an independent edge process label...

  5. Markov Random Fields on Triangle Meshes

    DEFF Research Database (Denmark)

    Andersen, Vedrana; Aanæs, Henrik; Bærentzen, Jakob Andreas

    2010-01-01

    In this paper we propose a novel anisotropic smoothing scheme based on Markov Random Fields (MRF). Our scheme is formulated as two coupled processes. A vertex process is used to smooth the mesh by displacing the vertices according to a MRF smoothness prior, while an independent edge process label...

  6. METAPHORIC MECHANISMS IN IMAGE SCHEME DEVELOPMENT

    National Research Council Canada - National Science Library

    Pankratova, S.A

    2017-01-01

    .... In the summary the author underscores that both ways of image scheme development are of importance to cognitive science, both heuristic epiphora and image-based diaphora play a significant role in the explication of image scheme development.

  7. Comparison of different incremental analysis update schemes in a realistic assimilation system with Ensemble Kalman Filter

    Science.gov (United States)

    Yan, Y.; Barth, A.; Beckers, J. M.; Brankart, J. M.; Brasseur, P.; Candille, G.

    2017-07-01

    In this paper, three incremental analysis update schemes (IAU 0, IAU 50 and IAU 100) are compared in the same assimilation experiments with a realistic eddy permitting primitive equation model of the North Atlantic Ocean using the Ensemble Kalman Filter. The difference between the three IAU schemes lies on the position of the increment update window. The relevance of each IAU scheme is evaluated through analyses on both thermohaline and dynamical variables. The validation of the assimilation results is performed according to both deterministic and probabilistic metrics against different sources of observations. For deterministic validation, the ensemble mean and the ensemble spread are compared to the observations. For probabilistic validation, the continuous ranked probability score (CRPS) is used to evaluate the ensemble forecast system according to reliability and resolution. The reliability is further decomposed into bias and dispersion by the reduced centred random variable (RCRV) score. The obtained results show that 1) the IAU 50 scheme has the same performance as the IAU 100 scheme 2) the IAU 50/100 schemes outperform the IAU 0 scheme in error covariance propagation for thermohaline variables in relatively stable region, while the IAU 0 scheme outperforms the IAU 50/100 schemes in dynamical variables estimation in dynamically active region 3) in case with sufficient number of observations and good error specification, the impact of IAU schemes is negligible. The differences between the IAU 0 scheme and the IAU 50/100 schemes are mainly due to different model integration time and different instability (density inversion, large vertical velocity, etc.) induced by the increment update. The longer model integration time with the IAU 50/100 schemes, especially the free model integration, on one hand, allows for better re-establishment of the equilibrium model state, on the other hand, smooths the strong gradients in dynamically active region.

  8. Novel coupling scheme to control dynamics of coupled discrete systems

    Science.gov (United States)

    Shekatkar, Snehal M.; Ambika, G.

    2015-08-01

    We present a new coupling scheme to control spatio-temporal patterns and chimeras on 1-d and 2-d lattices and random networks of discrete dynamical systems. The scheme involves coupling with an external lattice or network of damped systems. When the system network and external network are set in a feedback loop, the system network can be controlled to a homogeneous steady state or synchronized periodic state with suppression of the chaotic dynamics of the individual units. The control scheme has the advantage that its design does not require any prior information about the system dynamics or its parameters and works effectively for a range of parameters of the control network. We analyze the stability of the controlled steady state or amplitude death state of lattices using the theory of circulant matrices and Routh-Hurwitz criterion for discrete systems and this helps to isolate regions of effective control in the relevant parameter planes. The conditions thus obtained are found to agree well with those obtained from direct numerical simulations in the specific context of lattices with logistic map and Henon map as on-site system dynamics. We show how chimera states developed in an experimentally realizable 2-d lattice can be controlled using this scheme. We propose this mechanism can provide a phenomenological model for the control of spatio-temporal patterns in coupled neurons due to non-synaptic coupling with the extra cellular medium. We extend the control scheme to regulate dynamics on random networks and adapt the master stability function method to analyze the stability of the controlled state for various topologies and coupling strengths.

  9. The Ubiquity of Smooth Hilbert Schemes

    OpenAIRE

    Staal, Andrew P.

    2017-01-01

    We investigate the geography of Hilbert schemes that parametrize closed subschemes of projective space with a specified Hilbert polynomial. We classify Hilbert schemes with unique Borel-fixed points via combinatorial expressions for their Hilbert polynomials. We realize the set of all nonempty Hilbert schemes as a probability space and prove that Hilbert schemes are irreducible and nonsingular with probability greater than $0.5$.

  10. MIRD radionuclide data and decay schemes

    CERN Document Server

    Eckerman, Keith F

    2007-01-01

    For all physicians, scientists, and physicists working in the nuclear medicine field, the MIRD: Radionuclide Data and Decay Schemes updated edition is an essential sourcebook for radiation dosimetry and understanding the properties of radionuclides. Includes CD Table of Contents Decay schemes listed by atomic number Radioactive decay processes Serial decay schemes Decay schemes and decay tables This essential reference for nuclear medicine physicians, scientists and physicists also includes a CD with tabulations of the radionuclide data necessary for dosimetry calculations.

  11. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    and Wait (SW), Selective Repeat (SR), Stutter. (ST) and Go-Back-N (GBN) (Lin and Costello,. 2003). Combinations of these schemes lead to mixed mode schemes which include the SR-. GBN, SR-ST1 and SR-ST2. In the mixed mode schemes, when a prescribed number of failures occur in the SR mode, the GBN or ST ...

  12. The Original Management Incentive Schemes

    OpenAIRE

    Richard T. Holden

    2005-01-01

    During the 1990s, the structure of pay for top corporate executives shifted markedly as the use of stock options greatly expanded. By the early 2000s, as the dot-com boom ended and the Nasdaq stock index melted down, these modern executive incentive schemes were being sharply questioned on many grounds—for encouraging excessive risk-taking and a short-run orientation, for being an overly costly and inefficient method of providing incentives, and even for tempting managers of firms like Enron,...

  13. Adaptive Optics Metrics & QC Scheme

    Science.gov (United States)

    Girard, Julien H.

    2017-09-01

    "There are many Adaptive Optics (AO) fed instruments on Paranal and more to come. To monitor their performances and assess the quality of the scientific data, we have developed a scheme and a set of tools and metrics adapted to each flavour of AO and each data product. Our decisions to repeat observations or not depends heavily on this immediate quality control "zero" (QC0). Atmospheric parameters monitoring can also help predict performances . At the end of the chain, the user must be able to find the data that correspond to his/her needs. In Particular, we address the special case of SPHERE."

  14. The mathematics of Ponzi schemes

    OpenAIRE

    Artzrouni, Marc

    2009-01-01

    A first order linear differential equation is used to describe the dynamics of an investment fund that promises more than it can deliver, also known as a Ponzi scheme. The model is based on a promised, unrealistic interest rate; on the actual, realized nominal interest rate; on the rate at which new deposits are accumulated and on the withdrawal rate. Conditions on these parameters are given for the fund to be solvent or to collapse. The model is fitted to data available on Charles...

  15. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-01-01

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331

  16. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  17. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.

    Science.gov (United States)

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.

  18. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  19. Delivery of a national home safety equipment scheme in England: a survey of local scheme leaders.

    Science.gov (United States)

    Mulvaney, C A; Watson, M C; Hamilton, T; Errington, G

    2013-11-01

    Unintentional home injuries sustained by preschool children are a major cause of morbidity in the UK. Home safety equipment schemes may reduce home injury rates. In 2009, the Royal Society for the Prevention of Accidents was appointed as central coordinator of a two-year, £18m national home safety equipment scheme in England. This paper reports the findings from a national survey of all scheme leaders responsible for local scheme delivery. A questionnaire mailed to all local scheme leaders sought details of how the schemes were operated locally; barriers and facilitators to scheme implementation; evaluation of the local scheme and its sustainability. A response rate of 73% was achieved. Health visitors and family support workers played a key role in both the identification of eligible families and performing home safety checks. The majority of local scheme leaders (94.6%) reported that they thought their local scheme had been successful in including those families considered 'harder to engage'. Many scheme leaders (72.4%) reported that they had evaluated the provision of safety equipment in their scheme and over half (56.6%) stated that they would not be able to continue the scheme once funding ceased. Local schemes need support to effectively evaluate their scheme and to seek sustainability funding to ensure the future of the scheme. There remains a lack of evidence of whether the provision of home safety equipment reduces injuries in preschool children.

  20. Channel Aggregation Schemes for Cognitive Radio Networks

    Science.gov (United States)

    Lee, Jongheon; So, Jaewoo

    This paper proposed three channel aggregation schemes for cognitive radio networks, a constant channel aggregation scheme, a probability distribution-based variable channel aggregation scheme, and a residual channel-based variable channel aggregation scheme. A cognitive radio network can have a wide bandwidth if unused channels in the primary networks are aggregated. Channel aggregation schemes involve either constant channel aggregation or variable channel aggregation. In this paper, a Markov chain is used to develop an analytical model of channel aggregation schemes; and the performance of the model is evaluated in terms of the average sojourn time, the average throughput, the forced termination probability, and the blocking probability. Simulation results show that channel aggregation schemes can reduce the average sojourn time of cognitive users by increasing the channel occupation rate of unused channels in a primary network.

  1. Hybrid scheme for Brownian semistationary processes

    DEFF Research Database (Denmark)

    Bennedsen, Mikkel; Lunde, Asger; Pakkanen, Mikko S.

    is to approximate the kernel function by a power function near zero and by a step function elsewhere. The resulting approximation of the process is a combination of Wiener integrals of the power function and a Riemann sum, which is why we call this method a hybrid scheme. Our main theoretical result describes...... the asymptotics of the mean square error of the hybrid scheme and we observe that the scheme leads to a substantial improvement of accuracy compared to the ordinary forward Riemann-sum scheme, while having the same computational complexity. We exemplify the use of the hybrid scheme by two numerical experiments......We introduce a simulation scheme for Brownian semistationary processes, which is based on discretizing the stochastic integral representation of the process in the time domain. We assume that the kernel function of the process is regularly varying at zero. The novel feature of the scheme...

  2. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  3. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  4. Wave atom transform generated strong image hashing scheme

    Science.gov (United States)

    Liu, Fang; Cheng, Lee-Ming; Leung, Hon-Yin; Fu, Qi-Kai

    2012-11-01

    The rapid development of multimedia technology has resulted in a rising rate on digital unauthorized utilization and forgery, which makes the situation of image authentication increasingly severe. A novel strong image hashing scheme is proposed based on wave atom transform, which can better authenticate images by precisely distinguishing the malicious tampered images from the non-maliciously processed ones. Wave atom transform is employed since it has significantly sparser expansion and better characteristics of texture feature extraction than other traditional transforms. For better detection sensitivity, gray code is applied instead of natural binary code to optimize the hamming distance. Randomizations are also performed using Rényi chaotic map for the purposes of secure image hashing and key sensitivity. The experimental results show that the proposed strong scheme is robust to non-malicious content-preserving operations and also fragile to malicious content-altering operations. The scheme also outperforms DCT and DWT based schemes in terms of receiving operating characteristic (ROC) curves. Moreover, to provide an application-defined tradeoff, a security enhancement approach based on Rényi map is presented, which can further protect the integrity and secrecy of images.

  5. Security analysis of the unrestricted identity-based aggregate signature scheme.

    Directory of Open Access Journals (Sweden)

    Kwangsu Lee

    Full Text Available Aggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a short signature. An ideal aggregate signature scheme is an identity-based aggregate signature (IBAS scheme that supports full aggregation since it can reduce the total transmitted data by using an identity string as a public key and anyone can freely aggregate different signatures. Constructing a secure IBAS scheme that supports full aggregation in bilinear maps is an important open problem. Recently, Yuan et al. proposed such a scheme and claimed its security in the random oracle model under the computational Diffie-Hellman assumption. In this paper, we show that there is an efficient forgery on their IBAS scheme and that their security proof has a serious flaw.

  6. Blocked Randomization with Randomly Selected Block Sizes

    Directory of Open Access Journals (Sweden)

    Jimmy Efird

    2010-12-01

    Full Text Available When planning a randomized clinical trial, careful consideration must be given to how participants are selected for various arms of a study. Selection and accidental bias may occur when participants are not assigned to study groups with equal probability. A simple random allocation scheme is a process by which each participant has equal likelihood of being assigned to treatment versus referent groups. However, by chance an unequal number of individuals may be assigned to each arm of the study and thus decrease the power to detect statistically significant differences between groups. Block randomization is a commonly used technique in clinical trial design to reduce bias and achieve balance in the allocation of participants to treatment arms, especially when the sample size is small. This method increases the probability that each arm will contain an equal number of individuals by sequencing participant assignments by block. Yet still, the allocation process may be predictable, for example, when the investigator is not blind and the block size is fixed. This paper provides an overview of blocked randomization and illustrates how to avoid selection bias by using random block sizes.

  7. Blocked randomization with randomly selected block sizes.

    Science.gov (United States)

    Efird, Jimmy

    2011-01-01

    When planning a randomized clinical trial, careful consideration must be given to how participants are selected for various arms of a study. Selection and accidental bias may occur when participants are not assigned to study groups with equal probability. A simple random allocation scheme is a process by which each participant has equal likelihood of being assigned to treatment versus referent groups. However, by chance an unequal number of individuals may be assigned to each arm of the study and thus decrease the power to detect statistically significant differences between groups. Block randomization is a commonly used technique in clinical trial design to reduce bias and achieve balance in the allocation of participants to treatment arms, especially when the sample size is small. This method increases the probability that each arm will contain an equal number of individuals by sequencing participant assignments by block. Yet still, the allocation process may be predictable, for example, when the investigator is not blind and the block size is fixed. This paper provides an overview of blocked randomization and illustrates how to avoid selection bias by using random block sizes.

  8. Digital image communication scheme based on the breakup of spiral waves

    Science.gov (United States)

    Vaidelys, Martynas; Lu, Chen; Cheng, Yujie; Ragulskis, Minvydas

    2017-02-01

    A digital image communication scheme based on the breakup of spiral waves is presented in this paper. This communication system does not require spatially homogeneous random initial conditions. Moreover, the secret image is not embedded into the initial conditions of the evolving self-organizing patterns. Such features increase the security of the communication, but still enable an effective transmission of the secret image. Computational experiments are used to demonstrate the properties and efficiency of the proposed scheme.

  9. [Study on optimal model of hypothetical work injury insurance scheme].

    Science.gov (United States)

    Ye, Chi-yu; Dong, Heng-jin; Wu, Yuan; Duan, Sheng-nan; Liu, Xiao-fang; You, Hua; Hu, Hui-mei; Wang, Lin-hao; Zhang, Xing; Wang, Jing

    2013-12-01

    To explore an optimal model of hypothetical work injury insurance scheme, which is in line with the wishes of workers, based on the problems in the implementation of work injury insurance in China and to provide useful information for relevant policy makers. Multistage cluster sampling was used to select subjects: first, 9 small, medium, and large enterprises were selected from three cities (counties) in Zhejiang Province, China according to the economic development, transportation, and cooperation; then, 31 workshops were randomly selected from the 9 enterprises. Face-to-face interviews were conducted by trained interviewers using a pre-designed questionnaire among all workers in the 31 workshops. After optimization of hypothetical work injury insurance scheme, the willingness to participate in the scheme increased from 73.87%to 80.96%; the average willingness to pay for the scheme increased from 2.21% (51.77 yuan) to 2.38% of monthly wage (54.93 Yuan); the median willingness to pay for the scheme increased from 1% to 1.2% of monthly wage, but decreased from 35 yuan to 30 yuan. The optimal model of hypothetical work injury insurance scheme covers all national and provincial statutory occupational diseases and work accidents, as well as consultations about occupational diseases. The scheme is supposed to be implemented worldwide by the National Social Security Department, without regional differences. The premium is borne by the state, enterprises, and individuals, and an independent insurance fund is kept in the lifetime personal account for each of insured individuals. The premium is not refunded in any event. Compensation for occupational diseases or work accidents is unrelated to the enterprises of the insured workers but related to the length of insurance. The insurance becomes effective one year after enrollment, while it is put into effect immediately after the occupational disease or accident occurs. The optimal model of hypothetical work injury insurance

  10. Scheme of thinking quantum systems

    Science.gov (United States)

    Yukalov, V. I.; Sornette, D.

    2009-11-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  11. Fragment separator momentum compression schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  12. Fragment separator momentum compression schemes.

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, L.; Erdelyi, B.; Hausmann, M.; Kubo, T.; Nolen, J.; Portillo, M.; Sherrill, B.M. (Physics); (MSU); (Northern Illinois Univ.); (RIKEN)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  13. Fragment separator momentum compression schemes

    Science.gov (United States)

    Bandura, Laura; Erdelyi, Bela; Hausmann, Marc; Kubo, Toshiyuki; Nolen, Jerry; Portillo, Mauricio; Sherrill, Bradley M.

    2011-07-01

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  14. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations......The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...

  15. Staggered Schemes for Fluctuating Hydrodynamics

    CERN Document Server

    Balboa, F; Delgado-Buscalioni, R; Donev, A; Fai, T; Griffith, B; Peskin, C S

    2011-01-01

    We develop numerical schemes for solving the isothermal compressible and incompressible equations of fluctuating hydrodynamics on a grid with staggered momenta. We develop a second-order accurate spatial discretization of the diffusive, advective and stochastic fluxes that satisfies a discrete fluctuation-dissipation balance, and construct temporal discretizations that are at least second-order accurate in time deterministically and in a weak sense. Specifically, the methods reproduce the correct equilibrium covariances of the fluctuating fields to third (compressible) and second (incompressible) order in the time step, as we verify numerically. We apply our techniques to model recent experimental measurements of giant fluctuations in diffusively mixing fluids in a micro-gravity environment [A. Vailati et. al., Nature Communications 2:290, 2011]. Numerical results for the static spectrum of non-equilibrium concentration fluctuations are in excellent agreement between the compressible and incompressible simula...

  16. A fully distributed geo-routing scheme for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2013-12-01

    When marrying randomized distributed space-time coding (RDSTC) to beaconless geo-routing, new performance horizons can be created. In order to reach those horizons, however, beaconless geo-routing protocols must evolve to operate in a fully distributed fashion. In this letter, we expose a technique to construct a fully distributed geo-routing scheme in conjunction with RDSTC. We then demonstrate the performance gains of this novel scheme by comparing it to one of the prominent classical schemes. © 2013 IEEE.

  17. Randomization tests

    CERN Document Server

    Edgington, Eugene

    2007-01-01

    Statistical Tests That Do Not Require Random Sampling Randomization Tests Numerical Examples Randomization Tests and Nonrandom Samples The Prevalence of Nonrandom Samples in Experiments The Irrelevance of Random Samples for the Typical Experiment Generalizing from Nonrandom Samples Intelligibility Respect for the Validity of Randomization Tests Versatility Practicality Precursors of Randomization Tests Other Applications of Permutation Tests Questions and Exercises Notes References Randomized Experiments Unique Benefits of Experiments Experimentation without Mani

  18. A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps

    Science.gov (United States)

    Ahmad, Musheer; Khurana, Shruti; Singh, Sushmita; AlSharari, Hamed D.

    2017-06-01

    The chaotic maps posses high parameter sensitivity, random-like behavior and one-way computations, which favor the construction of cryptographic hash functions. In this paper, we propose to present a novel hash function scheme which uses multiple chaotic maps to generate efficient variable-sized hash functions. The message is divided into four parts, each part is processed by a different 1D chaotic map unit yielding intermediate hash code. The four codes are concatenated to two blocks, then each block is processed through 2D chaotic map unit separately. The final hash value is generated by combining the two partial hash codes. The simulation analyses such as distribution of hashes, statistical properties of confusion and diffusion, message and key sensitivity, collision resistance and flexibility are performed. The results reveal that the proposed anticipated hash scheme is simple, efficient and holds comparable capabilities when compared with some recent chaos-based hash algorithms.

  19. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  20. On Optimal Designs of Some Censoring Schemes

    Directory of Open Access Journals (Sweden)

    Dr. Adnan Mohammad Awad

    2016-03-01

    Full Text Available The main objective of this paper  is to explore suitability of some entropy-information measures for introducing a new optimality censoring criterion and to apply it to some censoring schemes from some underlying life-time models.  In addition, the  paper investigates four related issues namely; the  effect of the parameter of parent distribution on optimal scheme, equivalence of schemes based on Shannon and Awad sup-entropy measures, the conjecture that the optimal scheme is one stage scheme, and  a conjecture by Cramer and Bagh (2011 about Shannon minimum and maximum schemes when parent distribution is reflected power. Guidelines for designing an optimal censoring plane are reported together with theoretical and numerical results and illustrations.

  1. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme. These sche......With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme....... These schemes utilize directional relays, power flow through feeders, wind and PV measurements to optimally select the feeders to be disconnected during load shedding such that DG disconnection is minimized while disconnecting required amount of consumption. These different UFLS schemes are compared in terms...

  2. Multiobjective hyper heuristic scheme for system design and optimization

    Science.gov (United States)

    Rafique, Amer Farhan

    2012-11-01

    As system design is becoming more and more multifaceted, integrated, and complex, the traditional single objective optimization trends of optimal design are becoming less and less efficient and effective. Single objective optimization methods present a unique optimal solution whereas multiobjective methods present pareto front. The foremost intent is to predict a reasonable distributed pareto-optimal solution set independent of the problem instance through multiobjective scheme. Other objective of application of intended approach is to improve the worthiness of outputs of the complex engineering system design process at the conceptual design phase. The process is automated in order to provide the system designer with the leverage of the possibility of studying and analyzing a large multiple of possible solutions in a short time. This article presents Multiobjective Hyper Heuristic Optimization Scheme based on low level meta-heuristics developed for the application in engineering system design. Herein, we present a stochastic function to manage meta-heuristics (low-level) to augment surety of global optimum solution. Generic Algorithm, Simulated Annealing and Swarm Intelligence are used as low-level meta-heuristics in this study. Performance of the proposed scheme is investigated through a comprehensive empirical analysis yielding acceptable results. One of the primary motives for performing multiobjective optimization is that the current engineering systems require simultaneous optimization of conflicting and multiple. Random decision making makes the implementation of this scheme attractive and easy. Injecting feasible solutions significantly alters the search direction and also adds diversity of population resulting in accomplishment of pre-defined goals set in the proposed scheme.

  3. Resonance ionization scheme development for europium

    CERN Document Server

    Chrysalidis, K; Fedosseev, V N; Marsh, B A; Naubereit, P; Rothe, S; Seiffert, C; Kron, T; Wendt, K

    2017-01-01

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  4. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  5. SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES

    OpenAIRE

    Adrian Atanasiu; Laura Savu

    2012-01-01

    This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the results and some examples. The Mambo’s Proxy Signature is adapted for Shortened Digital Signature Standard, being part of a new Proxy Signcryption scheme.

  6. Optics design for CEPC double ring scheme

    Science.gov (United States)

    Wang, Yiwei; Su, Feng; Bai, Sha; Yu, Chenghui; Gao, Jie

    2017-12-01

    The CEPC is a future Circular Electron and Positron Collider proposed by China to mainly study the Higgs boson. Its baseline design is a double ring scheme and an alternative design is a partial double ring scheme. This paper will present the optics design for the main ring of the double ring scheme. The CEPC will also work as a W and Z factory. Compatible optics designs for a W and a Z modes will be presented as well.

  7. Wavelet Denoising within the Lifting Scheme Framework

    Directory of Open Access Journals (Sweden)

    M. P. Paskaš

    2012-11-01

    Full Text Available In this paper, we consider an example of the lifting scheme and present the results of the simple lifting scheme implementation using lazy transform. The paper is tutorial-oriented. The results are obtained by testing several common test signals for the signal denoising problem and using different threshold values. The lifting scheme represents an effective and flexible tool that can be used for introducing signal dependence into the problem by improving the wavelet properties.

  8. A Three Factor Remote User Authentication Scheme Using Collision Resist Fuzzy Extractor in Single Server Environment

    Directory of Open Access Journals (Sweden)

    Giri Debasis

    2017-01-01

    Full Text Available Due to rapid growth of online applications, it is needed to provide such a facility by which communicators can get the services by applying the applications in a secure way. As communications are done through an insecure channel like Internet, any adversary can trap and modify the communication messages. Only authentication procedure can overcome the aforementioned problem. Many researchers have proposed so many authentication schemes in this literature. But, this paper has shown that many of them are not usable in real world application scenarios because, the existing schemes cannot resist all the possible attacks. Therefore, this paper has proposed a three factor authentication scheme using hash function and fuzzy extractor. This paper has further analyzed the security of the proposed scheme using random oracle model. The analysis shows that the proposed scheme can resist all the possible attacks. Furthermore, comparison between proposed scheme and related existing schemes shows that the proposed scheme has better trade-off among storage, computational and communication costs.

  9. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (i......) Ghost states are easily avoided without including semicore shells. (ii) The ultrasoft pseudo-charge-augmentation functions can be made softer. (iii) The number of nonlocal operators is reduced. The scheme will be most useful for transition metals, and the feasibility and accuracy of the scheme...

  10. Central schemes for open-channel flow

    Science.gov (United States)

    Gottardi, Guido; Venutelli, Maurizio

    2003-03-01

    The resolution of the Saint-Venant equations for modelling shock phenomena in open-channel flow by using the second-order central schemes of Nessyahu and Tadmor (NT) and Kurganov and Tadmor (KT) is presented. The performances of the two schemes that we have extended to the non-homogeneous case and that of the classical first-order Lax-Friedrichs (LF) scheme in predicting dam-break and hydraulic jumps in rectangular open channels are investigated on the basis of different numerical and physical conditions. The efficiency and robustness of the schemes are tested by comparing model results with analytical or experimental solutions.

  11. Practical Cryptanalysis of a Public-key Encryption Scheme Based on New Multivariate Quadratic Assumptions

    DEFF Research Database (Denmark)

    Albrecht, Martin Roland; Faugére, Jean-Charles; Fitzpatrick, Robert

    2014-01-01

    In this paper, we investigate the security of a public-key encryption scheme introduced by Huang, Liu and Yang (HLY) at PKC’12. This new scheme can be provably reduced to the hardness of solving a set of quadratic equations whose coefficients of highest degree are chosen according to a discrete...... Gaussian distributions. The other terms being chosen uniformly at random. Such a problem is a variant of the classical problem of solving a system of non-linear equations (PoSSo), which is known to be hard for random systems. The main hypothesis of Huang, Liu and Yang is that their variant is not easier...

  12. Image hiding scheme based on time-averaged elliptic oscillations

    Science.gov (United States)

    Saunoriene, Loreta; Aleksiene, Sandra; Maskeliunas, Rimas; Ragulskis, Minvydas

    2017-11-01

    Image hiding technique based on time-averaged elliptic oscillations is proposed in this paper. The scheme is based on a single cover image representing a cross-moiré grating. The secret image is embedded into the background moiré grating by using a specially developed random scrambling algorithm. The secret is leaked in a form of a pattern of time-averaged moiré fringes when the cover image is elliptically oscillated. Also, the secret is leaked only if the parameters of elliptic oscillations are set to predefined values. Computational experiments are used to validate the proposed technique and to demonstrate the efficiency of its implementation.

  13. Security of a biometric identity-based encryption scheme

    OpenAIRE

    Tian, Miaomiao; Yang, Wei; Huang, Liusheng

    2011-01-01

    Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an identity w' can be decrypted using a secret key corresponding to the identity w which is close to w' as measured by some metric. Recently, Yang et al. proposed a constant-size Bio-IBE scheme and proved that it is secure against adaptive chosen-ciphertext attack (CCA2) in the random oracle model. Unfortunately, in this paper, we will show that their Bio-I...

  14. Nonstandard finite difference schemes for differential equations

    Directory of Open Access Journals (Sweden)

    Mohammad Mehdizadeh Khalsaraei

    2014-12-01

    Full Text Available In this paper, the reorganization of the denominator of the discrete derivative and nonlocal approximation of nonlinear terms are used in the design of nonstandard finite difference schemes (NSFDs. Numerical examples confirming then efficiency of schemes, for some differential equations are provided. In order to illustrate the accuracy of the new NSFDs, the numerical results are compared with standard methods.

  15. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  16. Sampling scheme optimization from hyperspectral data

    NARCIS (Netherlands)

    Debba, P.

    2006-01-01

    This thesis presents statistical sampling scheme optimization for geo-environ-menta] purposes on the basis of hyperspectral data. It integrates derived products of the hyperspectral remote sensing data into individual sampling schemes. Five different issues are being dealt with.First, the optimized

  17. Consolidation of the health insurance scheme

    CERN Multimedia

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  18. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  19. Mobile Machine for E-payment Scheme

    OpenAIRE

    Sattar J Aboud

    2010-01-01

    In this article e-payment scheme by mobile machine is considered. The requirements for a mobile machine in e-payment are presented, particularly when merchant employing accounts for payments and when using advertising. In the proposed scheme we will use the public key infrastructure and certificate for authenticate purchaser and merchant and to secure the communication between them.

  20. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    formation transmitted in digital communication systems. Such schemes ... Department of Electronics and Telecommunications Engineering,. University of Dar es ...... (2): 165-176. Kundaeli, H. N. (2013). Throughput-Delay. Analysis of the SR-ST-GBN ARQ Scheme. Mediterranean Journal of Electronics and. Communication.

  1. Cryptanalysis and Improvement of Chaos-Based Image Encryption Scheme with Circular Inter-Intra-Pixels Bit-Level Permutation

    Directory of Open Access Journals (Sweden)

    Haiju Fan

    2017-01-01

    Full Text Available A novel chaos-based image encryption scheme has been proposed recently. In this scheme, redundancies of the Fridrich’s structure were reduced significantly via a new circular inter-intra-pixels bit-level permutation strategy. However, we proved that the original encryption scheme is vulnerable to the known/chosen-plaintext attacks. Both the permutation and diffusion phases have been improved to enhance the security of the original scheme. By shifting each row of the plain image randomly, known-plaintext attacks could be resisted. Furthermore, by appending double crossover diffusion to the end of the original scheme, chosen-plaintext attacks lost their efficacies. Simulation results demonstrated that the improved encryption scheme outperforms the original one.

  2. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  3. Reverse flood routing with the inverted Muskingum storage routing scheme

    Directory of Open Access Journals (Sweden)

    A. D. Koussis

    2012-01-01

    Full Text Available This work treats reverse flood routing aiming at signal identification: inflows are inferred from observed outflows by orienting the Muskingum scheme against the wave propagation direction. Routing against the wave propagation is an ill-posed, inverse problem (small errors amplify, leading to large spurious responses; therefore, the reverse solution must be smoothness-constrained towards stability and uniqueness (regularised. Theoretical constrains on the coefficients of the reverse routing scheme assist in error control, but optimal grids are derived by numerical experimentation. Exact solutions of the convection-diffusion equation, for a single and a composite wave, are reverse-routed and in both instances the wave is backtracked well for a range of grid parameters. In the arduous test of a square pulse, the result is comparable to those of more complex methods. Seeding outflow data with random errors enhances instability; to cope with the spurious oscillations, the reversed solution is conditioned by smoothing via low-pass filtering or optimisation. Good-quality inflow hydrographs are recovered with either smoothing treatment, yet the computationally demanding optimisation is superior. Finally, the reverse Muskingum routing method is compared to a reverse-solution method of the St. Venant equations of flood wave motion and is found to perform equally well, at a fraction of the computing effort. This study leads us to conclude that the efficiently attained good inflow identification rests on the simplicity of the Muskingum reverse routing scheme that endows it with numerical robustness.

  4. Novel Noncommutative Cryptography Scheme Using Extra Special Group

    Directory of Open Access Journals (Sweden)

    Gautam Kumar

    2017-01-01

    Full Text Available Noncommutative cryptography (NCC is truly a fascinating area with great hope of advancing performance and security for high end applications. It provides a high level of safety measures. The basis of this group is established on the hidden subgroup or subfield problem (HSP. The major focus in this manuscript is to establish the cryptographic schemes on the extra special group (ESG. ESG is showing one of the most appropriate noncommutative platforms for the solution of an open problem. The working principle is based on the random polynomials chosen by the communicating parties to secure key exchange, encryption-decryption, and authentication schemes. This group supports Heisenberg, dihedral order, and quaternion group. Further, this is enhanced from the general group elements to equivalent ring elements, known by the monomials generations for the cryptographic schemes. In this regard, special or peculiar matrices show the potential advantages. The projected approach is exclusively based on the typical sparse matrices, and an analysis report is presented fulfilling the central cryptographic requirements. The order of this group is more challenging to assail like length based, automorphism, and brute-force attacks.

  5. A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Laicheng Cao

    2016-01-01

    Full Text Available In order to verify the data integrity in mobile multicloud computing environment, a MMCDIV (mobile multicloud data integrity verification scheme is proposed. First, the computability and nondegeneracy of verification can be obtained by adopting BLS (Boneh-Lynn-Shacham short signature scheme. Second, communication overhead is reduced based on HVR (Homomorphic Verifiable Response with random masking and sMHT (sequence-enforced Merkle hash tree construction. Finally, considering the resource constraints of mobile devices, data integrity is verified by lightweight computing and low data transmission. The scheme improves shortage that mobile device communication and computing power are limited, it supports dynamic data operation in mobile multicloud environment, and data integrity can be verified without using direct source file block. Experimental results also demonstrate that this scheme can achieve a lower cost of computing and communications.

  6. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    Science.gov (United States)

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  7. A Hybrid Cooperative Coding Scheme for the Relay-Eavesdropper Channel

    Directory of Open Access Journals (Sweden)

    Peng Xu

    2014-03-01

    Full Text Available This paper considers the four-node relay-eavesdropper channel, where a relay node helps the source to send secret messages to the destination in the presence of a passive eavesdropper. For the discrete memoryless case, we propose a hybrid cooperative coding scheme, which is based on the combination of the partial decode-forward scheme, the noise-forward scheme and the random binning scheme. The key feature of the proposed hybrid cooperative scheme is that the relay integrates the explicit cooperation strategy and the implicit cooperation strategy by forwarding source messages and additional interference at the same time. The derived achievable secrecy rate shows that some existing works can be viewed as special cases of the proposed scheme. Then, the achievable secrecy rate is extended to the Gaussian channel based on Gaussian codebooks, and the optimal power policy is also identified in the high power region. Both the analysis and numerical results are provided to demonstrate that the proposed hybrid cooperative coding scheme outperforms the comparable ones, especially in the high power region.

  8. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  9. Optical encryption scheme for multiple color images using complete trinary tree structure

    Science.gov (United States)

    Su, Yonggang; Tang, Chen; Gao, Guannan; Gu, Fan; Lei, Zhenkun; Tang, Shuwei

    2017-11-01

    We propose an optical encryption scheme for multiple color images based on the complete trinary tree structure. In the proposed encryption scheme, the encryption modules (EMs) are taken as branch nodes, and the color components of plain images are input as leaf nodes. In each EM which consists of phase truncated Fresnel transforms and random amplitude-phase masks, three input images are subsequently encoded into a complex function and finally encrypted to a real-value image. The proposed encryption scheme can encrypt multiple color images into a real-value grayscale cipher image, and make different color images have different encryption and decryption paths. By the proposed encryption scheme, we can realize an authority management with high security among multiple users. In addition, the proposed scheme possesses the advantages such as high robustness against various attacks and high encryption efficiency. Moreover, as the number of plain color images increases, high quality of the decrypted color images can still be maintained. Extensive simulation results have shown the performance of the proposed scheme. The proposed scheme can also be directly extended to encrypt multiple gray images.

  10. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2014-01-01

    Full Text Available The proxy signature, a variant of the ordinary digital signature, has been an active research topic in recent years; it has many useful applications, including distributed systems and grid computing. Although many identity-based proxy signature schemes have been proposed in the literature, only a few proposals for identity-based strong designated verifier proxy signature (ID-SDVPS schemes are available. However, it has been found that most of the ID-SDVPS schemes that have been proposed to date are not efficient in terms of computation and security, and a computationally efficient and secured ID-SDVPS scheme using elliptic curve bilinear pairing has been proposed in this paper. The security of the scheme is mainly based on the hardness assumption of CDH and GBDH problems in the random oracle model, which is existentially unforgeable against different types of adversaries. Furthermore, the security of our scheme is simulated in the AVISPA (Automated Validation of Internet Security Protocols and Applications software, a widely used automated internet protocol validation tool, and the simulation results confirm strong security against both active and passive attacks. In addition, because of a high processing capability and supporting additional security features, the scheme is suitable for the environments in which less computational cost with strong security is required.

  11. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  12. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  13. Towards an "All Speed" Unstructured Upwind Scheme

    Science.gov (United States)

    Loh, Ching Y.; Jorgenson, Philip C.E.

    2009-01-01

    In the authors previous studies [1], a time-accurate, upwind finite volume method (ETAU scheme) for computing compressible flows on unstructured grids was proposed. The scheme is second order accurate in space and time and yields high resolution in the presence of discontinuities. The scheme features a multidimensional limiter and multidimensional numerical dissipation. These help to stabilize the numerical process and to overcome the annoying pathological behaviors of upwind schemes. In the present paper, it will be further shown that such multidimensional treatments also lead to a nearly all-speed or Mach number insensitive upwind scheme. For flows at very high Mach number, e.g., 10, local numerical instabilities or the pathological behaviors are suppressed, while for flows at very low Mach number, e.g., 0.02, computation can be directly carried out without invoking preconditioning. For flows in different Mach number regimes, i.e., low, medium, and high Mach numbers, one only needs to adjust one or two parameters in the scheme. Several examples with low and high Mach numbers are demonstrated in this paper. Thus, the ETAU scheme is applicable to a broad spectrum of flow regimes ranging from high supersonic to low subsonic, appropriate for both CFD (computational fluid dynamics) and CAA (computational aeroacoustics).

  14. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  15. Secure Electronic Cash Scheme with Anonymity Revocation

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2016-01-01

    Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.

  16. Source-Independent Quantum Random Number Generation

    Science.gov (United States)

    Cao, Zhu; Zhou, Hongyi; Yuan, Xiao; Ma, Xiongfeng

    2016-01-01

    Quantum random number generators can provide genuine randomness by appealing to the fundamental principles of quantum mechanics. In general, a physical generator contains two parts—a randomness source and its readout. The source is essential to the quality of the resulting random numbers; hence, it needs to be carefully calibrated and modeled to achieve information-theoretical provable randomness. However, in practice, the source is a complicated physical system, such as a light source or an atomic ensemble, and any deviations in the real-life implementation from the theoretical model may affect the randomness of the output. To close this gap, we propose a source-independent scheme for quantum random number generation in which output randomness can be certified, even when the source is uncharacterized and untrusted. In our randomness analysis, we make no assumptions about the dimension of the source. For instance, multiphoton emissions are allowed in optical implementations. Our analysis takes into account the finite-key effect with the composable security definition. In the limit of large data size, the length of the input random seed is exponentially small compared to that of the output random bit. In addition, by modifying a quantum key distribution system, we experimentally demonstrate our scheme and achieve a randomness generation rate of over 5 ×103 bit /s .

  17. Security scheme in IMDD-OFDM-PON system with the chaotic pilot interval and scrambling

    Science.gov (United States)

    Chen, Qianghua; Bi, Meihua; Fu, Xiaosong; Lu, Yang; Zeng, Ran; Yang, Guowei; Yang, Xuelin; Xiao, Shilin

    2018-01-01

    In this paper, a random chaotic pilot interval and permutations scheme without any requirement of redundant sideband information is firstly proposed for the physical layer security-enhanced intensity modulation direct detection orthogonal frequency division multiplexing passive optical network (IMDD-OFDM-PON) system. With the help of the position feature of inserting the pilot, a simple logistic chaos map is used to generate the random pilot interval and scramble the chaotic subcarrier allocation of each column pilot data for improving the physical layer confidentiality. Due to the dynamic chaotic permutations of pilot data, the enhanced key space of ∼103303 is achieved in OFDM-PON. Moreover, the transmission experiment of 10-Gb/s 16-QAM encrypted OFDM data is successfully demonstrated over 20-km single-mode fiber, which indicates that the proposed scheme not only improves the system security, but also can achieve the same performance as in the common IMDD-OFDM-PON system without encryption scheme.

  18. Task discrimination from myoelectric activity: a learning scheme for EMG-based interfaces.

    Science.gov (United States)

    Liarokapis, Minas V; Artemiadis, Panagiotis K; Kyriakopoulos, Kostas J

    2013-06-01

    A learning scheme based on Random Forests is used to discriminate the task to be executed using only myoelectric activity from the upper limb. Three different task features can be discriminated: subspace to move towards, object to be grasped and task to be executed (with the object). The discrimination between the different reach to grasp movements is accomplished with a random forests classifier, which is able to perform efficient features selection, helping us to reduce the number of EMG channels required for task discrimination. The proposed scheme can take advantage of both a classifier and a regressor that cooperate advantageously to split the task space, providing better estimation accuracy with task-specific EMG-based motion decoding models, as reported in [1] and [2]. The whole learning scheme can be used by a series of EMG-based interfaces, that can be found in rehabilitation cases and neural prostheses.

  19. Deitmar schemes, graphs and zeta functions

    Science.gov (United States)

    Mérida-Angulo, Manuel; Thas, Koen

    2017-07-01

    In Thas (2014) it was explained how one can naturally associate a Deitmar scheme (which is a scheme defined over the field with one element, F1) to a so-called ;loose graph; (which is a generalization of a graph). Several properties of the Deitmar scheme can be proven easily from the combinatorics of the (loose) graph, and known realizations of objects over F1 such as combinatorial F1-projective and F1-affine spaces exactly depict the loose graph which corresponds to the associated Deitmar scheme. In this paper, we first modify the construction of loc. cit., and show that Deitmar schemes which are defined by finite trees (with possible end points) are ;defined over F1; in Kurokawa's sense; we then derive a precise formula for the Kurokawa zeta function for such schemes (and so also for the counting polynomial of all associated Fq-schemes). As a corollary, we find a zeta function for all such trees which contains information such as the number of inner points and the spectrum of degrees, and which is thus very different than Ihara's zeta function (which is trivial in this case). Using a process called ;surgery,; we show that one can determine the zeta function of a general loose graph and its associated {Deitmar, Grothendieck}-schemes in a number of steps, eventually reducing the calculation essentially to trees. We study a number of classes of examples of loose graphs, and introduce the Grothendieck ring ofF1-schemes along the way in order to perform the calculations. Finally, we include a computer program for performing more tedious calculations, and compare the new zeta function to Ihara's zeta function for graphs in a number of examples.

  20. Assessing water quality of rural water supply schemes as a measure ...

    African Journals Online (AJOL)

    This study was conducted in WondoGenet district, Southern Ethiopia to assess the water quality of rural water supply schemes in relation to the sustainability of their service delivery. 28 functional water points were selected randomly, for their assessments. The assessments included sanitary surveillance of water points and ...

  1. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  2. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  3. Galilean invariant resummation schemes of cosmological perturbations

    Science.gov (United States)

    Peloso, Marco; Pietroni, Massimo

    2017-01-01

    Many of the methods proposed so far to go beyond Standard Perturbation Theory break invariance under time-dependent boosts (denoted here as extended Galilean Invariance, or GI). This gives rise to spurious large scale effects which spoil the small scale predictions of these approximation schemes. By using consistency relations we derive fully non-perturbative constraints that GI imposes on correlation functions. We then introduce a method to quantify the amount of GI breaking of a given scheme, and to correct it by properly tailored counterterms. Finally, we formulate resummation schemes which are manifestly GI, discuss their general features, and implement them in the so called Time-Flow, or TRG, equations.

  4. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  5. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  6. Graph state-based quantum authentication scheme

    Science.gov (United States)

    Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying

    2017-04-01

    Inspired by the special properties of the graph state, a quantum authentication scheme is proposed in this paper, which is implemented with the utilization of the graph state. Two entities, a reliable party, Trent, as a verifier and Alice as prover are included. Trent is responsible for registering Alice in the beginning and confirming Alice in the end. The proposed scheme is simple in structure and convenient to realize in the realistic physical system due to the use of the graph state in a one-way quantum channel. In addition, the security of the scheme is extensively analyzed and accordingly can resist the general individual attack strategies.

  7. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    . This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC......) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more...

  8. Fully-distributed randomized cooperation in wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2015-01-07

    When marrying randomized distributed space-time coding (RDSTC) to geographical routing, new performance horizons can be created. In order to reach those horizons however, routing protocols must evolve to operate in a fully distributed fashion. In this letter, we expose a technique to construct a fully distributed geographical routing scheme in conjunction with RDSTC. We then demonstrate the performance gains of this novel scheme by comparing it to one of the prominent classical schemes.

  9. Password authentication scheme based on the quadratic residue problem

    Science.gov (United States)

    Ali, Muhammad Helmi; Ismail, Eddie Shahril

    2017-04-01

    In this paper, we propose a new password-authentication scheme based on quadratic residue problem with the following advantages: the scheme does not require a verification file, and the scheme can withstand replay attacks and resist from the guessing and impersonation attacks. We next discuss the advantages of our designated scheme over other schemes in terms of security and efficiency.

  10. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  11. Designing optimal sampling schemes for field visits

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2008-10-01

    Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...

  12. A Climate Classification Scheme for Habitable Worlds

    Science.gov (United States)

    Byrne, J. F.

    2017-11-01

    This presentation will include an exploration of the internal/external forcings and variability associated with climate using Earth as a reference model in addition to a classification scheme consisting of five categories.

  13. Secure Wake-Up Scheme for WBANs

    Science.gov (United States)

    Liu, Jing-Wei; Ameen, Moshaddique Al; Kwak, Kyung-Sup

    Network life time and hence device life time is one of the fundamental metrics in wireless body area networks (WBAN). To prolong it, especially those of implanted sensors, each node must conserve its energy as much as possible. While a variety of wake-up/sleep mechanisms have been proposed, the wake-up radio potentially serves as a vehicle to introduce vulnerabilities and attacks to WBAN, eventually resulting in its malfunctions. In this paper, we propose a novel secure wake-up scheme, in which a wake-up authentication code (WAC) is employed to ensure that a BAN Node (BN) is woken up by the correct BAN Network Controller (BNC) rather than unintended users or malicious attackers. The scheme is thus particularly implemented by a two-radio architecture. We show that our scheme provides higher security while consuming less energy than the existing schemes.

  14. Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN Key Exchange

    Directory of Open Access Journals (Sweden)

    Kish Laszlo B.

    2016-03-01

    Full Text Available We introduce two new Kirchhoff-law-Johnson-noise (KLJN secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR- KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random Resistor Random Temperature (RRRT- KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at a non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.

  15. Renormalization scheme dependence with renormalization group summation

    Science.gov (United States)

    McKeon, D. G. C.

    2015-08-01

    We consider all perturbative radiative corrections to the total e+e- annihilation cross section Re+e- showing how the renormalization group (RG) equation associated with the radiatively induced mass scale μ can be used to sum the logarithmic contributions in two ways. First of all, one can sum leading-log, next-to-leading-log, etc., contributions to Re+e- using in turn the one-loop, two-loop, etc., contributions to the RG function β . A second summation shows how all logarithmic corrections to Re+e- can be expressed entirely in terms of the log-independent contributions when one employs the full β -function. Next, using Stevenson's characterization of any choice of renormalization scheme by the use of the contributions to the β -function arising beyond two-loop order, we examine the RG scheme dependence in Re+e- when using the second way of summing logarithms. The renormalization scheme invariants that arise are then related to the renormalization scheme invariants found by Stevenson. We next consider two choices of the renormalization scheme, one which can be used to express Re+e- solely in terms of two powers of a running coupling, and the second which can be used to express Re+e- as an infinite series in the two-loop running coupling (i.e., a Lambert W -function). In both cases, Re+e- is expressed solely in terms of renormalization scheme invariant parameters that are to be computed by a perturbative evaluation of Re+e-. We then establish how in general the coupling constant arising in one renormalization scheme can be expressed as a power series of the coupling arising in any other scheme. We then establish how, by using a different renormalization mass scale at each order of perturbation theory, all renormalization scheme dependence can be absorbed into these mass scales when one uses the second way of summing logarithmic corrections to Re+e-. We then employ the approach to renormalization scheme dependency that we have applied to Re+e- to a RG summed

  16. Navigators’ Behavior in Traffic Separation Schemes

    Directory of Open Access Journals (Sweden)

    Zbigniew Pietrzykowski

    2015-03-01

    Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.

  17. Readout scheme of the upgraded ALICE TPC

    CERN Document Server

    Appelshaeuser, Harald; Ivanov, Marian; Lippmann, Christian; Wiechula, Jens

    2016-01-01

    In this document, we present the updated readout scheme for the ALICE TPC Upgrade. Two major design changes are implemented with respect to the concept that was presented in the TPC Upgrade Technical Design Report: – The SAMPA front-end ASIC will be used in direct readout mode. – The ADC sampling frequency will be reduced from 10 to 5 MHz. The main results from simulations and a description of the new readout scheme is outlined.

  18. Dynamic Restarting Schemes for Eigenvalue Problems

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Simon, Horst D.

    1999-03-10

    In studies of restarted Davidson method, a dynamic thick-restart scheme was found to be excellent in improving the overall effectiveness of the eigen value method. This paper extends the study of the dynamic thick-restart scheme to the Lanczos method for symmetric eigen value problems and systematically explore a range of heuristics and strategies. We conduct a series of numerical tests to determine their relative strength and weakness on a class of electronic structure calculation problems.

  19. Characterisation of random DFB Raman laser amplifier for WDM transmission

    OpenAIRE

    Rosa, Paweł; Rizzelli, Giuseppe; Tan, Mingming; Harper, Paul; Ania-Castañón, Juan Diego

    2015-01-01

    We perform a full numerical characterisation of half-open cavity random DFB Raman fibre laser amplifier schemes for WDM transmission in terms of signal power variation, noise and nonlinear impairments, showcasing the excellent potential of this scheme to provide amplification for DWDM transmission with very low gain variation. © 2015 Optical Society of America

  20. Characterisation of random DFB Raman laser amplifier for WDM transmission.

    Science.gov (United States)

    Rosa, Paweł; Rizzelli, Giuseppe; Tan, Mingming; Harper, Paul; Ania-Castañόn, Juan Diego

    2015-11-02

    We perform a full numerical characterisation of half-open cavity random DFB Raman fibre laser amplifier schemes for WDM transmission in terms of signal power variation, noise and nonlinear impairments, showcasing the excellent potential of this scheme to provide amplification for DWDM transmission with very low gain variation.

  1. Characterisation of random DFB Raman laser amplifier for WDM transmission

    National Research Council Canada - National Science Library

    Rosa, Paweł; Rizzelli, Giuseppe; Tan, Mingming; Harper, Paul; Ania-Castañόn, Juan Diego

    2015-01-01

    We perform a full numerical characterisation of half-open cavity random DFB Raman fibre laser amplifier schemes for WDM transmission in terms of signal power variation, noise and nonlinear impairments...

  2. Growth of preferential attachment random graphs via continuous ...

    Indian Academy of Sciences (India)

    Abstract. Some growth asymptotics of a version of `preferential attachment' random graphs are studied through an embedding into a continuous-time branching scheme. These results complement and extend previous work in the literature.

  3. Reliable, Efficient, and Power Optimized Control-Channel Selection Scheme for Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Saleem Aslam

    2013-01-01

    Full Text Available This paper presents a centralized control-channel selection scheme for cognitive radio networks (CRNs by exploiting the variation in the spectrum across capacity, occupancy, and error rate. We address the fundamental challenges in the design of the control-channel for CRNs: (1 random licensed users (LUs activity and (2 the economical and vulnerability concerns for a dedicated control-channel. We develop a knapsack problem (KP based reliable, efficient, and power optimized (REPO control-channel selection scheme with an optimal data rate, bit error rate (BER, and idle time. Moreover, we introduce the concept of the backup channels in the context of control-channel selection, which assists the CRs to quickly move on to the next stable channel in order to cater for the sudden appearance of LUs. Based on the KP and its dynamic programming solution, simulation results show that the proposed scheme is highly adaptable and resilient to random LU activity. The REPO scheme reduces collisions with the LUs, minimizes the alternate channel selection time, and reduces the bit error rate (BER. Moreover, it reduces the power consumed during channel switching and provides a performance, that is, competitive with those schemes that are using a static control-channel for the management of control traffic in CRNs.

  4. Transmission performance improvement using random DFB laser based Raman amplification and bidirectional second-order pumping

    OpenAIRE

    Tan, M.; Rosa, P; Le, S.T.; Iqbal, Md A.; Phillips, I.D.; Harper, P.

    2016-01-01

    We demonstrate that a distributed Raman amplification scheme based on random distributed feedback (DFB) fiber laser enables bidirectional second-order Raman pumping without increasing relative intensity noise (RIN) of the signal. This extends the reach of 10 × 116 Gb/s DP-QPSK WDM transmission up to 7915 km, compared with conventional Raman amplification schemes. Moreover, this scheme gives the longest maximum transmission distance among all the Raman amplification schemes presented in this p...

  5. Combining image-processing and image compression schemes

    Science.gov (United States)

    Greenspan, H.; Lee, M.-C.

    1995-01-01

    An investigation into the combining of image-processing schemes, specifically an image enhancement scheme, with existing compression schemes is discussed. Results are presented on the pyramid coding scheme, the subband coding scheme, and progressive transmission. Encouraging results are demonstrated for the combination of image enhancement and pyramid image coding schemes, especially at low bit rates. Adding the enhancement scheme to progressive image transmission allows enhanced visual perception at low resolutions. In addition, further progressing of the transmitted images, such as edge detection schemes, can gain from the added image resolution via the enhancement.

  6. Counter-Based Broadcast Scheme Considering Reachability, Network Density, and Energy Efficiency for Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Ji-Young; Seo, Dong-Yoon; Lee, Jung-Ryun

    2018-01-04

    A wireless sensor network (WSN) is emerging as an innovative method for gathering information that will significantly improve the reliability and efficiency of infrastructure systems. Broadcast is a common method to disseminate information in WSNs. A variety of counter-based broadcast schemes have been proposed to mitigate the broadcast-storm problems, using the count threshold value and a random access delay. However, because of the limited propagation of the broadcast-message, there exists a trade-off in a sense that redundant retransmissions of the broadcast-message become low and energy efficiency of a node is enhanced, but reachability become low. Therefore, it is necessary to study an efficient counter-based broadcast scheme that can dynamically adjust the random access delay and count threshold value to ensure high reachability, low redundant of broadcast-messages, and low energy consumption of nodes. Thus, in this paper, we first measure the additional coverage provided by a node that receives the same broadcast-message from two neighbor nodes, in order to achieve high reachability with low redundant retransmissions of broadcast-messages. Second, we propose a new counter-based broadcast scheme considering the size of the additional coverage area, distance between the node and the broadcasting node, remaining battery of the node, and variations of the node density. Finally, we evaluate performance of the proposed scheme compared with the existing counter-based broadcast schemes. Simulation results show that the proposed scheme outperforms the existing schemes in terms of saved rebroadcasts, reachability, and total energy consumption.

  7. Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2017-01-01

    Full Text Available With the development of Internet, cloud computing has emerged to provide service to data users. But, it is necessary for an auditor on behalf of users to check the integrity of the data stored in the cloud. The cloud server also must ensure the privacy of the data. In a usual public integrity check scheme, the linear combination of data blocks is needed for verification. But, after times of auditing on the same data blocks, based on collected linear combinations, the auditor might derive these blocks. Recently, a number of public auditing schemes with privacy-preserving are proposed. With blinded linear combinations of data blocks, the authors of these schemes believed that the auditor cannot derive any information about the data blocks and claimed that their schemes are provably secure in the random oracle model. In this paper, with detailed security analysis of these schemes, we show that these schemes are vulnerable to an attack from the malicious cloud server who modifies the data blocks and succeeds in forging proof information for data integrity check.

  8. Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud

    Directory of Open Access Journals (Sweden)

    Tengfei Tu

    2017-01-01

    Full Text Available As information technology develops, cloud storage has been widely accepted for keeping volumes of data. Remote data auditing scheme enables cloud user to confirm the integrity of her outsourced file via the auditing against cloud storage, without downloading the file from cloud. In view of the significant computational cost caused by the auditing process, outsourced auditing model is proposed to make user outsource the heavy auditing task to third party auditor (TPA. Although the first outsourced auditing scheme can protect against the malicious TPA, this scheme enables TPA to have read access right over user’s outsourced data, which is a potential risk for user data privacy. In this paper, we introduce the notion of User Focus for outsourced auditing, which emphasizes the idea that lets user dominate her own data. Based on User Focus, our proposed scheme not only can prevent user’s data from leaking to TPA without depending on data encryption but also can avoid the use of additional independent random source that is very difficult to meet in practice. We also describe how to make our scheme support dynamic updates. According to the security analysis and experimental evaluations, our proposed scheme is provably secure and significantly efficient.

  9. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  10. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  11. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  12. A Novel Nondestructive Bit-Line Discharging Scheme for Deep Submicrometer STT-RAM

    DEFF Research Database (Denmark)

    Zeinali, Behzad; Madsen, Jens Kargaard; Raghavan, Praveen

    A combination of semiconductor integrated circuits (IC) and a dense array of scaled magnetic tunnel junctions (MTJ) makes promising Spin-Transfer Torque Random Access Memory (STT-RAM). This emerging memory minimizes the leakage power consumption and provides a high density at scaled technologies....... In this paper, we propose a novel non-destructive self-reference sensing scheme for STT-RAM. The proposed technique overcomes the large bit-to-bit variation of MTJ resistance. In the proposed scheme, the stored value in the STTRAM cell preserves, hence, the long write-back operation is eliminated. Besides...

  13. Performance and serum cortisol concentration in Santa Inês lambs under different suckling schemes

    OpenAIRE

    Ana Carolina Alves; Nadja Gomes Alves; Ivan Júnior Ascari; Felipe Barbosa Junqueira; Luciana França Smith Maciel; Iraides Ferreira Furusho Garcia; Renato Ribeiro de Lima

    2016-01-01

    ABSTRACT The objective of this study was to examine the effects of suckling schemes (continued, controlled, and total separation) and the type of pregnancy on performance and serum cortisol concentration in lambs. A total of 29 Santa Inês ewes and 40 lambs were used, and the randomized block design was applied in a split-plot scheme with a 3 × 2 factorial arrangement in the plot and time in the subplot. For controlled suckling, the diet was supplied twice daily during one hour, starting on th...

  14. A New Quantum Key Distribution Scheme based on Frequency and Time Coding

    OpenAIRE

    Zhu, Chang-hua; Pei, Chang-xing; Quan, Dong-xiao; Chen, Nan; Yi, Yun-hui

    2010-01-01

    A new scheme of quantum key distribution (QKD) using frequency and time coding is proposed, in which the security is based on the frequency-time uncertainty relation. In this scheme, the binary information sequence is encoded randomly on either the central frequency or the time delay at the sender. The central frequency of the single photon pulse is set as omega1 for bit "0" and set as omega2 for bit "1" when frequency coding is selected. While, the single photon pulse is not delayed for bit ...

  15. Convergence of the Grunwald-Letnikov scheme for time-fractional diffusion

    Science.gov (United States)

    Gorenflo, R.; Abdel-Rehim, E. A.

    2007-08-01

    Using bivariate generating functions, we prove convergence of the Grunwald-Letnikov difference scheme for the fractional diffusion equation (in one space dimension) with and without central linear drift in the Fourier-Laplace domain as the space and time steps tend to zero in a well-scaled way. This implies convergence in distribution (weak convergence) of the discrete solution towards the probability of sojourn of a diffusing particle. The difference schemes allow also interpretation as discrete random walks. For fractional diffusion with central linear drift we show that in the Fourier-Laplace domain the limiting ordinary differential equation coincides with that for the solution of the corresponding diffusion equation.

  16. Identity-Based Verifiably Encrypted Signatures without Random Oracles

    Science.gov (United States)

    Zhang, Lei; Wu, Qianhong; Qin, Bo

    Fair exchange protocol plays an important role in electronic commerce in the case of exchanging digital contracts. Verifiably encrypted signatures provide an optimistic solution to these scenarios with an off-line trusted third party. In this paper, we propose an identity-based verifiably encrypted signature scheme. The scheme is non-interactive to generate verifiably encrypted signatures and the resulting encrypted signature consists of only four group elements. Based on the computational Diffie-Hellman assumption, our scheme is proven secure without using random oracles. To the best of our knowledge, this is the first identity-based verifiably encrypted signature scheme provably secure in the standard model.

  17. METAPHORIC MECHANISMS IN IMAGE SCHEME DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    Pankratova, S.A.

    2017-06-01

    Full Text Available Problems of knowledge representation by means of images are still cognitively significant and invariably modern. The article deals with the image heuristic potential of a bookish sphere as a donor of meanings, aiding metaphoric scheme development of another modern sphere of cinematography. The key factor here is the differentiation between two basically different metaphor types – heuristic epiphora and image diaphora. The author had offered a unique methodology of counting of quantitative parameters of heuristic potential which opens the possibility of modeling the mechanisms of metaphoric meaning development. In the summary the author underscores that both ways of image scheme development are of importance to cognitive science, both heuristic epiphora and image-based diaphora play a significant role in the explication of image scheme development.

  18. IPCT: A scheme for mobile authentication

    Directory of Open Access Journals (Sweden)

    Vishnu Shankar

    2016-09-01

    Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.

  19. Tradable white certificate schemes : what can we learn from tradable green certificate schemes?

    NARCIS (Netherlands)

    Oikonomou, Vlasis; Mundaca, Luis

    In this paper, we analyze the experiences gained from tradable green certificate (TGC) schemes and extract some policy lessons that can lead to a successful design of a market-based approach for energy efficiency improvement, alias tradable white certificate schemes. We use tradable green

  20. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  1. Poverty and Christian Welfare Scheme: Evidence from the Church of Nigeria (Anglican Communion Osun State, Nigeria

    Directory of Open Access Journals (Sweden)

    S. Awoniyi

    2015-05-01

    Full Text Available Existing studies on welfare schemes in Nigerian Churches have focussed on the political and economic perspectives, neglecting the ethical dimension which has a stronger basis in the Bible. This study, therefore, examined the welfare scheme of the Church of Nigeria (Anglican Communion, Osun State, Nigeria as evidence with a view to assessing their method of generating welfare resources, as well as their implementation and monitoring strategy against the provision of the Bible on welfare ethics. Data were obtained through interviews, observation and questionnaire. In-depth interviews were conducted with 90 randomly selected key informants including 12 clergy, 24 poor members of the church, 18 welfare scheme officers and 36 beneficiaries. Four welfare schemes were observed between 1991 -2012 in a total of 30 Anglican Churches in major towns in Osun State. A total of 600 copies of the questionnaire were purposively administered to beneficiaries, church members and welfare scheme officers. Out of these, 550 were retrieved and analysed using percentages. The Church of Nigeria (Anglican Communion generated resources for welfare schemes through compulsory  levies, donations, annual harvest proceeds, offering collection ,tithes/offering and foreign assistance .Four categories of welfare schemes were adopted: Health care delivery, vocational rehabilitation, micro-credit loans, and women’s empowerment. One implementation strategy was adopted, namely, social advocacy. The church utilized sensitisation mechanism, widow retreat workshops, free health campaign, radio/television programmes and supportive counselling. Welfare scheme for the Church of Nigeria offered socio-economic benefits to members of the Church, but they were weakened by limited human coverage, insufficient funds and poor monitoring. These call for moral reorientation on the part of stakeholders in order to inculcate the ethics of justice and fairness as enshrined in the Bible.

  2. Carbon trading: Current schemes and future developments

    Energy Technology Data Exchange (ETDEWEB)

    Perdan, Slobodan, E-mail: slobodan.perdan@manchester.ac.uk [School of Chemical Engineering and Analytical Science, Room F30, The Mill, University of Manchester, Sackville Street, Manchester M13 9PL (United Kingdom); Azapagic, Adisa [School of Chemical Engineering and Analytical Science, Room F30, The Mill, University of Manchester, Sackville Street, Manchester M13 9PL (United Kingdom)

    2011-10-15

    This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: > The paper provides an extensive overview of mandatory emissions trading schemes around the world. > Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. > The expansion requires considerable technical fixes and harmonisation of different trading systems. > Clear policy signals, political support and a stable economic environment are needed for the expansion. > A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.

  3. Empirical Bayes for DCM: A Group Inversion Scheme.

    Science.gov (United States)

    Friston, Karl; Zeidman, Peter; Litvak, Vladimir

    2015-01-01

    This technical note considers a simple but important methodological issue in estimating effective connectivity; namely, how do we integrate measurements from multiple subjects to infer functional brain architectures that are conserved over subjects. We offer a solution to this problem that rests on a generalization of random effects analyses to Bayesian inference about nonlinear models of electrophysiological time-series data. Specifically, we present an empirical Bayesian scheme for group or hierarchical models, in the setting of dynamic causal modeling (DCM). Recent developments in approximate Bayesian inference for hierarchical models enable the efficient estimation of group effects in DCM studies of multiple trials, sessions, or subjects. This approach estimates second (e.g., between-subject) level parameters based on posterior estimates from the first (e.g., within-subject) level. Here, we use empirical priors from the second level to iteratively optimize posterior densities over parameters at the first level. The motivation for this iterative application is to finesse the local minima problem inherent in the (first level) inversion of nonlinear and ill-posed models. Effectively, the empirical priors shrink the first level parameter estimates toward the global maximum, to provide more robust and efficient estimates of within (and between-subject) effects. This paper describes the inversion scheme using a worked example based upon simulated electrophysiological responses. In a subsequent paper, we will assess its robustness and reproducibility using an empirical example.

  4. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  5. An Elaborate Secure Quantum Voting Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-10-01

    An elaborate secure quantum voting scheme is presented in this paper. It is based on quantum proxy blind signature. The eligible voter's voting information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Charlie's supervision in the whole voting process can make the protocol satisfy fairness and un-repeatability so as to avoid Bob's dishonest behaviour. Our scheme uses the physical characteristics of quantum mechanics to achieve voting, counting and immediate supervision. In addition, the program also uses quantum key distribution protocol and quantum one-time pad to guarantee its unconditional security.

  6. A COMPLETE SCHEME FOR A MUON COLLIDER.

    Energy Technology Data Exchange (ETDEWEB)

    PALMER,R.B.; BERG, J.S.; FERNOW, R.C.; GALLARDO, J.C.; KIRK, H.G.; ALEXAHIN, Y.; NEUFFER, D.; KAHN, S.A.; SUMMERS, D.

    2007-09-01

    A complete scheme for production, cooling, acceleration, and ring for a 1.5 TeV center of mass muon collider is presented, together with parameters for two higher energy machines. The schemes starts with the front end of a proposed neutrino factory that yields bunch trains of both muon signs. Six dimensional cooling in long-period helical lattices reduces the longitudinal emittance until it becomes possible to merge the trains into single bunches, one of each sign. Further cooling in all dimensions is applied to the single bunches in further helical lattices. Final transverse cooling to the required parameters is achieved in 50 T solenoids.

  7. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC...

  8. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  9. Droop Scheme With Consideration of Operating Costs

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede

    2014-01-01

    considered even though they are different for different types of DGs. This letter thus proposes an alternative droop scheme, which can better distinguish the different operating characteristics and objectives of the DGs grouped together in a weighted droop expression. The power sharing arrived in the steady......Although many droop schemes have been proposed for distributed generator (DG) control in a microgrid, they mainly focus on achieving proportional power sharing based on the DG kVA ratings. Other factors like generation costs, efficiencies, and emission penalties at different loads have not been...

  10. Convergence of the Graph Allen-Cahn Scheme

    Science.gov (United States)

    Luo, Xiyang; Bertozzi, Andrea L.

    2017-05-01

    The graph Laplacian and the graph cut problem are closely related to Markov random fields, and have many applications in clustering and image segmentation. The diffuse interface model is widely used for modeling in material science, and can also be used as a proxy to total variation minimization. In Bertozzi and Flenner (Multiscale Model Simul 10(3):1090-1118, 2012), an algorithm was developed to generalize the diffuse interface model to graphs to solve the graph cut problem. This work analyzes the conditions for the graph diffuse interface algorithm to converge. Using techniques from numerical PDE and convex optimization, monotonicity in function value and convergence under an a posteriori condition are shown for a class of schemes under a graph-independent stepsize condition. We also generalize our results to incorporate spectral truncation, a common technique used to save computation cost, and also to the case of multiclass classification. Various numerical experiments are done to compare theoretical results with practical performance.

  11. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security

  12. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2014-12-01

    Dec 1, 2014 ... Abstract. We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit ...

  13. An Energy-Efficient Game-Theory-Based Spectrum Decision Scheme for Cognitive Radio Sensor Networks.

    Science.gov (United States)

    Salim, Shelly; Moh, Sangman

    2016-06-30

    A cognitive radio sensor network (CRSN) is a wireless sensor network in which sensor nodes are equipped with cognitive radio. In this paper, we propose an energy-efficient game-theory-based spectrum decision (EGSD) scheme for CRSNs to prolong the network lifetime. Note that energy efficiency is the most important design consideration in CRSNs because it determines the network lifetime. The central part of the EGSD scheme consists of two spectrum selection algorithms: random selection and game-theory-based selection. The EGSD scheme also includes a clustering algorithm, spectrum characterization with a Markov chain, and cluster member coordination. Our performance study shows that EGSD outperforms the existing popular framework in terms of network lifetime and coordination overhead.

  14. An Energy-Efficient Game-Theory-Based Spectrum Decision Scheme for Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shelly Salim

    2016-06-01

    Full Text Available A cognitive radio sensor network (CRSN is a wireless sensor network in which sensor nodes are equipped with cognitive radio. In this paper, we propose an energy-efficient game-theory-based spectrum decision (EGSD scheme for CRSNs to prolong the network lifetime. Note that energy efficiency is the most important design consideration in CRSNs because it determines the network lifetime. The central part of the EGSD scheme consists of two spectrum selection algorithms: random selection and game-theory-based selection. The EGSD scheme also includes a clustering algorithm, spectrum characterization with a Markov chain, and cluster member coordination. Our performance study shows that EGSD outperforms the existing popular framework in terms of network lifetime and coordination overhead.

  15. Creating Culturally Sustainable Agri-Environmental Schemes

    Science.gov (United States)

    Burton, Rob J. F.; Paragahawewa, Upananda Herath

    2011-01-01

    Evidence is emerging from across Europe that contemporary agri-environmental schemes are having only limited, if any, influence on farmers' long-term attitudes towards the environment. In this theoretical paper we argue that these approaches are not "culturally sustainable," i.e. the actions are not becoming embedded within farming…

  16. Pay-what-you-want pricing schemes

    DEFF Research Database (Denmark)

    Kahsay, Goytom Abraha; Samahita, Margaret

    Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular in a wide range of industries. We develop a model incorporating self-image into the buyer's utility function and introduce heterogeneity in consumption utility and image-sensitivity, which generates different purchase...

  17. Enhancing Cooperative Loan Scheme Through Automated Loan ...

    African Journals Online (AJOL)

    Enhancing Cooperative Loan Scheme Through Automated Loan Management System. ... Financial transactions through manual system of operation are prone to errors and unimagined complexities, making it so difficult a task maintaining all entries of users account, search records of activities, handle loan deduction errors ...

  18. Geometrical and frequential watermarking scheme using similarities

    Science.gov (United States)

    Bas, Patrick; Chassery, Jean-Marc; Davoine, Franck

    1999-04-01

    Watermarking schemes are more and more robust to classical degradations. The NEC system developed by Cox, using both original and marked images, can detect the mark with a JPEG compression ratio of 30. Nevertheless a very simple geometric attack done by the program Stirmark can remove the watermark. Most of the present watermarking schemes only map a mark on the image without geometric reference and therefore are not robust to geometric transformation. We present a scheme based on the modification of a collage map (issued from a fractal code used in fractal compression). We add a mark introducing similarities in the image. The embedding of the mark is done by selection of points of interest supporting blocks on which similarities are hided. This selection is done by the Stephens-Harris detector. The similarity is embedded locally to be robust to cropping. Contrary to many schemes, the reference mark used for the detection comes from the marked image and thus undergoes geometrical distortions. The detection of the mark is done by searching interest blocks and their similarities. It does not use the original image and the robustness is guaranteed by a key. Our first results show that the similarities-based watermarking is quite robust to geometric transformation such as translations, rotations and cropping.

  19. The Partners in Flight species prioritization scheme

    Science.gov (United States)

    William C. Hunter; Michael F. Carter; David N. Pashley; Keith Barker

    1993-01-01

    The prioritization scheme identifies those birds at any locality on several geographic scales most in need of conservation action. Further, it suggests some of those actions that ought to be taken. Ranking criteria used to set priorities for Neotropical migratory landbirds measure characteristics of species that make them vulnerable to local and global extinction....

  20. Shanghai : Developing a Green Electricity Scheme

    OpenAIRE

    Heijndermans, Enno; Berrah, Noureddine; Crowdis, Mark D.

    2006-01-01

    This report documents the experience of developing a green electricity scheme in Shanghai, China. It is intended to be a resource when replicating this effort in another city or country. The study consists of two parts. In Part 1, the general characteristics of both the framework for green electricity products and the market for green electricity products are presented. It also presents a ...

  1. EXPERIMENTAL EVALUATION OF LIDAR DATA VISUALIZATION SCHEMES

    Directory of Open Access Journals (Sweden)

    S. Ghosh

    2012-07-01

    Full Text Available LiDAR (Light Detection and Ranging has attained the status of an industry standard method of data collection for gathering three dimensional topographic information. Datasets captured through LiDAR are dense, redundant and are perceivable from multiple directions, which is unlike other geospatial datasets collected through conventional methods. This three dimensional information has triggered an interest in the scientific community to develop methods for visualizing LiDAR datasets and value added products. Elementary schemes of visualization use point clouds with intensity or colour, triangulation and tetrahedralization based terrain models draped with texture. Newer methods use feature extraction either through the process of classification or segmentation. In this paper, the authors have conducted a visualization experience survey where 60 participants respond to a questionnaire. The questionnaire poses six different questions on the qualities of feature perception and depth for 12 visualization schemes. The answers to these questions are obtained on a scale of 1 to 10. Results are thus presented using the non-parametric Friedman's test, using post-hoc analysis for hypothetically ranking the visualization schemes based on the rating received and finally confirming the rankings through the Page's trend test. Results show that a heuristic based visualization scheme, which has been developed by Ghosh and Lohani (2011 performs the best in terms of feature and depth perception.

  2. The data cyclotron query processing scheme

    NARCIS (Netherlands)

    R.A. Goncalves (Romulo); M.L. Kersten (Martin)

    2010-01-01

    htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot

  3. Value constraints in the CLP scheme

    NARCIS (Netherlands)

    M.H. van Emden

    1996-01-01

    textabstractThis paper addresses the question of how to incorporate constraint propagation into logic programming. A likely candidate is the CLP scheme, which allows one to exploit algorithmic opportunities while staying within logic programming semantics. CLP($cal R$) is an example: it combines

  4. Benefit Reentitlement Conditions in Unemployment Insurance Schemes

    DEFF Research Database (Denmark)

    Andersen, Torben M.; Christoffersen, Mark Strøm; Svarer, Michael

    Unemployment insurance schemes include conditions on past employment history as part of the eligibility conditions. This aspect is often neglected in the literature which primarily focuses on benefit levels and benefit duration. In a search-matching framework we show that benefit duration and emp...

  5. External quality assessment schemes for toxicology.

    Science.gov (United States)

    Wilson, John

    2002-08-14

    A variety of external quality assurance (EQA) schemes monitor quantitative performance for routine biochemical analysis of agents such as paracetamol, salicylate, ethanol and carboxyhaemoglobin. Their usefulness for toxicologists can be lessened where the concentrations monitored do not extend fully into the toxic range or where the matrix is synthetic, of animal origin or serum as opposed to whole human blood. A scheme for quantitative determinations of a wider range of toxicological analytes such as opioids, benzodiazepines and tricyclics in human blood has been piloted by the United Kingdom National External Quality Assessment Scheme (UKNEQAS). Specialist schemes are available for drugs of abuse testing in urine and for hair analysis. Whilst these programmes provide much useful information on the performance of analytical techniques, they fail to monitor the integrated processes that are needed in investigation of toxicological cases. In practice, both qualitative and quantitative tests are used in combination with case information to guide the evaluation of the samples and to develop an interpretation of the analytical findings that is used to provide clinical or forensic advice. EQA programs that combine the analytical and interpretative aspects of case studies are available from EQA providers such as UKNEQAS and the Dutch KKGT program (Stichting Kwaliteitsbewaking Klinische Geneesmiddelanalyse en Toxicologie).

  6. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  7. Voluntary Certification Schemes and Legal Minimum Standards

    NARCIS (Netherlands)

    Herzfeld, T.; Jongeneel, R.A.

    2012-01-01

    EU farmers face increasing requests to comply with legal as well as private agribusiness and retail standards. Both requests potentially raise farmer’s administrative burden. This paper discusses the potential synergies between cross-compliance and third-party certification schemes. In selected

  8. Traffic calming schemes : opportunities and implementation strategies.

    NARCIS (Netherlands)

    Schagen, I.N.L.G. van (ed.)

    2003-01-01

    Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and

  9. A Presuppositional Approach to Conceptual Schemes | Wang ...

    African Journals Online (AJOL)

    ; for they have been focused too much on the truth-conditional notions of meaning/concepts and translation/interpretation in Tarski's style. It is exactly due to such a Quinean interpretation of the notion of conceptual schemes that the very notion ...

  10. Observations and comments on the classification schemes ...

    African Journals Online (AJOL)

    Reviews of the classification schemes proposed by various geologists are basically similar. However, general discrepancies, inconsistencies and contradictions in the stratigraphic positions of some of the rock units have been observed, as well as terminologies to describe rock units which are inconsistent with stratigraphic ...

  11. Energy decomposition scheme based on the generalized Kohn-Sham scheme.

    Science.gov (United States)

    Su, Peifeng; Jiang, Zhen; Chen, Zuochang; Wu, Wei

    2014-04-03

    In this paper, a new energy decomposition analysis scheme based on the generalized Kohn-Sham (GKS) and the localized molecular orbital energy decomposition analysis (LMO-EDA) scheme, named GKS-EDA, is proposed. The GKS-EDA scheme has a wide range of DFT functional adaptability compared to LMO-EDA. In the GKS-EDA scheme, the exchange, repulsion, and polarization terms are determined by DFT orbitals; the correlation term is defined as the difference of the GKS correlation energy from monomers to supermolecule. Using the new definition, the GKS-EDA scheme avoids the error of LMO-EDA which comes from the separated treatment of EX and EC functionals. The scheme can perform analysis both in the gas and in the condensed phases with most of the popular DFT functionals, including LDA, GGA, meta-GGA, hybrid GGA/meta-GGA, double hybrid, range-separated (long-range correction), and dispersion correction. By the GKS-EDA scheme, the DFT functionals assessment for hydrogen bonding, vdW interaction, symmetric radical cation, charge-transfer, and metal-ligand interaction is performed.

  12. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  13. Electricity storage using a thermal storage scheme

    Science.gov (United States)

    White, Alexander

    2015-01-01

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on "sensible heat" storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  14. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  15. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  16. Random thoughts

    Science.gov (United States)

    ajansen; kwhitefoot; panteltje1; edprochak; sudhakar, the

    2014-07-01

    In reply to the physicsworld.com news story “How to make a quantum random-number generator from a mobile phone” (16 May, http://ow.ly/xFiYc, see also p5), which describes a way of delivering random numbers by counting the number of photons that impinge on each of the individual pixels in the camera of a Nokia N9 smartphone.

  17. Simple and High-Accurate Schemes for Hyperbolic Conservation Laws

    Directory of Open Access Journals (Sweden)

    Renzhong Feng

    2014-01-01

    Full Text Available The paper constructs a class of simple high-accurate schemes (SHA schemes with third order approximation accuracy in both space and time to solve linear hyperbolic equations, using linear data reconstruction and Lax-Wendroff scheme. The schemes can be made even fourth order accurate with special choice of parameter. In order to avoid spurious oscillations in the vicinity of strong gradients, we make the SHA schemes total variation diminishing ones (TVD schemes for short by setting flux limiter in their numerical fluxes and then extend these schemes to solve nonlinear Burgers’ equation and Euler equations. The numerical examples show that these schemes give high order of accuracy and high resolution results. The advantages of these schemes are their simplicity and high order of accuracy.

  18. Transverse Hilbert schemes and completely integrable systems

    Directory of Open Access Journals (Sweden)

    Donin Niccolò Lora Lamia

    2017-12-01

    Full Text Available In this paper we consider a special class of completely integrable systems that arise as transverse Hilbert schemes of d points of a complex symplectic surface S projecting onto ℂ via a surjective map p which is a submersion outside a discrete subset of S. We explicitly endow the transverse Hilbert scheme Sp[d] with a symplectic form and an endomorphism A of its tangent space with 2-dimensional eigenspaces and such that its characteristic polynomial is the square of its minimum polynomial and show it has the maximal number of commuting Hamiltonians.We then provide the inverse construction, starting from a 2ddimensional holomorphic integrable system W which has an endomorphism A: TW → TW satisfying the above properties and recover our initial surface S with W ≌ Sp[d].

  19. A hybrid Lagrangian Voronoi-SPH scheme

    Science.gov (United States)

    Fernandez-Gutierrez, D.; Souto-Iglesias, A.; Zohdi, T. I.

    2017-11-01

    A hybrid Lagrangian Voronoi-SPH scheme, with an explicit weakly compressible formulation for both the Voronoi and SPH sub-domains, has been developed. The SPH discretization is substituted by Voronoi elements close to solid boundaries, where SPH consistency and boundary conditions implementation become problematic. A buffer zone to couple the dynamics of both sub-domains is used. This zone is formed by a set of particles where fields are interpolated taking into account SPH particles and Voronoi elements. A particle may move in or out of the buffer zone depending on its proximity to a solid boundary. The accuracy of the coupled scheme is discussed by means of a set of well-known verification benchmarks.

  20. Fixed Wordsize Implementation of Lifting Schemes

    Directory of Open Access Journals (Sweden)

    Tanja Karp

    2007-01-01

    Full Text Available We present a reversible nonlinear discrete wavelet transform with predefined fixed wordsize based on lifting schemes. Restricting the dynamic range of the wavelet domain coefficients due to a fixed wordsize may result in overflow. We show how this overflow has to be handled in order to maintain reversibility of the transform. We also perform an analysis on how large a wordsize of the wavelet coefficients is needed to perform optimal lossless and lossy compressions of images. The scheme is advantageous to well-known integer-to-integer transforms since the wordsize of adders and multipliers can be predefined and does not increase steadily. This also results in significant gains in hardware implementations.

  1. New communication schemes based on adaptive synchronization.

    Science.gov (United States)

    Yu, Wenwu; Cao, Jinde; Wong, Kwok-Wo; Lü, Jinhu

    2007-09-01

    In this paper, adaptive synchronization with unknown parameters is discussed for a unified chaotic system by using the Lyapunov method and the adaptive control approach. Some communication schemes, including chaotic masking, chaotic modulation, and chaotic shift key strategies, are then proposed based on the modified adaptive method. The transmitted signal is masked by chaotic signal or modulated into the system, which effectively blurs the constructed return map and can resist this return map attack. The driving system with unknown parameters and functions is almost completely unknown to the attackers, so it is more secure to apply this method into the communication. Finally, some simulation examples based on the proposed communication schemes and some cryptanalysis works are also given to verify the theoretical analysis in this paper.

  2. Optimization of Train Trip Package Operation Scheme

    Directory of Open Access Journals (Sweden)

    Lu Tong

    2015-01-01

    Full Text Available Train trip package transportation is an advanced form of railway freight transportation, realized by a specialized train which has fixed stations, fixed time, and fixed path. Train trip package transportation has lots of advantages, such as large volume, long distance, high speed, simple forms of organization, and high margin, so it has become the main way of railway freight transportation. This paper firstly analyzes the related factors of train trip package transportation from its organizational forms and characteristics. Then an optimization model for train trip package transportation is established to provide optimum operation schemes. The proposed model is solved by the genetic algorithm. At last, the paper tests the model on the basis of the data of 8 regions. The results show that the proposed method is feasible for solving operation scheme issues of train trip package.

  3. A numerical relativity scheme for cosmological simulations

    Science.gov (United States)

    Daverio, David; Dirian, Yves; Mitsou, Ermis

    2017-12-01

    Cosmological simulations involving the fully covariant gravitational dynamics may prove relevant in understanding relativistic/non-linear features and, therefore, in taking better advantage of the upcoming large scale structure survey data. We propose a new 3  +  1 integration scheme for general relativity in the case where the matter sector contains a minimally-coupled perfect fluid field. The original feature is that we completely eliminate the fluid components through the constraint equations, thus remaining with a set of unconstrained evolution equations for the rest of the fields. This procedure does not constrain the lapse function and shift vector, so it holds in arbitrary gauge and also works for arbitrary equation of state. An important advantage of this scheme is that it allows one to define and pass an adaptation of the robustness test to the cosmological context, at least in the case of pressureless perfect fluid matter, which is the relevant one for late-time cosmology.

  4. Optimizing multiplexing scheme in interferometric microscopy

    Science.gov (United States)

    Tayebi, Behnam; Jaferzadeh, Keyvan; Sharif, Farnaz; Han, Jae-Ho

    2016-08-01

    In single exposure off-axis interferometry, multiple information can be recorded by spatial frequency multiplexing. We investigate optimum conditions for designing 2D sampling schemes to record larger field of view in off-axis interferometry multiplexing. The spatial resolution of the recorded image is related to the numerical aperture of the system and sensor pixel size. The spatial resolution should preserve by avoiding crosstalk in the frequency domain. Furthermore, the field of view depends on the sensor size and magnification of the imaging system. In order to preserve resolution and have a larger field of view, the frequency domain should be designed correctly. The experimental results demonstrate that selecting the wrong geometrical scheme in frequency domain decrease the recorded image area.

  5. Exclusion from the Health Insurance Scheme

    CERN Multimedia

    2003-01-01

    A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635

  6. METAPHORIC MECHANISMS IN IMAGE SCHEME DEVELOPMENT

    OpenAIRE

    Pankratova, S.A.

    2017-01-01

    Problems of knowledge representation by means of images are still cognitively significant and invariably modern. The article deals with the image heuristic potential of a bookish sphere as a donor of meanings, aiding metaphoric scheme development of another modern sphere of cinematography. The key factor here is the differentiation between two basically different metaphor types – heuristic epiphora and image diaphora. The author had offered a unique methodology of counting of quantitative par...

  7. [A scheme to support teenagers in care].

    Science.gov (United States)

    Maldera, David

    In some family situations, the placement of a teenager, even in the case of a court decision, proves ineffective. The accumulation of all kinds of difficulties requires a different type of support, based on responsiveness, attention and above all time to come together. A dedicated scheme helps to prevent situations of waywardness or marginalisation among these teenagers and to support the families. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  8. The Emergent Universe scheme and tunneling

    Energy Technology Data Exchange (ETDEWEB)

    Labraña, Pedro [Departamento de Física, Universidad del Bío-Bío, Avenida Collao 1202, Casilla 5-C, Concepción, Chile and Departament d' Estructura i Constituents de la Matèria and Institut de Ciències del Cosmos, Universitat (Spain)

    2014-07-23

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.

  9. Failure of a proposed superluminal scheme

    Science.gov (United States)

    Furuya, K.; Milonni, P. W.; Steinberg, A. M.; Wolinsky, M.

    1999-02-01

    We consider a “superluminal quantum Morse telegraph”, recently proposed by Garuccio, involving a polarization-correlated photon pair and a Michelson interferometer in which one of the mirrors is replaced by a phase-conjugating mirror (PCM). Superluminal information transfer in this scheme is precluded by the impossibility of distinguishing between unpolarized photons prepared by mixing linear polarization states or by mixing circular polarization states.

  10. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  11. A Scatter Storage Scheme for Dictionary Lookups

    Directory of Open Access Journals (Sweden)

    D. M. Murray

    1970-09-01

    Full Text Available Scatter storage schemes are examined with respect to their applicability to dictionary lookup procedures. Of particular interest are virtual scatter methods which combine the advantages of rapid search speed and reasonable storage requirements. The theoretical aspects of computing hash addresses are developed, and several algorithms are evaluated. Finally, experiments with an actual text lookup process are described, and a possible library application is discussed.

  12. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    one more than the total number of blocks or one more than `, whichever is less. min ( f s/bs, `) + 1 (4.10) 4.3.1 MAC-PDP For local data experiments, we...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS COST COMPARISON AMONG PROVABLE DATA POSSESSION SCHEMES by Stephen J. Bremer March 2016 Thesis...response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and

  13. A rational function based scheme for solving advection equation

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, Feng [Gunma Univ., Kiryu (Japan). Faculty of Engineering; Yabe, Takashi

    1995-07-01

    A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author).

  14. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  15. A weak blind signature scheme based on quantum cryptography

    Science.gov (United States)

    Wen, Xiaojun; Niu, Xiamu; Ji, Liping; Tian, Yuan

    2009-02-01

    In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein-Padolsky-Rosen) pairs. Different from classical blind signature schemes and current quantum signature schemes, our quantum blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Experimental analysis proved that our scheme have the characteristics of non-counterfeit, non-disavowal, blindness and traceability. It has a wide application to E-payment system, E-government, E-business, and etc.

  16. Fractal-based image sequence compression scheme

    Science.gov (United States)

    Li, Haibo; Novak, Mirek; Forchheimer, Robert

    1993-07-01

    The dominant image transformation used in the existing fractal coding schemes is the affine function. Although an affine transformation is easy to compute and understand, its linear approximation ability limits the employment of larger range blocks, that is, it limits further improvement in compression efficiency. We generalize the image transformation from the usual affine form to the more general quadratic form, and provide theoretical requirements for the generalized transformation to be contractive. Based on the self-transformation system (STS) model, an image sequence coding scheme--fractal-based image sequence coding--is proposed. In this coding scheme, our generalized transformation is used to model the self- transformation is used to model the self-transformation from the domain block to its range blocks. Experimental results on a real image sequence show that for the same size of blocks, the SNR can be improved by 10 dB, or, for the same SNR of the decoded image sequence, the compression ratio is raised twofold when the new generalized transformation is used to replace the usual affine transformation. In addition, due to the utilization of the STS model, the computational complexity is only linearly related to the size of the 3-D blocks. This provides for fast encoding and decoding.

  17. Doppler Shift Compensation Schemes in VANETs

    Directory of Open Access Journals (Sweden)

    F. Nyongesa

    2015-01-01

    Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.

  18. Progress on Implementing Additional Physics Schemes into ...

    Science.gov (United States)

    The U.S. Environmental Protection Agency (USEPA) has a team of scientists developing a next generation air quality modeling system employing the Model for Prediction Across Scales – Atmosphere (MPAS-A) as its meteorological foundation. Several preferred physics schemes and options available in the Weather Research and Forecasting (WRF) model are regularly used by the USEPA with the Community Multiscale Air Quality (CMAQ) model to conduct retrospective air quality simulations. These include the Pleim surface layer, the Pleim-Xiu (PX) land surface model with fractional land use for a 40-class National Land Cover Database (NLCD40), the Asymmetric Convective Model 2 (ACM2) planetary boundary layer scheme, the Kain-Fritsch (KF) convective parameterization with subgrid-scale cloud feedback to the radiation schemes and a scale-aware convective time scale, and analysis nudging four-dimensional data assimilation (FDDA). All of these physics modules and options have already been implemented by the USEPA into MPAS-A v4.0, tested, and evaluated (please see the presentations of R. Gilliam and R. Bullock at this workshop). Since the release of MPAS v5.1 in May 2017, work has been under way to implement these preferred physics options into the MPAS-A v5.1 code. Test simulations of a summer month are being conducted on a global variable resolution mesh with the higher resolution cells centered over the contiguous United States. Driving fields for the FDDA and soil nudging are

  19. INFORMATION FROM THE CERN HEALTH INSURANCE SCHEME

    CERN Multimedia

    Tel : 7-3635

    2002-01-01

    Please note that, from 1 July 2002, the tariff agreement between CERN and the Hôpital de la Tour will no longer be in force. As a result the members of the CERN Health Insurance Scheme will no longer obtain a 5% discount for quick payment of bills. More information on the termination of the agreement and the implications for our Health Insurance Scheme will be provided in the next issue of the CHIS Bull', due for publication in the first half of July. It will be sent to your home address, so, if you have moved recently, please check that your divisional secretariat has your current address. Tel.: 73635 The Organization's Health Insurance Scheme (CHIS) has launched its own Web pages, located on the Website of the Social & Statutory Conditions Group of HR Division (HR-SOC). The address is short and easy-to-remember www.cern.ch/chis The pages currently available concentrate on providing basic information. Over the coming months it is planned to fill out the details and introduce new topics. Please give us ...

  20. Dynamical decoupling schemes derived from Hamilton cycles

    Science.gov (United States)

    Rötteler, Martin

    2008-04-01

    We address the problem of decoupling the interactions in a spin network governed by a pair-interaction Hamiltonian. Combinatorial schemes for decoupling and for manipulating the couplings of Hamiltonians have been developed, which use selective pulses. In this paper, we consider an additional requirement on these pulse sequences: as few different control operations as possible should be used. This requirement is motivated by the fact that to find an optimal implementation of each individual selective pulse will be expensive since it requires to solve a pulse shaping problem. Hence, it is desirable to use as few different selective pulses as possible. As a first result, we show that for d-dimensional systems, where d ⩾2, the ability to implement only two control operations is sufficient to turn off the time evolution. Next, we address the case of a bipartite system with local control and show that four different control operations are sufficient. Finally, turning to networks consisting of several d-dimensional nodes, we show that decoupling can be achieved if one is able to control a number of different control operations, which is logarithmic in the number of nodes. We give an explicit family of efficient decoupling schemes with logarithmic number of different pulses based on the classic Hamming codes. We also provide a table of the best known decoupling schemes for small networks of qubits.

  1. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-07-24

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.

  2. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chun-Ta Li

    2013-07-01

    Full Text Available Wireless sensor networks (WSNs can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs. Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.’s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users’ attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.’s authentication scheme are left unchanged.

  3. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

    Science.gov (United States)

    Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-01-01

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381

  4. Spatial and temporal accuracy of asynchrony-tolerant finite difference schemes for partial differential equations at extreme scales

    Science.gov (United States)

    Kumari, Komal; Donzis, Diego

    2017-11-01

    Highly resolved computational simulations on massively parallel machines are critical in understanding the physics of a vast number of complex phenomena in nature governed by partial differential equations. Simulations at extreme levels of parallelism present many challenges with communication between processing elements (PEs) being a major bottleneck. In order to fully exploit the computational power of exascale machines one needs to devise numerical schemes that relax global synchronizations across PEs. This asynchronous computations, however, have a degrading effect on the accuracy of standard numerical schemes.We have developed asynchrony-tolerant (AT) schemes that maintain order of accuracy despite relaxed communications. We show, analytically and numerically, that these schemes retain their numerical properties with multi-step higher order temporal Runge-Kutta schemes. We also show that for a range of optimized parameters,the computation time and error for AT schemes is less than their synchronous counterpart. Stability of the AT schemes which depends upon history and random nature of delays, are also discussed. Support from NSF is gratefully acknowledged.

  5. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

    Science.gov (United States)

    Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-06-23

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

  6. Uncertainty of Microphysics Schemes in CRMs

    Science.gov (United States)

    Tao, W. K.; van den Heever, S. C.; Wu, D.; Saleeby, S. M.; Lang, S. E.

    2015-12-01

    Microphysics is the framework through which to understand the links between interactive aerosol, cloud and precipitation processes. These processes play a critical role in the water and energy cycle. CRMs with advanced microphysics schemes have been used to study the interaction between aerosol, cloud and precipitation processes at high resolution. But, there are still many uncertainties associated with these microphysics schemes. This has arisen, in part, from the fact microphysical processes cannot be measured directly; instead, cloud properties, which can be measured, are and have been used to validate model results. The utilization of current and future global high-resolution models is rapidly increasing and are at what has been traditional CRM resolutions and are using microphysics schemes that were developed in traditional CRMs. A potential NASA satellite mission called the Cloud and Precipitation Processes Mission (CaPPM) is currently being planned for submission to the NASA Earth Science Decadal Survey. This mission could provide the necessary global estimates of cloud and precipitation properties with which to evaluate and improve dynamical and microphysical parameterizations and the feedbacks. In order to facilitate the development of this mission, CRM simulations have been conducted to identify microphysical processes responsible for the greatest uncertainties in CRMs. In this talk, we will present results from numerical simulations conducted using two CRMs (NU-WRF and RAMS) with different dynamics, radiation, land surface and microphysics schemes. Specifically, we will conduct sensitivity tests to examine the uncertainty of the some of the key ice processes (i.e. riming, melting, freezing and shedding) in these two-microphysics schemes. The idea is to quantify how these two different models' respond (surface rainfall and its intensity, strength of cloud drafts, LWP/IWP, convective-stratiform-anvil area distribution) to changes of these key ice

  7. Universal randomness

    Energy Technology Data Exchange (ETDEWEB)

    Dotsenko, Viktor S [Landau Institute for Theoretical Physics, Russian Academy of Sciences, Moscow (Russian Federation)

    2011-03-31

    In the last two decades, it has been established that a single universal probability distribution function, known as the Tracy-Widom (TW) distribution, in many cases provides a macroscopic-level description of the statistical properties of microscopically different systems, including both purely mathematical ones, such as increasing subsequences in random permutations, and quite physical ones, such as directed polymers in random media or polynuclear crystal growth. In the first part of this review, we use a number of models to examine this phenomenon at a simple qualitative level and then consider the exact solution for one-dimensional directed polymers in a random environment, showing that free energy fluctuations in such a system are described by the universal TW distribution. The second part provides detailed appendix material containing the necessary mathematical background for the first part. (reviews of topical problems)

  8. True randomness from an incoherent source

    Science.gov (United States)

    Qi, Bing

    2017-11-01

    Quantum random number generators (QRNGs) harness the intrinsic randomness in measurement processes: the measurement outputs are truly random, given the input state is a superposition of the eigenstates of the measurement operators. In the case of trusted devices, true randomness could be generated from a mixed state ρ so long as the system entangled with ρ is well protected. We propose a random number generation scheme based on measuring the quadrature fluctuations of a single mode thermal state using an optical homodyne detector. By mixing the output of a broadband amplified spontaneous emission (ASE) source with a single mode local oscillator (LO) at a beam splitter and performing differential photo-detection, we can selectively detect the quadrature fluctuation of a single mode output of the ASE source, thanks to the filtering function of the LO. Experimentally, a quadrature variance about three orders of magnitude larger than the vacuum noise has been observed, suggesting this scheme can tolerate much higher detector noise in comparison with QRNGs based on measuring the vacuum noise. The high quality of this entropy source is evidenced by the small correlation coefficients of the acquired data. A Toeplitz-hashing extractor is applied to generate unbiased random bits from the Gaussian distributed raw data, achieving an efficiency of 5.12 bits per sample. The output of the Toeplitz extractor successfully passes all the NIST statistical tests for random numbers.

  9. Random triangles

    OpenAIRE

    Matula, Dominik

    2013-01-01

    The author summarizes some previous results concerning random triangles. He describes the Gaussian triangle and random triangles whose vertices lie in a unit n-dimensional ball, in a rectangle or in a general bounded convex set. In the second part, the author deals with an inscribed triangle in a triangle - let ABC be an equilateral triangle and let M, N, O be three points, each laying on one side of the ABC. We call MNO inscribed triangle (in an equi- laterral triangle). The median triangle ...

  10. Random matrices

    CERN Document Server

    Mehta, Madan Lal

    1990-01-01

    Since the publication of Random Matrices (Academic Press, 1967) so many new results have emerged both in theory and in applications, that this edition is almost completely revised to reflect the developments. For example, the theory of matrices with quaternion elements was developed to compute certain multiple integrals, and the inverse scattering theory was used to derive asymptotic results. The discovery of Selberg's 1944 paper on a multiple integral also gave rise to hundreds of recent publications. This book presents a coherent and detailed analytical treatment of random matrices, leading

  11. 7 CFR 400.458 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  12. Exact Distributions of Finite Random Matrices and Their Applications to Spectrum Sensing.

    Science.gov (United States)

    Zhang, Wensheng; Wang, Cheng-Xiang; Tao, Xiaofeng; Patcharamaneepakorn, Piya

    2016-07-29

    The exact and simple distributions of finite random matrix theory (FRMT) are critically important for cognitive radio networks (CRNs). In this paper, we unify some existing distributions of the FRMT with the proposed coefficient matrices (vectors) and represent the distributions with the coefficient-based formulations. A coefficient reuse mechanism is studied, i.e., the same coefficient matrices (vectors) can be exploited to formulate different distributions. For instance, the same coefficient matrices can be used by the largest eigenvalue (LE) and the scaled largest eigenvalue (SLE); the same coefficient vectors can be used by the smallest eigenvalue (SE) and the Demmel condition number (DCN). A new and simple cumulative distribution function (CDF) of the DCN is also deduced. In particular, the dimension boundary between the infinite random matrix theory (IRMT) and the FRMT is initially defined. The dimension boundary provides a theoretical way to divide random matrices into infinite random matrices and finite random matrices. The FRMT-based spectrum sensing (SS) schemes are studied for CRNs. The SLE-based scheme can be considered as an asymptotically-optimal SS scheme when the dimension K is larger than two. Moreover, the standard condition number (SCN)-based scheme achieves the same sensing performance as the SLE-based scheme for dual covariance matrix K = 2 . The simulation results verify that the coefficient-based distributions can fit the empirical results very well, and the FRMT-based schemes outperform the IRMT-based schemes and the conventional SS schemes.

  13. A Fuzzy Commitment Scheme with McEliece's Cipher

    Directory of Open Access Journals (Sweden)

    Deo Brat Ojha

    2010-04-01

    Full Text Available In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. This scheme is one of the interesting candidates for post quantum cryptography. Hence our interest to deal with this system with fuzzy commitment scheme. The concept itself is illustrated with the help of a simple situation and the validation of mathematical experimental verification is provided.

  14. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    The point of contention in this case was whether the illegality of the business of the scheme was a relevant consideration in determining whether the pay-outs were made in the ordinary course of business of the scheme. This paper discusses pyramid schemes in the context of impeachable dispositions in terms of the ...

  15. a comparative study of prioritized handoff schemes with guard

    African Journals Online (AJOL)

    eobe

    A COMPARATIVE STUDY OF PRIORITIZED HANDOFF SCHEMES WITH GUARD CHANNELS IN WIRELESS NETWORKS. D. U. Onyishi. D. U. Onyishi, et al. Nigerian Journal of Technology. Vol. 34, No. 3, July 2015 600 application of resource allocation schemes.This gives precedence to handoff calls. Such schemes ...

  16. Matters of Coercion-Resistance in Cryptographic Voting Schemes

    OpenAIRE

    Kempka, Carmen

    2014-01-01

    This work addresses coercion-resistance in cryptographic voting schemes. It focuses on three particularly challenging cases: write-in candidates, internet elections and delegated voting. Furthermore, this work presents a taxonomy for analyzing and comparing a huge variety of voting schemes, and presents practical experiences with the voting scheme Bingo Voting.

  17. Efficient rate control scheme using modified inter-layer dependency ...

    Indian Academy of Sciences (India)

    In this paper, a spatial-resolutionratio-based MB mode decision scheme is proposed for spatially enhanced layers. The scheme uses the motion estimated at the base layer, to encode the respective MBs in the enhancement layers. The spatial–temporalsearch schemes at the enhancement layers are used to derive motion ...

  18. 7 CFR 623.21 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture... AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it is determined by NRCS that a landowner has employed a scheme or device to defeat the purposes of this part, any...

  19. 7 CFR 1421.305 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1421.305... scheme or device. (a) A producer shall be ineligible to receive payments under this subpart if it is determined by DAFP, the State committee, or the county committee to have: (1) Adopted any scheme or device...

  20. 7 CFR 1430.310 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.310... Disaster Assistance Payment Program § 1430.310 Misrepresentation and scheme or device. (a) In addition to... assistance under this program if the producer is determined by FSA or CCC to have: (1) Adopted any scheme or...

  1. 7 CFR 795.17 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...

  2. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to defeat...

  3. 7 CFR 784.9 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 784.9 Section... Misrepresentation and scheme or device. (a) A sheep and lamb operation shall be ineligible to receive assistance...) Adopted any scheme or device that tends to defeat the purpose of this program; (2) Made any fraudulent...

  4. 7 CFR 636.14 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 636.14 Section....14 Misrepresentation and scheme or device. (a) A participant who is determined to have erroneously... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  5. Developing and Rewarding Excellent Teachers: The Scottish Chartered Teacher Scheme

    Science.gov (United States)

    Ingvarson, Lawrence

    2009-01-01

    The Scottish Chartered Teacher Scheme was designed to recognise and reward teachers who attained high standards of practice. The scheme emerged in 2001 as part of an agreement between government, local employing authorities and teacher organisations. Policies such as the chartered teacher scheme aim to benefit students in two main ways: by…

  6. 7 CFR 1470.36 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1470.36... General Administration § 1470.36 Misrepresentation and scheme or device. (a) If NRCS determines that an... to have: (1) Adopted any scheme or device that tends to defeat the purpose of the program; (2) Made...

  7. 7 CFR 1430.610 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.610... Disaster Assistance Payment Program II (DDAP-II) § 1430.610 Misrepresentation and scheme or device. (a) In... receive assistance under this program if the producer is determined by CCC to have: (1) Adopted any scheme...

  8. 7 CFR 786.110 - Misrepresentation, scheme, or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 786.110 Section... Misrepresentation, scheme, or device. (a) In addition to other penalties, sanctions, or remedies that may apply, a... FSA to have: (1) Adopted any scheme or device that tends to defeat the purpose of this program, (2...

  9. 7 CFR 1430.220 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.220... Contract Program § 1430.220 Misrepresentation and scheme or device. (a) A dairy operation shall be ineligible for the MILC program if FSA determines that it knowingly: (1) Adopted a scheme or device that...

  10. 7 CFR 1415.20 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a) If it is determined by USDA that a participant has employed a scheme or device to defeat the purposes...

  11. 7 CFR 760.109 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 760.109... Agricultural Disaster Assistance Programs § 760.109 Misrepresentation and scheme or device. (a) A participant... in accordance with this part, or otherwise used a scheme or device with the intent to receive...

  12. 7 CFR 1463.110 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1463.110... PROGRAM Tobacco Transition Payment Program § 1463.110 Misrepresentation and scheme or device. A person... program determination made in accordance with this subpart; (b) Adopted any scheme or device that tends to...

  13. 7 CFR 633.18 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 633.18 Section 633.18 Agriculture... AGRICULTURE LONG TERM CONTRACTING WATER BANK PROGRAM § 633.18 Scheme and device. (a) If it is determined by the NRCS that a person has employed a scheme or device to defeat the purposes of this part, any part...

  14. 7 CFR 1430.507 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.507... Assistance Program § 1430.507 Misrepresentation and scheme or device. (a) A dairy operation shall be... committee to have: (1) Adopted any scheme or device which tends to defeat the purpose of this program; (2...

  15. 7 CFR 1469.36 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1469.36... General Administration § 1469.36 Misrepresentation and scheme or device. (a) If the Department determines... who is determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the purpose...

  16. 7 CFR 760.1310 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 760.1310... Program § 760.1310 Misrepresentation and scheme or device. (a) In addition to other penalties, sanctions... this subpart if the producer or operation is determined by FSA to have: (1) Adopted any scheme or...

  17. 7 CFR 625.19 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 625.19 Section 625.19 Agriculture... AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.19 Scheme and device. (a) If it is determined by NRCS that a person has employed a scheme or device to defeat the purposes of this part, any...

  18. 7 CFR 1465.35 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1465.35... ASSISTANCE General Administration § 1465.35 Misrepresentation and scheme or device. (a) A participant who is... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  19. 7 CFR 1467.19 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme and device. 1467.19 Section 1467.19... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme and device. (a) If it is determined by the NRCS that a participant has employed a scheme or device to defeat...

  20. 7 CFR 1468.35 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1468.35... Administration § 1468.35 Misrepresentation and scheme or device. (a) A participant who is determined to have... knowingly adopted any scheme or device that tends to defeat the purpose of the program; made any fraudulent...

  1. 7 CFR 1410.60 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1410.60 Section 1410.60 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION RESERVE PROGRAM § 1410.60 Scheme or device. (a) If CCC determines that a person has employed a scheme or device to defeat the purposes of this part...

  2. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1424.13... Misrepresentation and scheme or device. (a) A producer shall be ineligible to receive payments under this program if CCC determines the producer: (1) Adopted any scheme or device that tends to defeat the purpose of the...

  3. 7 CFR 1466.35 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1466.35... PROGRAM General Administration § 1466.35 Misrepresentation and scheme or device. (a) A person, joint.... (b) A producer who is determined to have knowingly: (1) Adopted any scheme or device that tends to...

  4. 7 CFR 1491.32 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... Administration § 1491.32 Scheme or device. (a) If it is determined by the NRCS that a cooperating entity has employed a scheme or device to defeat the purposes of this part, any part of any program payment otherwise...

  5. Nigeria's National Health Insurance Scheme: a critical reappraisal ...

    African Journals Online (AJOL)

    For well over four decades, the National Health Insurance Scheme (NHIS) remained on the drawing board. It is now a little over half a decade since the actual commencement of the implementation of the scheme. This review, therefore, chronicles the historical background to the introduction of the scheme, highlighting the ...

  6. On the strong monotonicity of the CABARET scheme

    Science.gov (United States)

    Ostapenko, V. V.

    2012-03-01

    The strong monotonicity of the CABARET scheme with single flux correction is analyzed as applied to the linear advection equation. It is shown that the scheme is strongly monotone (has the NED property) at Courant numbers r ∈ (0,0,5), for which it is monotone. Test computations illustrating this property of the CABARET scheme are presented.

  7. A dynamic digital signature scheme without third parties

    NARCIS (Netherlands)

    Van Elsas, M.; Van der Lubbe, J.C.A.; Weber, J.H.

    2015-01-01

    We propose a digital signature scheme for dynamic coalitions. Particularly, we enable members to join and leave. Our scheme does not need trusted or oblivious third parties (TTPs or OTPs). In this distributed scheme there is a changing secret group key dependent on the members in the group. Each

  8. An Annotation Scheme for Social Interaction in Digital Playgrounds

    NARCIS (Netherlands)

    Moreno Celleri, Alejandro Manuel; van Delden, Robertus Wilhelmus; Reidsma, Dennis; Poppe, Ronald Walter; Heylen, Dirk K.J.; Herrlich, Marc; Malaka, Rainer; Masuch, Maic

    This paper introduces a new annotation scheme, designed specifically to study children's social interactions during play in digital playgrounds. The scheme is motivated by analyzing relevant literature, combined with observations from recordings of play sessions. The scheme allows us to analyze how

  9. Fissioned Triangular Schemes Via the Cross-Ratio

    NARCIS (Netherlands)

    van Dam, E.R.; de Caen, D.

    1999-01-01

    A construction of association schemes is presented; these are fission schemes of the triangular schemes T(n) where n=q + 1with q any prime power. The key observation is quite elementary, being that the natural action of PGL(2,q) on the 2-element subsets of the projective line PG(1,q) is generously

  10. A combined spectrum sensing and OFDM demodulation scheme

    NARCIS (Netherlands)

    Heskamp, M.; Slump, Cornelis H.

    2009-01-01

    In this paper we propose a combined signaling and spectrum sensing scheme for cognitive radio that can detect in-band primary users while the networks own signal is active. The signaling scheme uses OFDM with phase shift keying modulated sub-carriers, and the detection scheme measures the deviation

  11. throughput analysis of arq schemes using state transition diagrams

    African Journals Online (AJOL)

    User

    ST2) scheme having variable selective repeat mode retransmissions and the Selective Repeat-Stutter-Go Back N (SR-ST-GBN) scheme having variable stutter mode retransmissions. Using the SR-ST-GBN scheme, it is also shown that it is pos-.

  12. Throughput Analysis of Arq Schemes Using State Transition Diagrams

    African Journals Online (AJOL)

    ST2) scheme having variable selective repeat mode retransmissions and the Selective Repeat-Stutter-Go Back N (SR-ST-GBN) scheme having variable stutter mode retransmissions. Using the SR-ST-GBN scheme, it is also shown that it is ...

  13. Forgery attack to Kang-Tang digital signature scheme

    Science.gov (United States)

    Fang, Jie; Guo, Yongning; Liu, Chenglian

    2014-10-01

    In 2006, Kang and Tang proposed a digital signature scheme without hash functions and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Kang-Tang scheme is insecure.

  14. Dynamics of iterative schemes for quadratic polynomial

    Science.gov (United States)

    Goyal, Komal; Prasad, Bhagwati

    2017-10-01

    Most of the fractals are generated by applying a map recursively to an initial point or a set of the space such as complex plane. An orbit of a point is a sequence of iteratively obtained points from it and the orbit is said to be diverging when its points grow unbounded. A set of all the points whose orbits are not diverging may be termed as a fractal. The fractal dynamics of the orbits depends on the rule of iteration also. In this paper, we study the dynamics of iterations for a number of iterative schemes. The results regarding the escape criteria for quadratic complex polynomials under various iteration procedures are established.

  15. Rural poverty reduction through centrally sponsored schemes.

    Science.gov (United States)

    Saxena, N C

    2007-10-01

    This paper discusses the evolving profile of poverty in India and reviews the national performance of selected anti-poverty programmes between 1997-1998 and 2005. For each programme, it outlines the budgetary allocation principle used for the States and districts and analyzes budgetary performance over the period. The main objective is to explore the extent to which the anti-poverty programmes are reaching their target groups effectively. Finally, it identifies the specific factors responsible for under-performance and provides a set of recommendations for policy makers and programme implementers which could help improve the outcomes of the schemes.

  16. New Financing Schemes of Public Infrastructure

    Directory of Open Access Journals (Sweden)

    Ignacio de la Riva

    2017-01-01

    Full Text Available Public works procurements and concessions are traditional legal techniques used to shape the financing of public infrastructure. Fiscal constraints faced by public administrations at the end of the 20th century, and the subsequent increase of private participation in the provision of public goods and services, encouraged the development of new legal schemes allowing a higher degree of private investment in public infrastructure; such as Public Private Partnerships, project finance, securitizations, the shadow toll, turn-key agreements, public leasing and public trusts.

  17. A Ponzi scheme exposed to volatile markets

    OpenAIRE

    Parodi, Bernhard R.

    2014-01-01

    The PGBM model for a couple of counteracting, exponentially growing capital flows is presented: the available capital stock X(t) evolves according to a variant of inhomogeneous geometric Brownian motion (GBM) with time-dependent drift, in particular, to the stochastic differential equation dX(t)=[pX(t) + rho1*exp(q1*t)+rho2*exp(q2*t)]dt + sigma*X(t)*dW(t), where W(t) is a Wiener process. As a paragon, we study a continuous-time model for a nine-parameter Ponzi scheme with an exponentially gro...

  18. Pay-what-you-want pricing schemes

    DEFF Research Database (Denmark)

    Kahsay, Goytom Abraha; Samahita, Margaret

    2015-01-01

    Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular. We develop a model incorporating self-image into the buyer’s utility function and introduce heterogeneity in consumption utility and image-sensitivity, generating different purchase decisions and optimal prices across...... individuals. When a good’s fixed price is lower than a threshold fair value, PWYW can lead to a lower utility. This may result in a lower purchase rate and higher average price, accounting for previously unexplained field experimental evidence. An increase in the threshold value decreases the buyer’s utility...... and may further lower the purchase rate, resulting in a further increase in purchase price....

  19. A Distributed Quaternary Turbo Coded Cooperative Scheme

    Directory of Open Access Journals (Sweden)

    BALDINI FILHO, R.

    2014-12-01

    Full Text Available Cooperative communications achieve MIMO-like diversity gains by introducing a relay that creates an independent faded path between the source and the destination. Coded cooperation integrates cooperation with channel coding in order to increase the bit error rate (BER performance of cooperative communications. Turbo codewords can be built efficiently at the destination using encoded portions of the information sent by the source and the relay. This paper presents a distributed turbo cooperative coding scheme that utilizes convolutional codes defined over the finite ring of integers Z4 that performs better than its equivalent binary counterparts.

  20. ATLAS PhD Grant Scheme

    CERN Multimedia

    2016-01-01

    In this #CERNandSociety video, the 3 PhD students, awarded the ATLAS PhD Grant in 2015, talk about their research work within the ATLAS Collaboration and how this experience has shaped their future. Find out more about the ATLAS PhD Grant Scheme: cern.ch/ATLASPhDGrant This programme is just one of the many #CERNandSociety projects at CERN. Find out more and how you can be involved: http://cern.ch/go/pBt7

  1. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  2. A simple data compression scheme for binary images of bacteria compared with commonly used image data compression schemes

    NARCIS (Netherlands)

    Wilkinson, M.H.F.

    A run length code compression scheme of extreme simplicity, used for image storage in an automated bacterial morphometry system, is compared with more common compression schemes, such as are used in the tag image file format. These schemes are Lempel-Ziv and Welch (LZW), Macintosh Packbits, and

  3. Computational evaluation of convection schemes in fluid dynamics problems

    Directory of Open Access Journals (Sweden)

    Paulo Laerte Natti

    2012-11-01

    Full Text Available This article provides a computational evaluation of the popular high resolution upwind WACEB, CUBISTA and ADBQUICKEST schemes for solving non-linear fluid dynamics problems. By using the finite difference methodology, the schemes are analyzed and implemented in the context of normalized variables of Leonard. In order to access the performance of the schemes, Riemann problems for 1D Burgers, Euler and shallow water equations are considered. From the numerical results, the schemes are ranked according to their performance in solving these non-linear equations. The best scheme is then applied in the numerical simulation of tridimensional incompressible moving free surface flows.

  4. On the monotonicity of multidimensional finite difference schemes

    Science.gov (United States)

    Kovyrkina, O.; Ostapenko, V.

    2016-10-01

    The classical concept of monotonicity, introduced by Godunov for linear one-dimensional difference schemes, is extended to multidimensional case. Necessary and sufficient conditions of monotonicity are obtained for linear multidimensional difference schemes of first order. The constraints on the numerical viscosity are given that ensure the monotonicity of a difference scheme in the multidimensional case. It is proposed a modification of the second order multidimensional CABARET scheme that preserves the monotonicity of one-dimensional discrete solutions and, as a result, ensures higher smoothness in the computation of multidimensional discontinuous solutions. The results of two-dimensional test computations illustrating the advantages of the modified CABARET scheme are presented.

  5. Scheme Transformations in the Vicinity of an Infrared Fixed Point

    DEFF Research Database (Denmark)

    Ryttov, Thomas; Shrock, Robert

    2012-01-01

    We analyze the effect of scheme transformations in the vicinity of an exact or approximate infrared fixed point in an asymptotically free gauge theory with fermions. We show that there is far less freedom in carrying out such scheme transformations in this case than at an ultraviolet fixed point....... We construct a transformation from the $\\bar{MS}$ scheme to a scheme with a vanishing three-loop term in the $\\beta$ function and use this to assess the scheme dependence of an infrared fixed point in SU($N$) theories with fermions. Implications for the anomalous dimension of the fermion bilinear...

  6. A group signature scheme based on quantum teleportation

    Science.gov (United States)

    Wen, Xiaojun; Tian, Yuan; Ji, Liping; Niu, Xiamu

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  7. A subgrid parameterization scheme for precipitation

    Directory of Open Access Journals (Sweden)

    S. Turner

    2012-04-01

    Full Text Available With increasing computing power, the horizontal resolution of numerical weather prediction (NWP models is improving and today reaches 1 to 5 km. Nevertheless, clouds and precipitation formation are still subgrid scale processes for most cloud types, such as cumulus and stratocumulus. Subgrid scale parameterizations for water vapor condensation have been in use for many years and are based on a prescribed probability density function (PDF of relative humidity spatial variability within the model grid box, thus providing a diagnosis of the cloud fraction. A similar scheme is developed and tested here. It is based on a prescribed PDF of cloud water variability and a threshold value of liquid water content for droplet collection to derive a rain fraction within the model grid. Precipitation of rainwater raises additional concerns relative to the overlap of cloud and rain fractions, however. The scheme is developed following an analysis of data collected during field campaigns in stratocumulus (DYCOMS-II and fair weather cumulus (RICO and tested in a 1-D framework against large eddy simulations of these observed cases. The new parameterization is then implemented in a 3-D NWP model with a horizontal resolution of 2.5 km to simulate real cases of precipitating cloud systems over France.

  8. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  9. IMPLEMENTATION OF THE NEW CAREER STRUCTURE SCHEME

    CERN Multimedia

    Human Resources Division

    2001-01-01

    CERN's new Merit Advancement and Promotion Scheme, MAPS, comes into force on 1 September, and all members of staff will soon be receiving the official letter of notification of their assimilation into the new scheme. In this announcement, we take a look at where you can learn about the new system. There will also be an article in the Weekly Bulletin at the end of the month, which will summarise the main changes. During the early summer, HR Division presented the new structure to the staff in the Laboratory via Divisional Information Meetings. The transparencies used in these meetings, along with a list of the most relevant questions and answers, a Career Path Guide as well as a general overview document are available on the HR Division web site http://cern.ch/CERN/Divisions/PE/. Hard copies of the latter document are also available from the Divisional secretariats. The first question most staff members will ask is how they will fit into the new career path structure. Via the same web page, they can type in th...

  10. Extended lattice Boltzmann scheme for droplet combustion.

    Science.gov (United States)

    Ashna, Mostafa; Rahimian, Mohammad Hassan; Fakhari, Abbas

    2017-05-01

    The available lattice Boltzmann (LB) models for combustion or phase change are focused on either single-phase flow combustion or two-phase flow with evaporation assuming a constant density for both liquid and gas phases. To pave the way towards simulation of spray combustion, we propose a two-phase LB method for modeling combustion of liquid fuel droplets. We develop an LB scheme to model phase change and combustion by taking into account the density variation in the gas phase and accounting for the chemical reaction based on the Cahn-Hilliard free-energy approach. Evaporation of liquid fuel is modeled by adding a source term, which is due to the divergence of the velocity field being nontrivial, in the continuity equation. The low-Mach-number approximation in the governing Navier-Stokes and energy equations is used to incorporate source terms due to heat release from chemical reactions, density variation, and nonluminous radiative heat loss. Additionally, the conservation equation for chemical species is formulated by including a source term due to chemical reaction. To validate the model, we consider the combustion of n-heptane and n-butanol droplets in stagnant air using overall single-step reactions. The diameter history and flame standoff ratio obtained from the proposed LB method are found to be in good agreement with available numerical and experimental data. The present LB scheme is believed to be a promising approach for modeling spray combustion.

  11. Dynamic balancing scheme for motor armatures

    Science.gov (United States)

    Tseng, Chyuan-Yow; Shih, Ting-Wei; Lin, Jun-Tsun

    2007-07-01

    This paper presents a novel approach based on an adaptive parameter estimation technique for the dynamic balancing of the armature in an automobile starting motor. The proposed scheme is implemented on an experimental system comprising an unbalance measurement machine and a milling machine. Applying the influence coefficient method, two matrices, namely the unbalance calculation matrix and the milling vector calculation matrix, are constructed. The unbalance calculation matrix computes the armature unbalance based on vibration measurements, while the milling vector calculation matrix establishes the position and magnitude of the required unbalance correction. To compensate for the wear of the milling cutter following repeated machining operations, an algorithm is formulated to generate on-line estimates of the parameter settings required in the milling vector calculation matrix. A series of balancing experiments are performed to evaluate the feasibility and performance of the proposed scheme. The results show that the balancing system achieves a better balancing performance than a system based on the conventional influence coefficient method.

  12. Multiplexing schemes for quantum repeater networks

    Science.gov (United States)

    Aparicio, Luciano; Van Meter, Rodney

    2011-08-01

    When built, quantum repeaters will allow the distribution of entangled quantum states across large distances, playing a vital part in many proposed quantum technologies. Enabling multiple users to connect through the same network will be key to their real-world deployment. Previous work on repeater technologies has focussed only on simple entanglment production, without considering the issues of resource scarcity and competition that necessarily arise in a network setting. In this paper we simulated a thirteen-node network with up to five flows sharing different parts of the network, measuring the total throughput and fairness for each case. Our results suggest that the Internet-like approach of statistical multiplexing use of a congested link gives the highest aggregate throughput. Time division multiplexing and buffer space multiplexing were slightly less effective, but all three schemes allow the sum of multiple flows to substantially exceed that of any one flow, improving over circuit switching by taking advantage of resources that are forced to remain idle in circuit switching. All three schemes proved to have excellent fairness. The high performance, fairness and simplicity of implementation support a recommendation of statistical multiplexing for shared quantum repeater networks.

  13. Finite-difference schemes for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: es@cwi.nl [Centrum Wiskunde and Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands)

    2014-09-01

    In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.

  14. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  15. Random Tensor Theory: Extending Random Matrix Theory to Mixtures of Random Product States

    Science.gov (United States)

    Ambainis, Andris; Harrow, Aram W.; Hastings, Matthew B.

    2012-02-01

    We consider a problem in random matrix theory that is inspired by quantum information theory: determining the largest eigenvalue of a sum of p random product states in {(mathbb {C}^d)^{⊗ k}}, where k and p/ d k are fixed while d → ∞. When k = 1, the Marčenko-Pastur law determines (up to small corrections) not only the largest eigenvalue ({(1+sqrt{p/d^k})^2}) but the smallest eigenvalue {(min(0,1-sqrt{p/d^k})^2)} and the spectral density in between. We use the method of moments to show that for k > 1 the largest eigenvalue is still approximately {(1+sqrt{p/d^k})^2} and the spectral density approaches that of the Marčenko-Pastur law, generalizing the random matrix theory result to the random tensor case. Our bound on the largest eigenvalue has implications both for sampling from a particular heavy-tailed distribution and for a recently proposed quantum data-hiding and correlation-locking scheme due to Leung and Winter. Since the matrices we consider have neither independent entries nor unitary invariance, we need to develop new techniques for their analysis. The main contribution of this paper is to give three different methods for analyzing mixtures of random product states: a diagrammatic approach based on Gaussian integrals, a combinatorial method that looks at the cycle decompositions of permutations and a recursive method that uses a variant of the Schwinger-Dyson equations.

  16. Spatial dimming scheme for optical OFDM based visible light communication.

    Science.gov (United States)

    Yang, Yang; Zeng, Zhimin; Cheng, Julian; Guo, Caili

    2016-12-26

    A new dimming control scheme termed spatial dimming orthogonal frequency division multiplexing (SD-OFDM) is proposed for multiple-input and multiple output OFDM based visible light communication. The basic idea of SD-OFDM is that the illumination can be represented by the number of glared light emitting diodes (LEDs) in an LED lamp. As the biasing level of LEDs does not adjust to represent the required illumination level, the proposed scheme can significantly mitigate the clipping noise compared to analogue dimming schemes. Furthermore, unlike digital dimming schemes that control illumination levels by setting different duty cycles of pulse width modulation, the proposed scheme is always in the "on-state" for varied illumination levels. Both analytical and simulation results indicate that the proposed scheme is an efficient and feasible dimmable scheme.

  17. A numerical scheme for the generalized Burgers–Huxley equation

    Directory of Open Access Journals (Sweden)

    Brajesh K. Singh

    2016-10-01

    Full Text Available In this article, a numerical solution of generalized Burgers–Huxley (gBH equation is approximated by using a new scheme: modified cubic B-spline differential quadrature method (MCB-DQM. The scheme is based on differential quadrature method in which the weighting coefficients are obtained by using modified cubic B-splines as a set of basis functions. This scheme reduces the equation into a system of first-order ordinary differential equation (ODE which is solved by adopting SSP-RK43 scheme. Further, it is shown that the proposed scheme is stable. The efficiency of the proposed method is illustrated by four numerical experiments, which confirm that obtained results are in good agreement with earlier studies. This scheme is an easy, economical and efficient technique for finding numerical solutions for various kinds of (nonlinear physical models as compared to the earlier schemes.

  18. LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Song Li

    2017-01-01

    Full Text Available From smart watch to remote healthcare system, wireless body sensor networks (WBSNs play an important role in modern healthcare system. However, the weak capacity of devices has limited WBSNs development. Considering the huge processing and storage capacity of the cloud, it can be merged with WBSNs to make up for the deficiencies of weak capacity. Based on this consideration, the concept of cloud-assisted WBSNs has been proposed recently. In contrast to generic data, the data in cloud-assisted WBSNs will be used for providing medical diagnosis, so the integrity of data is very important because any modification will result in severe consequences such as misdiagnosis. The public auditing scheme could provide an efficient solution to check the data integrity remotely without downloading them. However, the traditional public auditing scheme for cloud cannot be used directly due to the high data density and weak processing capacity in WBSNs. So, in this paper, we proposed a lightweight and efficient public auditing scheme, LEPA, for cloud-assisted WBSNs. Compared with similar schemes, the WBSNs’ client only needs to do one symmetrical encryption with low computational cost in LEPA. Security proof shows that LEPA can resist two types of adversaries in random oracle model. The efficiency evaluation also shows that LEPA outperforms previous proposals.

  19. Two-Phase Image Encryption Scheme Based on FFCT and Fractals

    Directory of Open Access Journals (Sweden)

    Mervat Mikhail

    2017-01-01

    Full Text Available This paper blends the ideas from recent researches into a simple, yet efficient image encryption scheme for colored images. It is based on the finite field cosine transform (FFCT and symmetric-key cryptography. The FFCT is used to scramble the image yielding an image with a uniform histogram. The FFCT has been chosen as it works with integers modulo p and hence avoids numerical inaccuracies inherent to other transforms. Fractals are used as a source of randomness to generate a one-time-pad keystream to be employed in enciphering step. The fractal images are scanned in zigzag manner to ensure decorrelation of adjacent pixels values in order to guarantee a strong key. The performance of the proposed algorithm is evaluated using standard statistical analysis techniques. Moreover, sensitivity analysis techniques such as resistance to differential attacks measures, mean square error, and one bit change in system key have been investigated. Furthermore, security of the proposed scheme against classical cryptographic attacks has been analyzed. The obtained results show great potential of the proposed scheme and competitiveness with other schemes in literature. Additionally, the algorithm lends itself to parallel processing adding to its computational efficiency.

  20. A study of the spreading scheme for viral marketing based on a complex network model

    Science.gov (United States)

    Yang, Jianmei; Yao, Canzhong; Ma, Weicheng; Chen, Guanrong

    2010-02-01

    Buzzword-based viral marketing, known also as digital word-of-mouth marketing, is a marketing mode attached to some carriers on the Internet, which can rapidly copy marketing information at a low cost. Viral marketing actually uses a pre-existing social network where, however, the scale of the pre-existing network is believed to be so large and so random, so that its theoretical analysis is intractable and unmanageable. There are very few reports in the literature on how to design a spreading scheme for viral marketing on real social networks according to the traditional marketing theory or the relatively new network marketing theory. Complex network theory provides a new model for the study of large-scale complex systems, using the latest developments of graph theory and computing techniques. From this perspective, the present paper extends the complex network theory and modeling into the research of general viral marketing and develops a specific spreading scheme for viral marking and an approach to design the scheme based on a real complex network on the QQ instant messaging system. This approach is shown to be rather universal and can be further extended to the design of various spreading schemes for viral marketing based on different instant messaging systems.

  1. Onchocerciasis, malaria and trypanosomiasis in three resettlement schemes in western Ethiopia.

    Science.gov (United States)

    Kloos, H; Kello, A B; Addus, A

    1991-12-01

    Epidemiological studies were carried out among 180 randomly chosen settler and 180 non-settler households in the three resettlement schemes of Kishe, Gera and Didessa located in river valleys and highland areas of Illubabor Administrative Region in western Ethiopia. Up to 49% of the indigenous populations (in Kishe) and 0.9% of the settlers had onchocerciasis, with a mean density of 13.6 filariae per slide/skin snip for indigenous people and 9.4 for settlers. Onchocerciasis prevalence rates were higher in males than females and were highest in the 20-59 age group. In the Kishe scheme, rates were inversely related to distance between residences and probable forest/stream habitat of Simulium damnosum. No onchocerciasis transmission appears to occur in the Gera scheme at 1,950 meters altitude, apparently due to the absence of suitable vectors. Eight of 622 (1.2%) persons had malaria (P. vivax and P. falciparum). The most common man-biting anophelines were A. gambiae and A. funestus. No human trypanosomiasis cases were found but high livestock mortality was reported by local populations in the lowland schemes of Kishe and Didessa.

  2. PMI-based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme

    CERN Document Server

    Lan, Pang-Chang; Lee, Chia-Han; Yeh, Ping-Cheng; Cheng, Chen-Mou

    2011-01-01

    In the literature, J.-P. Cheng et al. have proposed the MIMO-OFDM PHY integrated (MOPI) scheme for achieving physical-layer security in practice without using any cryptographic ciphers. The MOPI scheme uses channel sounding and physical-layer network coding (PNC) to prevent eavesdroppers from learning the channel state information (CSI). Nevertheless, due to the use of multiple antennas for PNC at transmitter and beamforming at receiver, it is not possible to have spatial multiplexing nor use space-time codes in our previous MOPI scheme. In this paper, we propose a variant of the MOPI scheme, called P-MOPI, that works with a cryptographic cipher and utilizes precoding matrix index (PMI) as an efficient key-exchange mechanism. With channel sounding, the PMI is only known between the transmitter and the legal receiver. The shared key can then be used, e.g., as the seed to generate pseudo random bit sequences for securing subsequent transmissions using a stream cipher. By applying the same techniques at independ...

  3. A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps

    Science.gov (United States)

    Rehman, Atique Ur; Khan, Jan Sher; Ahmad, Jawad; Hwang, Soeng Oun

    2016-03-01

    Substitution box is a unique and nonlinear core component of block ciphers. A better designing technique of substitution box can boost up the quality of ciphertexts. In this paper, a new encryption method based on dynamic substitution boxes is proposed via using two chaotic maps. To break the correlation in an original image, pixels values of the original plaintext image are permuted row- and column-wise through random sequences. The aforementioned random sequences are generated by 2-D Burgers chaotic map. For the generation of dynamic substitution boxes, Logistic chaotic map is employed. In the process of diffusion, the permuted image is divided into blocks and each block is substituted via different dynamic substitution boxes. In contrast to conventional encryption schemes, the proposed scheme does not undergo the fixed block cipher and hence the security level can be enhanced. Extensive security analysis including histogram test is applied on the proposed image encryption technique. All experimental results reveal that the proposed scheme has a high level of security and robustness for transmission of digital images on insecure communication channels.

  4. Is MGNREG Scheme complementary to fishing activities? A study on some selected states of India

    Directory of Open Access Journals (Sweden)

    Chiranjib Neogi

    2016-01-01

    Full Text Available Freshwater fish output is taken as a proxy variable for empirical assessment of indirect benefits in terms of enhanced quantity of freshwater fish (output cultivation. It is not unlikely to assess empirically the productivity of subsidized public scheme when rural development or rural asset generations are underlined in the said scheme, MGNREG Act, 2005. Rainwater harvesting is a major component part of the scheme since about 49.5 per cent of the total fund is already utilized on water conservation and obviously it has an impact on the cultivation of freshwater fish output. Time series data on annual expenditure on MGNREG and corresponding freshwater fish output at the state level are taken during the period 2006-07 to 2013-14 for 16 major Indian states. Fixed effect model and random effect models are being applied and the Hausman specification test suggests that fixed effect model is more appropriate than random effect model. Significant differences among the intercepts of the selected states are revealed as per F test. The results of fixed effect panel regression establish that fish output is enhanced by 0.000257 thousand tones or 0.26 tones if MGNREG expenditure rises by one crore or 10 million rupees.

  5. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  6. Why sampling scheme matters: the effect of sampling scheme on landscape genetic results

    Science.gov (United States)

    Michael K. Schwartz; Kevin S. McKelvey

    2008-01-01

    There has been a recent trend in genetic studies of wild populations where researchers have changed their sampling schemes from sampling pre-defined populations to sampling individuals uniformly across landscapes. This reflects the fact that many species under study are continuously distributed rather than clumped into obvious "populations". Once individual...

  7. Collective agri-environment schemes: How can regionalenvironmental cooperatives enhance farmers’ intentions foragri-environment schemes?

    NARCIS (Netherlands)

    Dijk, van W.F.A.; Lokhorst, A.M.; Berendse, F.; Snoo, de G.R.

    2015-01-01

    The effectiveness of agri-environment schemes (AES) in enhancing biodiversity on farmland and creating a long-lasting change in farmers’ motivation towards a more environmental-friendly practice is still strongly debated. Applying a regional approach has been advocated widely to make AES more

  8. A simple language to script and simulate breeding schemes: the breeding scheme language

    Science.gov (United States)

    It is difficult for plant breeders to determine an optimal breeding strategy given that the problem involves many factors, such as target trait genetic architecture and breeding resource availability. There are many possible breeding schemes for each breeding program. Although simulation study may b...

  9. Numerical approximation of random periodic solutions of stochastic differential equations

    Science.gov (United States)

    Feng, Chunrong; Liu, Yu; Zhao, Huaizhong

    2017-10-01

    In this paper, we discuss the numerical approximation of random periodic solutions of stochastic differential equations (SDEs) with multiplicative noise. We prove the existence of the random periodic solution as the limit of the pull-back flow when the starting time tends to -∞ along the multiple integrals of the period. As the random periodic solution is not explicitly constructible, it is useful to study the numerical approximation. We discretise the SDE using the Euler-Maruyama scheme and modified Milstein scheme. Subsequently, we obtain the existence of the random periodic solution as the limit of the pull-back of the discretised SDE. We prove that the latter is an approximated random periodic solution with an error to the exact one at the rate of √{Δ t} in the mean square sense in Euler-Maruyama method and Δ t in the Milstein method. We also obtain the weak convergence result for the approximation of the periodic measure.

  10. Performance Evaluation and Robustness Testing of Advanced Oscilloscope Triggering Schemes

    Directory of Open Access Journals (Sweden)

    Shakeb A. KHAN

    2010-01-01

    Full Text Available In this paper, performance and robustness of two advanced oscilloscope triggering schemes is evaluated. The problem of time period measurement of complex waveforms can be solved using the algorithms, which utilize the associative memory network based weighted hamming distance (Whd and autocorrelation based techniques. Robustness of both the advanced techniques, are then evaluated by simulated addition of random noise of different levels to complex test signals waveforms, and minimum value of Whd (Whd min and peak value of coefficient of correlation(COCmax are computed over 10000 cycles of the selected test waveforms. The distance between mean value of second lowest value of Whd and Whd min and distance between second highest value of coefficient of correlation (COC and COC max are used as parameters to analyze the robustness of considered techniques. From the results, it is found that both the techniques are capable of producing trigger pulses efficiently; but correlation based technique is found to be better from robustness point of view.

  11. An efficient compression scheme for bitmap indices

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2004-04-13

    When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time

  12. Random walks in a random environment

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    Abstract. Random walks as well as diffusions in random media are considered. Methods are developed that allow one to establish large deviation results for both the 'quenched' and the 'averaged' case. Keywords. Large deviations; random walks in a random environment. 1. Introduction. A random walk on Zd is a stochastic ...

  13. An energy-efficient data transmission scheme for remote state estimation and applications to a water-tank system.

    Science.gov (United States)

    Li, Yunji; Li, Peng; Chen, Wen

    2017-09-01

    An energy-efficient data transmission scheme for remote state estimation is proposed and experimentally evaluated in this paper. This new transmission strategy is presented by proving an upper bound of the system performance. Stability of the remote estimator is proved under the condition that some of the observation measurements are lost in a random probability. An experimental platform of two coupled water tanks with a wireless sensor node is established to evaluate and verify the proposed transmission scheme. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  14. Design of Infusion Schemes for Neuroreceptor Imaging

    DEFF Research Database (Denmark)

    Feng, Ling; Svarer, Claus; Madsen, Karine

    2016-01-01

    for bolus infusion (BI) or programmed infusion (PI) experiments. Steady-state quantitative measurements can be made with one short scan and venous blood samples. The GABAA receptor ligand [(11)C]Flumazenil (FMZ) was chosen for this purpose, as it lacks a suitable reference region. Methods. Five bolus [(11)C...... state was attained within 40 min, which was 8 min earlier than the optimal BI (B/I ratio = 55 min). Conclusions. The system can design both BI and PI schemes to attain steady state rapidly. For example, subjects can be [(11)C]FMZ-PET scanned after 40 min of tracer infusion for 40 min with venous...

  15. Combined Control Scheme for Monitoring Quality Characteristics

    Directory of Open Access Journals (Sweden)

    Adekeye K.S.

    2014-07-01

    Full Text Available In the literature, the Exponentially Weighted Moving Average (EWMA and Exponentially Weighted Moving Variance (EMWV control schemes have been used separately to monitor the process average and process variability respectively. Here the two are combined and applied on simulated process with different level of variation. The control limit interval (CLI and the average run length (ARL were evaluated for the combined chart. The combined chart performed better than the two independently. Furthermore, an algorithm was developed for the two control charts and implemented on visual basic VB6.0. The obtained results show that the combined EWMA and EWMV control chart is very sensitive in detecting shift in production process and every shift in the process mean is always preceded by shift in the process variability.

  16. Parasitology: United Kingdom National Quality Assessment Scheme.

    Science.gov (United States)

    Hawthorne, M.; Chiodini, P. L.; Snell, J. J.; Moody, A. H.; Ramsay, A.

    1992-01-01

    AIMS: To assess the results from parasitology laboratories taking part in a quality assessment scheme between 1986 and 1991; and to compare performance with repeat specimens. METHODS: Quality assessment of blood parasitology, including tissue parasites (n = 444; 358 UK, 86 overseas), and faecal parasitology, including extra-intestinal parasites (n = 205; 141 UK, 64 overseas), was performed. RESULTS: Overall, the standard of performance was poor. A questionnaire distributed to participants showed that a wide range of methods was used, some of which were considered inadequate to achieve reliable results. Teaching material was distributed to participants from time to time in an attempt to improve standards. CONCLUSIONS: Since the closure of the IMLS fellowship course in 1972, fewer opportunities for specialised training in parasitology are available: more training is needed. Poor performance in the detection of malarial parasites is mainly attributable to incorrect speciation, misidentification, and lack of equipment such as an eyepiece graticule. PMID:1452791

  17. Auction dynamics: A volume constrained MBO scheme

    Science.gov (United States)

    Jacobs, Matt; Merkurjev, Ekaterina; Esedoǧlu, Selim

    2018-02-01

    We show how auction algorithms, originally developed for the assignment problem, can be utilized in Merriman, Bence, and Osher's threshold dynamics scheme to simulate multi-phase motion by mean curvature in the presence of equality and inequality volume constraints on the individual phases. The resulting algorithms are highly efficient and robust, and can be used in simulations ranging from minimal partition problems in Euclidean space to semi-supervised machine learning via clustering on graphs. In the case of the latter application, numerous experimental results on benchmark machine learning datasets show that our approach exceeds the performance of current state-of-the-art methods, while requiring a fraction of the computation time.

  18. Efficient Conservative Reformulation Schemes for Lithium Intercalation

    Energy Technology Data Exchange (ETDEWEB)

    Urisanga, PC; Rife, D; De, S; Subramanian, VR

    2015-02-18

    Porous electrode theory coupled with transport and reaction mechanisms is a widely used technique to model Li-ion batteries employing an appropriate discretization or approximation for solid phase diffusion with electrode particles. One of the major difficulties in simulating Li-ion battery models is the need to account for solid phase diffusion in a second radial dimension r, which increases the computation time/cost to a great extent. Various methods that reduce the computational cost have been introduced to treat this phenomenon, but most of them do not guarantee mass conservation. The aim of this paper is to introduce an inherently mass conserving yet computationally efficient method for solid phase diffusion based on Lobatto III A quadrature. This paper also presents coupling of the new solid phase reformulation scheme with a macro-homogeneous porous electrode theory based pseudo 20 model for Li-ion battery. (C) The Author(s) 2015. Published by ECS. All rights reserved.

  19. Foil Bearing Stiffness Estimation with Pseudospectral Scheme

    Directory of Open Access Journals (Sweden)

    Sankar Balaji

    2016-01-01

    Full Text Available Compliant foil gas lubricated bearings are used for the support of light loads in the order of few kilograms at high speeds, in the order of 50,000 RPM. The stiffness of the foil bearings depends both on the stiffness of the compliant foil and on the lubricating gas film. The stiffness of the bearings plays a crucial role in the stable operation of the supported rotor over a range of speeds. This paper describes a numerical approach to estimate the stiffness of the bearings using pseudo spectral scheme. Methodology to obtain the stiffness of the foil bearing as a function of weight of the shaft is given and the results are presented.

  20. State Of Art in Homomorphic Encryption Schemes

    Directory of Open Access Journals (Sweden)

    S. Sobitha Ahila

    2014-02-01

    Full Text Available The demand for privacy of digital data and of algorithms for handling more complex structures have increased exponentially over the last decade. However, the critical problem arises when there is a requirement for publicly computing with private data or to modify functions or algorithms in such a way that they are still executable while their privacy is ensured. This is where homomorphic cryptosystems can be used since these systems enable computations with encrypted data. A fully homomorphic encryption scheme enables computation of arbitrary functions on encrypted data.. This enables a customer to generate a program that can be executed by a third party, without revealing the underlying algorithm or the processed data. We will take the reader through a journey of these developments and provide a glimpse of the exciting research directions that lie ahead. In this paper, we propose a selection of the most important available solutions, discussing their properties and limitations.

  1. New CERN Health Insurance Scheme (CHIS) forms

    CERN Multimedia

    HR Department

    2015-01-01

    New versions of the following forms for claims and requests to the CERN Health Insurance Scheme (CHIS) have been released:   form for claiming reimbursement of medical expenses,   form for requesting advance reimbursement, and   dental estimate form (for treatments foreseen to exceed 800 CHF).   The new forms are available in French and English. They can either be completed electronically before being printed and signed, or completed in paper form. New detailed instructions can be found at the back of the claim form; CHIS members are invited to read them carefully. The electronic versions (PDF) of all the forms are available on the CHIS website and on the UNIQA Member Portal. CHIS Members are requested to use these new forms forthwith and to discard any previous version. Questions regarding the above should be addressed directly to UNIQA (72730 or 022.718 63 00 or uniqa.assurances@cern.ch).

  2. New scheme for braiding Majorana fermions

    Science.gov (United States)

    Wu, Long-Hua; Liang, Qi-Feng; Hu, Xiao

    2014-01-01

    Non-Abelian statistics can be achieved by exchanging two vortices in topological superconductors with each grabbing a Majorana fermion (MF) as zero-energy quasi-particle at the cores. However, in experiments it is difficult to manipulate vortices. In the present work, we propose a way to braid MFs without moving vortices. The only operation required in the present scheme is to turn on and off local gate voltages, which liberates a MF from its original host vortex and transports it along the prepared track. We solve the time-dependent Bogoliubov–de Gennes equation numerically, and confirm that the MFs are protected provided the switching of gate voltages for exchanging MFs are adiabatic, which takes only several nano seconds given reasonable material parameters. By monitoring the time evolution of MF wave-functions, we show that non-Abelian statistics is achieved. PMID:27877725

  3. An efficient training scheme for supermodels

    Science.gov (United States)

    Schevenhoven, Francine J.; Selten, Frank M.

    2017-06-01

    Weather and climate models have improved steadily over time as witnessed by objective skill scores, although significant model errors remain. Given these imperfect models, predictions might be improved by combining them dynamically into a so-called supermodel. In this paper a new training scheme to construct such a supermodel is explored using a technique called cross pollination in time (CPT). In the CPT approach the models exchange states during the prediction. The number of possible predictions grows quickly with time, and a strategy to retain only a small number of predictions, called pruning, needs to be developed. The method is explored using low-order dynamical systems and applied to a global atmospheric model. The results indicate that the CPT training is efficient and leads to a supermodel with improved forecast quality as compared to the individual models. Due to its computational efficiency, the technique is suited for application to state-of-the art high-dimensional weather and climate models.

  4. European Influenza Surveillance Scheme on the Internet.

    Science.gov (United States)

    Snacken, R; Manuguerra, J C; Taylor, P

    1998-09-01

    In 1995, The European Influenza Surveillance Scheme was created with the participation of eight networks from seven countries. The main objectives were to continue the previous CARE Telematics Network and to adapt the project to the Internet environment as well as to improve substantially the quality of the surveillance according to new epidemiological requirements. Clinical and virological data from the general population and hospitals are collected in an interactive real-time database which can then be used for data entry, queries and consultations. Research programmes have been undertaken in various fields such as standardisation of clinical data and comparability between countries. Validation and security processes guarantee the quality assurance as well as regular assessment by the steering committee. Two additional countries will participate during the next influenza season (1997-98). This will represent an early warning system in a region of approximately 264 million inhabitants.

  5. Secure identity-based encryption in the quantum random oracle model

    Science.gov (United States)

    Zhandry, Mark

    2015-04-01

    We give the first proof of security for an identity-based encryption (IBE) scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model that does not rely on the assumed existence of so-called quantum-secure pseudorandom functions (PRFs). Our techniques are quite general and we use them to obtain security proofs for two random oracle hierarchical IBE schemes and a random oracle signature scheme, all of which have previously resisted quantum security proofs, even assuming quantum-secure PRFs. We also explain how to remove quantum-secure PRFs from prior quantum random oracle model proofs. We accomplish these results by developing new tools for arguing that quantum algorithms cannot distinguish between two oracle distributions. Using a particular class of oracle distributions that we call semi-constant distributions, we argue that the aforementioned cryptosystems are secure against quantum adversaries.

  6. MIMO transmit scheme based on morphological perceptron with competitive learning.

    Science.gov (United States)

    Valente, Raul Ambrozio; Abrão, Taufik

    2016-08-01

    This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Security analysis and improvements of arbitrated quantum signature schemes

    Science.gov (United States)

    Zou, Xiangfu; Qiu, Daowen

    2010-10-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  8. Quantifying the morphodynamics of river restoration schemes using Unmanned Aerial Vehicles (UAVs)

    Science.gov (United States)

    Williams, Richard; Byrne, Patrick; Gilles, Eric; Hart, John; Hoey, Trevor; Maniatis, George; Moir, Hamish; Reid, Helen; Ves, Nikolas

    2017-04-01

    River restoration schemes are particularly sensitive to morphological adjustment during the first set of high-flow events that they are subjected to. Quantifying elevation change associated with morphological adjustment can contribute to improved adaptive decision making to ensure river restoration scheme objectives are achieved. To date the relatively high cost, technical demands and challenging logistics associated with acquiring repeat, high-resolution topographic surveys has resulted in a significant barrier to monitoring the three-dimensional morphodynamics of river restoration schemes. The availability of low-cost, consumer grade Unmanned Aerial Vehicles that are capable of acquiring imagery for processing using Structure-from-Motion Multi-View Stereo (SfM MVS) photogrammetry has the potential to transform the survey the morphodynamics of river restoration schemes. Application guidance does, however, need to be developed to fully exploit the advances of UAV technology and SfM MVS processing techniques. In particular, there is a need to quantify the effect of the number and spatial distribution of ground targets on vertical error. This is particularly significant because vertical errors propagate when mapping morphological change, and thus determine the evidence that is available for decision making. This presentation presents results from a study that investigated how the number and spatial distribution of targets influenced vertical error, and then used the findings to determine survey protocols for a monitoring campaign that has quantified morphological change across a number of restoration schemes. At the Swindale river restoration scheme, Cumbria, England, 31 targets were distributed across a 700 m long reach and the centre of each target was surveyed using RTK-GPS. Using the targets as General Control Points (GCPs) or checkpoints, they were divided into three different spatial patterns (centre, edge and random) and used for processing images acquired

  9. Chaos-based CAZAC scheme for secure transmission in OFDM-PON

    Science.gov (United States)

    Fu, Xiaosong; Bi, Meihua; Zhou, Xuefang; Yang, Guowei; Lu, Yang; Hu, Miao

    2018-01-01

    To effectively resist malicious eavesdropping and performance deterioration, a novel chaos-based secure transmission scheme is proposed to enhance the physical layer security and reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing passive optical network (OFDM-PON). By the randomly extracting operation of common CAZAC values, the specially-designed constant amplitude zero autocorrelation (CAZAC) is created for system encryption and PAPR reduction enhancing the transmission security. This method is verified in {10-Gb/s encrypted OFDM-PON with 20-km fiber transmission. Results show that, compared to common OFDM-PON, our scheme achieves {3-dB PAPR reduction and {1-dB receiver sensitivity improvement.

  10. An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2016-01-01

    Full Text Available A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in which the real identity of the user is encrypted with a shared key between the user and the trusted server. Only the trusted server can determine the real identity of a user during the authentication, and any other entities including other users of the system get nothing about the user’s real identity. In addition, the shared key of encryption can be easily computed by the user and trusted server using the Chebyshev map without additional burdensome key management. Once the partnered two users are authenticated by the trusted server, they can easily proceed with the agreement of the session key. Formal security analysis demonstrates that the proposed scheme is secure under the random oracle model.

  11. A Novel Deployment Scheme Based on Three-Dimensional Coverage Model for Wireless Sensor Networks

    Science.gov (United States)

    Xiao, Fu; Yang, Yang; Wang, Ruchuan; Sun, Lijuan

    2014-01-01

    Coverage pattern and deployment strategy are directly related to the optimum allocation of limited resources for wireless sensor networks, such as energy of nodes, communication bandwidth, and computing power, and quality improvement is largely determined by these for wireless sensor networks. A three-dimensional coverage pattern and deployment scheme are proposed in this paper. Firstly, by analyzing the regular polyhedron models in three-dimensional scene, a coverage pattern based on cuboids is proposed, and then relationship between coverage and sensor nodes' radius is deduced; also the minimum number of sensor nodes to maintain network area's full coverage is calculated. At last, sensor nodes are deployed according to the coverage pattern after the monitor area is subdivided into finite 3D grid. Experimental results show that, compared with traditional random method, sensor nodes number is reduced effectively while coverage rate of monitor area is ensured using our coverage pattern and deterministic deployment scheme. PMID:25045747

  12. A novel scheme for image encryption based on 2D piecewise chaotic maps

    Science.gov (United States)

    Akhshani, A.; Behnia, S.; Akhavan, A.; Hassan, H. Abu; Hassan, Z.

    2010-09-01

    In this paper, a hierarchy of two-dimensional piecewise nonlinear chaotic maps with an invariant measure is introduced. These maps have interesting features such as invariant measure, ergodicity and the possibility of K-S entropy calculation. Then by using significant properties of these chaotic maps such as ergodicity, sensitivity to initial condition and control parameter, one-way computation and random like behavior, we present a new scheme for image encryption. Based on all analysis and experimental results, it can be concluded that, this scheme is efficient, practicable and reliable, with high potential to be adopted for network security and secure communications. Although the two-dimensional piecewise nonlinear chaotic maps presented in this paper aims at image encryption, it is not just limited to this area and can be widely applied in other information security fields.

  13. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm.

    Science.gov (United States)

    Rajput, Sudheesh K; Nishchal, Naveen K

    2014-01-20

    We propose a novel nonlinear image-encryption scheme based on a Gerchberg-Saxton (G-S) phase-retrieval algorithm in the Fresnel transform domain. The decryption process can be performed using conventional double random phase encoding (DRPE) architecture. The encryption is realized by applying G-S phase-retrieval algorithm twice, which generates two asymmetric keys from intermediate phases. The asymmetric keys are generated in such a way that decryption is possible optically with a conventional DRPE method. Due to the asymmetric nature of the keys, the proposed encryption process is nonlinear and offers enhanced security. The cryptanalysis has been carried out, which proves the robustness of proposed scheme against known-plaintext, chosen-plaintext, and special attacks. A simple optical setup for decryption has also been suggested. Results of computer simulation support the idea of the proposed cryptosystem.

  14. Random tensors

    CERN Document Server

    Gurau, Razvan

    2017-01-01

    Written by the creator of the modern theory of random tensors, this book is the first self-contained introductory text to this rapidly developing theory. Starting from notions familiar to the average researcher or PhD student in mathematical or theoretical physics, the book presents in detail the theory and its applications to physics. The recent detections of the Higgs boson at the LHC and gravitational waves at LIGO mark new milestones in Physics confirming long standing predictions of Quantum Field Theory and General Relativity. These two experimental results only reinforce today the need to find an underlying common framework of the two: the elusive theory of Quantum Gravity. Over the past thirty years, several alternatives have been proposed as theories of Quantum Gravity, chief among them String Theory. While these theories are yet to be tested experimentally, key lessons have already been learned. Whatever the theory of Quantum Gravity may be, it must incorporate random geometry in one form or another....

  15. Random functions and turbulence

    CERN Document Server

    Panchev, S

    1971-01-01

    International Series of Monographs in Natural Philosophy, Volume 32: Random Functions and Turbulence focuses on the use of random functions as mathematical methods. The manuscript first offers information on the elements of the theory of random functions. Topics include determination of statistical moments by characteristic functions; functional transformations of random variables; multidimensional random variables with spherical symmetry; and random variables and distribution functions. The book then discusses random processes and random fields, including stationarity and ergodicity of random

  16. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  17. An Efficient Remote Authentication Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen

    2017-02-01

    Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.

  18. International proposal for an acoustic classification scheme for dwellings

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2014-01-01

    Acoustic classification schemes specify different quality levels for acoustic conditions. Regulations and classification schemes for dwellings typically include criteria for airborne and impact sound insulation, façade sound insulation and service equipment noise. However, although important...... European countries have introduced classification schemes. The schemes typically include four classes. Comparative studies have shown significant discrepancies between countries due to national development of schemes. The diversity is an obstacle for exchange of construction experience for different...... classes, implying also trade barriers. Thus, a harmonized classification scheme would be useful, and the European COST Action TU0901 "Integrating and Harmonizing Sound Insulation Aspects in Sustainable Urban Housing Constructions", running 2009-2013 with members from 32 countries, including three overseas...

  19. Moving towards universal coverage in South Africa? Lessons from a voluntary government insurance scheme

    Directory of Open Access Journals (Sweden)

    Veloshnee Govender

    2013-01-01

    Full Text Available Background: In 2005, the South African government introduced a voluntary, subsidised health insurance scheme for civil servants. In light of the global emphasis on universal coverage, empirical evidence is needed to understand the relationship between new health financing strategies and health care access thereby improving global understanding of these issues. Objectives: This study analysed coverage of the South African government health insurance scheme, the population groups with low uptake, and the individual-level factors, as well as characteristics of the scheme, that influenced enrolment. Methods: Multi-stage random sampling was used to select 1,329 civil servants from the health and education sectors in four of South Africa's nine provinces. They were interviewed to determine factors associated with enrolment in the scheme. The analysis included both descriptive statistics and multivariate logistic regression. Results: Notwithstanding the availability of a non-contributory option within the insurance scheme and access to privately-provided primary care, a considerable portion of socio-economically vulnerable groups remained uninsured (57.7% of the lowest salary category. Non-insurance was highest among men, black African or coloured ethnic groups, less educated and lower-income employees, and those living in informal-housing. The relatively poor uptake of the contributory and non-contributory insurance options was mostly attributed to insufficient information, perceived administrative challenges of taking up membership, and payment costs. Conclusion: Barriers to enrolment include insufficient information, unaffordability of payments and perceived administrative complexity. Achieving universal coverage requires good physical access to service providers and appropriate benefit options within pre-payment health financing mechanisms.

  20. RF Tomography for Tunnel Detection: Principles and Inversion Schemes

    Science.gov (United States)

    Lo Monte, L.; Erricolo, D.; Inan, U. S.; Wicks, M. C.

    2008-12-01

    We propose a novel way to detect underground tunnels based on classical seismic tomography, Ground Penetrating Radar (GPR), inverse scattering principles, and the deployment of distributed sensors, which we call "Distributed RF Tomography". Tunnel detection has been a critical problem that cannot be considered fully solved. Presently, tunnel detection is performed by methods that include seismic sensors, electrical impedance, microgravity, boreholes, and GPR. All of these methods have drawbacks that make them not applicable for use in unfriendly environments, such as battlefields. Specifically, they do not cover wide surface areas, they are generally shallow, they are limited to vertical prospecting, and require the user to be in situ, which may jeopardize one's safety. Additional application of the proposed distributed RF tomography include monitoring sensitive areas, (e.g. banks, power plants, military bases, prisons, national borders) and civil applications (e.g. environmental engineering, mine safety, search and rescue, speleology, archaeology and geophysics). The novelty of a Distributed RF tomography system consists of the following. 1) Sensors are scattered randomly above the ground, thus saving time and money compared to the use of boreholes. 2) The use of lower operating frequency (around HF), which allows for deeper penetration. 3) The use of CW diffraction tomography, which increases the resolution to sub-wavelength values, independently from the sensor displacement, and increases the SNR. 4) Use of linear inversion schemes that are suited for tunnel detection. 5) The use of modulation schemes and signal processing algorithms to mitigate interferences and noise. This presentation will cover: 1. Current physical limits of existing techniques for tunnel detection. 2. Concept of Distributed RF Tomography. 3. Inversion theories and strategies a. Proper forward model for voids buried into an homogeneous medium b. Extended matched filtering inversion c. Near

  1. Interference Drop Scheme: Enhancing QoS Provision in Multi-Hop Ad Hoc Networks

    Science.gov (United States)

    Luo, Chang-Yi; Komuro, Nobuyoshi; Takahashi, Kiyoshi; Kasai, Hiroyuki; Ueda, Hiromi; Tsuboi, Toshinori

    Ad hoc networking uses wireless technologies to construct networks with no physical infrastructure and so are expected to provide instant networking in areas such as disaster recovery sites and inter-vehicle communication. Unlike conventional wired networks services, services in ad hoc networks are easily disrupted by the frequent changes in traffic and topology. Therefore, solutions to assure the Quality of Services (QoS) in ad hoc networks are different from the conventional ones used in wired networks. In this paper, we propose a new queue management scheme, Interference Drop Scheme (IDS) for ad hoc networks. In the conventional queue management approaches such as FIFO (First-in First-out) and RED (Random Early Detection), a queue is usually managed by a queue length limit. FIFO discards packets according to the queue limit, and RED discards packets in an early and random fashion. IDS, on the other hand, manages the queue according to wireless interference time, which increases as the number of contentions in the MAC layer increases. When there are many MAC contentions, IDS discards TCP data packets. By observing the interference time and discarding TCP data packets, our simulation results show that IDS improves TCP performance and reduces QoS violations in UDP in ad hoc networks with chain, grid, and random topologies. Our simulation results also demonstrate that wireless interference time is a better metric than queue length limit for queue management in multi-hop ad hoc networks.

  2. Iteration and superposition encryption scheme for image sequences based on multi-dimensional keys

    Science.gov (United States)

    Han, Chao; Shen, Yuzhen; Ma, Wenlin

    2017-12-01

    An iteration and superposition encryption scheme for image sequences based on multi-dimensional keys is proposed for high security, big capacity and low noise information transmission. Multiple images to be encrypted are transformed into phase-only images with the iterative algorithm and then are encrypted by different random phase, respectively. The encrypted phase-only images are performed by inverse Fourier transform, respectively, thus new object functions are generated. The new functions are located in different blocks and padded zero for a sparse distribution, then they propagate to a specific region at different distances by angular spectrum diffraction, respectively and are superposed in order to form a single image. The single image is multiplied with a random phase in the frequency domain and then the phase part of the frequency spectrums is truncated and the amplitude information is reserved. The random phase, propagation distances, truncated phase information in frequency domain are employed as multiple dimensional keys. The iteration processing and sparse distribution greatly reduce the crosstalk among the multiple encryption images. The superposition of image sequences greatly improves the capacity of encrypted information. Several numerical experiments based on a designed optical system demonstrate that the proposed scheme can enhance encrypted information capacity and make image transmission at a highly desired security level.

  3. Decentralized Economic Dispatch Scheme With Online Power Reserve for Microgrids

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Wang, P.

    2017-01-01

    Decentralized economic operation schemes have several advantages when compared with the traditional centralized management system for microgrids. Specifically, decentralized schemes are more flexible, less computationally intensive, and easier to implement without relying on communication...... costs, their power ratings, and other necessary constraints, before deciding the DG dispatch priorities and droop characteristics. The proposed scheme also allows online power reserve to be set and regulated within the microgrid. This, together with the generation cost saved, has been verified...

  4. A stable fast marching scheme for computational fluid mechanics

    Science.gov (United States)

    Behnia, M.; de Vahl Davis, G.; Wolfshtein, M.

    1990-04-01

    A stable fast marching scheme has been developed for the solution of coupled parabolic partial differential equations such as the Navier-Stokes equations. The scheme was developed with the aid of a stability analysis. The implementation of the method in standard alternating direction implicit algorithms is straightforward. The scheme was tested on the problem of natural convection in a square cavity. The number of iterations required for convergence was significantly reduced compared to conventional methods.

  5. 7 CFR 12.10 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...

  6. A repeat-until-success quantum computing scheme

    Energy Technology Data Exchange (ETDEWEB)

    Beige, A [School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT (United Kingdom); Lim, Y L [DSO National Laboratories, 20 Science Park Drive, Singapore 118230, Singapore (Singapore); Kwek, L C [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542, Singapore (Singapore)

    2007-06-15

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes.

  7. A Comparative Analysis of Schemes for Correlated Branch Prediction

    OpenAIRE

    Young, Cliff; Gloy, Nicolas; Smith, Michael D.

    1995-01-01

    Modern high-performance architectures require extremely accurate branch prediction to overcome the performance limitations of conditional branches. We present a framework that categorizes branch prediction schemes by the way in which they partition dynamic branches and by the kind of predictor that they use. The framework allows us to compare and contrast branch prediction schemes, and to analyze why they work. We use the framework to show how a static correlated branch prediction scheme incr...

  8. An ASI Suppression Scheme Based on Array Synthesis

    Science.gov (United States)

    Zhu, Jinhua; Liu, Peixi; Luo, Wu

    2017-10-01

    An adjacent satellite interference (ASI) suppression scheme based on transmitting antennas array synthesis is proposed in this paper. The scheme ensures the ASI under the upper bound specified by international regulations, and simultaneously maximize the main-axis radiated power. Specifically, the interference suppression problem is converted into a uniform linear array (ULA) synthesis problem, and then solved by two algorithms. Numerical results are presented to illustrate the performance of the scheme.

  9. Two Conservative Difference Schemes for Rosenau-Kawahara Equation

    Directory of Open Access Journals (Sweden)

    Jinsong Hu

    2014-01-01

    Full Text Available Two conservative finite difference schemes for the numerical solution of the initialboundary value problem of Rosenau-Kawahara equation are proposed. The difference schemes simulate two conservative quantities of the problem well. The existence and uniqueness of the difference solution are proved. It is shown that the finite difference schemes are of second-order convergence and unconditionally stable. Numerical experiments verify the theoretical results.

  10. Scheme for achieving coherent perfect absorption by anisotropic metamaterials

    KAUST Repository

    Zhang, Xiujuan

    2017-02-22

    We propose a unified scheme to achieve coherent perfect absorption of electromagnetic waves by anisotropic metamaterials. The scheme describes the condition on perfect absorption and offers an inverse design route based on effective medium theory in conjunction with retrieval method to determine practical metamaterial absorbers. The scheme is scalable to frequencies and applicable to various incident angles. Numerical simulations show that perfect absorption is achieved in the designed absorbers over a wide range of incident angles, verifying the scheme. By integrating these absorbers, we further propose an absorber to absorb energy from two coherent point sources.

  11. Nested Hilbert schemes on surfaces: Virtual fundamental class

    DEFF Research Database (Denmark)

    Gholampour, Amin; Sheshmani, Artan; Yau, Shing-Tung

    We construct natural virtual fundamental classes for nested Hilbert schemes on a nonsingular projective surface S. This allows us to define new invariants of S that recover some of the known important cases such as Poincare invariants of Durr-Kabanov-Okonek and the stable pair invariants of Kool......-Thomas. In the case of the nested Hilbert scheme of points, we can express these invariants in terms of integrals over the products of Hilbert scheme of points on S, and relate them to the vertex operator formulas found by Carlsson-Okounkov. The virtual fundamental classes of the nested Hilbert schemes play a crucial...

  12. A chaos secure communication scheme based on multiplication modulation

    Science.gov (United States)

    Fallahi, Kia; Leung, Henry

    2010-02-01

    A secure spread spectrum communication scheme using multiplication modulation is proposed. The proposed system multiplies the message by chaotic signal. The scheme does not need to know the initial condition of the chaotic signals and the receiver is based on an extended Kalman filter (EKF). This signal encryption scheme lends itself to cheap implementation and can therefore be used effectively for ensuring security and privacy in commercial consumer electronics products. To illustrate the effectiveness of the proposed scheme, a numerical example based on Genesio-Tesi system and also Chen dynamical system is presented and the results are compared.

  13. Comparison of two SVD-based color image compression schemes.

    Science.gov (United States)

    Li, Ying; Wei, Musheng; Zhang, Fengxia; Zhao, Jianli

    2017-01-01

    Color image compression is a commonly used process to represent image data as few bits as possible, which removes redundancy in the data while maintaining an appropriate level of quality for the user. Color image compression algorithms based on quaternion are very common in recent years. In this paper, we propose a color image compression scheme, based on the real SVD, named real compression scheme. First, we form a new real rectangular matrix C according to the red, green and blue components of the original color image and perform the real SVD for C. Then we select several largest singular values and the corresponding vectors in the left and right unitary matrices to compress the color image. We compare the real compression scheme with quaternion compression scheme by performing quaternion SVD using the real structure-preserving algorithm. We compare the two schemes in terms of operation amount, assignment number, operation speed, PSNR and CR. The experimental results show that with the same numbers of selected singular values, the real compression scheme offers higher CR, much less operation time, but a little bit smaller PSNR than the quaternion compression scheme. When these two schemes have the same CR, the real compression scheme shows more prominent advantages both on the operation time and PSNR.

  14. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  15. Error function attack of chaos synchronization based encryption schemes.

    Science.gov (United States)

    Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu

    2004-03-01

    Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor. Copyright 2004 American Institute of Physics.

  16. Evaluation of a pilot peer observation of teaching scheme for chair-side tutors at Glasgow University Dental School.

    Science.gov (United States)

    Cairns, A M; Bissell, V; Bovill, C

    2013-06-01

    To introduce and examine a pilot peer observation of teaching (POT) scheme within the Department of Paediatric Dentistry at Glasgow Dental School and its associated outreach centres. All tutors teaching paediatric dentistry were invited to be involved in evaluation of the POT scheme. Participants were randomly paired with a peer, who then observed their teaching and provided constructive feedback. For those consenting to be involved in the evaluation of the scheme, semi-structured, one-to-one interviews were carried out by the principal investigator. POT was found by all participants to be a beneficial process, reassuring those of their teaching styles and giving them ideas to adapt their teaching. POT is an effective method for engaging chair-side tutors in the reflection and development of their teaching practice via observations and scholarly discussion.

  17. Fourth order Douglas implicit scheme for solving three dimension reaction diffusion equation with non-linear source term

    Science.gov (United States)

    Hasnain, Shahid; Saqib, Muhammad; Mashat, Daoud Suleiman

    2017-07-01

    This research paper represents a numerical approximation to non-linear three dimension reaction diffusion equation with non-linear source term from population genetics. Since various initial and boundary value problems exist in three dimension reaction diffusion phenomena, which are studied numerically by different numerical methods, here we use finite difference schemes (Alternating Direction Implicit and Fourth Order Douglas Implicit) to approximate the solution. Accuracy is studied in term of L2, L∞ and relative error norms by random selected grids along time levels for comparison with analytical results. The test example demonstrates the accuracy, efficiency and versatility of the proposed schemes. Numerical results showed that Fourth Order Douglas Implicit scheme is very efficient and reliable for solving 3-D non-linear reaction diffusion equation.

  18. A Study on the Enhancement of Positioning Accuracy Performance Using Interrogator Selection Schemes over Indoor Wireless Channels

    Science.gov (United States)

    Park, Seungkeun; Kang, Byeong Gwon

    In this paper, two kinds of interrogator selection schemes named as random interrogator selection and hybrid interrogator selection methods are considered to enhance the positioning accuracy under indoor wireless LAN environments and the performances are compared with those of the conventional methods called as normal and reference interrogator selection schemes. These interrogator selection schemes are based on received signal strength(RSS) levels and trilateration method. A testbed was set up to measure and compare the positioning estimation error of the considered methods and previous conventional ones. The experiments results showed that the accuracy of location estimation was enormously improved with the hybrid method as much as 3m especially in a hostile environment with some obstacles. Meanwhile, the differences of estimation errors are not so much (< 0.2m) without obstacle conditions among the four kinds of interrogator selection methods.

  19. Date Attachable Offline Electronic Cash Scheme

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2014-01-01

    Full Text Available Electronic cash (e-cash is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  20. Date Attachable Offline Electronic Cash Scheme

    Science.gov (United States)

    Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  1. Date attachable offline electronic cash scheme.

    Science.gov (United States)

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  2. Predicting FLDs Using a Multiscale Modeling Scheme

    Science.gov (United States)

    Wu, Z.; Loy, C.; Wang, E.; Hegadekatte, V.

    2017-09-01

    The measurement of a single forming limit diagram (FLD) requires significant resources and is time consuming. We have developed a multiscale modeling scheme to predict FLDs using a combination of limited laboratory testing, crystal plasticity (VPSC) modeling, and dual sequential-stage finite element (ABAQUS/Explicit) modeling with the Marciniak-Kuczynski (M-K) criterion to determine the limit strain. We have established a means to work around existing limitations in ABAQUS/Explicit by using an anisotropic yield locus (e.g., BBC2008) in combination with the M-K criterion. We further apply a VPSC model to reduce the number of laboratory tests required to characterize the anisotropic yield locus. In the present work, we show that the predicted FLD is in excellent agreement with the measured FLD for AA5182 in the O temper. Instead of 13 different tests as for a traditional FLD determination within Novelis, our technique uses just four measurements: tensile properties in three orientations; plane strain tension; biaxial bulge; and the sheet crystallographic texture. The turnaround time is consequently far less than for the traditional laboratory measurement of the FLD.

  3. Nonlinear inversion schemes for fluorescence optical tomography.

    Science.gov (United States)

    Freiberger, Manuel; Egger, Herbert; Scharfetter, Hermann

    2010-11-01

    Fluorescence optical tomography is a non-invasive imaging modality that employs the absorption and re-emission of light by fluorescent dyes. The aim is to reconstruct the fluorophore distribution in a body from measurements of light intensities at the boundary. Due to the diffusive nature of light propagation in tissue, fluorescence tomography is a nonlinear and severely ill-posed problem, and some sort of regularization is required for a stable solution. In this paper we investigate reconstruction methods based on Tikhonov regularization with nonlinear penalty terms, namely total-variation regularization and a levelset-type method using a nonlinear parameterization of the unknown function. Moreover, we use the full threedimensional nonlinear forward model, which arises from the governing system of partial differential equations. We discuss the numerical realization of the regularization schemes by Newtontype iterations, present some details of the discretization by finite element methods, and outline the efficient implementation of sensitivity systems via adjoint methods. As we will demonstrate in numerical tests, the proposed nonlinear methods provide better reconstructions than standard methods based on linearized forward models and linear penalty terms. We will additionally illustrate, that the careful discretization of the methods derived on the continuous level allows to obtain reliable, mesh independent reconstruction algorithms.

  4. Multilevel SOT-MRAM Cell with a Novel Sensing Scheme for High-Density Memory Applications

    DEFF Research Database (Denmark)

    Zeinali, Behzad; Madsen, Jens Kargaard; Moradi, Farshad

    in high-density memory application. To deal with this obstacle, we propose a multilevel cell which stores two bits per memory cell. In addition, we propose a novel sensing scheme to read out the stored data in the multilevel SOT-MRAM cell. Our simulation results show that the proposed cell can achieve 3X......This paper presents a multilevel spin-orbit torque magnetic random access memory (SOT-MRAM). The conventional SOT-MRAMs enables a reliable and energy efficient write operation. However, these cells require two access transistors per cell, hence the efficiency of the SOTMRAMs can be questioned...

  5. Design and comparison of gene-pyramiding schemes in animals.

    Science.gov (United States)

    Zhao, F P; Jiang, L; Gao, H J; Ding, X D; Zhang, Q

    2009-08-01

    Marker-assisted gene pyramiding provides a promising way to develop new animal breeds or lines, in which genes responsible for certain favorable characters identified in different breeds or lines are incorporated. In consideration of features of animal populations, we proposed five schemes for pyramiding three genes, denoted Scheme A-E, and five schemes for pyramiding four genes, denoted Scheme F-J. These schemes are representative of the possible alternatives. We also provided an algorithm to compute the population sizes needed in each generation. We compared these schemes with respect to the total population size and the number of generations required under different situations. The results show that there is no scheme that is optimal in all cases. Among the schemes for pyramiding three genes from three lines (L1, L2 and L3), Scheme D (a three-way cross between the three lines are first performed, followed by a backcross to L1 and a subsequent intercross to obtain the desired genotype) has a significant advantage over the other schemes when the recombination rate between adjacent genes ranges from 0.1 to 0.4, while Scheme A (a two-way cross between L1 and L2 and a subsequent intercross are performed, followed by a cross with L3 and a subsequent intercross to obtain the desired genotype) is optimal when recombination rate is 0.5. Among schemes for pyramiding four genes from four lines (L1, L2, L3 and L4), Scheme I (seperately, a two-way cross between L1 and L2 (L3 and L4) followed by a backcross to L1 (L3) and a subsequent intercross are performed, then the offspring from the two sides are crossed and followed by a backcross to L1 and a subsequent intercross to obtain the desired genotype) is optimal when the recombination rate ranges from 0.1 to 0.4, while Scheme F (cross and subsequent intercross between the four lines are performed successively) is the optimal when the recombination rate is 0.5. We also disscuss how the animals' reproductive capacity, the

  6. Dynamic downscaling over western Himalayas: Impact of cloud microphysics schemes

    Science.gov (United States)

    Tiwari, Sarita; Kar, Sarat C.; Bhatla, R.

    2018-03-01

    Due to lack of observation data in the region of inhomogeneous terrain of the Himalayas, detailed climate of Himalayas is still unknown. Global reanalysis data are too coarse to represent the hydroclimate over the region with sharp orography gradient in the western Himalayas. In the present study, dynamic downscaling of the European Centre for Medium-Range Weather Forecast (ECMWF) Reanalysis-Interim (ERA-I) dataset over the western Himalayas using high-resolution Weather Research and Forecast (WRF) model has been carried out. Sensitivity studies have also been carried out using convection and microphysics parameterization schemes. The WRF model simulations have been compared against ERA-I and available station observations. Analysis of the results suggests that the WRF model has simulated the hydroclimate of the region well. It is found that in the simulations that the impact of convection scheme is more during summer months than in winter. Examination of simulated results using various microphysics schemes reveal that the WRF single-moment class-6 (WSM6) scheme simulates more precipitation on the upwind region of the high mountain than that in the Morrison and Thompson schemes during the winter period. Vertical distribution of various hydrometeors shows that there are large differences in mixing ratios of ice, snow and graupel in the simulations with different microphysics schemes. The ice mixing ratio in Morrison scheme is more than WSM6 above 400 hPa. The Thompson scheme favors formation of more snow than WSM6 or Morrison schemes while the Morrison scheme has more graupel formation than other schemes.

  7. Random fixed points and random differential inclusions

    Directory of Open Access Journals (Sweden)

    Nikolaos S. Papageorgiou

    1988-01-01

    Full Text Available In this paper, first, we study random best approximations to random sets, using fixed point techniques, obtaining this way stochastic analogues of earlier deterministic results by Browder-Petryshyn, KyFan and Reich. Then we prove two fixed point theorems for random multifunctions with stochastic domain that satisfy certain tangential conditions. Finally we consider a random differential inclusion with upper semicontinuous orientor field and establish the existence of random solutions.

  8. Adverse selection in a community-based health insurance scheme in rural Africa: implications for introducing targeted subsidies.

    Science.gov (United States)

    Parmar, Divya; Souares, Aurélia; de Allegri, Manuela; Savadogo, Germain; Sauerborn, Rainer

    2012-06-28

    Although most community-based health insurance (CBHI) schemes are voluntary, problem of adverse selection is hardly studied. Evidence on the impact of targeted subsidies on adverse selection is completely missing. This paper investigates adverse selection in a CBHI scheme in Burkina Faso. First, we studied the change in adverse selection over a period of 4 years. Second, we studied the effect of targeted subsidies on adverse selection. The study area, covering 41 villages and 1 town, was divided into 33 clusters and CBHI was randomly offered to these clusters during 2004-06. In 2007, premium subsidies were offered to the poor households. The data was collected by a household panel survey 2004-2007 from randomly selected households in these 33 clusters (n = 6795). We applied fixed effect models. We found weak evidence of adverse selection before the implementation of subsidies. Adverse selection significantly increased the next year and targeted subsidies largely explained this increase. Adverse selection is an important concern for any voluntary health insurance scheme. Targeted subsidies are often used as a tool to pursue the vision of universal coverage. At the same time targeted subsidies are also associated with increased adverse selection as found in this study. Therefore, it's essential that targeted subsidies for poor (or other high-risk groups) must be accompanied with a sound plan to bridge the financial gap due to adverse selection so that these schemes can continue to serve these populations.

  9. Interleaving Gains for Receive Diversity Schemes of Distributed Turbo Codes in Wireless Half–Duplex Relay Channels

    Directory of Open Access Journals (Sweden)

    Tamer H. M. Soliman

    2015-06-01

    Full Text Available This paper proposes the interleaving gain in two different distributed turbo-coding schemes: Distributed Turbo Codes (DTC and Distributed Multiple Turbo Codes (DMTC for half-duplex relay system as an extension of our previous work on turbo coding interleaver design for direct communication channel. For these schemes with half-duplex constraint, the source node transmits its information with the parity bit sequence(s to both the relay and the destination nodes during the first phase. The relay received the data from the source and process it by using decode and forward protocol. For the second transmission period, the decoded systematic data at relay is interleaved and re-encoded by a Recursive Systematic Convolutional (RSC encoder and forwarded to the destination. At destination node, the signals received from the source and relay are processed by using turbo log-MAP iterative decoding for retrieving the original information bits. We demonstrate via simulations that the interleaving gain has a large effect with DTC scheme when we use only one RSC encoder at both the source and relay with best performance when using Modified Matched S-Random (MMSR interleaver. Furthermore, by designing a Chaotic Pseudo Random Interleaver (CPRI as an outer interleaver at the source node instead of classical interleavers, our scheme can add more secure channel conditions.

  10. Random transmission scheme approach for a FMCW TDMA coherent MIMO radar

    NARCIS (Netherlands)

    Belfiori, F.; Rossum, W.L. van; Hoogeboom, P.

    2012-01-01

    In this paper the authors analyze the use of Time Division Multiple Access (TDMA) applied to coherent Multiple-Input Multiple-Output (MIMO) radar systems. One of the main limitations in exploiting the orthogonal condition in the time domain for MIMO radars is the reduction of the unambiguous Doppler

  11. Effect of national open apprenticeship scheme on youth employment ...

    African Journals Online (AJOL)

    % response and welding and fabrication with 10.0% response. Socio-economic effect of the scheme was more on employment generation with 87.5% response. Major problems of respondents in the scheme were, exclusion of some participants ...

  12. Evaluating an Earlybird Scheme: Encouraging Early Assignment Writing and Revising

    Science.gov (United States)

    Unsworth, Kerrie; Kauter, Katherine

    2008-01-01

    It is widely suggested that feedback on assignments is useful to students' learning, however, little research has examined how this feedback may be provided in large classes or the actual effects of such a scheme. We designed and implemented a voluntary "earlybird scheme" that provided detailed feedback to undergraduate Business students on a…

  13. A Scale of Cognitive Development: Validating Perry's Scheme.

    Science.gov (United States)

    Fago, George C.

    When William G. Perry (1968) developed his scheme of nine stages of cognitive development, most of which are experienced during the college years, he did not attempt to quantify it. Subsequently, T. D. Erwin (1983) constructed a scale that attempted to quantify the Perry scheme. His findings supported the overall conception of student development…

  14. Awareness and Coverage of the National Health Insurance Scheme ...

    African Journals Online (AJOL)

    A prepayment scheme for health through the National Health Insurance Scheme (NHIS) was commenced in Nigeria about ten years ago. Nigeria operates a federal system of government. Sub- national levels possess a high degree of autonomy in a number of sectors including health. It is important to assess the level of ...

  15. Review of pension schemes of Ukraine and Argentina in ...

    African Journals Online (AJOL)

    The effectiveness of a pension plan or scheme is a function of its contents, structure and management. Over the years, the non-contributory pension scheme in Nigeria was confronted with daunting challenges. As alternative to these challenges, the 2004 Pension Reform Act came into force. The 2004 Pension Reform Act ...

  16. REVIEW OF PENSION SCHEMES OF UKRAINE AND ARGENTINA ...

    African Journals Online (AJOL)

    GRACE

    Abstract. The effectiveness of a pension plan or scheme is a function of its contents, structure and management. Over the years, the non-contributory pension scheme in Nigeria was confronted with daunting challenges. As alternative to these challenges, the 2004 Pension Reform Act came into force. The 2004. Pension ...

  17. Efficient schemes for deterministic joint remote preparation of an ...

    Indian Academy of Sciences (India)

    We present three schemes for the joint remote state preparation (JRSP) of an arbitrary four-qubit W-type entangled state with complex coefficients via four and two three-qubit GHZ states as the quantum channel. In these schemes, two senders (or N senders) share the original state which they wish to help the receiver to ...

  18. Pseudorandomness analysis of the (extended) Lai–Massey scheme

    NARCIS (Netherlands)

    Luo, Yiyuan; Desmedt, Y.; Lai, Xuejia; Gong, Zheng

    2010-01-01

    In this paper we find that the two-round (extended) Lai–Massey scheme is not pseudorandom and three-round (extended) Lai–Massey scheme is not strong pseudorandom. Combined with previous work, we prove that three rounds are necessary and sufficient for the pseudorandomness and four rounds are

  19. Hybrid Modulation Scheme for Cascaded H-Bridge Inverter Cells ...

    African Journals Online (AJOL)

    This work proposes a switching technique for cascaded H-Bridge (CHB) cells. Single carrier Sinusoidal PWM (SCSPWM) scheme is employed in the generation of the gating signals. A sequential switching and base PWM circulation schemes are presented for this fundamental cascaded multilevel inverter topology.

  20. Lattice Boltzmann scheme for diffusion on triangular grids

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2003-01-01

    In this paper we present a Lattice Boltzmann scheme for diffusion on it unstructured triangular grids. In this formulation of a LB for irregular grids there is no need for interpolation, which is required in other LB schemes on irregular grids. At the end of the propagation step the lattice gas

  1. Convection-diffusion lattice Boltzmann scheme for irregular lattices

    NARCIS (Netherlands)

    Sman, van der R.G.M.; Ernst, M.H.

    2000-01-01

    In this paper, a lattice Boltzmann (LB) scheme for convection diffusion on irregular lattices is presented, which is free of any interpolation or coarse graining step. The scheme is derived using the axioma that the velocity moments of the equilibrium distribution equal those of the

  2. An Adaptive Coding Scheme For Effective Bandwidth And Power ...

    African Journals Online (AJOL)

    An adaptive coding scheme that utilizes the different merits of more than one fixed rate codes and the noise level variations on a communication channel to achieve an increased throughput has been implemented in this work. An adaptive coding scheme using three fixed-rate BCH codes was developed and implemented ...

  3. State of the Art in the Cramer Classification Scheme and ...

    Science.gov (United States)

    Slide presentation at the SOT FDA Colloquium on State of the Art in the Cramer Classification Scheme and Threshold of Toxicological Concern in College Park, MD. Slide presentation at the SOT FDA Colloquium on State of the Art in the Cramer Classification Scheme and Threshold of Toxicological Concern in College Park, MD.

  4. Sensor scheme design for active structural acoustic control

    NARCIS (Netherlands)

    Berkhoff, Arthur P.

    Efficient sensing schemes for the active reduction of sound radiation from plates are presented based on error signals derived from spatially weighted plate velocity or near-field pressure. The schemes result in near-optimal reductions as compared to weighting procedures derived from eigenvector or

  5. A robust and secure watermarking scheme based on singular ...

    Indian Academy of Sciences (India)

    In this work, we propose a blind watermarking scheme based on the discrete wavelet transform (DWT) and singular value decomposition (SVD). Singular values (SV's) of high frequency (HH) band are used to optimize perceptual transparency and robustness constraints. Although most of the SVD-based schemes prove to ...

  6. Investigation of schemes for incorporating generator Q limits in the ...

    Indian Academy of Sciences (India)

    ... to avoid the possibility of anomalous solutions encountered while using the conventional schemes is also proposed and evaluated. Results from extensive simulation studies are provided to highlight the strengths and weaknesses of these existing and proposed schemes, especially from the point of view of reliability.

  7. Design Scheme of Remote Monitoring System Based on Qt

    Directory of Open Access Journals (Sweden)

    Xu Dawei

    2015-01-01

    Full Text Available This paper introduces a design scheme of remote monitoring system based on Qt, the scheme of remote monitoring system based on S3C2410 and Qt, with the aid of cross platform development tools Qt and powerful ARM platform design and implementation. The development of remote video surveillance system based on embedded terminal has practical significance and value.

  8. LDPC-PPM Coding Scheme for Optical Communication

    Science.gov (United States)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  9. Scheme on the Web and in the Classroom

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2012-01-01

    LAML is a software system that brings XML languages into Scheme as a collection of Scheme functions. The XML languages are defined by XML document type definitions (DTDs). We review the development of LAML during more than a decade, and we collect the experiences from these efforts. The paper des...

  10. Adaptive guard channel allocation scheme with buffer for mobile ...

    African Journals Online (AJOL)

    A simulation program written in Java programming language evaluates the performance of the scheme based on blocking/dropping probabilities of both calls. Results of the evaluation is described using descriptive statistics such as bar charts. The proposed scheme would reduce congestion and improve quality of service ...

  11. Gaps in the implementation of Uganda's students' loan scheme ...

    African Journals Online (AJOL)

    This study was conducted to examine the performance of the student loan scheme in Uganda. Making reference to related literature, views of selected stakeholders, and the performance of government's earlier lending programmes, the study identifies gaps in the performance of the scheme. These are in the areas of ...

  12. An accurate scheme by block method for third order ordinary ...

    African Journals Online (AJOL)

    A block linear multistep method for solving special third order initial value problems of ordinary differential equations is presented in this paper. The approach of collocation approximation is adopted in the derivation of the scheme and then the scheme is applied as simultaneous integrator to special third order initial value ...

  13. A Heuristic Hierarchical Scheme for Academic Search and Retrieval

    DEFF Research Database (Denmark)

    Amolochitis, Emmanouil; Christou, Ioannis T.; Tan, Zheng-Hua

    2013-01-01

    We present PubSearch, a hybrid heuristic scheme for re-ranking academic papers retrieved from standard digital libraries such as the ACM Portal. The scheme is based on the hierarchical combination of a custom implementation of the term frequency heuristic, a time-depreciated citation score...

  14. A FRACTAL-BASED STOCHASTIC INTERPOLATION SCHEME IN SUBSURFACE HYDROLOGY

    Science.gov (United States)

    The need for a realistic and rational method for interpolating sparse data sets is widespread. Real porosity and hydraulic conductivity data do not vary smoothly over space, so an interpolation scheme that preserves irregularity is desirable. Such a scheme based on the properties...

  15. Valuation and Hedging of Variable Annuities in Pension Schemes

    NARCIS (Netherlands)

    Bovenberg, A.L.; van Bilsen, S.; Laeven, R.J.A.

    2016-01-01

    This paper explores defined ambition pension schemes that provide (deferred) variable annuities. These pension schemes allocate various risks (i.e., real interest rate, expected inflation and stock market risk) to the policyholders on the basis of complete contracts. We show how these variable

  16. Practical schemes for privacy and security enhanced RFID

    NARCIS (Netherlands)

    Hoepman, J.H.; Joosten, R.

    2010-01-01

    Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key

  17. A toolbox for the lifting scheme on quincunx grids (LISQ)

    NARCIS (Netherlands)

    P.M. de Zeeuw (Paul)

    2002-01-01

    textabstractA collection of functions written in MATLAB is presented. The functions include second generation wavelet decomposition and reconstruction tools for images as well as functions for the computation of moments. The wavelet schemes rely on the lifting scheme of Sweldens and use the

  18. Comparing interpolation schemes in dynamic receive ultrasound beamforming

    DEFF Research Database (Denmark)

    Kortbek, Jacob; Andresen, Henrik; Nikolov, Svetoslav

    2005-01-01

    In medical ultrasound interpolation schemes are of- ten applied in receive focusing for reconstruction of image points. This paper investigates the performance of various interpolation scheme by means of ultrasound simulations of point scatterers in Field II. The investigation includes conventional...

  19. An efficient entire chaos-based scheme for deniable authentication

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Di [College of Computer Science and Engineering, Chongqing University, Chongqing, 400044 (China) and College of Mechanical Engineering, Chongqing University, Chongqing, 400044 (China)]. E-mail: xiaodi_cqu@hotmail.com; Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing, 400044 (China); Wong, K.W. [Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong (China)

    2005-02-01

    By using a chaotic encryption-hash parallel algorithm and the semi-group property of Chebyshev chaotic map, we propose a secure and efficient scheme for the deniable authentication. The scheme is efficient, practicable and reliable, with high potential to be adopted for e-commerce.

  20. Convexity-preserving Bernstein–Bézier quartic scheme

    Directory of Open Access Journals (Sweden)

    Maria Hussain

    2014-07-01

    Full Text Available A C1 convex surface data interpolation scheme is presented to preserve the shape of scattered data arranged over a triangular grid. Bernstein–Bézier quartic function is used for interpolation. Lower bound of the boundary and inner Bézier ordinates is determined to guarantee convexity of surface. The developed scheme is flexible and involves more relaxed constraints.

  1. Group schemes with additional structures and Weyl group cosets

    NARCIS (Netherlands)

    Moonen, B.

    2000-01-01

    Let Y be an abelian variety of dimension g over an algebraically closed eld k of characteristic p To Y we can associate its pkernel Y p which is a nite commutative kgroup scheme of rank pg In the unpublished manuscript Kraft showed that xing g there are only nitely many such group schemes

  2. Smallholder irrigation schemes in South Africa: A review of ...

    African Journals Online (AJOL)

    The status and characteristics of the 302 smallholder irrigation schemes found in South Africa are discussed and knowledge on South African smallholder irrigation schemes generated by the Water Research Commission (WRC) over a period of nearly 20 years is reviewed. Themes covered include planning, design and ...

  3. Review of the Assistance for Isolated Children Scheme.

    Science.gov (United States)

    Tomlinson, D. G.; Tannock, P. D.

    A total of 3,732 recipients of Assistance for Isolated Children (AIC) allowances during 1979 and 1980 received questionnaires and parents of 313 families were interviewed to determine who benefitted from the AIC Scheme, what use was made of the AIC allowance, what effect did the AIC Scheme appear to have had, and what anomalies existed in relation…

  4. Some Comments on the Scheme of Arrangement as an "Affected ...

    African Journals Online (AJOL)

    Some Comments on the Scheme of Arrangement as an "Affected Transaction" as Defined in the Companies Act 71 of 2008. ... revisited by the legislature for clarification. KEYWORDS: Scheme of arrangement; affected transaction; Companies Act; company takeover; re-acquisition of companies; south african company law ...

  5. The Defunct Rivers State 'School to Land' Scheme: A Dream ...

    African Journals Online (AJOL)

    Ensuring food security and self-reliance through farming made many countries to embark on farming schemes such as the Gezira in Sudan, Alto Beni in Bolivia, Nyakashaka of Uganda, farming settlements of Eastern and Western Nigeria and the ―School to Land‖ scheme. The initial euphoria that welcomed these ...

  6. AN EFFECTIVE SCHEDULING SCHEME FOR LIFT CLUBS

    Directory of Open Access Journals (Sweden)

    W. Van Wijck

    2012-01-01

    Full Text Available

    ENGLISH ABSTRACT: This paper describes a formula for scheduling the day-to-day operation of a lift club. The formula is remarkably simple, and can easily be implemented on a spreadsheet. It is also extremely flexible and can cater for almost any peculiarity that may arise. Much like a business, the lift club is viewed as an entity in its own right, rather than as a collection of individuals. The scheme can be used to generate interesting statistics such as percentage utilization of each member, average percentage utilization of all members, effective size of the lift club, etc. In addition, a graph, depicting each member's liability towards the club against time, can be generated. Finally, every member can obtain a record of his/her trip data over any specific period, which may be handy for income tax purposes.

    AFRIKAANSE OPSOMMING: Hierdie artikel beskryf 'n fonnule vir die dag-tot-dag skedulering van 'n saamryklub. Die fonnule is merkwaardig eenvoudig en kan maklik op 'n sigblad geimplementeer word. Dit is ook besonder buigsaam deurdat dit vir bykans enige gebeurlikheid voorsienning maak. Die voorgestelde skeduleringsmetode beskou die saamryklub as 'n entiteit in eie reg, en skeduleing word vanuit die saamryklub se oogpunt gedoen. Die skema kan gebruik word om interesante statistieke soos byvoorbeeld die persentasie benutting deur enige lid, die gemiddelde persentasie benutting deur aIle lede, die effektiewe grootte van die klub, ens., te genereer. Voorts kan 'n grafiek gegenereer word wat elke lid se aanspreeklikheid teenoor die klub as 'n funksie van tyd grafies vertoon. Laastens kan enige lid op enige stadium 'n rekord trek van die aantal saamrygeleenthede wat hy oor 'n bepaalde periode voorsien en ontvang het. Dit mag handig wees vir belasting doeleindes.

  7. The effect of sampling scheme in the survey of atmospheric deposition of heavy metals in Albania by using moss biomonitoring.

    Science.gov (United States)

    Qarri, Flora; Lazo, Pranvera; Bekteshi, Lirim; Stafilov, Trajce; Frontasyeva, Marina; Harmens, Harry

    2015-02-01

    The atmospheric deposition of heavy metals in Albania was investigated by using a carpet-forming moss species (Hypnum cupressiforme) as bioindicator. Sampling was done in the dry seasons of autumn 2010 and summer 2011. Two different sampling schemes are discussed in this paper: a random sampling scheme with 62 sampling sites distributed over the whole territory of Albania and systematic sampling scheme with 44 sampling sites distributed over the same territory. Unwashed, dried samples were totally digested by using microwave digestion, and the concentrations of metal elements were determined by inductively coupled plasma atomic emission spectroscopy (ICP-AES) and AAS (Cd and As). Twelve elements, such as conservative and trace elements (Al and Fe and As, Cd, Cr, Cu, Ni, Mn, Pb, V, Zn, and Li), were measured in moss samples. Li as typical lithogenic element is also included. The results reflect local emission points. The median concentrations and statistical parameters of elements were discussed by comparing two sampling schemes. The results of both sampling schemes are compared with the results of other European countries. Different levels of the contamination valuated by the respective contamination factor (CF) of each element are obtained for both sampling schemes, while the local emitters identified like iron-chromium metallurgy and cement industry, oil refinery, mining industry, and transport have been the same for both sampling schemes. In addition, the natural sources, from the accumulation of these metals in mosses caused by metal-enriched soil, associated with wind blowing soils were pointed as another possibility of local emitting factors.

  8. Developing a risk-based trading scheme for cattle in England: farmer perspectives on managing trading risk for bovine tuberculosis.

    Science.gov (United States)

    Little, R; Wheeler, K; Edge, S

    2017-02-11

    This paper examines farmer attitudes towards the development of a voluntary risk-based trading scheme for cattle in England as a risk mitigation measure for bovine tuberculosis (bTB). The research reported here was commissioned to gather evidence on the type of scheme that would have a good chance of success in improving the information farmers receive about the bTB risk of cattle they buy. Telephone interviews were conducted with a stratified random sample of 203 cattle farmers in England, splitting the interviews equally between respondents in the high-risk area and low-risk area for bTB. Supplementary interviews and focus groups with farmers were also carried out across the risk areas. Results suggest a greater enthusiasm for a risk-based trading scheme in low-risk areas compared with high-risk areas and among members of breed societies and cattle health schemes. Third-party certification of herds by private vets or the Animal and Plant Health Agency were regarded as the most credible source, with farmer self-certification being favoured by sellers, but being regarded as least credible by buyers. Understanding farmers' attitudes towards voluntary risk-based trading is important to gauge likely uptake, understand preferences for information provision and to assist in monitoring, evaluating and refining the scheme once established. British Veterinary Association.

  9. Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2014-12-01

    Telecare medicine information systems provide a communicating platform for accessing remote medical resources through public networks, and help health care workers and medical personnel to rapidly making correct clinical decisions and treatments. An authentication scheme for data exchange in telecare medicine information systems enables legal users in hospitals and medical institutes to establish a secure channel and exchange electronic medical records or electronic health records securely and efficiently. This investigation develops an efficient and secure verified-based three-party authentication scheme by using extended chaotic maps for data exchange in telecare medicine information systems. The proposed scheme does not require server's public keys and avoids time-consuming modular exponential computations and scalar multiplications on elliptic curve used in previous related approaches. Additionally, the proposed scheme is proven secure in the random oracle model, and realizes the lower bounds of messages and rounds in communications. Compared to related verified-based approaches, the proposed scheme not only possesses higher security, but also has lower computational cost and fewer transmissions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  10. Evaluation of the Norwegian R&D Tax Credit Scheme

    Directory of Open Access Journals (Sweden)

    Ådne Cappelen

    2010-11-01

    Full Text Available We find that the Norwegian R&D tax credit scheme introduced in 2002 mainly works as intended. The scheme is cost-effective and it is used by a large number of firms. It stimulates these firms to invest more in R&D, and, in particular, the effect is positive for small firms with little R&D experience. The returns on the R&D investments supported by the scheme are positive and generally not different from the returns to other R&D investments. We have found examples of what can be interpreted as tax motivated adjustments to the scheme, but to some extent this must be accepted as a cost to subsidy and support schemes intended for use by a large number of economic agents. This is particularly so when attempts are made to keep administrative expenditures and control routines at a low level.

  11. Robust Model Predictive Control Schemes for Tracking Setpoints

    Directory of Open Access Journals (Sweden)

    Vu Trieu Minh

    2010-01-01

    Full Text Available This paper briefly reviews the development of nontracking robust model predictive control (RMPC schemes for uncertain systems using linear matrix inequalities (LMIs subject to input saturated and softened state constraints. Then we develop two new tracking setpoint RMPC schemes with common Lyapunov function and with zero terminal equality subject to input saturated and softened state constraints. The novel tracking setpoint RMPC schemes are able to stabilize uncertain systems once the output setpoints lead to the violation of the state constraints. The state violation can be regulated by changing the value of the weighting factor. A brief comparative simulation study of the two tracking setpoint RMPC schemes is done via simple examples to demonstrate the ability of the softened state constraint schemes. Finally, some features of future research from this study are discussed.

  12. A simplification of the unified gas kinetic scheme

    CERN Document Server

    Chen, Songze; Xu, Kun

    2016-01-01

    Unified gas kinetic scheme (UGKS) is an asymptotic preserving scheme for the kinetic equations. It is superior for transition flow simulations, and has been validated in the past years. However, compared to the well known discrete ordinate method (DOM) which is a classical numerical method solving the kinetic equations, the UGKS needs more computational resources. In this study, we propose a simplification of the unified gas kinetic scheme. It allows almost identical numerical cost as the DOM, but predicts numerical results as accurate as the UGKS. Based on the observation that the equilibrium part of the UGKS fluxes can be evaluated analytically, the equilibrium part in the UGKS flux is not necessary to be discretized in velocity space. In the simplified scheme, the numerical flux for the velocity distribution function and the numerical flux for the macroscopic conservative quantities are evaluated separately. The simplification is equivalent to a flux hybridization of the gas kinetic scheme for the Navier-S...

  13. Near-optimal labeling schemes for nearest common ancestors

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Bistrup Halvorsen, Esben; Larsen, Kasper Green

    2014-01-01

    and Korman (STOC'10) established that labels in ancestor labeling schemes have size log n + Θ(log log n), our new lower bound separates ancestor and NCA labeling schemes. Our upper bound improves the 10 log n upper bound by Alstrup, Gavoille, Kaplan and Rauhe (TOCS'04), and our theoretical result even......We consider NCA labeling schemes: given a rooted tree T, label the nodes of T with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the label of their nearest common ancestor. For trees with n nodes we present upper and lower bounds...... establishing that labels of size (2 ± ε)log n, ε schemes have labels of size log n + Ω(log log n). Our lower bound increases this to log n + Ω(log n) for NCA labeling schemes. Since Fraigniaud...

  14. Sound classification of dwellings - Comparison of schemes in Europe

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2009-01-01

    , facade sound insulation and installation noise. The quality classes reflect dierent levels of acoustical comfort. The paper presents and compares the sound classification schemes in Europe. The schemes have been implemented and revised gradually since the 1990es. However, due to lack of coordination......, there are significant discrepancies. Descriptors, number of quality classes, class intervals, class levels and status of the classification schemes in relation to legal requirements vary. In some countries the building code and the classification standard are incoherent. In other countries, they are strongly......National sound classification schemes for dwellings exist in nine countries in Europe, and proposals are under preparation in more countries. The schemes specify class criteria concerning several acoustic aspects, the main criteria being about airborne and impact sound insulation between dwellings...

  15. Hybrid update / invalidate schemes for cache coherence protocols

    Directory of Open Access Journals (Sweden)

    R. V. Dovgopol

    2015-01-01

    Full Text Available In general when considering cache coherence, write back schemes are the default. These schemes invalidate all other copies of a data block during a write. In this paper we propose several hybrid schemes that will switch between updating and invalidating on processor writes at runtime, depending on program conditions. This kind of approaches tend to improve the overall performance of systems in numerous fields ranging from the Information Security to the Civil Aviation. We created our own cache simulator on which we could implement our schemes, and generated data sets from both commercial benchmarks and through artificial methods to run on the simulator. We analyze the results of running the benchmarks with various schemes, and suggest further research that can be done in this area.

  16. Lagrangian modelling of plankton motion: From deceptively simple random walks to Fokker-Planck and back again

    DEFF Research Database (Denmark)

    Visser, Andre

    2008-01-01

    The movement of plankton, either by turbulent mixing or their own inherent motility, can be simulated in a Lagrangian framework as a random walk. Validation of random walk simulations is essential. There is a continuum of mathematically valid stochastic integration schemes upon which random walk ...

  17. High order accurate finite difference schemes based on symmetry preservation

    Science.gov (United States)

    Ozbenli, Ersin; Vedula, Prakash

    2017-11-01

    In this paper, we present a mathematical approach that is based on modified equations and the method of equivariant moving frames for construction of high order accurate invariant finite difference schemes that preserve Lie symmetry groups of underlying partial differential equations (PDEs). In the proposed approach, invariant (or symmetry preserving) numerical schemes with a desired (or fixed) order of accuracy are constructed from some non-invariant (base) numerical schemes. Modified forms of PDEs are used to improve the order of accuracy of existing schemes and these modified forms are obtained through addition of defect correction terms to the original forms of PDEs. These defect correction terms of modified PDEs that are noted from truncation error analysis are either completely removed from schemes or their representation is significantly simplified by considering convenient moving frames. This feature of the proposed method can especially be useful to avoid cumbersome numerical representations when high order schemes are developed from low order ones via the method of modified equations. The proposed method is demonstrated via construction of invariant numerical schemes with fixed (and higher) order of accuracy for some common linear and nonlinear problems (including the linear advection-diffusion equation in 1D and 2D, inviscid Burgers' equation, and viscous Burgers' equation) and the performance of these invariant numerical schemes is further evaluated. Our results indicate that such invariant numerical schemes obtained from existing base numerical schemes have the potential to significantly improve the quality of results not only in terms of desired higher order accuracy but also in the context of preservation of appropriate symmetry properties of underlying PDEs.

  18. An evaluation of a working memory training scheme in older adults

    Directory of Open Access Journals (Sweden)

    Laura Patricia McAvinue

    2013-05-01

    Full Text Available Working memory is a cognitive process that is particularly vulnerable to decline with age. The current study sought to evaluate the efficacy of a working memory training scheme in improving memory in a group of older adults. A 5-week online training scheme was designed to provide training in the main components of Baddeley’s (2000 working memory model, namely auditory and visuospatial short-term and working memory. A group of older adults aged between 64 and 79 were randomly assigned to a trainee (n = 19 or control (n = 17 group, with trainees engaging in the adaptive training scheme and controls engaging in a non-adaptive version of the programme. Before and after training and at 3- and 6-month follow-up sessions, trainees and controls were asked to complete measures of short-term and working memory, long-term episodic memory, subjective ratings of memory and attention and achievement of goals set at the beginning of training. The results provided evidence of an expansion of auditory short-term memory span, which was maintained 6 months later, and transfer to long-term episodic memory but no evidence of improvement in working memory capacity per se. A serendipitous and intriguing finding of a relationship between time spent training, psychological stress and training gains provided further insight into individual differences in training gains in older adults.

  19. The Effect of Different Resistance Training Load Schemes on Strength and Body Composition in Trained Men.

    Science.gov (United States)

    Lopes, Charles Ricardo; Aoki, Marcelo Saldanha; Crisp, Alex Harley; de Mattos, Renê Scarpari; Lins, Miguel Alves; da Mota, Gustavo Ribeiro; Schoenfeld, Brad Jon; Marchetti, Paulo Henrique

    2017-09-01

    The purpose of this study was to evaluate the impact of moderate-load (10 RM) and low-load (20 RM) resistance training schemes on maximal strength and body composition. Sixteen resistance-trained men were randomly assigned to 1 of 2 groups: a moderate-load group (n = 8) or a low-load group (n = 8). The resistance training schemes consisted of 8 exercises performed 4 times per week for 6 weeks. In order to equate the number of repetitions performed by each group, the moderate load group performed 6 sets of 10 RM, while the low load group performed 3 sets of 20 RM. Between-group differences were evaluated using a 2-way ANOVA and independent t-tests. There was no difference in the weekly total load lifted (sets × reps × kg) between the 2 groups. Both groups equally improved maximal strength and measures of body composition after 6 weeks of resistance training, with no significant between-group differences detected. In conclusion, both moderate-load and low-load resistance training schemes, similar for the total load lifted, induced a similar improvement in maximal strength and body composition in resistance-trained men.

  20. The Effect of Different Resistance Training Load Schemes on Strength and Body Composition in Trained Men

    Directory of Open Access Journals (Sweden)

    Lopes Charles Ricardo

    2017-08-01

    Full Text Available The purpose of this study was to evaluate the impact of moderate-load (10 RM and low-load (20 RM resistance training schemes on maximal strength and body composition. Sixteen resistance-trained men were randomly assigned to 1 of 2 groups: a moderate-load group (n = 8 or a low-load group (n = 8. The resistance training schemes consisted of 8 exercises performed 4 times per week for 6 weeks. In order to equate the number of repetitions performed by each group, the moderate load group performed 6 sets of 10 RM, while the low load group performed 3 sets of 20 RM. Between-group differences were evaluated using a 2-way ANOVA and independent t-tests. There was no difference in the weekly total load lifted (sets × reps × kg between the 2 groups. Both groups equally improved maximal strength and measures of body composition after 6 weeks of resistance training, with no significant between-group differences detected. In conclusion, both moderate-load and low-load resistance training schemes, similar for the total load lifted, induced a similar improvement in maximal strength and body composition in resistance-trained men.

  1. The Effect of Different Resistance Training Load Schemes on Strength and Body Composition in Trained Men

    Science.gov (United States)

    Lopes, Charles Ricardo; Aoki, Marcelo Saldanha; Crisp, Alex Harley; de Mattos, Renê Scarpari; Lins, Miguel Alves; da Mota, Gustavo Ribeiro; Schoenfeld, Brad Jon; Marchetti, Paulo Henrique

    2017-01-01

    Abstract The purpose of this study was to evaluate the impact of moderate-load (10 RM) and low-load (20 RM) resistance training schemes on maximal strength and body composition. Sixteen resistance-trained men were randomly assigned to 1 of 2 groups: a moderate-load group (n = 8) or a low-load group (n = 8). The resistance training schemes consisted of 8 exercises performed 4 times per week for 6 weeks. In order to equate the number of repetitions performed by each group, the moderate load group performed 6 sets of 10 RM, while the low load group performed 3 sets of 20 RM. Between-group differences were evaluated using a 2-way ANOVA and independent t-tests. There was no difference in the weekly total load lifted (sets × reps × kg) between the 2 groups. Both groups equally improved maximal strength and measures of body composition after 6 weeks of resistance training, with no significant between-group differences detected. In conclusion, both moderate-load and low-load resistance training schemes, similar for the total load lifted, induced a similar improvement in maximal strength and body composition in resistance-trained men. PMID:28828088

  2. Public vs private administration of rural health insurance schemes: a comparative study in Zhejiang of China.

    Science.gov (United States)

    Zhou, Xiaoyuan; Mao, Zhengzhong; Rechel, Bernd; Liu, Chaojie; Jiang, Jialin; Zhang, Yinying

    2013-07-01

    Since 2003, China has experimented in some of the country's counties with the private administration of the New Cooperative Medical Scheme (NCMS), a publicly subsidized health insurance scheme for rural populations. Our study compared the effectiveness and efficiency of private vs public administration in four counties in one of China's most affluent provinces in the initial stage of the NCMS's implementation. The study was undertaken in Ningbo city of Zhejiang province. Out of 10 counties in Ningbo, two counties with private administration for the NCMS (Beilun and Ninghai) were compared with two others counties with public administration (Zhenhai and Fenghua), using the following indicators: (1) proportion of enrollees who were compensated for inpatient care; (2) average reimbursement-expense ratio per episode of inpatient care; (3) overall administration cost; (4) enrollee satisfaction. Data from 2004 to 2006 were collected from the local health authorities, hospitals and the contracted insurance companies, supplemented by a randomized household questionnaire survey covering 176 households and 479 household members. In our sample counties, private administration of the NCMS neither reduced transaction costs, nor improved the benefits of enrollees. Enrollees covered by the publicly administered NCMS were more likely to be satisfied with the insurance scheme than those covered by the privately administered NCMS. Experience in the selected counties suggests that private administration of the NCMS did not deliver the hoped-for results. We conclude that caution needs to be exercised in extending private administration of the NCMS.

  3. Low-complexity co-tier interference reduction scheme in open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2011-12-01

    This paper addresses the effect of co-tier interference on the performance of multiuser overlaid cellular networks that share the same available resources. It assumed that each macrocell contains a number of self-configurable and randomly located femtocells that employ the open-access control strategy to reduce the effect of cross-tier interference. It is also assumed that the desired user equipment (UE) can access only one of the available channels, maintains simple decoding circuitry with single receive antenna, and has limited knowledge of the instantaneous channel state information (CSI) due to resource limitation. To mitigate the effect of co-tier interference in the absence of the CSI of the desired UE, a low-complexity switched-based scheme for single channel selection based on the predicted interference levels associated with available channels is proposed for the case of over-loaded channels. Through the analysis, new general formulation for the statistics of the resulting instantaneous interference power and some performance measures are presented. The effect of the switching threshold on the efficiency and performance of the proposed scheme is studied. Numerical and simulation results to clarify the usefulness of the proposed scheme in reducing the impact of co-tier interference are also provided. © 2011 IEEE.

  4. Effects of Mesh Irregularities on Accuracy of Finite-Volume Discretization Schemes

    Science.gov (United States)

    Diskin, Boris; Thomas, James L.

    2012-01-01

    The effects of mesh irregularities on accuracy of unstructured node-centered finite-volume discretizations are considered. The focus is on an edge-based approach that uses unweighted least-squares gradient reconstruction with a quadratic fit. For inviscid fluxes, the discretization is nominally third order accurate on general triangular meshes. For viscous fluxes, the scheme is an average-least-squares formulation that is nominally second order accurate and contrasted with a common Green-Gauss discretization scheme. Gradient errors, truncation errors, and discretization errors are separately studied according to a previously introduced comprehensive methodology. The methodology considers three classes of grids: isotropic grids in a rectangular geometry, anisotropic grids typical of adapted grids, and anisotropic grids over a curved surface typical of advancing layer grids. The meshes within the classes range from regular to extremely irregular including meshes with random perturbation of nodes. Recommendations are made concerning the discretization schemes that are expected to be least sensitive to mesh irregularities in applications to turbulent flows in complex geometries.

  5. Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering

    Directory of Open Access Journals (Sweden)

    Buescher Niklas

    2017-10-01

    Full Text Available The widespread deployment of smart meters that frequently report energy consumption information, is a known threat to consumers’ privacy. Many promising privacy protection mechanisms based on secure aggregation schemes have been proposed. Even though these schemes are cryptographically secure, the energy provider has access to the plaintext aggregated power consumption. A privacy trade-off exists between the size of the aggregation scheme and the personal data that might be leaked, where smaller aggregation sizes leak more personal data. Recently, a UK industrial body has studied this privacy trade-off and identified that two smart meters forming an aggregate, are sufficient to achieve privacy. In this work, we challenge this study and investigate which aggregation sizes are sufficient to achieve privacy in the smart grid. Therefore, we propose a flexible, yet formal privacy metric using a cryptographic game based definition. Studying publicly-available, real world energy consumption datasets with various temporal resolutions, ranging from minutes to hourly intervals, we show that a typical household can be identified with very high probability. For example, we observe a 50% advantage over random guessing in identifying households for an aggregation size of 20 households with a 15-minutes reporting interval. Furthermore, our results indicate that single appliances can be identified with significant probability in aggregation sizes up to 10 households.

  6. A study of temperature sensor location based on fractal analysis for cascade control schemes in tubular reactors

    DEFF Research Database (Denmark)

    Eduardo Ramirez-Castelan, Carlos; Moguel-Castañeda, Jazael; Puebla, Hector

    2016-01-01

    Temperature sensor location for cascade control schemes in tubular reactors is still an open research problem. Several studies have pointed out that most temperature sensitive zones along the length of the reactor are suitable to this end. In this work, we have studied the problem of sensor...... location in a cascade control configuration using fractal analysis of time series obtained by random forcing of the jacket rector. A benchmark dispersion axial model displaying different temperature profiles is used to illustrate our findings....

  7. Acupuncture for Symptom Relief in Palliative Care—Study Protocol and Semistandardized Treatment Schemes

    Directory of Open Access Journals (Sweden)

    Sybille Kramer

    2017-08-01

    Full Text Available The use of complementary and alternative medicine methods such as acupuncture in palliative care has increased over the past years. Well-planned trials are warranted to show its effectiveness in relieving distressing symptoms. The development of treatment schemes to be used in the trial for both acupuncture and medical symptom control is challenging, as both acupuncture and palliative care are highly individualized. Thus, standardized care plans of a randomized controlled trial will have difficulties in producing treatment results that compare to the clinical practice. As an alternative, treatment protocols for both acupuncture and medical symptom control of dyspnea, pruritus, hypersalivation, depression, anxiety, and xerostomia were designed with the input of experts. They are designed to provide sufficient symptom control and comparability for a three-arm, randomized controlled trial. Medical symptom control will be provided to all groups. The two control groups will be medical treatment and sham-laser acupuncture.

  8. Acupuncture for Symptom Relief in Palliative Care-Study Protocol and Semistandardized Treatment Schemes.

    Science.gov (United States)

    Kramer, Sybille; Irnich, Dominik; Lorenzl, Stefan

    2017-08-01

    The use of complementary and alternative medicine methods such as acupuncture in palliative care has increased over the past years. Well-planned trials are warranted to show its effectiveness in relieving distressing symptoms. The development of treatment schemes to be used in the trial for both acupuncture and medical symptom control is challenging, as both acupuncture and palliative care are highly individualized. Thus, standardized care plans of a randomized controlled trial will have difficulties in producing treatment results that compare to the clinical practice. As an alternative, treatment protocols for both acupuncture and medical symptom control of dyspnea, pruritus, hypersalivation, depression, anxiety, and xerostomia were designed with the input of experts. They are designed to provide sufficient symptom control and comparability for a three-arm, randomized controlled trial. Medical symptom control will be provided to all groups. The two control groups will be medical treatment and sham-laser acupuncture. Copyright © 2017. Published by Elsevier B.V.

  9. Generalized energy and potential enstrophy conserving finite difference schemes for the shallow water equations

    Science.gov (United States)

    Abramopoulos, Frank

    1988-01-01

    The conditions under which finite difference schemes for the shallow water equations can conserve both total energy and potential enstrophy are considered. A method of deriving such schemes using operator formalism is developed. Several such schemes are derived for the A-, B- and C-grids. The derived schemes include second-order schemes and pseudo-fourth-order schemes. The simplest B-grid pseudo-fourth-order schemes are presented.

  10. Sparse Reconstruction Schemes for Nonlinear Electromagnetic Imaging

    KAUST Repository

    Desmal, Abdulla

    2016-03-01

    Electromagnetic imaging is the problem of determining material properties from scattered fields measured away from the domain under investigation. Solving this inverse problem is a challenging task because (i) it is ill-posed due to the presence of (smoothing) integral operators used in the representation of scattered fields in terms of material properties, and scattered fields are obtained at a finite set of points through noisy measurements; and (ii) it is nonlinear simply due the fact that scattered fields are nonlinear functions of the material properties. The work described in this thesis tackles the ill-posedness of the electromagnetic imaging problem using sparsity-based regularization techniques, which assume that the scatterer(s) occupy only a small fraction of the investigation domain. More specifically, four novel imaging methods are formulated and implemented. (i) Sparsity-regularized Born iterative method iteratively linearizes the nonlinear inverse scattering problem and each linear problem is regularized using an improved iterative shrinkage algorithm enforcing the sparsity constraint. (ii) Sparsity-regularized nonlinear inexact Newton method calls for the solution of a linear system involving the Frechet derivative matrix of the forward scattering operator at every iteration step. For faster convergence, the solution of this matrix system is regularized under the sparsity constraint and preconditioned by leveling the matrix singular values. (iii) Sparsity-regularized nonlinear Tikhonov method directly solves the nonlinear minimization problem using Landweber iterations, where a thresholding function is applied at every iteration step to enforce the sparsity constraint. (iv) This last scheme is accelerated using a projected steepest descent method when it is applied to three-dimensional investigation domains. Projection replaces the thresholding operation and enforces the sparsity constraint. Numerical experiments, which are carried out using

  11. Three-level schemes of the alternating triangular method

    Science.gov (United States)

    Vabishchevich, P. N.

    2014-06-01

    In this paper, the schemes of the alternating triangular method are set out in the class of splitting methods used for the approximate solution of Cauchy problems for evolutionary problems. These schemes are based on splitting the problem operator into two operators that are conjugate transposes of each other. Economical schemes for the numerical solution of boundary value problems for parabolic equations are designed on the basis of an explicit-implicit splitting of the problem operator. The alternating triangular method is also of interest for the construction of numerical algorithms that solve boundary value problems for systems of partial differential equations and vector systems. The conventional schemes of the alternating triangular method used for first-order evolutionary equations are two-level ones. The approximation properties of such splitting methods can be improved by transiting to three-level schemes. Their construction is based on a general principle for improving the properties of difference schemes, namely, on the regularization principle of A.A. Samarskii. The analysis conducted in this paper is based on the general stability (or correctness) theory of operator-difference schemes.

  12. Design of an extensive information representation scheme for clinical narratives.

    Science.gov (United States)

    Deléger, Louise; Campillos, Leonardo; Ligozat, Anne-Laure; Névéol, Aurélie

    2017-09-11

    Knowledge representation frameworks are essential to the understanding of complex biomedical processes, and to the analysis of biomedical texts that describe them. Combined with natural language processing (NLP), they have the potential to contribute to retrospective studies by unlocking important phenotyping information contained in the narrative content of electronic health records (EHRs). This work aims to develop an extensive information representation scheme for clinical information contained in EHR narratives, and to support secondary use of EHR narrative data to answer clinical questions. We review recent work that proposed information representation schemes and applied them to the analysis of clinical narratives. We then propose a unifying scheme that supports the extraction of information to address a large variety of clinical questions. We devised a new information representation scheme for clinical narratives that comprises 13 entities, 11 attributes and 37 relations. The associated annotation guidelines can be used to consistently apply the scheme to clinical narratives and are https://cabernet.limsi.fr/annotation_guide_for_the_merlot_french_clinical_corpus-Sept2016.pdf . The information scheme includes many elements of the major schemes described in the clinical natural language processing literature, as well as a uniquely detailed set of relations.

  13. Building Secure Public Key Encryption Scheme from Hidden Field Equations

    Directory of Open Access Journals (Sweden)

    Yuan Ping

    2017-01-01

    Full Text Available Multivariate public key cryptography is a set of cryptographic schemes built from the NP-hardness of solving quadratic equations over finite fields, amongst which the hidden field equations (HFE family of schemes remain the most famous. However, the original HFE scheme was insecure, and the follow-up modifications were shown to be still vulnerable to attacks. In this paper, we propose a new variant of the HFE scheme by considering the special equation x2=x defined over the finite field F3 when x=0,1. We observe that the equation can be used to further destroy the special structure of the underlying central map of the HFE scheme. It is shown that the proposed public key encryption scheme is secure against known attacks including the MinRank attack, the algebraic attacks, and the linearization equations attacks. The proposal gains some advantages over the original HFE scheme with respect to the encryption speed and public key size.

  14. How Governance Regimes Shape the Implementation of Water Reuse Schemes

    Directory of Open Access Journals (Sweden)

    Jos Frijns

    2016-12-01

    Full Text Available The governance dimensions of water reuse scheme development and operation, such as policies and regulatory frameworks, and public involvement and stakeholder collaboration, can serve to both facilitate and constrain wider adoption of water reuse practices. This paper explores the significance and underlying structure of the key governance challenges facing the water reuse sector in Europe. It presents empirical evidence from interviews and focus group sessions conducted at four water reuse schemes: an indirect potable reuse scheme at Torreele (Belgium, the urban reuse of treated municipal wastewater at the London Olympic Park (United Kingdom and at Sabadell (Spain, and the reuse of agro-industrial effluent for irrigation at Capitanata (Italy. The findings underscore the importance of clarity in policy arrangements around water reuse, as well as of the financial competitiveness of reuse projects compared to alternative water supply options. Operators of water reuse schemes expressed a preference for water quality standards, which focus on appropriateness for use rather than over-emphasise the waters’ origin so that unnecessary treatment and costs can be avoided. Positive public support was widely acknowledged as an important factor in the success or failure of water reuse schemes. We conclude that constructive institutional relationships underpin many of the challenges faced by reuse scheme operators and that greater emphasis should be given to building confidence and gaining trust in water service providers through early identification of how governance regimes shape the viability of new schemes.

  15. Comparative evaluation of remote maintenance schemes for fusion DEMO reactor

    Energy Technology Data Exchange (ETDEWEB)

    Utoh, Hiroyasu, E-mail: uto.hiroyasu@jaea.go.jp; Tobita, Kenji; Someya, Youji; Asakura, Nobuyuki; Sakamoto, Yoshiteru; Hoshino, Kazuo; Nakamura, Makoto

    2015-10-15

    Highlights: • Various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. • The banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme. • The key engineering issues are in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability. - Abstract: Maintenance schemes are one of the critical issues in DEMO design, significantly affecting the configuration of in-vessel components, the size of toroidal field (TF) coil, the arrangement of poloidal field (PF) coils, reactor building, hot cell and so forth. Therefore, the maintenance schemes should satisfy many design requirements and criteria to assure reliable and safe plant operation and to attain reasonable plant availability. The plant availability depends on reliability of remote maintenance scheme, inspection of pipe connection and plasma operation. In this paper, various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. From the view points of the reliability of inspection on hot cell, TF coil size, stored energy of PF coil and portability of segment, the banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme, and it has key engineering issues such as in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability.

  16. Evaluation of classical spatial-analysis schemes of extreme rainfall

    Directory of Open Access Journals (Sweden)

    D. Ceresetti

    2012-11-01

    Full Text Available Extreme rainfall is classically estimated using raingauge data at raingauge locations. An important related issue is to assess return levels of extreme rainfall at ungauged sites. Classical methods consist in interpolating extreme-value models. In this paper, such methods are referred to as regionalization schemes. Our goal is to evaluate three classical regionalization schemes. Each scheme consists of an extreme-value model (block maxima, peaks over threshold taken from extreme-value theory plus a method to interpolate the parameters of the statistical model throughout the Cévennes-Vivarais region. From the interpolated parameters, the 100-yr quantile level can be estimated over this whole region. A reference regionalization scheme is made of the couple block maxima/kriging, where kriging is an optimal interpolation method. The two other schemes differ from the reference by replacing either the extreme-value model block maxima by peaks over threshold or kriging by a neural network interpolation procedure. Hyper-parameters are selected by cross-validation and the three regionalization schemes are compared by double cross-validation. Our evaluation criteria are based on the ability to interpolate the 100-yr return level both in terms of precision and spatial distribution. It turns out that the best results are obtained by the regionalization scheme combining the peaks-over-threshold method with kriging.

  17. Verifiable Rational Secret Sharing Scheme in Mobile Networks

    Directory of Open Access Journals (Sweden)

    En Zhang

    2015-01-01

    Full Text Available With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants’ share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.

  18. Differences exist across insurance schemes in China post-consolidation.

    Science.gov (United States)

    Li, Yang; Zhao, Yinjun; Yi, Danhui; Wang, Xiaojun; Jiang, Yan; Wang, Yu; Liu, Xinchun; Ma, Shuangge

    2017-01-01

    In China, the basic insurance system consists of three schemes: the UEBMI (Urban Employee Basic Medical Insurance), URBMI (Urban Resident Basic Medical Insurance), and NCMS (New Cooperative Medical Scheme), across which significant differences have been observed. Since 2009, the central government has been experimenting with consolidating these schemes in selected areas. This study examines whether differences still exist across schemes after the consolidation. A survey was conducted in the city of Suzhou, collecting data on subjects 45 years old and above with at least one inpatient or outpatient treatment during a period of twelve months. Analysis on 583 subjects was performed comparing subjects' characteristics across insurance schemes. A resampling-based method was applied to compute the predicted gross medical cost, OOP (out-of-pocket) cost, and insurance reimbursement rate. Subjects under different insurance schemes differ in multiple aspects. For inpatient treatments, subjects under the URBMI have the highest observed and predicted gross and OOP costs, while those under the UEBMI have the lowest. For outpatient treatments, subjects under the UEBMI and URBMI have comparable costs, while those under the NCMS have much lower costs. Subjects under the NCMS also have a much lower reimbursement rate. Differences still exist across schemes in medical costs and insurance reimbursement rate post-consolidation. Further investigations are needed to identify the causes, and interventions are needed to eliminate such differences.

  19. Energy Efficient Data Gathering Schemes in Wireless Sensor Networks Using Ant Colony Optimization

    Directory of Open Access Journals (Sweden)

    Mrinal K.Naskar

    2009-01-01

    Full Text Available Wireless sensor nodes are highly energy constrainedand hence formulating energy-efficient protocols in order toenhance network lifetime and performance are of utmostimportance in wireless sensor networks. A few solutions exist tothe problem, LEACH and PEGASIS protocols being the mostelegant ones. Both schemes try to achieve a solution byminimizing the overall energy dissipation by the nodes in thenetwork. While randomizing cluster heads for achieving equalenergy dissipation has been done in the LEACH protocol, thePEGASIS protocol forms a chain of all the nodes in thenetwork, each node taking rounds in transmitting to the basestation. In this paper we propose energy efficient protocolswhich enhance the performance of LEACH, PEGASIS. Theindividual nodes being deployed randomly in the play field thebase station is located at variable distances from them. Hence itis clear that the nodes would actually dissipate a differentamount of energy during their turn of transmission to the basestation. The inter-nodal distance also being variable it too playsa role in unequal energy dissipation of the nodes. This energydifference between the various nodes keeps on increasingresulting in poorer network performance. In our schemes we tryto nullify the differences occurring due to these abovementioned causes and thus increase the network performanceby balancing the energy dissipation by the nodes. We alsoemploy the Ant Colony Optimization algorithm (ACO for chainconstruction instead of the greedy algorithm to enhance thenetwork performance. Extensive simulations have been carriedout which show significant improvement over PEGASIS whichin turn implies substantial increment over LEACH.

  20. Dynamic Retransmission Limit Scheme in MAC Layer for Routing in Multihop Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    Rachid El-Azouzi

    2008-05-01

    Full Text Available We consider a wireless ad hoc network with random access channel. We present a model that takes into account topology, routing, random access in MAC layer, and forwarding probability. In this paper, we focus on drawing benefit from the interaction of the MAC (governed by IEEE 802.11 or slotted Aloha and routing by defining a new cross-layer scheme for routing based on the limit number of retransmission. By adjusting dynamically and judiciously this parameter in a saturated network, we have realized that both stability of forwarding queues and average throughput are significantly improved in linear networks with symmetric traffic: a gain of 100% can be reached. While in asymmetric topology network with asymmetric traffic, we achieve a better average delay (resp., throughput for each connection without changing the average throughput (resp., delay. In addition, we show the efficiency of our new scheme in case of multimedia applications with delay constraint. A detailed performance study is presented using analytical and simulation evaluation.