WorldWideScience

Sample records for random-number expansion protocol

  1. Quantum random number generators

    Science.gov (United States)

    Herrero-Collantes, Miguel; Garcia-Escartin, Juan Carlos

    2017-01-01

    Random numbers are a fundamental resource in science and engineering with important applications in simulation and cryptography. The inherent randomness at the core of quantum mechanics makes quantum systems a perfect source of entropy. Quantum random number generation is one of the most mature quantum technologies with many alternative generation methods. This review discusses the different technologies in quantum random number generation from the early devices based on radioactive decay to the multiple ways to use the quantum states of light to gather entropy from a quantum origin. Randomness extraction and amplification and the notable possibility of generating trusted random numbers even with untrusted hardware using device-independent generation protocols are also discussed.

  2. Drawing a random number

    DEFF Research Database (Denmark)

    Wanscher, Jørgen Bundgaard; Sørensen, Majken Vildrik

    2006-01-01

    highly uniform multidimensional draws, which are highly relevant for todays traffic models. This paper shows among others combined shuffling and scrambling seems needless, that scrambling gives the lowest correlation and that there are detectable differences between random numbers, dependent...

  3. Random Numbers and Quantum Computers

    Science.gov (United States)

    McCartney, Mark; Glass, David

    2002-01-01

    The topic of random numbers is investigated in such a way as to illustrate links between mathematics, physics and computer science. First, the generation of random numbers by a classical computer using the linear congruential generator and logistic map is considered. It is noted that these procedures yield only pseudo-random numbers since…

  4. Thermodynamics of random number generation

    Science.gov (United States)

    Aghamohammadi, Cina; Crutchfield, James P.

    2017-06-01

    We analyze the thermodynamic costs of the three main approaches to generating random numbers via the recently introduced Information Processing Second Law. Given access to a specified source of randomness, a random number generator (RNG) produces samples from a desired target probability distribution. This differs from pseudorandom number generators (PRNGs) that use wholly deterministic algorithms and from true random number generators (TRNGs) in which the randomness source is a physical system. For each class, we analyze the thermodynamics of generators based on algorithms implemented as finite-state machines, as these allow for direct bounds on the required physical resources. This establishes bounds on heat dissipation and work consumption during the operation of three main classes of RNG algorithms—including those of von Neumann, Knuth, and Yao and Roche and Hoshi—and for PRNG methods. We introduce a general TRNG and determine its thermodynamic costs exactly for arbitrary target distributions. The results highlight the significant differences between the three main approaches to random number generation: One is work producing, one is work consuming, and the other is potentially dissipation neutral. Notably, TRNGs can both generate random numbers and convert thermal energy to stored work. These thermodynamic costs on information creation complement Landauer's limit on the irreducible costs of information destruction.

  5. Random Numbers from Astronomical Imaging

    OpenAIRE

    Pimbblet, Kevin A.; Bulmer, Michael

    2004-01-01

    This article describes a method to turn astronomical imaging into a random number generator by using the positions of incident cosmic rays and hot pixels to generate bit streams. We subject the resultant bit streams to a battery of standard benchmark statistical tests for randomness and show that these bit streams are statistically the same as a perfect random bit stream. Strategies for improving and building upon this method are outlined.

  6. New Design of Crypto-Based Pseudo random number generator (CBPRNG) using BLOW FISH cipher

    OpenAIRE

    T.Chalama Reddy; Dr.R.Seshadri

    2013-01-01

    Random Number Generators (RNGs) are an important building block for algorithms and protocols in cryptography. Random number generation is used in a wide variety of cryptographic operations, such as key generation and challenge/response protocols. A random number generator outputs a sequence of 0s and 1s such that at any position, the next bit cannot be expected on the previous bits. However, true random number produces non- deterministic output since if the same random generator is run twice,...

  7. Quantum Random Number Generation on a Mobile Phone

    Directory of Open Access Journals (Sweden)

    Bruno Sanguinetti

    2014-09-01

    Full Text Available Quantum random number generators (QRNGs can significantly improve the security of cryptographic protocols by ensuring that generated keys cannot be predicted. However, the cost, size, and power requirements of current Quantum random number generators have prevented them from becoming widespread. In the meantime, the quality of the cameras integrated in mobile telephones has improved significantly so that now they are sensitive to light at the few-photon level. We demonstrate how these can be used to generate random numbers of a quantum origin.

  8. Self-correcting random number generator

    Energy Technology Data Exchange (ETDEWEB)

    Humble, Travis S.; Pooser, Raphael C.

    2016-09-06

    A system and method for generating random numbers. The system may include a random number generator (RNG), such as a quantum random number generator (QRNG) configured to self-correct or adapt in order to substantially achieve randomness from the output of the RNG. By adapting, the RNG may generate a random number that may be considered random regardless of whether the random number itself is tested as such. As an example, the RNG may include components to monitor one or more characteristics of the RNG during operation, and may use the monitored characteristics as a basis for adapting, or self-correcting, to provide a random number according to one or more performance criteria.

  9. Analysis of android random number generator

    OpenAIRE

    Sarıtaş, Serkan

    2013-01-01

    Ankara : The Department of Computer Engineering and the Graduate School of Engineering and Science of Bilkent University, 2013. Thesis (Master's) -- Bilkent University, 2013. Includes bibliographical references leaves 61-65. Randomness is a crucial resource for cryptography, and random number generators are critical building blocks of almost all cryptographic systems. Therefore, random number generation is one of the key parts of secure communication. Random number generatio...

  10. Random numbers spring from alpha decay

    Energy Technology Data Exchange (ETDEWEB)

    Frigerio, N.A.; Sanathanan, L.P.; Morley, M.; Clark, N.A.; Tyler, S.A.

    1980-05-01

    Congruential random number generators, which are widely used in Monte Carlo simulations, are deficient in that the number they generate are concentrated in a relatively small number of hyperplanes. While this deficiency may not be a limitation in small Monte Carlo studies involving a few variables, it introduces a significant bias in large simulations requiring high resolution. This bias was recognized and assessed during preparations for an accident analysis study of nuclear power plants. This report describes a random number device based on the radioactive decay of alpha particles from a /sup 235/U source in a high-resolution gas proportional counter. The signals were fed to a 4096-channel analyzer and for each channel the frequency of signals registered in a 20,000-microsecond interval was recorded. The parity bits of these frequency counts (0 for an even count and 1 for an odd count) were then assembled in sequence to form 31-bit binary random numbers and transcribed to a magnetic tape. This cycle was repeated as many times as were necessary to create 3 million random numbers. The frequency distribution of counts from the present device conforms to the Brockwell-Moyal distribution, which takes into account the dead time of the counter (both the dead time and decay constant of the underlying Poisson process were estimated). Analysis of the count data and tests of randomness on a sample set of the 31-bit binary numbers indicate that this random number device is a highly reliable source of truly random numbers. Its use is, therefore, recommended in Monte Carlo simulations for which the congruential pseudorandom number generators are found to be inadequate. 6 figures, 5 tables.

  11. Random numbers certified by Bell's theorem.

    Science.gov (United States)

    Pironio, S; Acín, A; Massar, S; de la Giroday, A Boyer; Matsukevich, D N; Maunz, P; Olmschenk, S; Hayes, D; Luo, L; Manning, T A; Monroe, C

    2010-04-15

    Randomness is a fundamental feature of nature and a valuable resource for applications ranging from cryptography and gambling to numerical simulation of physical and biological systems. Random numbers, however, are difficult to characterize mathematically, and their generation must rely on an unpredictable physical process. Inaccuracies in the theoretical modelling of such processes or failures of the devices, possibly due to adversarial attacks, limit the reliability of random number generators in ways that are difficult to control and detect. Here, inspired by earlier work on non-locality-based and device-independent quantum information processing, we show that the non-local correlations of entangled quantum particles can be used to certify the presence of genuine randomness. It is thereby possible to design a cryptographically secure random number generator that does not require any assumption about the internal working of the device. Such a strong form of randomness generation is impossible classically and possible in quantum systems only if certified by a Bell inequality violation. We carry out a proof-of-concept demonstration of this proposal in a system of two entangled atoms separated by approximately one metre. The observed Bell inequality violation, featuring near perfect detection efficiency, guarantees that 42 new random numbers are generated with 99 per cent confidence. Our results lay the groundwork for future device-independent quantum information experiments and for addressing fundamental issues raised by the intrinsic randomness of quantum theory.

  12. Source-Device-Independent Ultrafast Quantum Random Number Generation

    Science.gov (United States)

    Marangon, Davide G.; Vallone, Giuseppe; Villoresi, Paolo

    2017-02-01

    Secure random numbers are a fundamental element of many applications in science, statistics, cryptography and more in general in security protocols. We present a method that enables the generation of high-speed unpredictable random numbers from the quadratures of an electromagnetic field without any assumption on the input state. The method allows us to eliminate the numbers that can be predicted due to the presence of classical and quantum side information. In particular, we introduce a procedure to estimate a bound on the conditional min-entropy based on the entropic uncertainty principle for position and momentum observables of infinite dimensional quantum systems. By the above method, we experimentally demonstrated the generation of secure true random bits at a rate greater than 1.7 Gbit /s .

  13. Random Number Generators in Secure Disk Drives

    Directory of Open Access Journals (Sweden)

    Hars Laszlo

    2009-01-01

    Full Text Available Abstract Cryptographic random number generators seeded by physical entropy sources are employed in many embedded security systems, including self-encrypting disk drives, being manufactured by the millions every year. Random numbers are used for generating encryption keys and for facilitating secure communication, and they are also provided to users for their applications. We discuss common randomness requirements, techniques for estimating the entropy of physical sources, investigate specific nonrandom physical properties, estimate the autocorrelation, then mix reduce the data until all common randomness tests pass. This method is applied to a randomness source in disk drives: the always changing coefficients of an adaptive filter for the read channel equalization. These coefficients, affected by many kinds of physical noise, are used in the reseeding process of a cryptographic pseudorandom number generator in a family of self encrypting disk drives currently in the market.

  14. A Hybrid Random Number Generator(HRNG

    Directory of Open Access Journals (Sweden)

    Osvaldo Skliar

    2011-07-01

    Full Text Available The purpose of this paper is to present a novel Hybrid Random Number Generator (HRNG. Here “hybrid” refers to the fact that to construct this generator it is necessary to use 1physical components – texts – and a physical process, and 2 a mathematical procedure. This HRNG makes it possible to generate genuine random numbers which may be used both for computer simulation of probabilistic systems and in the field of cryptography. The results of a comparative study of the binary strings generated by this HRNG and of those generated by two highly used implementations of a congruential algorithm designed to generate pseudorandom numbers are given here. One of the latter is the implementation incorporated into the Java 2 platform (version 1.6, and the other is the implementation incorporated into the runtime library of Microsoft’s Visual C++ 2008 compiler.

  15. Astronomical random numbers for quantum foundations experiments

    OpenAIRE

    Leung, Calvin; Brown, Amy; Nguyen, Hien; Friedman, Andrew S.; Kaiser, David I.; Gallicchio, Jason

    2017-01-01

    Photons from distant astronomical sources can be used as a classical source of randomness to improve fundamental tests of quantum nonlocality, wave-particle duality, and local realism through Bell's inequality and delayed-choice quantum eraser tests inspired by Wheeler's cosmic-scale Mach-Zehnder interferometer gedankenexperiment. Such sources of random numbers may also be useful for information-theoretic applications such as key distribution for quantum cryptography. Building on the design o...

  16. Stability comparison of two different dentoalveolar expansion treatment protocols

    Directory of Open Access Journals (Sweden)

    Ezgi Atik

    Full Text Available ABSTRACT Objective: The aim of this study was to compare the longitudinal stability of the conventional straight-wire system after the use of a quad-helix appliance with Damon self-ligating system in patients with Class I malocclusion. Methods: 27 adolescent patients were evaluated at three different periods: pre-treatment (T1, post-treatment (T2 and three years post-treatment (T3. Group 1 included 12 patients (with a mean age of 14.65 year treated with Damon 3MX bracket system; and Group 2 included 15 patients (with a mean age of 14.8 year who underwent orthodontic treatment with Roth prescribed brackets after expansion with Quad-Helix appliance. Relapse was evaluated with dental cast examination and cephalometric radiograph tracings. Statistical analysis was performed with IBM-SPSS for Windows software, version 21 (SPSS Inc., Chicago, IL. A p-value smaller than 0.05 was considered statistically significant. Results: There were significant increases in all transverse dental and postero-anterior measurements (except for UL6-ML mm in Group 1 with active treatment. There was some significant relapse in the long-term in inter-canine width in both groups and in the inter-first premolar width in Group 2 (p< 0.05. Significant decrease in all frontal measurements from T2 to T3 was seen for both groups. Upper and lower incisors significantly proclined in T1-T2 (p<0.05, however no relapse was found for both groups. When two systems were compared, there was no significant difference for the long-term follow-up period. Conclusion: Conventional (quad-helix appliance with conventional brackets and Damon systems were found similar with regard to the long-term incisor positions and transverse dimension changes of maxillary arch.

  17. Source-Independent Quantum Random Number Generation

    Science.gov (United States)

    Cao, Zhu; Zhou, Hongyi; Yuan, Xiao; Ma, Xiongfeng

    2016-01-01

    Quantum random number generators can provide genuine randomness by appealing to the fundamental principles of quantum mechanics. In general, a physical generator contains two parts—a randomness source and its readout. The source is essential to the quality of the resulting random numbers; hence, it needs to be carefully calibrated and modeled to achieve information-theoretical provable randomness. However, in practice, the source is a complicated physical system, such as a light source or an atomic ensemble, and any deviations in the real-life implementation from the theoretical model may affect the randomness of the output. To close this gap, we propose a source-independent scheme for quantum random number generation in which output randomness can be certified, even when the source is uncharacterized and untrusted. In our randomness analysis, we make no assumptions about the dimension of the source. For instance, multiphoton emissions are allowed in optical implementations. Our analysis takes into account the finite-key effect with the composable security definition. In the limit of large data size, the length of the input random seed is exponentially small compared to that of the output random bit. In addition, by modifying a quantum key distribution system, we experimentally demonstrate our scheme and achieve a randomness generation rate of over 5 ×103 bit /s .

  18. Generation of Random Numbers and Parallel Random Number Streams for Monte Carlo Simulations

    Directory of Open Access Journals (Sweden)

    L. Yu. Barash

    2012-01-01

    Full Text Available Modern methods and libraries for high quality pseudorandom number generation and for generation of parallel random number streams for Monte Carlo simulations are considered. The probability equidistribution property and the parameters when the property holds at dimensions up to logarithm of mesh size are considered for Multiple Recursive Generators.

  19. Random Numbers Generated from Audio and Video Sources

    Directory of Open Access Journals (Sweden)

    I-Te Chen

    2013-01-01

    Full Text Available Random numbers are very useful in simulation, chaos theory, game theory, information theory, pattern recognition, probability theory, quantum mechanics, statistics, and statistical mechanics. The random numbers are especially helpful in cryptography. In this work, the proposed random number generators come from white noise of audio and video (A/V sources which are extracted from high-resolution IPCAM, WEBCAM, and MPEG-1 video files. The proposed generator applied on video sources from IPCAM and WEBCAM with microphone would be the true random number generator and the pseudorandom number generator when applied on video sources from MPEG-1 video file. In addition, when applying NIST SP 800-22 Rev.1a 15 statistics tests on the random numbers generated from the proposed generator, around 98% random numbers can pass 15 statistical tests. Furthermore, the audio and video sources can be found easily; hence, the proposed generator is a qualified, convenient, and efficient random number generator.

  20. Solution-Processed Carbon Nanotube True Random Number Generator.

    Science.gov (United States)

    Gaviria Rojas, William A; McMorrow, Julian J; Geier, Michael L; Tang, Qianying; Kim, Chris H; Marks, Tobin J; Hersam, Mark C

    2017-08-09

    With the growing adoption of interconnected electronic devices in consumer and industrial applications, there is an increasing demand for robust security protocols when transmitting and receiving sensitive data. Toward this end, hardware true random number generators (TRNGs), commonly used to create encryption keys, offer significant advantages over software pseudorandom number generators. However, the vast network of devices and sensors envisioned for the "Internet of Things" will require small, low-cost, and mechanically flexible TRNGs with low computational complexity. These rigorous constraints position solution-processed semiconducting single-walled carbon nanotubes (SWCNTs) as leading candidates for next-generation security devices. Here, we demonstrate the first TRNG using static random access memory (SRAM) cells based on solution-processed SWCNTs that digitize thermal noise to generate random bits. This bit generation strategy can be readily implemented in hardware with minimal transistor and computational overhead, resulting in an output stream that passes standardized statistical tests for randomness. By using solution-processed semiconducting SWCNTs in a low-power, complementary architecture to achieve TRNG, we demonstrate a promising approach for improving the security of printable and flexible electronics.

  1. Unbiased All-Optical Random-Number Generator

    OpenAIRE

    Tobias Steinle; Greiner, Johannes N.; Jörg Wrachtrup; Harald Giessen; Ilja Gerhardt

    2017-01-01

    The generation of random bits is of enormous importance in modern information science. Cryptographic security is based on random numbers which require a physical process for their generation. This is commonly performed by hardware random number generators. These exhibit often a number of problems, namely experimental bias, memory in the system, and other technical subtleties, which reduce the reliability in the entropy estimation. Further, the generated outcome has to be post-processed to "ir...

  2. Random Number Generation for Petascale Quantum Monte Carlo

    Energy Technology Data Exchange (ETDEWEB)

    Ashok Srinivasan

    2010-03-16

    The quality of random number generators can affect the results of Monte Carlo computations, especially when a large number of random numbers are consumed. Furthermore, correlations present between different random number streams in a parallel computation can further affect the results. The SPRNG software, which the author had developed earlier, has pseudo-random number generators (PRNGs) capable of producing large numbers of streams with large periods. However, they had been empirically tested on only thousand streams earlier. In the work summarized here, we tested the SPRNG generators with over a hundred thousand streams, involving over 10^14 random numbers per test, on some tests. We also tested the popular Mersenne Twister. We believe that these are the largest tests of PRNGs, both in terms of the numbers of streams tested and the number of random numbers tested. We observed defects in some of these generators, including the Mersenne Twister, while a few generators appeared to perform well. We also corrected an error in the implementation of one of the SPRNG generators.

  3. Recoverable Random Numbers in an Internet of Things Operating System

    Directory of Open Access Journals (Sweden)

    Taeill Yoo

    2017-03-01

    Full Text Available Over the past decade, several security issues with Linux Random Number Generator (LRNG on PCs and Androids have emerged. The main problem involves the process of entropy harvesting, particularly at boot time. An entropy source in the input pool of LRNG is not transferred into the non-blocking output pool if the entropy counter of the input pool is less than 192 bits out of 4098 bits. Because the entropy estimation of LRNG is highly conservative, the process may require more than one minute for starting the transfer. Furthermore, the design principle of the estimation algorithm is not only heuristic but also unclear. Recently, Google released an Internet of Things (IoT operating system called Brillo based on the Linux kernel. We analyze the behavior of the random number generator in Brillo, which inherits that of LRNG. In the results, we identify two features that enable recovery of random numbers. With these features, we demonstrate that random numbers of 700 bytes at boot time can be recovered with the success probability of 90% by using time complexity for 5.20 × 2 40 trials. Therefore, the entropy of random numbers of 700 bytes is merely about 43 bits. Since the initial random numbers are supposed to be used for sensitive security parameters, such as stack canary and key derivation, our observation can be applied to practical attacks against cryptosystem.

  4. Clinical grade purification and expansion of NK cell products for an optimized manufacturing protocol

    Directory of Open Access Journals (Sweden)

    Ulrike eKoehl

    2013-05-01

    Full Text Available Allogeneic Natural Killer (NK cells are used for adoptive immunotherapy after stem cell transplantation. In order to overcome technical limitations in NK cell purification and activation, the following study investigates the impact of different variables on NK cell recovery, cytotoxicity and T cell depletion during GMP-grade NK cell selection. 40 NK cell products were derived from 54 unstimulated donor leukaphereses using immunomagnetic CD3 T-cell depletion, followed by a CD56 cell enrichment step. For T cell depletion, either the depletion 2.1 program in single or double procedure (D2.1 1depl, n=18; D2.1 2depl, n=13 or the faster depletion 3.1 (D3.1, n=9 was used on the CliniMACS instrument. 17 purified NK cell products were activated in vitro by IL-2 for 12 days. The whole process resulted in a median number of 7.59x10e8 CD56+CD3- cells with both purity and viability of 94%, respectively. The T-cell depletion was significantly better using D2.1 1depl/2depl compared to D3.1 (log 4.6/log 4.9 vs. log 3.7; p<0.01 and double procedure in two stages led always to residual T cells below 0.1%. In contrast D3.1 was superior to D2.1 1depl/2depl with regard to recovery of CD56+CD3- NK cells (68% vs 41%/38%. Concomitant monocytes and especially IL-2 activation led to increased NK cell activity against malignant target cells compared to unstimulated NK cells, which correlated with both up-regulation of natural cytotoxicity receptors and intracellular signaling. Overall, wide variations in the NK cell expansion rate and the distribution of NK cell subpopulations were found. In conclusion, our results indicate that GMP-grade purification of NK cells might be improved by a sequential processing of T cell depletion program D2.1 and D3.1. In addition NK cell expansion protocols need to be further optimized.

  5. Humans cannot consciously generate random numbers sequences: Polemic study.

    Science.gov (United States)

    Figurska, Małgorzata; Stańczyk, Maciej; Kulesza, Kamil

    2008-01-01

    It is widely believed, that randomness exists in Nature. In fact such an assumption underlies many scientific theories and is embedded in the foundations of quantum mechanics. Assuming that this hypothesis is valid one can use natural phenomena, like radioactive decay, to generate random numbers. Today, computers are capable of generating the so-called pseudorandom numbers. Such series of numbers are only seemingly random (bias in the randomness quality can be observed). Question whether people can produce random numbers, has been investigated by many scientists in the recent years. The paper "Humans can consciously generate random numbers sequences..." published recently in Medical Hypotheses made claims that were in many ways contrary to state of art; it also stated far-reaching hypotheses. So, we decided to repeat the experiments reported, with special care being taken of proper laboratory procedures. Here, we present the results and discuss possible implications in computer and other sciences.

  6. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  7. GASPRNG: GPU accelerated scalable parallel random number generator library

    Science.gov (United States)

    Gao, Shuang; Peterson, Gregory D.

    2013-04-01

    Graphics processors represent a promising technology for accelerating computational science applications. Many computational science applications require fast and scalable random number generation with good statistical properties, so they use the Scalable Parallel Random Number Generators library (SPRNG). We present the GPU Accelerated SPRNG library (GASPRNG) to accelerate SPRNG in GPU-based high performance computing systems. GASPRNG includes code for a host CPU and CUDA code for execution on NVIDIA graphics processing units (GPUs) along with a programming interface to support various usage models for pseudorandom numbers and computational science applications executing on the CPU, GPU, or both. This paper describes the implementation approach used to produce high performance and also describes how to use the programming interface. The programming interface allows a user to be able to use GASPRNG the same way as SPRNG on traditional serial or parallel computers as well as to develop tightly coupled programs executing primarily on the GPU. We also describe how to install GASPRNG and use it. To help illustrate linking with GASPRNG, various demonstration codes are included for the different usage models. GASPRNG on a single GPU shows up to 280x speedup over SPRNG on a single CPU core and is able to scale for larger systems in the same manner as SPRNG. Because GASPRNG generates identical streams of pseudorandom numbers as SPRNG, users can be confident about the quality of GASPRNG for scalable computational science applications. Catalogue identifier: AEOI_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEOI_v1_0.html Program obtainable from: CPC Program Library, Queen’s University, Belfast, N. Ireland Licensing provisions: UTK license. No. of lines in distributed program, including test data, etc.: 167900 No. of bytes in distributed program, including test data, etc.: 1422058 Distribution format: tar.gz Programming language: C and CUDA. Computer: Any PC or

  8. The Evolution of Random Number Generation in MUVES

    Science.gov (United States)

    2017-01-01

    3 2. Collins JC . Testing, selection, and implementation of random number genera- tors. Aberdeen Proving Ground (MD): Army Research Laboratory (US...261–269. 13, 16 5. L‘Ecuyer P. Tables of linear congruential generators of different sizes and good lattice structure. Mathematics of Computation

  9. Chaos-based Pseudo-random Number Generation

    KAUST Repository

    Barakat, Mohamed L.

    2014-04-10

    Various methods and systems related to chaos-based pseudo-random number generation are presented. In one example, among others, a system includes a pseudo-random number generator (PRNG) to generate a series of digital outputs and a nonlinear post processing circuit to perform an exclusive OR (XOR) operation on a first portion of a current digital output of the PRNG and a permutated version of a corresponding first portion of a previous post processed output to generate a corresponding first portion of a current post processed output. In another example, a method includes receiving at least a first portion of a current output from a PRNG and performing an XOR operation on the first portion of the current PRNG output with a permutated version of a corresponding first portion of a previous post processed output to generate a corresponding first portion of a current post processed output.

  10. A Quickly Tested Pascal Random Number Generator for Microcomputers.

    Science.gov (United States)

    1985-05-01

    in any way at equal intervals spaced h units apart, the serial correlation of the series can be obtained for various lags and tested against...pass handily. The unit range between zero and unity was divided into 100 equally spaced frequencies, and the generated random numbers were...NSDTEST; (*MEAN AND SDEV TESTS*) FREQKOLTEST; (*CHISQ FREQ DISTR AND KOLMOGOROFF -SMIRNOV TESTS*) PAIRTEST; (*TEST DISTR OF RANDOM PAIRS*) TRIOTEST; (*TEST

  11. Cellular Automata-Based Parallel Random Number Generators Using FPGAs

    Directory of Open Access Journals (Sweden)

    David H. K. Hoe

    2012-01-01

    Full Text Available Cellular computing represents a new paradigm for implementing high-speed massively parallel machines. Cellular automata (CA, which consist of an array of locally connected processing elements, are a basic form of a cellular-based architecture. The use of field programmable gate arrays (FPGAs for implementing CA accelerators has shown promising results. This paper investigates the design of CA-based pseudo-random number generators (PRNGs using an FPGA platform. To improve the quality of the random numbers that are generated, the basic CA structure is enhanced in two ways. First, the addition of a superrule to each CA cell is considered. The resulting self-programmable CA (SPCA uses the superrule to determine when to make a dynamic rule change in each CA cell. The superrule takes its inputs from neighboring cells and can be considered itself a second CA working in parallel with the main CA. When implemented on an FPGA, the use of lookup tables in each logic cell removes any restrictions on how the super-rules should be defined. Second, a hybrid configuration is formed by combining a CA with a linear feedback shift register (LFSR. This is advantageous for FPGA designs due to the compactness of the LFSR implementations. A standard software package for statistically evaluating the quality of random number sequences known as Diehard is used to validate the results. Both the SPCA and the hybrid CA/LFSR were found to pass all the Diehard tests.

  12. Ternary jitter-based true random number generator

    Science.gov (United States)

    Latypov, Rustam; Stolov, Evgeni

    2017-01-01

    In this paper a novel family of generators producing true uniform random numbers in ternary logic is presented. The generator consists of a number of identical ternary logic combinational units connected into a ring. All the units are provided to have a random delay time, and this time is supposed to be distributed in accordance with an exponential distribution. All delays are supposed to be independent events. The theory of the generator is based on Erlang equations. The generator can be used for test production in various systems. Features of multidimensional random vectors, produced by the generator, are discussed.

  13. Random number generation based on digital differential chaos

    KAUST Repository

    Zidan, Mohammed A.

    2012-07-29

    In this paper, we present a fully digital differential chaos based random number generator. The output of the digital circuit is proved to be chaotic by calculating the output time series maximum Lyapunov exponent. We introduce a new post processing technique to improve the distribution and statistical properties of the generated data. The post-processed output passes the NIST Sp. 800-22 statistical tests. The system is written in Verilog VHDL and realized on Xilinx Virtex® FPGA. The generator can fit into a very small area and have a maximum throughput of 2.1 Gb/s.

  14. Quantum Statistical Testing of a Quantum Random Number Generator

    Energy Technology Data Exchange (ETDEWEB)

    Humble, Travis S [ORNL

    2014-01-01

    The unobservable elements in a quantum technology, e.g., the quantum state, complicate system verification against promised behavior. Using model-based system engineering, we present methods for verifying the opera- tion of a prototypical quantum random number generator. We begin with the algorithmic design of the QRNG followed by the synthesis of its physical design requirements. We next discuss how quantum statistical testing can be used to verify device behavior as well as detect device bias. We conclude by highlighting how system design and verification methods must influence effort to certify future quantum technologies.

  15. Analysis of entropy extraction efficiencies in random number generation systems

    Science.gov (United States)

    Wang, Chao; Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; Han, Zheng-Fu

    2016-05-01

    Random numbers (RNs) have applications in many areas: lottery games, gambling, computer simulation, and, most importantly, cryptography [N. Gisin et al., Rev. Mod. Phys. 74 (2002) 145]. In cryptography theory, the theoretical security of the system calls for high quality RNs. Therefore, developing methods for producing unpredictable RNs with adequate speed is an attractive topic. Early on, despite the lack of theoretical support, pseudo RNs generated by algorithmic methods performed well and satisfied reasonable statistical requirements. However, as implemented, those pseudorandom sequences were completely determined by mathematical formulas and initial seeds, which cannot introduce extra entropy or information. In these cases, “random” bits are generated that are not at all random. Physical random number generators (RNGs), which, in contrast to algorithmic methods, are based on unpredictable physical random phenomena, have attracted considerable research interest. However, the way that we extract random bits from those physical entropy sources has a large influence on the efficiency and performance of the system. In this manuscript, we will review and discuss several randomness extraction schemes that are based on radiation or photon arrival times. We analyze the robustness, post-processing requirements and, in particular, the extraction efficiency of those methods to aid in the construction of efficient, compact and robust physical RNG systems.

  16. Unbiased All-Optical Random-Number Generator

    Science.gov (United States)

    Steinle, Tobias; Greiner, Johannes N.; Wrachtrup, Jörg; Giessen, Harald; Gerhardt, Ilja

    2017-10-01

    The generation of random bits is of enormous importance in modern information science. Cryptographic security is based on random numbers which require a physical process for their generation. This is commonly performed by hardware random-number generators. These often exhibit a number of problems, namely experimental bias, memory in the system, and other technical subtleties, which reduce the reliability in the entropy estimation. Further, the generated outcome has to be postprocessed to "iron out" such spurious effects. Here, we present a purely optical randomness generator, based on the bistable output of an optical parametric oscillator. Detector noise plays no role and postprocessing is reduced to a minimum. Upon entering the bistable regime, initially the resulting output phase depends on vacuum fluctuations. Later, the phase is rigidly locked and can be well determined versus a pulse train, which is derived from the pump laser. This delivers an ambiguity-free output, which is reliably detected and associated with a binary outcome. The resulting random bit stream resembles a perfect coin toss and passes all relevant randomness measures. The random nature of the generated binary outcome is furthermore confirmed by an analysis of resulting conditional entropies.

  17. Unbiased All-Optical Random-Number Generator

    Directory of Open Access Journals (Sweden)

    Tobias Steinle

    2017-11-01

    Full Text Available The generation of random bits is of enormous importance in modern information science. Cryptographic security is based on random numbers which require a physical process for their generation. This is commonly performed by hardware random-number generators. These often exhibit a number of problems, namely experimental bias, memory in the system, and other technical subtleties, which reduce the reliability in the entropy estimation. Further, the generated outcome has to be postprocessed to “iron out” such spurious effects. Here, we present a purely optical randomness generator, based on the bistable output of an optical parametric oscillator. Detector noise plays no role and postprocessing is reduced to a minimum. Upon entering the bistable regime, initially the resulting output phase depends on vacuum fluctuations. Later, the phase is rigidly locked and can be well determined versus a pulse train, which is derived from the pump laser. This delivers an ambiguity-free output, which is reliably detected and associated with a binary outcome. The resulting random bit stream resembles a perfect coin toss and passes all relevant randomness measures. The random nature of the generated binary outcome is furthermore confirmed by an analysis of resulting conditional entropies.

  18. Computer routines for probability distributions, random numbers, and related functions

    Science.gov (United States)

    Kirby, W.

    1983-01-01

    Use of previously coded and tested subroutines simplifies and speeds up program development and testing. This report presents routines that can be used to calculate various probability distributions and other functions of importance in statistical hydrology. The routines are designed as general-purpose Fortran subroutines and functions to be called from user-written main progress. The probability distributions provided include the beta, chi-square, gamma, Gaussian (normal), Pearson Type III (tables and approximation), and Weibull. Also provided are the distributions of the Grubbs-Beck outlier test, Kolmogorov 's and Smirnov 's D, Student 's t, noncentral t (approximate), and Snedecor F. Other mathematical functions include the Bessel function, I sub o, gamma and log-gamma functions, error functions, and exponential integral. Auxiliary services include sorting and printer-plotting. Random number generators for uniform and normal numbers are provided and may be used with some of the above routines to generate numbers from other distributions. (USGS)

  19. Generative Learning Objects Instantiated with Random Numbers Based Expressions

    Directory of Open Access Journals (Sweden)

    Ciprian Bogdan Chirila

    2015-12-01

    Full Text Available The development of interactive e-learning content requires special skills like programming techniques, web integration, graphic design etc. Generally, online educators do not possess such skills and their e-learning products tend to be static like presentation slides and textbooks. In this paper we propose a new interactive model of generative learning objects as a compromise betweenstatic, dull materials and dynamic, complex software e-learning materials developed by specialized teams. We find that random numbers based automatic initialization learning objects increases content diversity, interactivity thus enabling learners’ engagement. The resulted learning object model is at a limited level of complexity related to special e-learning software, intuitive and capable of increasing learners’ interactivity, engagement and motivation through dynamic content. The approach was applied successfully on several computer programing disciplines.

  20. Dentoskeletal effects of maxillary protraction in cleft patients with repetitive weekly protocol of alternate rapid maxillary expansions and constrictions.

    Science.gov (United States)

    da Luz Vieira, Gustavo; de Menezes, Luciane Macedo; de Lima, Eduardo Martinelli S; Rizzatto, Susana

    2009-07-01

    To evaluate the amount of maxillary protraction with face mask in complete unilateral cleft lip and palate patients submitted to two distinct rapid maxillary expansion (RME) protocols. The sample consisted of 20 individuals (nine boys and 11 girls; mean age of 10.4 +/- 2.62 years) with unilateral complete cleft lip and palate who had a constricted maxilla in the vertical and transverse dimensions. Ten patients underwent 1 week of RME with screw activation of one complete turn per day, followed by 23 weeks of maxillary protraction (group 1). The other 10 patients underwent 7 weeks of alternate rapid maxillary expansion and constriction, with one complete turn per day, followed by 17 weeks of maxillary protraction (group 2); both groups underwent a total of 6 months of treatment. Cephalometric measurements were taken at different times: pretreatment (T1), soon after RME (T2), and after 6 months of treatment (T3). Each measurement was analyzed with mixed models for repeated measures, and the covariance structure chosen was compound symmetry. The maxilla displaced slightly forward and downward with a counterclockwise rotation; the mandible rotated downward and backward, resulting in an increase in anterior facial height; the sagittal maxillomandibular relationship was improved; the maxillary molars and incisors were protruded and extruded; and the mandibular incisors were retroclined. There was no significant difference between the groups in evaluation time.

  1. Fully Digital Chaotic Oscillators Applied to Pseudo Random Number Generation

    KAUST Repository

    Mansingka, Abhinav S.

    2012-05-01

    adapted for pseudo random number generation by truncating statistically defective bits. Finally, a novel post-processing technique using the Fibonacci series is proposed and implemented with a non-autonomous driven hyperchaotic system to provide pseudo random number generators with high nonlinear complexity and controllable period length that enables full utilization of all branches of the chaotic output as statistically secure pseudo random output.

  2. Is alternate rapid maxillary expansion and constriction an effective protocol in the treatment of Class III malocclusion? A systematic review.

    Science.gov (United States)

    Pithon, Matheus Melo; Santos, Nathalia de Lima; Santos, Camila Rangel Barreto Dos; Baião, Felipe Carvalho Souza; Pinheiro, Murilo Costa Rangel; Matos, Manoel; Souza, Ianderlei Andrade; Paula, Rafael Pereira de

    2016-01-01

    the treatment of Class III malocclusion in early age is one of the greatest challenges for orthodontists, and the establishment of more effective treatment method is a constant concern for these professionals. Thus, the objective of this systematic review is to verify the effectiveness of the therapy protocol for alternate rapid maxillary expansion and constriction (Alt-RAMEC) in the early treatment of Class III malocclusion. searches were performed in the following electronic databases: Cochrane Library, Medline (EBSCO and PubMed), SciELO, LILACS and Scopus. The following inclusion criteria were used: in vivo studies conducted with early intervention (patient in craniofacial development phase) with the use of the Alt-RAMEC protocol. Reviews, case reports, editorials, and studies with syndromic patients or under use of systemic drug were excluded. Duplicates were also excluded. The studies were assessed for methodological quality using the Cochrane tool for assessment of risk of bias, and classified as high or low risk of bias. 53 articles were found. Duplicates exclusion was thus performed and 35 articles remained. After inclusion analysis, only 5 matched the criteria. Two articles were classified as low risk of bias and three as high risk of bias. It was observed that the Alt-RAMEC enable protraction in less time and with better results, promoting greater effectiveness in the protraction treatment of Class III malocclusion. Although there is positive evidence of the effectiveness of early treatment with the Alt-RAMEC protocol in patients with Class III malocclusion, further studies are needed to confirm its effectiveness using long-term methodology.

  3. Experimental measurement-device-independent quantum random-number generation

    Science.gov (United States)

    Nie, You-Qi; Guan, Jian-Yu; Zhou, Hongyi; Zhang, Qiang; Ma, Xiongfeng; Zhang, Jun; Pan, Jian-Wei

    2016-12-01

    The randomness from a quantum random-number generator (QRNG) relies on the accurate characterization of its devices. However, device imperfections and inaccurate characterizations can result in wrong entropy estimation and bias in practice, which highly affects the genuine randomness generation and may even induce the disappearance of quantum randomness in an extreme case. Here we experimentally demonstrate a measurement-device-independent (MDI) QRNG based on time-bin encoding to achieve certified quantum randomness even when the measurement devices are uncharacterized and untrusted. The MDI-QRNG is randomly switched between the regular randomness generation mode and a test mode, in which four quantum states are randomly prepared to perform measurement tomography in real time. With a clock rate of 25 MHz, the MDI-QRNG generates a final random bit rate of 5.7 kbps. Such implementation with an all-fiber setup provides an approach to construct a fully integrated MDI-QRNG with trusted but error-prone devices in practice.

  4. Brain potentials index executive functions during random number generation.

    Science.gov (United States)

    Joppich, Gregor; Däuper, Jan; Dengler, Reinhard; Johannes, Sönke; Rodriguez-Fornells, Antoni; Münte, Thomas F

    2004-06-01

    The generation of random sequences is considered to tax different executive functions. To explore the involvement of these functions further, brain potentials were recorded in 16 healthy young adults while either engaging in random number generation (RNG) by pressing the number keys on a computer keyboard in a random sequence or in ordered number generation (ONG) necessitating key presses in the canonical order. Key presses were paced by an external auditory stimulus to yield either fast (1 press/800 ms) or slow (1 press/1300 ms) sequences in separate runs. Attentional demands of random and ordered tasks were assessed by the introduction of a secondary task (key-press to a target tone). The P3 amplitude to the target tone of this secondary task was reduced during RNG, reflecting the greater consumption of attentional resources during RNG. Moreover, RNG led to a left frontal negativity peaking 140 ms after the onset of the pacing stimulus, whenever the subjects produced a true random response. This negativity could be attributed to the left dorsolateral prefrontal cortex and was absent when numbers were repeated. This negativity was interpreted as an index for the inhibition of habitual responses. Finally, in response locked ERPs a negative component was apparent peaking about 50 ms after the key-press that was more prominent during RNG. Source localization suggested a medial frontal source. This effect was tentatively interpreted as a reflection of the greater monitoring demands during random sequence generation.

  5. Treatment of skeletal class III malocclusion using face mask therapy with alternate rapid maxillary expansion and constriction (Alt-RAMEC) protocol.

    Science.gov (United States)

    Rathi, Anand Ramchandra; Kumari, N Retna; Vadakkepuriyal, Kannan; Santhkumar, Madhu

    2015-01-01

    Class III malocclusion is very common malocclusion and can be due to maxillary retrusion, mandibular prognathism, or combination. Ellis and McNamara found a combination of maxillary retrusion and mandibular protrusion to be the most common skeletal relationship (30%). The treatment should be carried out as early as possible for permitting normal growth of the skeletal bases. Reverse pull head gear combined with maxillary expansion can effectively correct skeletal Class III malocclusion due to maxillary deficiency in growing patient. An eight-year-old female patient with chief complaint of prognathic mandible and anterior crossbite was successfully treated in duration of 5 months with facemask and expansion therapy based on Alternate Rapid Maxillary Expansion and Constriction (Alt-RAMEC) protocol.

  6. Treatment of skeletal class III malocclusion using face mask therapy with alternate rapid maxillary expansion and constriction (Alt-RAMEC protocol

    Directory of Open Access Journals (Sweden)

    Anand Ramchandra Rathi

    2015-01-01

    Full Text Available Class III malocclusion is very common malocclusion and can be due to maxillary retrusion, mandibular prognathism, or combination. Ellis and McNamara found a combination of maxillary retrusion and mandibular protrusion to be the most common skeletal relationship (30%. The treatment should be carried out as early as possible for permitting normal growth of the skeletal bases. Reverse pull head gear combined with maxillary expansion can effectively correct skeletal Class III malocclusion due to maxillary deficiency in growing patient. An eight-year-old female patient with chief complaint of prognathic mandible and anterior crossbite was successfully treated in duration of 5 months with facemask and expansion therapy based on Alternate Rapid Maxillary Expansion and Constriction (Alt-RAMEC protocol.

  7. Random number datasets generated from statistical analysis of randomly sampled GSM recharge cards.

    Science.gov (United States)

    Okagbue, Hilary I; Opanuga, Abiodun A; Oguntunde, Pelumi E; Ugwoke, Paulinus O

    2017-02-01

    In this article, a random number of datasets was generated from random samples of used GSM (Global Systems for Mobile Communications) recharge cards. Statistical analyses were performed to refine the raw data to random number datasets arranged in table. A detailed description of the method and relevant tests of randomness were also discussed.

  8. A generator for unique quantum random numbers based on vacuum states

    DEFF Research Database (Denmark)

    Gabriel, C.; Wittmann, C.; Sych, D.

    2010-01-01

    Random numbers are a valuable component in diverse applications that range from simulations(1) over gambling to cryptography(2,3). The quest for true randomness in these applications has engendered a large variety of different proposals for producing random numbers based on the foundational unpre...

  9. A Two-Phase Expansion Protocol Combining Interleukin (IL-15 and IL-21 Improves Natural Killer Cell Proliferation and Cytotoxicity against Rhabdomyosarcoma

    Directory of Open Access Journals (Sweden)

    Juliane Wagner

    2017-06-01

    Full Text Available Rhabdomyosarcoma (RMS is the most common soft tissue malignancy in children. Despite intensive research in recent decades the prognosis for patients with metastatic or relapsed diseases has hardly improved. New therapeutic concepts in anti-tumor therapy aim to modulate the patient’s immune system to increase its aggressiveness or targeted effects toward tumor cells. Besides surgery, radiotherapy and chemotherapy, immune activation by direct application of cytokines, antibodies or adoptive cell therapy are promising approaches. In the last years, adoptive transfer of natural killer (NK cells came into the focus of translational medicine, because of their high cytotoxic potential against transformed malignant cells. A main challenge of NK cell therapy is that it requires a high amount of functional NK cells. Therefore, ex vivo NK cell expansion protocols are currently being developed. Many culturing strategies are based on the addition of feeder or accessory cells, which need to be removed prior to the clinical application of the final NK cell product. In this study, we addressed feeder cell-free expansion methods using common γ-chain cytokines, especially IL-15 and IL-21. Our results demonstrated high potential of IL-15 for NK cell expansion, while IL-21 triggered NK cell maturation and functionality. Hence, we established a two-phase expansion protocol with IL-15 to induce an early NK cell expansion, followed by short exposure to IL-21 that boosted the cytotoxic activity of NK cells against RMS cells. Further functional analyses revealed enhanced degranulation and secretion of pro-inflammatory cytokines such as interferon-γ and tumor necrosis factor-α. In a proof of concept in vivo study, we also observed a therapeutic effect of adoptively transferred IL-15 expanded and IL-21 boosted NK cells in combination with image guided high precision radiation therapy using a luciferase-transduced RMS xenograft model. In summary, this two

  10. What parental characteristics can predict child maltreatment at the Emergency Department? Considering expansion of the Hague Protocol

    NARCIS (Netherlands)

    Diderich, H.M.; Dechesne, M.; Fekkes, M.; Verkerk, P.H.; Buitendijk, S.E.; Oudesluys-Murphy, A.M.

    2015-01-01

    The Hague Protocol considers three parental characteristics of Emergency Department adult patients to identify child abuse: (a) domestic violence, (b) intoxication, and (c) suicide attempt or auto mutilation. This study investigated whether additional parental characteristics could be included to

  11. Multi-bit quantum random number generation by measuring positions of arrival photons.

    Science.gov (United States)

    Yan, Qiurong; Zhao, Baosheng; Liao, Qinghong; Zhou, Nanrun

    2014-10-01

    We report upon the realization of a novel multi-bit optical quantum random number generator by continuously measuring the arrival positions of photon emitted from a LED using MCP-based WSA photon counting imaging detector. A spatial encoding method is proposed to extract multi-bits random number from the position coordinates of each detected photon. The randomness of bits sequence relies on the intrinsic randomness of the quantum physical processes of photonic emission and subsequent photoelectric conversion. A prototype has been built and the random bit generation rate could reach 8 Mbit/s, with random bit generation efficiency of 16 bits per detected photon. FPGA implementation of Huffman coding is proposed to reduce the bias of raw extracted random bits. The random numbers passed all tests for physical random number generator.

  12. High-Quality Random Number Generation Software for High-Performance Computing Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Random number (RN) generation is the key software component that permits random sampling. Software for parallel RN generation (RNG) should be based on RNGs that are...

  13. Note: A 10 Gbps real-time post-processing free physical random number generator chip

    Science.gov (United States)

    Qian, Yi; Liang, Futian; Wang, Xinzhe; Li, Feng; Chen, Lian; Jin, Ge

    2017-09-01

    A random number generator with high data rate, small size, and low power consumption is essential for a certain quantum key distribution (QKD) system. We designed a 10 Gbps random number generator ASIC, TRNG2016, for the QKD system. With a 6 mm × 6 mm QFN48 package, TRNG2016 has 10 independent physical random number generation channels, and each channel can work at a fixed frequency up to 1 Gbps. The random number generated by TRNG2016 can pass the NIST statistical tests without any post-processing. With 3.3 V IO power supply and 1.2 V core power supply, the typical power consumption of TRNG2016 is 773 mW with 10 channels on and running at 1 Gbps data rate.

  14. High-speed true random number generation based on paired memristors for security electronics

    Science.gov (United States)

    Zhang, Teng; Yin, Minghui; Xu, Changmin; Lu, Xiayan; Sun, Xinhao; Yang, Yuchao; Huang, Ru

    2017-11-01

    True random number generator (TRNG) is a critical component in hardware security that is increasingly important in the era of mobile computing and internet of things. Here we demonstrate a TRNG using intrinsic variation of memristors as a natural source of entropy that is otherwise undesirable in most applications. The random bits were produced by cyclically switching a pair of tantalum oxide based memristors and comparing their resistance values in the off state, taking advantage of the more pronounced resistance variation compared with that in the on state. Using an alternating read scheme in the designed TRNG circuit, the unbiasedness of the random numbers was significantly improved, and the bitstream passed standard randomness tests. The Pt/TaO x /Ta memristors fabricated in this work have fast programming/erasing speeds of ∼30 ns, suggesting a high random number throughput. The approach proposed here thus holds great promise for physically-implemented random number generation.

  15. Development of a two-step protocol for culture expansion of human annulus fibrosus cells with TGF-β1 and FGF-2.

    Science.gov (United States)

    Chou, Po-Hsin; Wang, Shih-Tien; Ma, Hsiao-Li; Liu, Chien-Lin; Chang, Ming-Chau; Lee, Oscar Kuang-Sheng

    2016-07-12

    Different biologic approaches to treat disc regeneration, including growth factors (GFs) application, are currently under investigation. Human annulus fibrosus (hAF) repair or regeneration is one of the key elements for maintenance and restoration of nucleus pulposus function. However, so far there is no effective treatment for this purpose. The aim of the present study was to investigate the response of hAF cells to different combinations of GFs, and develop a protocol for efficient culture expansion. hAF cells were harvested from degenerated disc tissues during surgical intervertebral disc removal, and hAF cells were expanded in a monolayer. The experiments were categorized based on different protocols with transforming growth factor (TGF-β1) and fibroblast growth factor (FGF-2) culture for 14 days: group 1 had no GFs (control group); group 2 received TGF-β1; group 3 received FGF-2; group 4 received both GFs; and group 5 (two-step) received both GFs for the first 10 days and TGF-β1 only for the next 4 days. Cell proliferation, collagen, and noncollagen extracellular matrix (ECM) production and genes expression were compared among these groups. At days 3, 7 and 10 of cultivation, groups 4 and 5 had significantly more cell numbers and faster cell proliferation rates than groups 1, 2, and 3. At 14 days of cultivation, significantly more cell numbers were observed in groups 3 and 4 than in group 5. The group 4 had the most cell numbers and the fastest proliferation rate at 14 days of cultivation. After normalization for cell numbers, group 5 (two-step) produced the most collagen and noncollagen ECM at 10 and 14 days of cultivation among the five groups. In group 5, ECM gene expression was significantly upregulated. High expression of matrix metalloproteinase-1 was upregulated with FGF-2 on the different days as compared to the other groups. Annulus fibrosus cell phenotypes were only marginally retained under the different protocols based on quantitative polymerase

  16. Recommendations and illustrations for the evaluation of photonic random number generators

    Science.gov (United States)

    Hart, Joseph D.; Terashima, Yuta; Uchida, Atsushi; Baumgartner, Gerald B.; Murphy, Thomas E.; Roy, Rajarshi

    2017-09-01

    The never-ending quest to improve the security of digital information combined with recent improvements in hardware technology has caused the field of random number generation to undergo a fundamental shift from relying solely on pseudo-random algorithms to employing optical entropy sources. Despite these significant advances on the hardware side, commonly used statistical measures and evaluation practices remain ill-suited to understand or quantify the optical entropy that underlies physical random number generation. We review the state of the art in the evaluation of optical random number generation and recommend a new paradigm: quantifying entropy generation and understanding the physical limits of the optical sources of randomness. In order to do this, we advocate for the separation of the physical entropy source from deterministic post-processing in the evaluation of random number generators and for the explicit consideration of the impact of the measurement and digitization process on the rate of entropy production. We present the Cohen-Procaccia estimate of the entropy rate h (𝜖 ,τ ) as one way to do this. In order to provide an illustration of our recommendations, we apply the Cohen-Procaccia estimate as well as the entropy estimates from the new NIST draft standards for physical random number generators to evaluate and compare three common optical entropy sources: single photon time-of-arrival detection, chaotic lasers, and amplified spontaneous emission.

  17. A Comparison of Three Random Number Generators for Aircraft Dynamic Modeling Applications

    Science.gov (United States)

    Grauer, Jared A.

    2017-01-01

    Three random number generators, which produce Gaussian white noise sequences, were compared to assess their suitability in aircraft dynamic modeling applications. The first generator considered was the MATLAB (registered) implementation of the Mersenne-Twister algorithm. The second generator was a website called Random.org, which processes atmospheric noise measured using radios to create the random numbers. The third generator was based on synthesis of the Fourier series, where the random number sequences are constructed from prescribed amplitude and phase spectra. A total of 200 sequences, each having 601 random numbers, for each generator were collected and analyzed in terms of the mean, variance, normality, autocorrelation, and power spectral density. These sequences were then applied to two problems in aircraft dynamic modeling, namely estimating stability and control derivatives from simulated onboard sensor data, and simulating flight in atmospheric turbulence. In general, each random number generator had good performance and is well-suited for aircraft dynamic modeling applications. Specific strengths and weaknesses of each generator are discussed. For Monte Carlo simulation, the Fourier synthesis method is recommended because it most accurately and consistently approximated Gaussian white noise and can be implemented with reasonable computational effort.

  18. Doing Better by Getting Worse: Posthypnotic Amnesia Improves Random Number Generation

    Science.gov (United States)

    Terhune, Devin Blair; Brugger, Peter

    2011-01-01

    Although forgetting is often regarded as a deficit that we need to control to optimize cognitive functioning, it can have beneficial effects in a number of contexts. We examined whether disrupting memory for previous numerical responses would attenuate repetition avoidance (the tendency to avoid repeating the same number) during random number generation and thereby improve the randomness of responses. Low suggestible and low dissociative and high dissociative highly suggestible individuals completed a random number generation task in a control condition, following a posthypnotic amnesia suggestion to forget previous numerical responses, and in a second control condition following the cancellation of the suggestion. High dissociative highly suggestible participants displayed a selective increase in repetitions during posthypnotic amnesia, with equivalent repetition frequency to a random system, whereas the other two groups exhibited repetition avoidance across conditions. Our results demonstrate that temporarily disrupting memory for previous numerical responses improves random number generation. PMID:22195022

  19. Doing better by getting worse: posthypnotic amnesia improves random number generation.

    Directory of Open Access Journals (Sweden)

    Devin Blair Terhune

    Full Text Available Although forgetting is often regarded as a deficit that we need to control to optimize cognitive functioning, it can have beneficial effects in a number of contexts. We examined whether disrupting memory for previous numerical responses would attenuate repetition avoidance (the tendency to avoid repeating the same number during random number generation and thereby improve the randomness of responses. Low suggestible and low dissociative and high dissociative highly suggestible individuals completed a random number generation task in a control condition, following a posthypnotic amnesia suggestion to forget previous numerical responses, and in a second control condition following the cancellation of the suggestion. High dissociative highly suggestible participants displayed a selective increase in repetitions during posthypnotic amnesia, with equivalent repetition frequency to a random system, whereas the other two groups exhibited repetition avoidance across conditions. Our results demonstrate that temporarily disrupting memory for previous numerical responses improves random number generation.

  20. Non-periodic pseudo-random numbers used in Monte Carlo calculations

    Science.gov (United States)

    Barberis, Gaston E.

    2007-09-01

    The generation of pseudo-random numbers is one of the interesting problems in Monte Carlo simulations, mostly because the common computer generators produce periodic numbers. We used simple pseudo-random numbers generated with the simplest chaotic system, the logistic map, with excellent results. The numbers generated in this way are non-periodic, which we demonstrated for 1013 numbers, and they are obtained in a deterministic way, which allows to repeat systematically any calculation. The Monte Carlo calculations are the ideal field to apply these numbers, and we did it for simple and more elaborated cases. Chemistry and Information Technology use this kind of simulations, and the application of this numbers to quantum Monte Carlo and cryptography is immediate. I present here the techniques to calculate, analyze and use these pseudo-random numbers, show that they lack periodicity up to 1013 numbers and that they are not correlated.

  1. Employing online quantum random number generators for generating truly random quantum states in Mathematica

    Science.gov (United States)

    Miszczak, Jarosław Adam

    2013-01-01

    The presented package for the Mathematica computing system allows the harnessing of quantum random number generators (QRNG) for investigating the statistical properties of quantum states. The described package implements a number of functions for generating random states. The new version of the package adds the ability to use the on-line quantum random number generator service and implements new functions for retrieving lists of random numbers. Thanks to the introduced improvements, the new version provides faster access to high-quality sources of random numbers and can be used in simulations requiring large amount of random data. New version program summaryProgram title: TRQS Catalogue identifier: AEKA_v2_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEKA_v2_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 18 134 No. of bytes in distributed program, including test data, etc.: 2 520 49 Distribution format: tar.gz Programming language: Mathematica, C. Computer: Any supporting Mathematica in version 7 or higher. Operating system: Any platform supporting Mathematica; tested with GNU/Linux (32 and 64 bit). RAM: Case-dependent Supplementary material: Fig. 1 mentioned below can be downloaded. Classification: 4.15. External routines: Quantis software library (http://www.idquantique.com/support/quantis-trng.html) Catalogue identifier of previous version: AEKA_v1_0 Journal reference of previous version: Comput. Phys. Comm. 183(2012)118 Does the new version supersede the previous version?: Yes Nature of problem: Generation of random density matrices and utilization of high-quality random numbers for the purpose of computer simulation. Solution method: Use of a physical quantum random number generator and an on-line service providing access to the source of true random

  2. Efficient Raman generation in a waveguide: A route to ultrafast quantum random number generation

    Energy Technology Data Exchange (ETDEWEB)

    England, D. G.; Bustard, P. J.; Moffatt, D. J.; Nunn, J.; Lausten, R.; Sussman, B. J., E-mail: ben.sussman@nrc.ca [National Research Council of Canada, 100 Sussex Drive, Ottawa, Ontario K1A 0R6 (Canada)

    2014-02-03

    The inherent uncertainty in quantum mechanics offers a source of true randomness which can be used to produce unbreakable cryptographic keys. We discuss the development of a high-speed random number generator based on the quantum phase fluctuations in spontaneously initiated stimulated Raman scattering (SISRS). We utilize the tight confinement and long interaction length available in a Potassium Titanyl Phosphate waveguide to generate highly efficient SISRS using nanojoule pulse energies, reducing the high pump power requirements of the previous approaches. We measure the random phase of the Stokes output using a simple interferometric setup to yield quantum random numbers at 145 Mbps.

  3. Repeatability of a planning target volume expansion protocol for radiation therapy of regional lymph nodes in canine and feline patients with head tumors.

    Science.gov (United States)

    Yoshikawa, Hiroto; Harmon, Joseph F; Custis, James T; Larue, Susan M

    2012-01-01

    For canine and feline patients with head tumors, simultaneous irradiation of the primary tumor and mandibular and retropharyngeal lymph nodes (LNs) is often indicated. The purpose of this study was to assess the repeatability of a planning target volume (PTV) expansion protocol for these LNs. Two CT image sets from 44 dogs and 37 cats that underwent radiation therapy for head tumors were compared to determine LN repositioning accuracy and precision; planning-CT (for radiation therapy planning) and cone-beam CT (at the time of actual treatment sessions). Eleven percent of dogs and 65% of cats received treatment to their LNs. In dogs, the mandibular LNs were positioned more caudally (P = 0.0002) and the right mandibular and right retropharyngeal LNs were positioned more to the left side of the patient (P = 0.00015 and P = 0.003, respectively). In cats, left mandibular LN was positioned higher (toward roof) than the planning-CT (P = 0.028). In conclusion, when the patient immobilization devices and bony anatomy matching are used to align the primary head target and these LNs are treated simultaneously, an asymmetrical PTV expansion that ranges 4-9 mm (dogs) and 2-4 mm (cats), depending on the directions of couch movement, should be used to include the LNs within the PTV at least 95% of the time. © 2012 Veterinary Radiology & Ultrasound.

  4. Examining Psychokinesis: The Interaction of Human Intention with Random Number Generators--A Meta-Analysis

    Science.gov (United States)

    Bosch, Holger; Steinkamp, Fiona; Boller, Emil

    2006-01-01

    Seance-room and other large-scale psychokinetic phenomena have fascinated humankind for decades. Experimental research has reduced these phenomena to attempts to influence (a) the fall of dice and, later, (b) the output of random number generators (RNGs). The meta-analysis combined 380 studies that assessed whether RNG output correlated with human…

  5. A time series approach to random number generation: Using recurrence quantification analysis to capture executive behavior

    NARCIS (Netherlands)

    Oomens, W.; Maes, J.H.R.; Hasselman, F.W.; Egger, J.I.M.

    2015-01-01

    The concept of executive functions plays a prominent role in contemporary experimental and clinical studies on cognition. One paradigm used in this framework is the random number generation (RNG) task, the execution of which demands aspects of executive functioning, specifically inhibition and

  6. Pseudo-Random Number Generators for Vector Processors and Multicore Processors

    DEFF Research Database (Denmark)

    Fog, Agner

    2015-01-01

    Large scale Monte Carlo applications need a good pseudo-random number generator capable of utilizing both the vector processing capabilities and multiprocessing capabilities of modern computers in order to get the maximum performance. The requirements for such a generator are discussed. New ways ...

  7. Lateral Ridge Splitting (Expansion) With Immediate Placement of Endosseous Dental Implant Using Piezoelectric Device: A New Treatment Protocol.

    Science.gov (United States)

    Jamil, Firas A; Al-Adili, Sahar Shakir

    2017-03-01

    Many treatment modalities have been introduced for correction of deficient alveolar ridge width. Bone expansion through the ridge split procedure is one of them. This technique was initiated in order to overcome many problems that usually associated with grafting procedures. The present study evaluated the effectiveness of piezoelectric device in performing ridge split using single-stage approach and assessed the outcomes during a period of about 4 months after surgery. A total of 23 patients aged in range between 18 and 60 years underwent ridge split procedure with immediate insertion of dental implants. A panoramic radiograph was obtained before surgery. The gained bone was measured and surgical complications were recorded. Implants stability was measured using Osstell device. Postoperative clinical complications were assessed. After a healing period of 16 weeks, all the implants were uncovered and evaluated regarding clinical, radiographic, and resonance frequency analysis findings. The totally implemented ridge split procedures were 26 cases including 57 implants inserted immediately at the time of surgery. The initial ridge width varied between 1 and 3.5 mm while the final width ranged from 5.5 to 8 mm. The minimum bone gain was 2.5 mm and the maximum value reached up to 7 mm. Few and insignificant clinical complications were recorded during the whole study. The survival rate was 100%. The study results indicated that piezoelectric ridge splitting technique is an effective, safe, and minimally invasive procedure. This technique has showed to be very successful in reducing the overall treatment period.

  8. Generating log-normally distributed random numbers by using the Ziggurat algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jong Soo [KINS, Daejeon (Korea, Republic of)

    2016-05-15

    Uncertainty analyses are usually based on the Monte Carlo method. Using an efficient random number generator(RNG) is a key element in success of Monte Carlo simulations. Log-normal distributed variates are very typical in NPP PSAs. This paper proposes an approach to generate log normally distributed variates based on the Ziggurat algorithm and evaluates the efficiency of the proposed Ziggurat RNG. The proposed RNG can be helpful to improve the uncertainty analysis of NPP PSAs. This paper focuses on evaluating the efficiency of the Ziggurat algorithm from a NPP PSA point of view. From this study, we can draw the following conclusions. - The Ziggurat algorithm is one of perfect random number generators to product normal distributed variates. - The Ziggurat algorithm is computationally much faster than the most commonly used method, Marsaglia polar method.

  9. Delay line length selection in generating fast random numbers with a chaotic laser.

    Science.gov (United States)

    Zhang, Jianzhong; Wang, Yuncai; Xue, Lugang; Hou, Jiayin; Zhang, Beibei; Wang, Anbang; Zhang, Mingjiang

    2012-04-10

    The chaotic light signals generated by an external cavity semiconductor laser have been experimentally demonstrated to extract fast random numbers. However, the photon round-trip time in the external cavity can cause the occurrence of the periodicity in random sequences. To overcome it, the exclusive-or operation on corresponding random bits in samples of the chaotic signal and its time-delay signal from a chaotic laser is required. In this scheme, the proper selection of delay length is a key issue. By doing a large number of experiments and theoretically analyzing the interplay between the Runs test and the threshold value of the autocorrelation function, we find when the corresponding delay time of autocorrelation trace with the correlation coefficient of less than 0.007 is considered as the delay time between the chaotic signal and its time-delay signal, streams of random numbers can be generated with verified randomness.

  10. A revision of the subtract-with-borrow random number generators

    Science.gov (United States)

    Sibidanov, Alexei

    2017-12-01

    The most popular and widely used subtract-with-borrow generator, also known as RANLUX, is reimplemented as a linear congruential generator using large integer arithmetic with the modulus size of 576 bits. Modern computers, as well as the specific structure of the modulus inferred from RANLUX, allow for the development of a fast modular multiplication - the core of the procedure. This was previously believed to be slow and have too high cost in terms of computing resources. Our tests show a significant gain in generation speed which is comparable with other fast, high quality random number generators. An additional feature is the fast skipping of generator states leading to a seeding scheme which guarantees the uniqueness of random number sequences. Licensing provisions: GPLv3 Programming language: C++, C, Assembler

  11. Note: Fully integrated 3.2 Gbps quantum random number generator with real-time extraction

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Xiao-Guang; Nie, You-Qi; Liang, Hao; Zhang, Jun, E-mail: zhangjun@ustc.edu.cn; Pan, Jian-Wei [Hefei National Laboratory for Physical Sciences at the Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Zhou, Hongyi; Ma, Xiongfeng [Center for Quantum Information, Institute for Interdisciplinary Information Sciences, Tsinghua University, Beijing 100084 (China)

    2016-07-15

    We present a real-time and fully integrated quantum random number generator (QRNG) by measuring laser phase fluctuations. The QRNG scheme based on laser phase fluctuations is featured for its capability of generating ultra-high-speed random numbers. However, the speed bottleneck of a practical QRNG lies on the limited speed of randomness extraction. To close the gap between the fast randomness generation and the slow post-processing, we propose a pipeline extraction algorithm based on Toeplitz matrix hashing and implement it in a high-speed field-programmable gate array. Further, all the QRNG components are integrated into a module, including a compact and actively stabilized interferometer, high-speed data acquisition, and real-time data post-processing and transmission. The final generation rate of the QRNG module with real-time extraction can reach 3.2 Gbps.

  12. High-speed quantum-random number generation by continuous measurement of arrival time of photons.

    Science.gov (United States)

    Yan, Qiurong; Zhao, Baosheng; Hua, Zhang; Liao, Qinghong; Yang, Hao

    2015-07-01

    We demonstrate a novel high speed and multi-bit optical quantum random number generator by continuously measuring arrival time of photons with a common starting point. To obtain the unbiased and post-processing free random bits, the measured photon arrival time is converted into the sum of integral multiple of a fixed period and a phase time. Theoretical and experimental results show that the phase time is an independent and uniform random variable. A random bit extraction method by encoding the phase time is proposed. An experimental setup has been built and the unbiased random bit generation rate could reach 128 Mb/s, with random bit generation efficiency of 8 bits per detected photon. The random numbers passed all tests in the statistical test suite.

  13. Concurrent Generation of Pseudo Random Numbers with LFSR of Fibonacci and Galois Type

    OpenAIRE

    Emina I. Milovanović; Stojčev, Mile K.; Igor Ž. Milovanović; Tatjana R. Nikolić; Zoran Stamenković

    2016-01-01

    We have considered implementation of parallel test pattern generator based on a linear feedback shift register (LFSR) with multiple outputs used as a building block in built-in-self-test (BIST) design within SoC. The proposed design can drive several circuits under test (CUT) simultaneously. The mathematical procedure for concurrent pseudo random number (PRN) generation is described. We have implemented LFSRs that generate two and three PRNs in FPGA and ASIC technology. The design was tested ...

  14. Performance of university students on random number generation at different rates to evaluate executive functions

    Directory of Open Access Journals (Sweden)

    Hamdan Amer C.

    2004-01-01

    Full Text Available OBJECTIVE: To evaluate the performance of adult young subjects in a Random Number Generation (RNG task by controlling the response speed (RS. METHOD: Sixty-nine university students of both sexes took part in the experiment (25.05 ± 6.71 year-old. Participants were alloted into 3 groups which differed in RS rates to generate numbers: 1, 2 and 4 seconds to generate each number. A digital metronomer was used to control RS. Participants were asked to generate 100 numbers. The responses were mensured through Evans's RNG Index. RESULTS: There were statistically significant differences among the groups [F (3, 68 = 7.120; p < .05]. Differences were localized between 1 and 2 seconds (p = 0.004 and between 1 and 4 seconds (p = 0.006. No differences were observed between 2 and 4 seconds (p = 0.985. CONCLUSION: The present results suggest that the response speed in production of random numbers influences the performance of the Random Numbers Generation task.

  15. Complexity and properties of a multidimensional Cat-Hadamard map for pseudo random number generation

    Science.gov (United States)

    Kim Hue, Ta Thi; Hoang, Thang Manh

    2017-07-01

    This paper presents a novel method to extend the Cat map from 2-dimension to higher dimension using the fast pseudo Hadamard Transform, and the resulted maps are called Cat-Hadamard maps. The complexity and properties of Cat-Hadamard maps are investigated under the point of view for cryptographic applications. In addition, we propose a method for constructing a pseudo random number generator using a novel design concept of the high dimensional Cat map. The simulation results show that the proposed generator fulfilled all the statistic tests of the NIST SP 800-90 A.

  16. Quantum random number generator based on quantum nature of vacuum fluctuations

    Science.gov (United States)

    Ivanova, A. E.; Chivilikhin, S. A.; Gleim, A. V.

    2017-11-01

    Quantum random number generator (QRNG) allows obtaining true random bit sequences. In QRNG based on quantum nature of vacuum, optical beam splitter with two inputs and two outputs is normally used. We compare mathematical descriptions of spatial beam splitter and fiber Y-splitter in the quantum model for QRNG, based on homodyne detection. These descriptions were identical, that allows to use fiber Y-splitters in practical QRNG schemes, simplifying the setup. Also we receive relations between the input radiation and the resulting differential current in homodyne detector. We experimentally demonstrate possibility of true random bits generation by using QRNG based on homodyne detection with Y-splitter.

  17. Leveraging Random Number Generation for Mastery of Learning in Teaching Quantitative Research Courses via an E-Learning Method

    Science.gov (United States)

    Boonsathorn, Wasita; Charoen, Danuvasin; Dryver, Arthur L.

    2014-01-01

    E-Learning brings access to a powerful but often overlooked teaching tool: random number generation. Using random number generation, a practically infinite number of quantitative problem-solution sets can be created. In addition, within the e-learning context, in the spirit of the mastery of learning, it is possible to assign online quantitative…

  18. Comparison of a quantum random number generator with pseudorandom number generators for their use in molecular Monte Carlo simulations.

    Science.gov (United States)

    Ghersi, Dario; Parakh, Abhishek; Mezei, Mihaly

    2017-12-05

    Four pseudorandom number generators were compared with a physical, quantum-based random number generator using the NIST suite of statistical tests, which only the quantum-based random number generator could successfully pass. We then measured the effect of the five random number generators on various calculated properties in different Markov-chain Monte Carlo simulations. Two types of systems were tested: conformational sampling of a small molecule in aqueous solution and liquid methanol under constant temperature and pressure. The results show that poor quality pseudorandom number generators produce results that deviate significantly from those obtained with the quantum-based random number generator, particularly in the case of the small molecule in aqueous solution setup. In contrast, the widely used Mersenne Twister pseudorandom generator and a 64-bit Linear Congruential Generator with a scrambler produce results that are statistically indistinguishable from those obtained with the quantum-based random number generator. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  19. Application of random number generators in genetic algorithms to improve rainfall-runoff modelling

    Science.gov (United States)

    Chlumecký, Martin; Buchtele, Josef; Richta, Karel

    2017-10-01

    The efficient calibration of rainfall-runoff models is a difficult issue, even for experienced hydrologists. Therefore, fast and high-quality model calibration is a valuable improvement. This paper describes a novel methodology and software for the optimisation of a rainfall-runoff modelling using a genetic algorithm (GA) with a newly prepared concept of a random number generator (HRNG), which is the core of the optimisation. The GA estimates model parameters using evolutionary principles, which requires a quality number generator. The new HRNG generates random numbers based on hydrological information and it provides better numbers compared to pure software generators. The GA enhances the model calibration very well and the goal is to optimise the calibration of the model with a minimum of user interaction. This article focuses on improving the internal structure of the GA, which is shielded from the user. The results that we obtained indicate that the HRNG provides a stable trend in the output quality of the model, despite various configurations of the GA. In contrast to previous research, the HRNG speeds up the calibration of the model and offers an improvement of rainfall-runoff modelling.

  20. Random Number Generation and Executive Functions in Parkinson's Disease: An Event-Related Brain Potential Study.

    Science.gov (United States)

    Münte, Thomas F; Joppich, Gregor; Däuper, Jan; Schrader, Christoph; Dengler, Reinhard; Heldmann, Marcus

    2015-01-01

    The generation of random sequences is considered to tax executive functions and has been reported to be impaired in Parkinson's disease (PD) previously. To assess the neurophysiological markers of random number generation in PD. Event-related potentials (ERP) were recorded in 12 PD patients and 12 age-matched normal controls (NC) while either engaging in random number generation (RNG) by pressing the number keys on a computer keyboard in a random sequence or in ordered number generation (ONG) necessitating key presses in the canonical order. Key presses were paced by an external auditory stimulus at a rate of 1 tone every 1800 ms. As a secondary task subjects had to monitor the tone-sequence for a particular target tone to which the number "0" key had to be pressed. This target tone occurred randomly and infrequently, thus creating a secondary oddball task. Behaviorally, PD patients showed an increased tendency to count in steps of one as well as a tendency towards repetition avoidance. Electrophysiologically, the amplitude of the P3 component of the ERP to the target tone of the secondary task was reduced during RNG in PD but not in NC. The behavioral findings indicate less random behavior in PD while the ERP findings suggest that this impairment comes about, because attentional resources are depleted in PD.

  1. A model of the health and economic impact of posttransfusion hepatitis C: application to cost-effectiveness analysis of further expansion of HCV screening protocols.

    Science.gov (United States)

    Pereira, A; Sanz, C

    2000-10-01

    Cost-effectiveness analyses are needed to decide the value of further expansion of the screening protocols for HCV in blood donors. However, such analyses are hampered by imperfect knowledge of the health and economic repercussions of posttransfusion hepatitis C (PTHC). A Monte Carlo simulation of a Markov model representing the outcomes of patients transfused with HCV-infective blood was used to estimate the health and economic impact of PTHC and to calculate the cost-effectiveness ratio of various HCV screening methods. Median survival for hypothetical patients with PTHC and for controls without hepatitis was 11.25 and 11.75 years, respectively. Overall, 12.3 percent of patients receiving HCV-infective blood will develop chronic hepatitis, 9.3 percent will progress to liver failure, and 9. 25 percent will eventually die of liver disease after a median time of 20.75 years (range, 6-70). Ninety-one percent of the infected blood recipients had no reduction in life expectancy due to PTHC, and the average loss per patient was 0.754 years. The present value of the lifetime health costs incurred by patients with PTHC is $6330 per case. HCV antibody testing increases the patients' life expectancy by 20.4 hours per blood collection tested, and it results in net savings by decreasing the number of patients that will require treatment for liver disease in the future. Adding HCV NAT increases the patients' life expectancy by 0.08 hours per blood collection tested, at a cost-effectiveness ratio of $1,829,611 per QALY gained. PTHC has low health benefits because of the advanced age of many blood recipients. Testing donors for HCV antibodies results in net savings for the health care system, despite low health benefits. Adding HCV NAT would produce little additional gain at a very high cost.

  2. Maxillary Expansion

    OpenAIRE

    Agarwal, Anirudh; Mathur, Rinku

    2010-01-01

    ABSTRACT Maxillary transverse discrepancy usually requires expansion of the palate by a combination of orthopedic and orthodontic tooth movements. Three expansion treatment modalities are used today: rapid maxillary expansion, slow maxillary expansion and surgically assisted maxillary expansion.This article aims to review the maxillary expansion by all the three modalities and a brief on commonly used appliances.

  3. On the design of henon and logistic map-based random number generator

    Science.gov (United States)

    Magfirawaty; Suryadi, M. T.; Ramli, Kalamullah

    2017-10-01

    The key sequence is one of the main elements in the cryptosystem. True Random Number Generators (TRNG) method is one of the approaches to generating the key sequence. The randomness source of the TRNG divided into three main groups, i.e. electrical noise based, jitter based and chaos based. The chaos based utilizes a non-linear dynamic system (continuous time or discrete time) as an entropy source. In this study, a new design of TRNG based on discrete time chaotic system is proposed, which is then simulated in LabVIEW. The principle of the design consists of combining 2D and 1D chaotic systems. A mathematical model is implemented for numerical simulations. We used comparator process as a harvester method to obtain the series of random bits. Without any post processing, the proposed design generated random bit sequence with high entropy value and passed all NIST 800.22 statistical tests.

  4. Compact quantum random number generator based on superluminescent light-emitting diodes

    Science.gov (United States)

    Wei, Shihai; Yang, Jie; Fan, Fan; Huang, Wei; Li, Dashuang; Xu, Bingjie

    2017-12-01

    By measuring the amplified spontaneous emission (ASE) noise of the superluminescent light emitting diodes, we propose and realize a quantum random number generator (QRNG) featured with practicability. In the QRNG, after the detection and amplification of the ASE noise, the data acquisition and randomness extraction which is integrated in a field programmable gate array (FPGA) are both implemented in real-time, and the final random bit sequences are delivered to a host computer with a real-time generation rate of 1.2 Gbps. Further, to achieve compactness, all the components of the QRNG are integrated on three independent printed circuit boards with a compact design, and the QRNG is packed in a small enclosure sized 140 mm × 120 mm × 25 mm. The final random bit sequences can pass all the NIST-STS and DIEHARD tests.

  5. Engineering applications of fpgas chaotic systems, artificial neural networks, random number generators, and secure communication systems

    CERN Document Server

    Tlelo-Cuautle, Esteban; de la Fraga, Luis Gerardo

    2016-01-01

    This book offers readers a clear guide to implementing engineering applications with FPGAs, from the mathematical description to the hardware synthesis, including discussion of VHDL programming and co-simulation issues. Coverage includes FPGA realizations such as: chaos generators that are described from their mathematical models; artificial neural networks (ANNs) to predict chaotic time series, for which a discussion of different ANN topologies is included, with different learning techniques and activation functions; random number generators (RNGs) that are realized using different chaos generators, and discussions of their maximum Lyapunov exponent values and entropies. Finally, optimized chaotic oscillators are synchronized and realized to implement a secure communication system that processes black and white and grey-scale images. In each application, readers will find VHDL programming guidelines and computer arithmetic issues, along with co-simulation examples with Active-HDL and Simulink. Readers will b...

  6. A Bidirectional Generalized Synchronization Theorem-Based Chaotic Pseudo-random Number Generator

    Directory of Open Access Journals (Sweden)

    Han Shuangshuang

    2013-07-01

    Full Text Available Based on a bidirectional generalized synchronization theorem for discrete chaos system, this paper introduces a new 5-dimensional bidirectional generalized chaos synchronization system (BGCSDS, whose prototype is a novel chaotic system introduced in [12]. Numerical simulation showed that two pair variables of the BGCSDS achieve generalized chaos synchronization via a transform H.A chaos-based pseudo-random number generator (CPNG was designed by the new BGCSDS. Using the FIPS-140-2 tests issued by the National Institute of Standard and Technology (NIST verified the randomness of the 1000 binary number sequences generated via the CPNG and the RC4 algorithm respectively. The results showed that all the tested sequences passed the FIPS-140-2 tests. The confidence interval analysis showed the statistical properties of the randomness of the sequences generated via the CPNG and the RC4 algorithm do not have significant differences.

  7. 640-Gbit/s fast physical random number generation using a broadband chaotic semiconductor laser

    Science.gov (United States)

    Zhang, Limeng; Pan, Biwei; Chen, Guangcan; Guo, Lu; Lu, Dan; Zhao, Lingjuan; Wang, Wei

    2017-04-01

    An ultra-fast physical random number generator is demonstrated utilizing a photonic integrated device based broadband chaotic source with a simple post data processing method. The compact chaotic source is implemented by using a monolithic integrated dual-mode amplified feedback laser (AFL) with self-injection, where a robust chaotic signal with RF frequency coverage of above 50 GHz and flatness of ±3.6 dB is generated. By using 4-least significant bits (LSBs) retaining from the 8-bit digitization of the chaotic waveform, random sequences with a bit-rate up to 640 Gbit/s (160 GS/s × 4 bits) are realized. The generated random bits have passed each of the fifteen NIST statistics tests (NIST SP800-22), indicating its randomness for practical applications.

  8. A Hardware Efficient Random Number Generator for Nonuniform Distributions with Arbitrary Precision

    Directory of Open Access Journals (Sweden)

    Christian de Schryver

    2012-01-01

    number generators is a very active research field. However, most state-of-the-art architectures are either tailored to specific distributions or use up a lot of hardware resources. At ReConFig 2010, we have presented a new design that saves up to 48% of area compared to state-of-the-art inversion-based implementation, usable for arbitrary distributions and precision. In this paper, we introduce a more flexible version together with a refined segmentation scheme that allows to further reduce the approximation error significantly. We provide a free software tool allowing users to implement their own distributions easily, and we have tested our random number generator thoroughly by statistic analysis and two application tests.

  9. Quantum random number generation enhanced by weak-coherent states interference.

    Science.gov (United States)

    Ferreira da Silva, T; Xavier, G B; Amaral, G C; Temporão, G P; von der Weid, J P

    2016-08-22

    We propose and demonstrate a technique for quantum random number generation based on the random population of the output spatial modes of a beam splitter when both inputs are simultaneously fed with indistinguishable weak coherent states. We simulate and experimentally validate the probability of generation of random bits as a function of the average photon number per input, and compare it to the traditional approach of a single weak coherent state transmitted through a beam-splitter, showing an improvement of up to 32%. The ensuing interference phenomenon reduces the probability of coincident counts between the detectors associated with bits 0 and 1, thus increasing the probability of occurrence of a valid output. A long bit string is assessed by a standard randomness test suite with good confidence. Our proposal can be easily implemented and opens attractive performance gains without a significant trade-off.

  10. Generation of random numbers on graphics processors: forced indentation in silico of the bacteriophage HK97.

    Science.gov (United States)

    Zhmurov, A; Rybnikov, K; Kholodov, Y; Barsegov, V

    2011-05-12

    The use of graphics processing units (GPUs) in simulation applications offers a significant speed gain as compared to computations on central processing units (CPUs). Many simulation methods require a large number of independent random variables generated at each step. We present two approaches for implementation of random number generators (RNGs) on a GPU. In the one-RNG-per-thread approach, one RNG produces a stream of random numbers in each thread of execution, whereas the one-RNG-for-all-threads method builds on the ability of different threads to communicate, thus, sharing random seeds across an entire GPU device. We used these approaches to implement Ran2, Hybrid Taus, and Lagged Fibonacci algorithms on a GPU. We profiled the performance of these generators in terms of the computational time, memory usage, and the speedup factor (CPU time/GPU time). These generators have been incorporated into the program for Langevin simulations of biomolecules fully implemented on the GPU. The ∼250-fold computational speedup on the GPU allowed us to carry out single-molecule dynamic force measurements in silico to explore the mechanical properties of the bacteriophage HK97 in the experimental subsecond time scale. We found that the nanomechanical response of HK97 depends on the conditions of force application, including the rate of change and geometry of the mechanical perturbation. Hence, using the GPU-based implementation of RNGs, presented here, in conjunction with Langevin simulations, makes it possible to directly compare the results of dynamic force measurements in vitro and in silico.

  11. An On-Demand Optical Quantum Random Number Generator with In-Future Action and Ultra-Fast Response.

    Science.gov (United States)

    Stipčević, Mario; Ursin, Rupert

    2015-06-09

    Random numbers are essential for our modern information based society e.g. in cryptography. Unlike frequently used pseudo-random generators, physical random number generators do not depend on complex algorithms but rather on a physical process to provide true randomness. Quantum random number generators (QRNG) do rely on a process, which can be described by a probabilistic theory only, even in principle. Here we present a conceptually simple implementation, which offers a 100% efficiency of producing a random bit upon a request and simultaneously exhibits an ultra low latency. A careful technical and statistical analysis demonstrates its robustness against imperfections of the actual implemented technology and enables to quickly estimate randomness of very long sequences. Generated random numbers pass standard statistical tests without any post-processing. The setup described, as well as the theory presented here, demonstrate the maturity and overall understanding of the technology.

  12. Aging effect on Executive Control in the Random Number Generation Test

    Directory of Open Access Journals (Sweden)

    Amer Cavalheiro Hamdan

    2006-12-01

    Full Text Available The decline of abilities related to Executive Control –EC with aging has been related with the Pre-Frontal System neurobiological aging. This study compared the score obtained in the Random Number Generation Test (RNG by two groups: 30 college students (older than 18 and 36 elderly (older than 60. This last group was divided according to the criteria of schooling in up to 8 years of schooling and over 8 years of schooling. The results show that the younger participants scored 0,344 ± 0,04 in the RNG test; the elderly with up to 8 years of schooling punctuated 0,432 ± 0,10 and that those who studied for 9 years or more reached a mean of 0,393 ± 0,05. The statistical analysis of these data suggest that the elderly performance in the RNG test (0,420 ± 0,09 was significantly worse when compared to the performance of the younger participants (t (64 = -3,9927; p = 0,0001, which confirms that the manipulation and inhibitory control abilities of information are decreased in older people, probably due to the natural aging process of the Frontal Cortex. Keywords: neuropsychology; aging; executive functions.

  13. Embedded Platform for Automatic Testing and Optimizing of FPGA Based Cryptographic True Random Number Generators

    Directory of Open Access Journals (Sweden)

    M. Varchola

    2009-12-01

    Full Text Available This paper deals with an evaluation platform for cryptographic True Random Number Generators (TRNGs based on the hardware implementation of statistical tests for FPGAs. It was developed in order to provide an automatic tool that helps to speed up the TRNG design process and can provide new insights on the TRNG behavior as it will be shown on a particular example in the paper. It enables to test sufficient statistical properties of various TRNG designs under various working conditions on the fly. Moreover, the tests are suitable to be embedded into cryptographic hardware products in order to recognize TRNG output of weak quality and thus increase its robustness and reliability. Tests are fully compatible with the FIPS 140 standard and are implemented by the VHDL language as an IP-Core for vendor independent FPGAs. A recent Flash based Actel Fusion FPGA was chosen for preliminary experiments. The Actel version of the tests possesses an interface to the Actel’s CoreMP7 softcore processor that is fully compatible with the industry standard ARM7TDMI. Moreover, identical tests suite was implemented to the Xilinx Virtex 2 and 5 in order to compare the performance of the proposed solution with the performance of already published one based on the same FPGAs. It was achieved 25% and 65% greater clock frequency respectively while consuming almost equal resources of the Xilinx FPGAs. On the top of it, the proposed FIPS 140 architecture is capable of processing one random bit per one clock cycle which results in 311.5 Mbps throughput for Virtex 5 FPGA.

  14. Harvesting Entropy for Random Number Generation for Internet of Things Constrained Devices Using On-Board Sensors

    Science.gov (United States)

    Pawlowski, Marcin Piotr; Jara, Antonio; Ogorzalek, Maciej

    2015-01-01

    Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In constrained devices of the Internet of Things ecosystem, high entropy random number generators are hard to achieve due to hardware limitations. For the purpose of the random number generation in constrained devices, this work proposes a solution based on the least-significant bits concatenation entropy harvesting method. As a potential source of entropy, on-board integrated sensors (i.e., temperature, humidity and two different light sensors) have been analyzed. Additionally, the costs (i.e., time and memory consumption) of the presented approach have been measured. The results obtained from the proposed method with statistical fine tuning achieved a Shannon entropy of around 7.9 bits per byte of data for temperature and humidity sensors. The results showed that sensor-based random number generators are a valuable source of entropy with very small RAM and Flash memory requirements for constrained devices of the Internet of Things. PMID:26506357

  15. Harvesting entropy for random number generation for internet of things constrained devices using on-board sensors.

    Science.gov (United States)

    Pawlowski, Marcin Piotr; Jara, Antonio; Ogorzalek, Maciej

    2015-10-22

    Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In constrained devices of the Internet of Things ecosystem, high entropy random number generators are hard to achieve due to hardware limitations. For the purpose of the random number generation in constrained devices, this work proposes a solution based on the least-significant bits concatenation entropy harvesting method. As a potential source of entropy, on-board integrated sensors (i.e., temperature, humidity and two different light sensors) have been analyzed. Additionally, the costs (i.e., time and memory consumption) of the presented approach have been measured. The results obtained from the proposed method with statistical fine tuning achieved a Shannon entropy of around 7.9 bits per byte of data for temperature and humidity sensors. The results showed that sensor-based random number generators are a valuable source of entropy with very small RAM and Flash memory requirements for constrained devices of the Internet of Things.

  16. Harvesting Entropy for Random Number Generation for Internet of Things Constrained Devices Using On-Board Sensors

    Directory of Open Access Journals (Sweden)

    Marcin Piotr Pawlowski

    2015-10-01

    Full Text Available Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In constrained devices of the Internet of Things ecosystem, high entropy random number generators are hard to achieve due to hardware limitations. For the purpose of the random number generation in constrained devices, this work proposes a solution based on the least-significant bits concatenation entropy harvesting method. As a potential source of entropy, on-board integrated sensors (i.e., temperature, humidity and two different light sensors have been analyzed. Additionally, the costs (i.e., time and memory consumption of the presented approach have been measured. The results obtained from the proposed method with statistical fine tuning achieved a Shannon entropy of around 7.9 bits per byte of data for temperature and humidity sensors. The results showed that sensor-based random number generators are a valuable source of entropy with very small RAM and Flash memory requirements for constrained devices of the Internet of Things.

  17. PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Dongfang Li

    2015-10-01

    Full Text Available Random number generators (RNG play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST randomness tests and is resilient to a wide range of security attacks.

  18. PUFKEY: a high-security and high-throughput hardware true random number generator for sensor networks.

    Science.gov (United States)

    Li, Dongfang; Lu, Zhaojun; Zou, Xuecheng; Liu, Zhenglin

    2015-10-16

    Random number generators (RNG) play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF) elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST) randomness tests and is resilient to a wide range of security attacks.

  19. Research of the method of pseudo-random number generation based on asynchronous cellular automata with several active cells

    Directory of Open Access Journals (Sweden)

    Bilan Stepan

    2017-01-01

    Full Text Available To date, there are many tasks that are aimed at studying the dynamic changes in physical processes. These tasks do not give advance known result. The solution of such problems is based on the construction of a dynamic model of the object. Successful structural and functional implementation of the object model can give a positive result in time. This approach uses the task of constructing artificial biological objects. To solve such problems, pseudo-random number generators are used, which also find wide application for information protection tasks. Such generators should have good statistical properties and give a long repetition period of the generated pseudo-random bit sequence. This work is aimed at improving these characteristics. The paper considers the method of forming pseudo-random sequences of numbers on the basis of aperiodic cellular automata with two active cells. A pseudo-random number generator is proposed that generates three bit sequences. The first two bit sequences are formed by the corresponding two active cells in the cellular automaton. The third bit sequence is the result of executing the XOR function over the bits of the first two sequences and it has better characteristics compared to them. The use of cellular automata with two active cells allowed to improve the statistical properties of the formed bit sequence, as well as its repetition period. This is proved by using graphical tests for generators built based on cellular automata using the neighborhoods of von Neumann and Moore. The tests showed high efficiency of the generator based on an asynchronous cellular automaton with the neighborhood of Moore. The proposed pseudo-random number generators have good statistical properties, which makes it possible to use them in information security systems, as well as for simulation tasks of various dynamic processes.

  20. Quantum random flip-flop and its applications in random frequency synthesis and true random number generation

    Energy Technology Data Exchange (ETDEWEB)

    Stipčević, Mario, E-mail: mario.stipcevic@irb.hr [Photonics and Quantum Optics Research Unit, Center of Excellence for Advanced Materials and Sensing Devices, Ruđer Bošković Institute, Bijenička 54, 10000 Zagreb (Croatia)

    2016-03-15

    In this work, a new type of elementary logic circuit, named random flip-flop (RFF), is proposed, experimentally realized, and studied. Unlike conventional Boolean logic circuits whose action is deterministic and highly reproducible, the action of a RFF is intentionally made maximally unpredictable and, in the proposed realization, derived from a fundamentally random process of emission and detection of light quanta. We demonstrate novel applications of RFF in randomness preserving frequency division, random frequency synthesis, and random number generation. Possible usages of these applications in the information and communication technology, cryptographic hardware, and testing equipment are discussed.

  1. Assessment of the suitability of different random number generators for Monte Carlo simulations in gamma-ray spectrometry

    Energy Technology Data Exchange (ETDEWEB)

    Cornejo Diaz, N.; Vergara Gil, A. [Centre for Radiological Protection and Higiene, P.O. Box 6195, Habana (Cuba); Jurado Vargas, M. [Physics Department, University of Extremadura, 06071 Badajoz (Spain)], E-mail: mjv@unex.es

    2010-03-15

    The Monte Carlo method has become a valuable numerical laboratory framework in which to simulate complex physical systems. It is based on the generation of pseudo-random number sequences by numerical algorithms called random generators. In this work we assessed the suitability of different well-known random number generators for the simulation of gamma-ray spectrometry systems during efficiency calibrations. The assessment was carried out in two stages. The generators considered (Delphi's linear congruential, mersenne twister, XorShift, multiplier with carry, universal virtual array, and non-periodic logistic map based generator) were first evaluated with different statistical empirical tests, including moments, correlations, uniformity, independence of terms and the DIEHARD battery of tests. In a second step, an application-specific test was conducted by implementing the generators in our Monte Carlo program DETEFF and comparing the results obtained with them. The calculations were performed with two different CPUs, for a typical HpGe detector and a water sample in Marinelli geometry, with gamma-rays between 59 and 1800 keV. For the Non-periodic Logistic Map based generator, dependence of the most significant bits was evident. This explains the bias, in excess of 5%, of the efficiency values obtained with this generator. The results of the application-specific assessment and the statistical performance of the other algorithms studied indicate their suitability for the Monte Carlo simulation of gamma-ray spectrometry systems for efficiency calculations.

  2. Random number generation in bilingual Balinese and German students: preliminary findings from an exploratory cross-cultural study.

    Science.gov (United States)

    Strenge, Hans; Lesmana, Cokorda Bagus Jaya; Suryani, Luh Ketut

    2009-08-01

    Verbal random number generation is a procedurally simple task to assess executive function and appears ideally suited for the use under diverse settings in cross-cultural research. The objective of this study was to examine ethnic group differences between young adults in Bali (Indonesia) and Kiel (Germany): 50 bilingual healthy students, 30 Balinese and 20 Germans, attempted to generate a random sequence of the digits 1 to 9. In Balinese participants, randomization was done in Balinese (native language L1) and Indonesian (first foreign language L2), in German subjects in the German (L1) and English (L2) languages. 10 of 30 Balinese (33%), but no Germans, were unable to inhibit habitual counting in more than half of the responses. The Balinese produced significantly more nonrandom responses than the Germans with higher rates of counting and significantly less occurrence of the digits 2 and 3 in L1 compared with L2. Repetition and cycling behavior did not differ between the four languages. The findings highlight the importance of taking into account culture-bound psychosocial factors for Balinese individuals when administering and interpreting a random number generation test.

  3. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demons...

  4. Benefits of Reiki therapy for a severely neutropenic patient with associated influences on a true random number generator.

    Science.gov (United States)

    Morse, Melvin L; Beem, Lance W

    2011-12-01

    Reiki therapy is documented for relief of pain and stress. Energetic healing has been documented to alter biologic markers of illness such as hematocrit. True random number generators are reported to be affected by energy healers and spiritually oriented conscious awareness. The patient was a then 54-year-old severely ill man who had hepatitis C types 1 and 2 and who did not improve with conventional therapy. He also suffered from obesity, the metabolic syndrome, asthma, and hypertension. He was treated with experimental high-dose interferon/riboviron therapy with resultant profound anemia and neutropenia. Energetic healing and Reiki therapy was administered initially to enhance the patient's sense of well-being and to relieve anxiety. Possible effects on the patient's absolute neutrophil count and hematocrit were incidentally noted. Reiki therapy was then initiated at times of profound neutropenia to assess its possible effect on the patient's absolute neutrophil count (ANC). Reiki and other energetic healing sessions were monitored with a true random number generator (RNG). Statistically significant relationships were documented between Reiki therapy, a quieting of the electronically created white noise of the RNG during healing sessions, and improvement in the patient's ANC. The immediate clinical result was that the patient could tolerate the high-dose interferon regimen without missing doses because of absolute neutropenia. The patient was initially a late responder to interferon and had been given a 5% chance of clearing the virus. He remains clear of the virus 1 year after treatment. The association between changes in the RNG, Reiki therapy, and a patient's ANC is the first to the authors' knowledge in the medical literature. Future studies assessing the effects of energetic healing on specific biologic markers of disease are anticipated. Concurrent use of a true RNG may prove to correlate with the effectiveness of energetic therapy.

  5. Random Number Simulations Reveal How Random Noise Affects the Measurements and Graphical Portrayals of Self-Assessed Competency

    Directory of Open Access Journals (Sweden)

    Edward Nuhfer

    2016-01-01

    Full Text Available Self-assessment measures of competency are blends of an authentic self-assessment signal that researchers seek to measure and random disorder or "noise" that accompanies that signal. In this study, we use random number simulations to explore how random noise affects critical aspects of self-assessment investigations: reliability, correlation, critical sample size, and the graphical representations of self-assessment data. We show that graphical conventions common in the self-assessment literature introduce artifacts that invite misinterpretation. Troublesome conventions include: (y minus x vs. (x scatterplots; (y minus x vs. (x column graphs aggregated as quantiles; line charts that display data aggregated as quantiles; and some histograms. Graphical conventions that generate minimal artifacts include scatterplots with a best-fit line that depict (y vs. (x measures (self-assessed competence vs. measured competence plotted by individual participant scores, and (y vs. (x scatterplots of collective average measures of all participants plotted item-by-item. This last graphic convention attenuates noise and improves the definition of the signal. To provide relevant comparisons across varied graphical conventions, we use a single dataset derived from paired measures of 1154 participants' self-assessed competence and demonstrated competence in science literacy. Our results show that different numerical approaches employed in investigating and describing self-assessment accuracy are not equally valid. By modeling this dataset with random numbers, we show how recognizing the varied expressions of randomness in self-assessment data can improve the validity of numeracy-based descriptions of self-assessment.

  6. expansion method

    Indian Academy of Sciences (India)

    In this paper, we shall apply the (G /G)-expansion method to obtain the exact travelling wave solution of the two-dimensional ... In §3, we apply our method to the mentioned equations. In §4, some conclusions are ..... The exact solution obtained by this method can be used to check computer codes or as initial condition for ...

  7. An Architecturally Constrained Model of Random Number Generation and its Application to Modelling the Effect of Generation Rate

    Directory of Open Access Journals (Sweden)

    Nicholas J. Sexton

    2014-07-01

    Full Text Available Random number generation (RNG is a complex cognitive task for human subjects, requiring deliberative control to avoid production of habitual, stereotyped sequences. Under various manipulations (e.g., speeded responding, transcranial magnetic stimulation, or neurological damage the performance of human subjects deteriorates, as reflected in a number of qualitatively distinct, dissociable biases. For example, the intrusion of stereotyped behaviour (e.g., counting increases at faster rates of generation. Theoretical accounts of the task postulate that it requires the integrated operation of multiple, computationally heterogeneous cognitive control ('executive' processes. We present a computational model of RNG, within the framework of a novel, neuropsychologically-inspired cognitive architecture, ESPro. Manipulating the rate of sequence generation in the model reproduced a number of key effects observed in empirical studies, including increasing sequence stereotypy at faster rates. Within the model, this was due to time limitations on the interaction of supervisory control processes, namely, task setting, proposal of responses, monitoring, and response inhibition. The model thus supports the fractionation of executive function into multiple, computationally heterogeneous processes.

  8. Theory and implementation of a very high throughput true random number generator in field programmable gate array.

    Science.gov (United States)

    Wang, Yonggang; Hui, Cong; Liu, Chong; Xu, Chao

    2016-04-01

    The contribution of this paper is proposing a new entropy extraction mechanism based on sampling phase jitter in ring oscillators to make a high throughput true random number generator in a field programmable gate array (FPGA) practical. Starting from experimental observation and analysis of the entropy source in FPGA, a multi-phase sampling method is exploited to harvest the clock jitter with a maximum entropy and fast sampling speed. This parametrized design is implemented in a Xilinx Artix-7 FPGA, where the carry chains in the FPGA are explored to realize the precise phase shifting. The generator circuit is simple and resource-saving, so that multiple generation channels can run in parallel to scale the output throughput for specific applications. The prototype integrates 64 circuit units in the FPGA to provide a total output throughput of 7.68 Gbps, which meets the requirement of current high-speed quantum key distribution systems. The randomness evaluation, as well as its robustness to ambient temperature, confirms that the new method in a purely digital fashion can provide high-speed high-quality random bit sequences for a variety of embedded applications.

  9. A time-series approach to random number generation: Using recurrence quantification analysis to capture executive behavior

    Directory of Open Access Journals (Sweden)

    Wouter eOomens

    2015-06-01

    Full Text Available The concept of executive functions plays a prominent role in contemporary experimental and clinical studies on cognition. One paradigm used in this framework is the random number generation (RNG task, the execution of which demands aspects of executive functioning, specifically inhibition and working memory. Data from the RNG task are best seen as a series of successive events. However, traditional RNG measures that are used to quantify executive functioning are mostly summary statistics referring to deviations from mathematical randomness. In the current study, we explore the utility of recurrence quantification analysis (RQA, a nonlinear method that keeps the entire sequence intact, as a better way to describe executive functioning compared to traditional measures. To this aim, 242 first- and second-year students completed a non-paced RNG task. Principal component analysis of their data showed that traditional and RQA measures convey more or less the same information. However, RQA measures do so more parsimoniously and have a better interpretation.

  10. Priming psychic and conjuring abilities of a magic demonstration influences event interpretation and random number generation biases

    Directory of Open Access Journals (Sweden)

    Christine eMohr

    2015-01-01

    Full Text Available Magical ideation and belief in the paranormal is considered to represent a trait-like character; people either believe in it or not. Yet, anecdotes indicate that exposure to an anomalous event can turn sceptics into believers. This transformation is likely to be accompanied by altered cognitive functioning such as impaired judgements of event likelihood. Here, we investigated whether the exposure to an anomalous event changes individuals’ explicit traditional (religious and non-traditional (e.g. paranormal beliefs as well as cognitive biases that have previously been associated with non-traditional beliefs, e.g. repetition avoidance when producing random numbers in a mental dice task. In a classroom, 91 students saw a magic demonstration after their psychology lecture. Before the demonstration, half of the students were told that the performance was done respectively by a conjuror (magician group or a psychic (psychic group. The instruction influenced participants’ explanations of the anomalous event. Participants in the magician, as compared to the psychic group, were more likely to explain the event through conjuring abilities while the reverse was true for psychic abilities. Moreover, these explanations correlated positively with their prior traditional and non-traditional beliefs. Finally, we observed that the psychic group showed more repetition avoidance than the magician group, and this effect remained the same regardless of whether assessed before or after the magic demonstration. We conclude that pre-existing beliefs and contextual suggestions both influence people’s interpretations of anomalous events and associated cognitive biases. Beliefs and associated cognitive biases are likely flexible well into adulthood and change with actual life events.

  11. Random number generators and the Metropolis algorithm: application to various problems in physics and mechanics as an introduction to computational physics

    Energy Technology Data Exchange (ETDEWEB)

    Calvayrac, Florent [Laboratoire de Physique de l' Etat Condense, UMR CNRS 6087 and FR 2575, Universite du Maine, 72085 Le Mans Cedex 9 (France)

    2005-09-01

    We present known and new applications of pseudo random numbers and of the Metropolis algorithm to phenomena of physical and mechanical interest, such as the search of simple clusters isomers with interactive visualization, or vehicle motion planning. The progression towards complicated problems was used with first-year graduate students who wrote most of the programs presented here. We argue that the use of pseudo random numbers in simulation and extrema research programs in teaching numerical methods in physics allows one to get quick programs and physically meaningful and demonstrative results without recurring to the advanced numerical analysis methods.

  12. Quantum random number generator based on ‘Fermi–Dirac’ statistics of photocounts of faint laser pulses with a 75 Mbit s‑1 rate

    Science.gov (United States)

    Balygin, K. A.; Zaitsev, V. I.; Klimov, A. N.; Kulik, S. P.; Molotkov, S. N.; Popova, E.; Vinogradov, S.

    2017-12-01

    We implemented experimentally a quantum random number generator, based on the registration of quasi-single-photon light by a silicon photo-multiplier, which allows one to reliably achieve the Poisson statistics of photocounts. The use of the optimal grouping of photocounts and a polynomial-length sequence of the method for extracting the random sequence 0 and 1 made it possible to achieve the output rate of a provably random sequence up to 75 Mbit s-1 .

  13. An empirical test of pseudo random number generators by means of an exponential decaying process; Una prueba empirica de generadores de numeros pseudoaleatorios mediante un proceso de decaimiento exponencial

    Energy Technology Data Exchange (ETDEWEB)

    Coronel B, H.F.; Hernandez M, A.R.; Jimenez M, M.A. [Facultad de Fisica e Inteligencia Artificial, Universidad Veracruzana, A.P. 475, Xalapa, Veracruz (Mexico); Mora F, L.E. [CIMAT, A.P. 402, 36000 Guanajuato (Mexico)]. e-mail: hcoronel@uv.mx

    2007-07-01

    Empirical tests for pseudo random number generators based on the use of processes or physical models have been successfully used and are considered as complementary to theoretical tests of randomness. In this work a statistical methodology for evaluating the quality of pseudo random number generators is presented. The method is illustrated in the context of the so-called exponential decay process, using some pseudo random number generators commonly used in physics. (Author)

  14. A molecular protocol for diagnosing myotonic dystrophy.

    Science.gov (United States)

    Guida, M; Marger, R S; Papp, A C; Snyder, P J; Sedra, M S; Kissel, J T; Mendell, J R; Prior, T W

    1995-01-01

    Myotonic dystrophy (DM) is an autosomal dominant genetic disease caused by an unstable CTG repeat sequence in the 3' untranslated region of the myotonin protein kinase gene. The CTG repeat is present 5-30 times in the normal population, whereas DM patients have CTG expansions of 50 to several thousand repeats. The age of onset of the disorder and the severity of the phenotype is roughly correlated with the size of the CTG expansion. We developed a molecular protocol for the diagnosis of DM based on an initial polymerase chain reaction screen to detect normal-sized alleles and small expansions, followed by an improved Southern protocol to detect larger expansions.

  15. Orthopedic Treatment of Maxillary Expansion: A Review of the Literature

    OpenAIRE

    Sylvia Ng; Minjie Li; Yanqi Yang

    2015-01-01

    Transverse maxillary deficiency, no matter in adolescents or in adults, is frequently seen in the patients seeking orthodontic treatment. The treatment goal of detaching the midpalatal suture can be achieved using an expansion device. In present article we give a review on various palatal expansion appliances and treatment protocol. A comprehensive search of the literatures was performed to observe the regime of different maxillary expansion appliances and therapies.

  16. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  17. Bridges Expansion Joints

    OpenAIRE

    Sergey W. Kozlachkow

    2012-01-01

    The survey is concerned with the expansion joints, used in bridge constructions to compensate medium and significant operational linear and spatial displacements between adjacent spans or between bridge span and pier. The analysis of design features of these types of expansion joints, their advantages and disadvantages, based on operational experience justified the necessity to design constructions, meeting the modern demands imposed to expansion joints.

  18. On skin expansion.

    Science.gov (United States)

    Pamplona, Djenane C; Velloso, Raquel Q; Radwanski, Henrique N

    2014-01-01

    This article discusses skin expansion without considering cellular growth of the skin. An in vivo analysis was carried out that involved expansion at three different sites on one patient, allowing for the observation of the relaxation process. Those measurements were used to characterize the human skin of the thorax during the surgical process of skin expansion. A comparison between the in vivo results and the numerical finite elements model of the expansion was used to identify the material elastic parameters of the skin of the thorax of that patient. Delfino's constitutive equation was chosen to model the in vivo results. The skin is considered to be an isotropic, homogeneous, hyperelastic, and incompressible membrane. When the skin is extended, such as with expanders, the collagen fibers are also extended and cause stiffening in the skin, which results in increasing resistance to expansion or further stretching. We observed this phenomenon as an increase in the parameters as subsequent expansions continued. The number and shape of the skin expanders used in expansions were also studied, both mathematically and experimentally. The choice of the site where the expansion should be performed is discussed to enlighten problems that can lead to frustrated skin expansions. These results are very encouraging and provide insight into our understanding of the behavior of stretched skin by expansion. To our knowledge, this study has provided results that considerably improve our understanding of the behavior of human skin under expansion. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Fully digital jerk-based chaotic oscillators for high throughput pseudo-random number generators up to 8.77Gbits/s

    KAUST Repository

    Mansingka, Abhinav S.

    2014-06-18

    This paper introduces fully digital implementations of four di erent systems in the 3rd order jerk-equation based chaotic family using the Euler approximation. The digitization approach enables controllable chaotic systems that reliably provide sinusoidal or chaotic output based on a selection input. New systems are introduced, derived using logical and arithmetic operations between two system implementations of different bus widths, with up to 100x higher maximum Lyapunov exponent than the original jerkequation based chaotic systems. The resulting chaotic output is shown to pass the NIST sp. 800-22 statistical test suite for pseudorandom number generators without post-processing by only eliminating the statistically defective bits. The systems are designed in Verilog HDL and experimentally verified on a Xilinx Virtex 4 FPGA for a maximum throughput of 15.59 Gbits/s for the native chaotic output and 8.77 Gbits/s for the resulting pseudo-random number generators.

  20. RFID authentication protocol to enhance patient medication safety.

    Science.gov (United States)

    Kaul, Sonam Devgan; Awasthi, Amit K

    2013-12-01

    Medication errors can cause substantial harm to patients. Automated patient medication system with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personalized patient medication and identification and also to provide counterfeit protection to the patients. In order to enhance medication safety for patients we propose a new dynamic ID based lightweight RFID authentication protocol. Due to low storage capacity and limited computational and communicational capacity of tags, only pseudo random number generator function, one way hash function and bitwise Xor operation are used in our authentication protocol. The proposed protocol is practical, secure and efficient for health care domain.

  1. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... real-world cases, a large probability of being caught is sufficient to prevent the adversary from trying to cheat. We show how to compile a passively secure protocol for honest majority into a protocol that is secure against covert attacks, again for honest majority. The transformed protocol catches...... cheating with probability 1/4 . Though we present no implementation of this compiler, we believe it will be very efficient and practical to implement using, say, VIFF. The cost of the modified protocol is essentially twice that of the original plus an overhead that only depends on the number of inputs. We...

  2. Bridges Expansion Joints

    Directory of Open Access Journals (Sweden)

    Sergey W. Kozlachkow

    2012-05-01

    Full Text Available The survey is concerned with the expansion joints, used in bridge constructions to compensate medium and significant operational linear and spatial displacements between adjacent spans or between bridge span and pier. The analysis of design features of these types of expansion joints, their advantages and disadvantages, based on operational experience justified the necessity to design constructions, meeting the modern demands imposed to expansion joints.

  3. Bridges Expansion Joints

    National Research Council Canada - National Science Library

    Sergey W. Kozlachkow

    2012-01-01

    .... The analysis of design features of these types of expansion joints, their advantages and disadvantages, based on operational experience justified the necessity to design constructions, meeting...

  4. (dtltt) protocol

    African Journals Online (AJOL)

    2013-03-01

    Mar 1, 2013 ... STLODGSTT protocol uses static value of threshold bandwidth to allocate available bandwidth to the asynchronous traffic, as such, the ... 12, 13 ] SAFENET [14], Manufacturing Automation. Protocol (MAP) [15], High-Speed ... the threshold bandwidth used in allocating available bandwidth to the n heavily ...

  5. Design of high-throughput and low-power true random number generator utilizing perpendicularly magnetized voltage-controlled magnetic tunnel junction

    Directory of Open Access Journals (Sweden)

    Hochul Lee

    2017-05-01

    Full Text Available A true random number generator based on perpendicularly magnetized voltage-controlled magnetic tunnel junction devices (MRNG is presented. Unlike MTJs used in memory applications where a stable bit is needed to store information, in this work, the MTJ is intentionally designed with small perpendicular magnetic anisotropy (PMA. This allows one to take advantage of the thermally activated fluctuations of its free layer as a stochastic noise source. Furthermore, we take advantage of the voltage dependence of anisotropy to temporarily change the MTJ state into an unstable state when a voltage is applied. Since the MTJ has two energetically stable states, the final state is randomly chosen by thermal fluctuation. The voltage controlled magnetic anisotropy (VCMA effect is used to generate the metastable state of the MTJ by lowering its energy barrier. The proposed MRNG achieves a high throughput (32 Gbps by implementing a 64×64 MTJ array into CMOS circuits and executing operations in a parallel manner. Furthermore, the circuit consumes very low energy to generate a random bit (31.5 fJ/bit due to the high energy efficiency of the voltage-controlled MTJ switching.

  6. Generation of multi-channel high-speed physical random numbers originated from two chaotic signals of mutually coupled semiconductor lasers

    Science.gov (United States)

    Tang, X.; Wu, Z. M.; Wu, J. G.; Deng, T.; Fan, L.; Zhong, Z. Q.; Chen, J. J.; Xia, G. Q.

    2015-01-01

    We propose and experimentally demonstrate a novel technique to generate multi-channel high-speed physical random numbers (PRNs) by taking two chaotic signal outputs from mutually coupled semiconductor lasers (MC-SLs) as entropy sources. First, through controlling the operation parameters of the MC-SL system, two time-delay signature (TDS) suppressed chaotic signals can be obtained. Next, each of these two chaotic signals is sampled by an 8 bit analog-to-digital converter (ADC) with a sampling rate of 10 GHz, and then a bitwise exclusive-OR (XOR) operation on the corresponding bits in samples of the chaotic signal and its time delayed signal is implemented to obtain 8 bit XOR data. Furthermore, through selecting the five least significant bits (LSBs) of 8 bit XOR data to form 5 bit Boolean sequences, two sets of PRN streams with a rate up to 50 Gbits s-1 are generated and successfully pass the NIST statistical tests. Finally, merging these two sets of 50 Gbits s-1 PRN streams by an interleaving operation, another set of the 100 Gbits s-1 PRN stream, which meets all the quality criteria of NIST statistical tests, is also acquired.

  7. Design of high-throughput and low-power true random number generator utilizing perpendicularly magnetized voltage-controlled magnetic tunnel junction

    Science.gov (United States)

    Lee, Hochul; Ebrahimi, Farbod; Amiri, Pedram Khalili; Wang, Kang L.

    2017-05-01

    A true random number generator based on perpendicularly magnetized voltage-controlled magnetic tunnel junction devices (MRNG) is presented. Unlike MTJs used in memory applications where a stable bit is needed to store information, in this work, the MTJ is intentionally designed with small perpendicular magnetic anisotropy (PMA). This allows one to take advantage of the thermally activated fluctuations of its free layer as a stochastic noise source. Furthermore, we take advantage of the voltage dependence of anisotropy to temporarily change the MTJ state into an unstable state when a voltage is applied. Since the MTJ has two energetically stable states, the final state is randomly chosen by thermal fluctuation. The voltage controlled magnetic anisotropy (VCMA) effect is used to generate the metastable state of the MTJ by lowering its energy barrier. The proposed MRNG achieves a high throughput (32 Gbps) by implementing a 64 ×64 MTJ array into CMOS circuits and executing operations in a parallel manner. Furthermore, the circuit consumes very low energy to generate a random bit (31.5 fJ/bit) due to the high energy efficiency of the voltage-controlled MTJ switching.

  8. Private randomness expansion with untrusted devices

    Energy Technology Data Exchange (ETDEWEB)

    Colbeck, Roger; Kent, Adrian, E-mail: rcolbeck@perimeterinstitute.ca, E-mail: a.p.a.kent@damtp.cam.ac.uk [Perimeter Institute for Theoretical Physics, 31 Caroline Street North, Waterloo, ON N2L 2Y5 (Canada)

    2011-03-04

    Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices-even ones created by an adversarial agent-while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.

  9. Effect of maxillary protraction with alternating rapid palatal expansion and constriction vs expansion alone in maxillary retrusive patients: a single-center, randomized controlled trial.

    Science.gov (United States)

    Liu, Weitao; Zhou, Yanheng; Wang, Xuedong; Liu, Dawei; Zhou, Shaonan

    2015-10-01

    The objective of this randomized controlled trial was to investigate the effects of facemask protraction combined with alternating rapid palatal expansion and constriction (RPE/C) vs rapid palatal expansion (RPE) alone in the early treatment of maxillary retrusive patients. Patients with a midface deficiency were recruited and randomly allocated into either the control group (RPE) or the intervention group (RPE/C). Eligibility criteria included the following: age 7 to 13 years old, Class III malocclusion, anterior crossbite, ANB less than 0°, Wits appraisal less than -2 mm, A-Np less than 0 mm, and no cleft of lip or palate. The primary outcome was the degree of maxillary forward movement after treatment. The secondary outcomes were the changes of the other cephalometric variables after treatment and the treatment time. Simple randomization was carried out using a random number table at the beginning of the study. Envelopes containing the grouping information were used to ensure allocation concealment from the researchers. Blinding was applicable for cephalometric analysis only. Hyrax palatal expanders and facemask maxillary protraction were used in all patients. Patients in the RPE group were treated with rapid palatal expansion for 1 week. Patients in the RPE/C group were treated with RPE/C for 7 weeks. The expansion or constriction rate was 1 mm per day. Cephalometric analysis with traditional cephalometric measurements and an x-y coordinate system were used to compare the pretreatment and posttreatment cephalometric radiographs. Independent t tests were used to compare the data between the 2 groups. A total of 44 patients were randomized to either the RPE group or the RPE/C group in a 1:1 ratio. One subject in the RPE group was lost to follow-up during the treatment. Per-protocol analysis was used. All the other 43 patients reached the treatment completion criteria and were analyzed (RPE group: n = 21; RPE/C group: n = 22). The average protraction time was 10

  10. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  11. Conformal expansions and renormalons

    CERN Document Server

    Brodsky, S J; Grunberg, G; Rathsman, J; Brodsky, Stanley J.; Gardi, Einan; Grunberg, Georges; Rathsman, Johan

    2001-01-01

    The coefficients in perturbative expansions in gauge theories are factoriallyincreasing, predominantly due to renormalons. This type of factorial increaseis not expected in conformal theories. In QCD conformal relations betweenobservables can be defined in the presence of a perturbative infraredfixed-point. Using the Banks-Zaks expansion we study the effect of thelarge-order behavior of the perturbative series on the conformal coefficients.We find that in general these coefficients become factorially increasing.However, when the factorial behavior genuinely originates in a renormalonintegral, as implied by a postulated skeleton expansion, it does not affect theconformal coefficients. As a consequence, the conformal coefficients willindeed be free of renormalon divergence, in accordance with previousobservations concerning the smallness of these coefficients for specificobservables. We further show that the correspondence of the BLM method with theskeleton expansion implies a unique scale-setting procedure. Th...

  12. Resonant state expansions

    Energy Technology Data Exchange (ETDEWEB)

    Lind, P.

    1993-02-01

    The completeness properties of the discrete set of bound state, virtual states and resonances characterizing the system of a single nonrelativistic particle moving in a central cutoff potential is investigated. From a completeness relation in terms of these discrete states and complex scattering states one can derive several Resonant State Expansions (RSE). It is interesting to obtain purely discrete expansion which, if valid, would significantly simplify the treatment of the continuum. Such expansions can be derived using Mittag-Leffler (ML) theory for a cutoff potential and it would be nice to see if one can obtain the same expansions starting from an eigenfunction theory that is not restricted to a finite sphere. The RSE of Greens functions is especially important, e.g. in the continuum RPA (CRPA) method of treating giant resonances in nuclear physics. The convergence of RSE is studied in simple cases using square well wavefunctions in order to achieve high numerical accuracy. Several expansions can be derived from each other by using the theory of analytic functions and one can the see how to obtain a natural discretization of the continuum. Since the resonance wavefunctions are oscillating with an exponentially increasing amplitude, and therefore have to be interpreted through some regularization procedure, every statement made about quantities involving such states is checked by numerical calculations.Realistic nuclear wavefunctions, generated by a Wood-Saxon potential, are used to test also the usefulness of RSE in a realistic nuclear calculation. There are some fundamental differences between different symmetries of the integral contour that defines the continuum in RSE. One kind of symmetry is necessary to have an expansion of the unity operator that is idempotent. Another symmetry must be used if we want purely discrete expansions. These are found to be of the same form as given by ML. (29 refs.).

  13. Virial Expansion Bounds

    Science.gov (United States)

    Tate, Stephen James

    2013-10-01

    In the 1960s, the technique of using cluster expansion bounds in order to achieve bounds on the virial expansion was developed by Lebowitz and Penrose (J. Math. Phys. 5:841, 1964) and Ruelle (Statistical Mechanics: Rigorous Results. Benjamin, Elmsford, 1969). This technique is generalised to more recent cluster expansion bounds by Poghosyan and Ueltschi (J. Math. Phys. 50:053509, 2009), which are related to the work of Procacci (J. Stat. Phys. 129:171, 2007) and the tree-graph identity, detailed by Brydges (Phénomènes Critiques, Systèmes Aléatoires, Théories de Jauge. Les Houches 1984, pp. 129-183, 1986). The bounds achieved by Lebowitz and Penrose can also be sharpened by doing the actual optimisation and achieving expressions in terms of the Lambert W-function. The different bound from the cluster expansion shows some improvements for bounds on the convergence of the virial expansion in the case of positive potentials, which are allowed to have a hard core.

  14. Proper protocol

    NARCIS (Netherlands)

    F. Arbab (Farhad)

    2016-01-01

    textabstractTreating interaction as an explicit first-class concept, complete with its own composition operators, leads to a model of concurrency that allows direct specification and manipulation of protocols as proper mathematical objects. Reo [2,5,6,8] serves as a premier example of such an

  15. Wake Expansion Models

    DEFF Research Database (Denmark)

    Branlard, Emmanuel Simon Pierre

    2017-01-01

    Different models of wake expansion are presented in this chapter: the 1D momentum theory model, the cylinder analog model and Theodorsen’s model. Far wake models such as the ones from Frandsen or Rathmann or only briefly mentioned. The different models are compared to each other. Results from thi...... this chapter are used in Chap. 16 to link near-wake and far-wake parameters and in Chap. 20 to study the influence of expansion on tip-losses....

  16. Nuclear expansion with excitation

    Energy Technology Data Exchange (ETDEWEB)

    De, J.N. [Saha Institute of Nuclear Physics, 1/AF Bidhannagar, Kolkata 700064 (India); Departament d' Estructura i Constituents de la Materia, Facultat de Fisica, Universitat de Barcelona, Diagonal 647, 08028 Barcelona (Spain); Samaddar, S.K. [Saha Institute of Nuclear Physics, 1/AF Bidhannagar, Kolkata 700064 (India); Vinas, X. [Departament d' Estructura i Constituents de la Materia, Facultat de Fisica, Universitat de Barcelona, Diagonal 647, 08028 Barcelona (Spain); Centelles, M. [Departament d' Estructura i Constituents de la Materia, Facultat de Fisica, Universitat de Barcelona, Diagonal 647, 08028 Barcelona (Spain)]. E-mail: mario@ecm.ub.es

    2006-07-06

    The expansion of an isolated hot spherical nucleus with excitation energy and its caloric curve are studied in a thermodynamic model with the SkM{sup *} force as the nuclear effective two-body interaction. The calted results are shown to compare well with the recent experimental data from energetic nuclear collisions. The fluctuations in temperature and density are also studied. They are seen to build up very rapidly beyond an excitation energy of {approx}9 MeV/u. Volume-conserving quadrupole deformation in addition to expansion indicates, however, nuclear disassembly above an excitation energy of {approx}4 MeV/u.

  17. Uniform gradient expansions

    Directory of Open Access Journals (Sweden)

    Massimo Giovannini

    2015-06-01

    Full Text Available Cosmological singularities are often discussed by means of a gradient expansion that can also describe, during a quasi-de Sitter phase, the progressive suppression of curvature inhomogeneities. While the inflationary event horizon is being formed the two mentioned regimes coexist and a uniform expansion can be conceived and applied to the evolution of spatial gradients across the protoinflationary boundary. It is argued that conventional arguments addressing the preinflationary initial conditions are necessary but generally not sufficient to guarantee a homogeneous onset of the conventional inflationary stage.

  18. AUTO-EXPANSIVE FLOW

    Science.gov (United States)

    Physics suggests that the interplay of momentum, continuity, and geometry in outward radial flow must produce density and concomitant pressure reductions. In other words, this flow is intrinsically auto-expansive. It has been proposed that this process is the key to understanding...

  19. Rethinking expansive learning

    DEFF Research Database (Denmark)

    Kolbæk, Ditte; Lundh Snis, Ulrika

    discussion forum on Google groups, they created new ways of reflecting and learning. We used netnography to select qualitative postings from the online community and expansive learning concepts for data analysis. The findings show how students changed practices of organisational learning...

  20. IKEA's International Expansion

    OpenAIRE

    Harapiak, Clayton

    2013-01-01

    This case concerns a global retailing firm that is dealing with strategic management and marketing issues. Applying a scenario of international expansion, this case provides a thorough analysis of the current business environment for IKEA. Utilizing a variety of methods (e.g. SWOT, PESTLE, McKinsey Matrix) the overall objective is to provide students with the opportunity to apply their research skills and knowledge regarding a highly competitive industry to develop strategic marketing strateg...

  1. Cone-Beam computed tomography evaluation of maxillary expansion in twins with cleft lip and palate

    OpenAIRE

    Luciane Macedo de Menezes; Fabiane Azeredo; André Weissheimer; Juliana Lindemann Rizzato; Susana Maria Deon Rizzatto

    2012-01-01

    OBJECTIVE: The establishment of normal occlusal relationships in patients with cleft lip and palate using rapid maxillary expansion may promote good conditions for future rehabilitation. OBJECTIVE: This study describes the clinical case of monozygotic twins with unilateral cleft lip and palate at the age of mixed dentition, who were treated using the same rapid maxillary expansion protocol, but with two different screws (conventional and fan-type expansion screw). Results were evaluated using...

  2. Análise morfológica do arco superior de portadores de fissura labiopalatal submetidos a diferentes protocolos de expansão rápida maxilar: avaliação das alterações maxilares Morphological analysis of the maxillary arch in patients with cleft lip and palate submitted to different protocols of rapid maxillary expansion: maxillary alterations evaluation

    Directory of Open Access Journals (Sweden)

    Maíra Massuia de Souza

    2009-10-01

    transverse dimensions of maxillary dental arches by analysis of the dental casts of 15 patients with complete unilateral cleft lip and palate who presented sagittal and transverse maxillary constriction and were submitted to two distinct protocols of rapid maxillary expansion. METHODS: Seven patients were submitted to rapid maxillary expansion (RME by the conventional activation protocol (Group 1, and the others were treated by the protocol proposed by Liou and Tsai in 2005, with alternated expansion and constriction (Group 2. Both groups were later submitted to maxillary protraction with facial mask. Dental casts were obtained at two periods: before placement of a modified Haas expander (T1 and after 24 weeks of treatment (T2. Transverse distances were measured with a digital caliper to register the distances between first upper premolars (anterior area and first upper molars (posterior area. Data were statistically analyzed by the Student's t test. RESULTS AND CONCLUSION: Both protocols were equally effective, since no differences were observed between the groups as to the transverse increasing achieved.

  3. Character expansion of matrix integrals

    OpenAIRE

    van de Leur, J. W.; Orlov, A. Yu.

    2016-01-01

    We consider character expansion of tau functions and multiple integrals in characters of orhtogonal and symplectic groups. In particular we consider character expansions of integrals over orthogonal and over symplectic matrices.

  4. Yoga protocol for treatment of breast cancer-related lymphedema

    Directory of Open Access Journals (Sweden)

    S R Narahari

    2016-01-01

    Discussion: Yoga exercises were selected on the basis of their role in chest expansion, maximizing range of movements: flexion of large muscles, maximum stretch of skin, and thus part-by-part lymph drainage from center and periphery. This protocol addressed functional, volume, and movement issues of BCRL and was found to be superior to other BCRL yoga protocols. However, this protocol needs to be tested in centers routinely managing BCRL.

  5. Quantum Information Protocols with Gaussian States of Light

    DEFF Research Database (Denmark)

    Jacobsen, Christian Scheffmann

    Quantum cryptography is widely regarded as the most mature field within the context of quantum information in the sense that its application and development has produced companies that base their products on genuine quantum mechanical principles. Examples include quantum random number generators...... and hardware for secure quantum key distribution. These technologies directly exploit quantum effects, and indeed this is where they offer advantages to classical products. This thesis deals with the development and implementation of quantum information protocols that utilize the rather inexpensive resource...... of Gaussian states. A quantum information protocol is essentially a sequence of state exchanges between some number of parties and a certain ordering of quantum mechanical unitary operators performed by these parties. An example of this is the famous BB84 protocol for secret key generation, where photons...

  6. Conformal expansions and renormalons

    CERN Document Server

    Gardi, E; Gardi, Einan; Grunberg, Georges

    2001-01-01

    The large-order behaviour of QCD is dominated by renormalons. On the other hand renormalons do not occur in conformal theories, such as the one describing the infrared fixed-point of QCD at small beta_0 (the Banks--Zaks limit). Since the fixed-point has a perturbative realization, all-order perturbative relations exist between the conformal coefficients, which are renormalon-free, and the standard perturbative coefficients, which contain renormalons. Therefore, an explicit cancellation of renormalons should occur in these relations. The absence of renormalons in the conformal limit can thus be seen as a constraint on the structure of the QCD perturbative expansion. We show that the conformal constraint is non-trivial: a generic model for the large-order behaviour violates it. We also analyse a specific example, based on a renormalon-type integral over the two-loop running-coupling, where the required cancellation does occur.

  7. Dynamic protocol stack composition: protocol independent addressing

    OpenAIRE

    Michiels, Sam; Mahieu, Tom; Matthijs, Frank; Verbaeten, Pierre

    2001-01-01

    This paper presents a generic addressing framework (GAF) which enables the development of protocol stack independent applications. This framework has been developed in the context of dynamic protocol stack composition. Having a way to compose and build protocol stacks is not sufficient. The protocol layers a stack is composed of have an impact on the addressing used inside the stack. Since addresses are used by applications, the impact of modifying the stack dynamically is not automaticall...

  8. Permissible limit for mandibular expansion.

    Science.gov (United States)

    Motoyoshi, Mitsuru; Shirai, Sawa; Yano, Shinya; Nakanishi, Kotoe; Shimizu, Noriyoshi

    2005-04-01

    In recent years, mandibular expansion has been increasingly performed in conjunction with orthodontic treatment. Lateral tipping of the molars associated with mandibular expansion should, however, be considered, because excessive expansion may result in excessive buccal tooth inclination, which may disturb the occlusal relationship. This study was conducted to quantitatively clarify molar movement during mandibular expansion using the Schwarz appliance to determine the permissible limit of mandibular expansion as a clinical index for inclination movement. Inclinations in the masticatory surface of the first molar and intermolar width were measured before expansion (T1), after expansion (T2), and before edgewise treatment (T3). Lower plaster models from 29 subjects treated with expansion plates were used and compared with models from 11 control subjects with normal occlusion. The average treatment change (T1-T2) in intermolar width was 5.42 mm (standard deviation 1.98), and the average angle of buccal tooth inclination was 10.16 degrees (standard deviation 3.83). No significant correlation was found between age prior to treatment and the treatment period when they were compared with the intermolar width increments and inclination angles. There was a significant positive correlation between retention duration and the amount of expansion. The regression coefficient of the angle of buccal tooth inclination during expansion to the increment of the intermolar width was approximately 0.2. This means that 1 mm of expansion is accompanied by 5 degrees of molar lateral tipping. This coefficient is clinically useful for estimating the permissible limit for mandibular expansion.

  9. Burial Ground Expansion Hydrogeologic Characterization

    Energy Technology Data Exchange (ETDEWEB)

    Gaughan , T.F.

    1999-02-26

    Sirrine Environmental Consultants provided technical oversight of the installation of eighteen groundwater monitoring wells and six exploratory borings around the location of the Burial Ground Expansion.

  10. Quantum adiabatic protocols using emergent local Hamiltonians.

    Science.gov (United States)

    Modak, Ranjan; Vidmar, Lev; Rigol, Marcos

    2017-10-01

    We present two applications of emergent local Hamiltonians to speed up quantum adiabatic protocols for isolated noninteracting and weakly interacting fermionic systems in one-dimensional lattices. We demonstrate how to extract maximal work from initial band-insulating states, and how to adiabatically transfer systems from linear and harmonic traps into box traps. Our protocols consist of two stages. The first one involves a free expansion followed by a quench to an emergent local Hamiltonian. In the second stage, the emergent local Hamiltonian is "turned off" quasistatically. For the adiabatic transfer from a harmonic trap, we consider both zero- and nonzero-temperature initial states.

  11. Convergence of generalized eigenfunction expansions

    Directory of Open Access Journals (Sweden)

    Mayumi Sakata

    2007-05-01

    Full Text Available We present a simplified theory of generalized eigenfunction expansions for a commuting family of bounded operators and with finitely many unbounded operators. We also study the convergence of these expansions, giving an abstract type of uniform convergence result, and illustrate the theory by giving two examples: The Fourier transform on Hecke operators, and the Laplacian operators in hyperbolic spaces.

  12. On the Bantu expansion.

    Science.gov (United States)

    Rowold, Daine J; Perez-Benedico, David; Stojkovic, Oliver; Garcia-Bertrand, Ralph; Herrera, Rene J

    2016-11-15

    Here we report the results of fine resolution Y chromosomal analyses (Y-SNP and Y-STR) of 267 Bantu-speaking males from three populations located in the southeast region of Africa. In an effort to determine the relative Y chromosomal affinities of these three genotyped populations, the findings are interpreted in the context of 74 geographically and ethnically targeted African reference populations representing four major ethno-linguistic groups (Afro-Asiatic, Niger Kordofanin, Khoisan and Pygmoid). In this investigation, we detected a general similarity in the Y chromosome lineages among the geographically dispersed Bantu-speaking populations suggesting a shared heritage and the shallow time depth of the Bantu Expansion. Also, micro-variations in the Bantu Y chromosomal composition across the continent highlight location-specific gene flow patterns with non-Bantu-speaking populations (Khoisan, Pygmy, Afro-Asiatic). Our Y chromosomal results also indicate that the three Bantu-speaking Southeast populations genotyped exhibit unique gene flow patterns involving Eurasian populations but fail to reveal a prevailing genetic affinity to East or Central African Bantu-speaking groups. In addition, the Y-SNP data underscores a longitudinal partitioning in sub-Sahara Africa of two R1b1 subgroups, R1b1-P25* (west) and R1b1a2-M269 (east). No evidence was observed linking the B2a haplogroup detected in the genotyped Southeast African Bantu-speaking populations to gene flow from contemporary Khoisan groups. Copyright © 2016 Elsevier B.V. All rights reserved.

  13. SPRNG Scalable Parallel Random Number Generator LIbrary

    Energy Technology Data Exchange (ETDEWEB)

    2010-03-16

    This revision corrects some errors in SPRNG 1. Users of newer SPRNG versions can obtain the corrected files and build their version with it. This version also improves the scalability of some of the application-based tests in the SPRNG test suite. It also includes an interface to a parallel Mersenne Twister, so that if users install the Mersenne Twister, then they can test this generator with the SPRNG test suite and also use some SPRNG features with that generator.

  14. Random Number Generation: A Practitioner's Overview

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    About the speaker Dr. Mascagni is full professor at Florida State University, where he runs a research group consisting of post-doctoral associates, graduate students, and undergraduate workers. The areas they work on are p...

  15. Analysis of Additive Random Number Generators.

    Science.gov (United States)

    1977-03-01

    CLASSIFICATION OF THIS PAGE (When Data Entered; I .,.,•• n .„^iMl~^.-». H .,il~l.*...,...-•..,.,.., • 1 ——’"- •"•’ ANALYSIS OF ADDITIVE RANDOM...among my teachers two of the best: my parents, Bil and Marleen Reiser. - , i — - •- - J I " ii. .1 I l. Kl U...the period, we know that r(pa*z) * pr(pa) and k - • - ----• •--- - -— — ...., . H ..J 1-..11.111 ’ Introduction that r(pa *’) divides

  16. Random Number Generation for High Performance Computing

    Science.gov (United States)

    2015-01-01

    issued patent and patent application are included as appendices in the pdf file accompanying this final report. Received Book TOTAL: Received Book Chapter...plan, the product of research undertaken by Silicon Informatics, KEYW Corporation and the UTSA Center for Innovation and Technology Entrepreneurship

  17. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  18. TOPICAL REVIEW: Negative thermal expansion

    Science.gov (United States)

    Barrera, G. D.; Bruno, J. A. O.; Barron, T. H. K.; Allan, N. L.

    2005-02-01

    There has been substantial renewed interest in negative thermal expansion following the discovery that cubic ZrW2O8 contracts over a temperature range in excess of 1000 K. Substances of many different kinds show negative thermal expansion, especially at low temperatures. In this article we review the underlying thermodynamics, emphasizing the roles of thermal stress and elasticity. We also discuss vibrational and non-vibrational mechanisms operating on the atomic scale that are responsible for negative expansion, both isotropic and anisotropic, in a wide range of materials.

  19. Thermal Expansion of Polyurethane Foam

    Science.gov (United States)

    Lerch, Bradley A.; Sullivan, Roy M.

    2006-01-01

    Closed cell foams are often used for thermal insulation. In the case of the Space Shuttle, the External Tank uses several thermal protection systems to maintain the temperature of the cryogenic fuels. A few of these systems are polyurethane, closed cell foams. In an attempt to better understand the foam behavior on the tank, we are in the process of developing and improving thermal-mechanical models for the foams. These models will start at the microstructural level and progress to the overall structural behavior of the foams on the tank. One of the key properties for model characterization and verification is thermal expansion. Since the foam is not a material, but a structure, the modeling of the expansion is complex. It is also exacerbated by the anisoptropy of the material. During the spraying and foaming process, the cells become elongated in the rise direction and this imparts different properties in the rise direction than in the transverse directions. Our approach is to treat the foam as a two part structure consisting of the polymeric cell structure and the gas inside the cells. The polymeric skeleton has a thermal expansion of its own which is derived from the basic polymer chemistry. However, a major contributor to the thermal expansion is the volume change associated with the gas inside of the closed cells. As this gas expands it exerts pressure on the cell walls and changes the shape and size of the cells. The amount that this occurs depends on the elastic and viscoplastic properties of the polymer skeleton. The more compliant the polymeric skeleton, the more influence the gas pressure has on the expansion. An additional influence on the expansion process is that the polymeric skeleton begins to breakdown at elevated temperatures and releases additional gas species into the cell interiors, adding to the gas pressure. The fact that this is such a complex process makes thermal expansion ideal for testing the models. This report focuses on the thermal

  20. Strategic Complexity and Global Expansion

    DEFF Research Database (Denmark)

    Oladottir, Asta Dis; Hobdari, Bersant; Papanastassiou, Marina

    2012-01-01

    The purpose of this paper is to analyse the determinants of global expansion strategies of newcomer Multinational Corporations (MNCs) by focusing on Iceland, Israel and Ireland. We argue that newcomer MNCs from small open economies pursue complex global expansion strategies (CGES). We distinguish....... The empirical evidence suggests that newcomer MNCs move away from simplistic dualities in the formulation of their strategic choices towards more complex options as a means of maintaining and enhancing their global competitiveness....

  1. Estimates of expansion time scales

    Science.gov (United States)

    Jones, E. M.

    Monte Carlo simulations of the expansion of a spacefaring civilization show that descendants of that civilization should be found near virtually every useful star in the Galaxy in a time much less than the current age of the Galaxy. Only extreme assumptions about local population growth rates, emigration rates, or ship ranges can slow or halt an expansion. The apparent absence of extraterrestrials from the solar system suggests that no such civilization has arisen in the Galaxy.

  2. Automating Security Protocol Analysis

    National Research Council Canada - National Science Library

    Mancini, Stephen

    2004-01-01

    .... Because of this, analysis of the protocol outside the encryption is becoming more important. Recent work by Joshua Guttman and others 9 have identified several properties that good protocols often exhibit...

  3. Reed's Conjecture on hole expansions

    CERN Document Server

    Fouquet, Jean-Luc

    2012-01-01

    In 1998, Reed conjectured that for any graph $G$, $\\chi(G) \\leq \\lceil \\frac{\\omega(G) + \\Delta(G)+1}{2}\\rceil$, where $\\chi(G)$, $\\omega(G)$, and $\\Delta(G)$ respectively denote the chromatic number, the clique number and the maximum degree of $G$. In this paper, we study this conjecture for some {\\em expansions} of graphs, that is graphs obtained with the well known operation {\\em composition} of graphs. We prove that Reed's Conjecture holds for expansions of bipartite graphs, for expansions of odd holes where the minimum chromatic number of the components is even, when some component of the expansion has chromatic number 1 or when a component induces a bipartite graph. Moreover, Reed's Conjecture holds if all components have the same chromatic number, if the components have chromatic number at most 4 and when the odd hole has length 5. Finally, when $G$ is an odd hole expansion, we prove $\\chi(G)\\leq\\lceil\\frac{\\omega(G)+\\Delta(G)+1}{2}\\rceil+1$.

  4. Blind Collective Signature Protocol

    Directory of Open Access Journals (Sweden)

    Nikolay A. Moldovyan

    2011-06-01

    Full Text Available Using the digital signature (DS scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implementation of the blind multisignature schemes that is a novel type of the signature schemes. The proposed protocols are the first implementations of the multisignature schemes based on Belarusian signature standard.

  5. Low thermal expansion glass ceramics

    CERN Document Server

    1995-01-01

    This book is one of a series reporting on international research and development activities conducted by the Schott group of companies With the series, Schott aims to provide an overview of its activities for scientists, engineers, and managers from all branches of industry worldwide where glasses and glass ceramics are of interest Each volume begins with a chapter providing a general idea of the current problems, results, and trends relating to the subjects treated This volume describes the fundamental principles, the manufacturing process, and applications of low thermal expansion glass ceramics The composition, structure, and stability of polycrystalline materials having a low thermal expansion are described, and it is shown how low thermal expansion glass ceramics can be manufactured from appropriately chosen glass compositions Examples illustrate the formation of this type of glass ceramic by utilizing normal production processes together with controlled crystallization Thus glass ceramics with thermal c...

  6. Low Thermal Expansion Glass Ceramics

    CERN Document Server

    Bach, Hans

    2005-01-01

    This book appears in the authoritative series reporting the international research and development activities conducted by the Schott group of companies. This series provides an overview of Schott's activities for scientists, engineers, and managers from all branches of industry worldwide in which glasses and glass ceramics are of interest. Each volume begins with a chapter providing a general idea of the current problems, results, and trends relating to the subjects treated. This new extended edition describes the fundamental principles, the manufacturing process, and applications of low thermal expansion glass ceramics. The composition, structure, and stability of polycrystalline materials having a low thermal expansion are described, and it is shown how low thermal expansion glass ceramics can be manufactured from appropriately chosen glass compositions. Examples illustrate the formation of this type of glass ceramic by utilizing normal production processes together with controlled crystallization. Thus g...

  7. Thermal Expansion of Hafnium Carbide

    Science.gov (United States)

    Grisaffe, Salvatore J.

    1960-01-01

    Since hafnium carbide (HfC) has a melting point of 7029 deg. F, it may have many high-temperature applications. A literature search uncovered very little information about the properties of HfC, and so a program was initiated at the Lewis Research Center to determine some of the physical properties of this material. This note presents the results of the thermal expansion investigation. The thermal-expansion measurements were made with a Gaertner dilatation interferometer calibrated to an accuracy of +/- 1 deg. F. This device indicates expansion by the movement of fringes produced by the cancellation and reinforcement of fixed wave-length light rays which are reflected from the surfaces of two parallel quartz glass disks. The test specimens which separate these disks are three small cones, each approximately 0.20 in. high.

  8. Repeated expansion in burn sequela.

    Science.gov (United States)

    Pitanguy, Ivo; Gontijo de Amorim, Natale Ferreira; Radwanski, Henrique N; Lintz, José Eduardo

    2002-08-01

    This paper presents a retrospective study of the use of 346 expanders in 132 patients operated at the Ivo Pitanguy Clinic, between the period of 1985 and 2000. The expanders were used in the treatment of burn sequela. In the majority of cases, more than one expander was used at the same time. In 42 patients, repeated tissue expansion was done. The re-expanded flaps demonstrated good distension and viability. With the increase in area at each new expansion, larger volume expanders were employed, achieving an adequate advancement of the flaps to remove the injured tissue. The great advantage of using tissue re-expansion in the burned patient is the reconstruction of extensive areas with the same color and texture of neighboring tissues, without the addition of new scars.

  9. 18 CFR 154.309 - Incremental expansions.

    Science.gov (United States)

    2010-04-01

    ... Changes § 154.309 Incremental expansions. (a) For every expansion for which incremental rates are charged... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Incremental expansions... incremental facilities to be rolled-in to the pipeline's rates. For every expansion that has an at-risk...

  10. Modeling Transport Layer Protocols

    Science.gov (United States)

    Sasnauskas, Raimondas; Weingaertner, Elias

    In a layered communication architecture, transport layer protocols handle the data exchange between processes on different hosts over potentially lossy communication channels. Typically, transport layer protocols are either connection-oriented or are based on the transmission of individual datagrams. Well known transport protocols are the connection-oriented Transmission Control Protocol (TCP) [372] and the User Datagram Protocol (UDP) [370] as well as the Stream Control Transmission Protocol (SCTP) [340] and DCCP, the Datagram Congestion Control Protocol [259]. In this chapter, we focus on the modeling process of the transport layer. While we mostly use TCP and UDP as a base of comparison from this point, we emphasize that the methodologies discussed further on are conferrable to virtually any transport layer in any layered communication architecture.

  11. Low-thermal expansion infrared glass ceramics

    Science.gov (United States)

    Lam, Philip

    2009-05-01

    L2 Tech, Inc. is in development of an innovative infrared-transparent glass ceramic material with low-thermal expansion (ZrW2O8) which has Negative Thermal Expansion (NTE). The glass phase is the infrared-transparent germanate glass which has positive thermal expansion (PTE). Then glass ceramic material has a balanced thermal expansion of near zero. The crystal structure is cubic and the thermal expansion of the glass ceramic is isotropic or equal in all directions.

  12. Expansive Openness in Teacher Practice

    Science.gov (United States)

    Kimmons, Royce

    2016-01-01

    Background/Context: Previous work on the use of open educational resources in K-12 classrooms has generally focused on issues related to cost. The current study takes a more expansive view of openness that also accounts for adaptation and sharing in authentic classroom contexts. Purpose/Objective/Research Question/Focus of Study The study seeks to…

  13. On Fourier re-expansions

    OpenAIRE

    Liflyand, E.

    2012-01-01

    We study an extension to Fourier transforms of the old problem on absolute convergence of the re-expansion in the sine (cosine) Fourier series of an absolutely convergent cosine (sine) Fourier series. The results are obtained by revealing certain relations between the Fourier transforms and their Hilbert transforms.

  14. On persistently positively expansive maps

    Directory of Open Access Journals (Sweden)

    Alexander Arbieto

    2010-06-01

    Full Text Available In this paper, we prove that any C¹-persistently positively expansive map is expanding. This improves a result due to Sakai (Sakai 2004.Neste artigo, mostramos que todo mapa C¹-persistentemente positivamente expansivo e expansor. Isto melhora um resultado devido a Sakai (Sakai 2004.

  15. The bootstrap and edgeworth expansion

    CERN Document Server

    Hall, Peter

    1992-01-01

    This monograph addresses two quite different topics, in the belief that each can shed light on the other. Firstly, it lays the foundation for a particular view of the bootstrap. Secondly, it gives an account of Edgeworth expansion. Chapter 1 is about the bootstrap, witih almost no mention of Edgeworth expansion; Chapter 2 is about Edgeworth expansion, with scarcely a word about the bootstrap; and Chapters 3 and 4 bring these two themes together, using Edgeworth expansion to explore and develop the properites of the bootstrap. The book is aimed a a graduate level audience who has some exposure to the methods of theoretical statistics. However, technical details are delayed until the last chapter (entitled "Details of Mathematical Rogour"), and so a mathematically able reader without knowledge of the rigorous theory of probability will have no trouble understanding the first four-fifths of the book. The book simultaneously fills two gaps in the literature; it provides a very readable graduate level account of t...

  16. Multiscale expansions in discrete world

    Indian Academy of Sciences (India)

    ... multiscale expansions discretely. The power of this manageable method is confirmed by applying it to two selected nonlinear Schrödinger evolution equations. This approach can also be applied to other nonlinear discrete evolution equations. All the computations have been made with Maple computer packet program.

  17. Large N Expansion. Vector Models

    OpenAIRE

    Nissimov, Emil; Pacheva, Svetlana

    2006-01-01

    Preliminary version of a contribution to the "Quantum Field Theory. Non-Perturbative QFT" topical area of "Modern Encyclopedia of Mathematical Physics" (SELECTA), eds. Aref'eva I, and Sternheimer D, Springer (2007). Consists of two parts - "main article" (Large N Expansion. Vector Models) and a "brief article" (BPHZL Renormalization).

  18. Effective Expansion: Balance between Shrinkage and Hygroscopic Expansion.

    Science.gov (United States)

    Suiter, E A; Watson, L E; Tantbirojn, D; Lou, J S B; Versluis, A

    2016-05-01

    The purpose of this study was to investigate the relationship between hygroscopic expansion and polymerization shrinkage for compensation of polymerization shrinkage stresses in a restored tooth. One resin-modified glass-ionomer (RMGI) (Ketac Nano, 3M ESPE), 2 compomers (Dyract, Dentsply; Compoglass, Ivoclar), and a universal resin-based composite (Esthet•X HD, Dentsply) were tested. Volumetric change after polymerization ("total shrinkage") and during 4 wk of water storage at 37°C was measured using an optical method (n= 10). Post-gel shrinkage was measured during polymerization using a strain gauge method (n= 10). Extracted human molars with large mesio-occluso-distal slot preparations were restored with the tested restorative materials. Tooth surfaces at baseline (preparation), after restoration, and during 4 wk of 37°C water storage were scanned with an optical scanner to determine cuspal flexure (n= 8). Occlusal interface integrity was measured using dye penetration. Data were analyzed using analysis of variance and post hoc tests (significance level 0.05). All tested materials shrunk after polymerization. RMGI had the highest total shrinkage (4.65%) but lowest post-gel shrinkage (0.35%). Shrinkage values dropped significantly during storage in water but had not completely compensated polymerization shrinkage after 4 wk. All restored teeth initially exhibited inward (negative) cuspal flexure due to polymerization shrinkage. Cuspal flexure with the RMGI restoration was significantly less (-6.4 µm) than with the other materials (-12.1 to -14.1 µm). After 1 d, cuspal flexure reversed to +5.0 µm cuspal expansion with the RMGI and increased to +9.3 µm at 4 wk. After 4 wk, hygroscopic expansion compensated cuspal flexure in a compomer (Compoglass) and reduced flexure with Dyract and resin-based composite. Marginal integrity (93.7% intact restoration wall) was best for the Compoglass restorations and lowest (73.1%) for the RMGI restorations. Hygroscopic

  19. Detecting Hidden Communications Protocols

    Science.gov (United States)

    2013-02-11

    CFG , we can build a LALR parser to parse the symbolized traffic data sets. After symbolization, we parse the training data sets to estimate a PCFG...HMMs to represent protocols in network, we have one assumption that the protocol has finite state. For context-free grammars ( CFGs ), they are in a...by a CFG , so it is more reasonable to use CFGs to model protocols. We started research with Probabilistic CFGs , where each production rule is

  20. Solution of Stochastic Nonlinear PDEs Using Automated Wiener-Hermite Expansion

    KAUST Repository

    Al-Juhani, Amnah

    2014-01-06

    The solution of the stochastic differential equations (SDEs) using Wiener-Hermite expansion (WHE) has the advantage of converting the problem to a system of deterministic equations that can be solved efficiently using the standard deterministic numerical methods [1]. The main statistics, such as the mean, covariance, and higher order statistical moments, can be calculated by simple formulae involving only the deterministic Wiener-Hermite coefficients. In WHE approach, there is no randomness directly involved in the computations. One does not have to rely on pseudo random number generators, and there is no need to solve the SDEs repeatedly for many realizations. Instead, the deterministic system is solved only once. For previous research efforts see [2, 4].

  1. A TNFR2-Agonist Facilitates High Purity Expansion of Human Low Purity Treg Cells.

    Directory of Open Access Journals (Sweden)

    Xuehui He

    Full Text Available Regulatory T cells (Treg are important for immune homeostasis and are considered of great interest for immunotherapy. The paucity of Treg numbers requires the need for ex vivo expansion. Although therapeutic Treg flow-sorting is feasible, most centers aiming at Treg-based therapy focus on magnetic bead isolation of CD4+CD25+ Treg using a good manufacturing practice compliant closed system that achieves lower levels of cell purity. Polyclonal Treg expansion protocols commonly use anti-CD3 plus anti-CD28 monoclonal antibody (mAb stimulation in the presence of rhIL-2, with or without rapamycin. However, the resultant Treg population is often heterogeneous and pro-inflammatory cytokines like IFNγ and IL-17A can be produced. Hence, it is crucial to search for expansion protocols that not only maximize ex vivo Treg proliferative rates, but also maintain Treg stability and preserve their suppressive function. Here, we show that ex vivo expansion of low purity magnetic bead isolated Treg in the presence of a TNFR2 agonist mAb (TNFR2-agonist together with rapamycin, results in a homogenous stable suppressive Treg population that expresses FOXP3 and Helios, shows low expression of CD127 and hypo-methylation of the FOXP3 gene. These cells reveal a low IL-17A and IFNγ producing potential and hardly express the chemokine receptors CCR6, CCR7 and CXCR3. Restimulation of cells in a pro-inflammatory environment did not break the stability of this Treg population. In a preclinical humanized mouse model, the TNFR2-agonist plus rapamycin expanded Treg suppressed inflammation in vivo. Importantly, this Treg expansion protocol enables the use of less pure, but more easily obtainable cell fractions, as similar outcomes were observed using either FACS-sorted or MACS-isolated Treg. Therefore, this protocol is of great interest for the ex vivo expansion of Treg for clinical immunotherapy.

  2. Shrub expansion in SW Greenland

    DEFF Research Database (Denmark)

    Jørgensen, Rasmus Halfdan

    , and has a range of ecosystem effects where it occurs. Shrub expansion has to a large extend been attributed to increasing temperatures over the past century, while grazing and human disturbance have received less attention. Alnus viridis ssp. crispa is a common arctic species that contributes...... including only undisturbed sites. Shrub cover increased most on E and SE facing slopes, in sites with stable substrate, in areas characterised by human disturbance and in areas without muskoxen grazing. Aspect and human disturbances had the strongest effect on shrub expansion, followed by muskoxen...... locations. A. viridis represents an interesting case to study these effects. SW Greenland is a subarctic to low-arctic region with only limited increases in temperatures during the past decades, and observed climate trends being largely dependent on the observation period. In this region there is limited...

  3. Shrub expansion in SW Greenland

    DEFF Research Database (Denmark)

    Jørgensen, Rasmus Halfdan

    of firewood collection. A delayed reaction to the ending of the little ice age cannot be excluded, but seems rather unlikely considering other studies from Greenland. Effects of global warming in SW Greenland must be studied over even longer time periods than the 120 years of the current study. To answer......, and has a range of ecosystem effects where it occurs. Shrub expansion has to a large extend been attributed to increasing temperatures over the past century, while grazing and human disturbance have received less attention. Alnus viridis ssp. crispa is a common arctic species that contributes...... by factors like grazing and human disturbance; II. which climatic factors control shrub growth in SW Greenland and whether these have improved sufficiently over the past century to allow shrub expansion; III. whether growth of A. viridis is promoted by experimental warming; IV. and whether plant genotypes...

  4. Clinical scale rapid expansion of lymphocytes for adoptive cell transfer therapy in the WAVE® bioreactor

    Science.gov (United States)

    2012-01-01

    Background To simplify clinical scale lymphocyte expansions, we investigated the use of the WAVE®, a closed system bioreactor that utilizes active perfusion to generate high cell numbers in minimal volumes. Methods We have developed an optimized rapid expansion protocol for the WAVE bioreactor that produces clinically relevant numbers of cells for our adoptive cell transfer clinical protocols. Results TIL and genetically modified PBL were rapidly expanded to clinically relevant scales in both static bags and the WAVE bioreactor. Both bioreactors produced comparable numbers of cells; however the cultures generated in the WAVE bioreactor had a higher percentage of CD4+ cells and had a less activated phenotype. Conclusions The WAVE bioreactor simplifies the process of rapidly expanding tumor reactive lymphocytes under GMP conditions, and provides an alternate approach to cell generation for ACT protocols. PMID:22475724

  5. RELIABILITY OF LENTICULAR EXPANSION COMPENSATORS

    Directory of Open Access Journals (Sweden)

    Gabriel BURLACU,

    2011-11-01

    Full Text Available Axial lenticular compensators are made to take over the longitudinal heat expansion, shock , vibration and noise, made elastic connections for piping systems. In order to have a long life for installations it is necessary that all elements, including lenticular compensators, have a good reliability. This desire can be did by technology of manufactoring and assembly of compensators, the material for lenses and by maintenance.of compensator

  6. Transmission Control Protocol, DARPA Internet Program Protocol Specification

    Science.gov (United States)

    1981-09-01

    particular a source or destination of messages from the point of view of the communicatio network. identification An Internet Protocol field. This...15-( RFC- 793 "* •TRANSMISSION CONTROL PROTOCOL ’-v DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 S... INTERNET PROGRAM PROTOCOL SPECIFICATION 1. INTRODUCTION The Transmission Control Protocol (TCP) is intended for use as a highly reliable host-to-host

  7. Simplifying Bridge Expansion Joint Design and Maintenance

    Science.gov (United States)

    2011-10-19

    This report presents a study focused on identifying the most durable expansion joints for the South : Carolina Department of Transportation. This is performed by proposing a degradation model for the : expansion joints and updating it based on bridge...

  8. 48 CFR 570.403 - Expansion requests.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Expansion requests. 570.403 Section 570.403 Federal Acquisition Regulations System GENERAL SERVICES ADMINISTRATION SPECIAL... Continued Space Requirements 570.403 Expansion requests. (a) If the expansion space is in the general scope...

  9. Expansion of protein domain repeats.

    Directory of Open Access Journals (Sweden)

    Asa K Björklund

    2006-08-01

    Full Text Available Many proteins, especially in eukaryotes, contain tandem repeats of several domains from the same family. These repeats have a variety of binding properties and are involved in protein-protein interactions as well as binding to other ligands such as DNA and RNA. The rapid expansion of protein domain repeats is assumed to have evolved through internal tandem duplications. However, the exact mechanisms behind these tandem duplications are not well-understood. Here, we have studied the evolution, function, protein structure, gene structure, and phylogenetic distribution of domain repeats. For this purpose we have assigned Pfam-A domain families to 24 proteomes with more sensitive domain assignments in the repeat regions. These assignments confirmed previous findings that eukaryotes, and in particular vertebrates, contain a much higher fraction of proteins with repeats compared with prokaryotes. The internal sequence similarity in each protein revealed that the domain repeats are often expanded through duplications of several domains at a time, while the duplication of one domain is less common. Many of the repeats appear to have been duplicated in the middle of the repeat region. This is in strong contrast to the evolution of other proteins that mainly works through additions of single domains at either terminus. Further, we found that some domain families show distinct duplication patterns, e.g., nebulin domains have mainly been expanded with a unit of seven domains at a time, while duplications of other domain families involve varying numbers of domains. Finally, no common mechanism for the expansion of all repeats could be detected. We found that the duplication patterns show no dependence on the size of the domains. Further, repeat expansion in some families can possibly be explained by shuffling of exons. However, exon shuffling could not have created all repeats.

  10. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  11. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification....... In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...

  12. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  13. Contribution of thermal expansion and

    Directory of Open Access Journals (Sweden)

    O.I.Pursky

    2007-01-01

    Full Text Available A theoretical model is developed to describe the experimental results obtained for the isobaric thermal conductivity of rare gas solids (RGS. The isobaric thermal conductivity of RGS has been analysed within Debye approximation with regard to the effect of thermal expansion. The suggested model takes into consideration the fact that thermal conductivity is determined by U-processes while above the phonon mobility edge it is determined by "diffusive" modes migrating randomly from site to site. The mobility edge ω0 is determined from the condition that the phonon mean-free path restricted by the U-processes cannot be smaller than half of the phonon wavelength.

  14. Gravitational entropy of cosmic expansion

    CERN Document Server

    Sussman, Roberto A

    2014-01-01

    We apply a recent proposal to define "gravitational entropy" to the expansion of cosmic voids within the framework of non-perturbative General Relativity. By considering CDM void configurations compatible with basic observational constraints, we show that this entropy grows from post-inflationary conditions towards a final asymptotic value in a late time fully non-linear regime described by the Lemaitre-Tolman-Bondi (LTB) dust models. A qualitatively analogous behavior occurs if we assume a positive cosmological constant consistent with a $\\Lambda$-CDM background model. However, the $\\Lambda$ term introduces a significant suppression of entropy growth with the terminal equilibrium value reached at a much faster rate.

  15. Cerrejon expansion in a tight market?

    Energy Technology Data Exchange (ETDEWEB)

    Pretelt, A. [Carbocol SA, Bogota (Colombia)

    1995-12-31

    Examines plans to expand Carbocol`s Cerrejon North Zone coal mine (Colombia). Covers: background; current status of the project; main features of the expansion (i.e. coal reserves, infrastructure, operating costs, expansion schedule and market factors); advantages of expansion; and Carbocol`s vision of the market. A positive decision to expand will depend on the results of a feasibility class III study which will define in exact terms the technical and economic aspects of the expansion and the best way to execute it. The study will be completed next year. The expansion programme should improve the profitability of the project. 10 figs.

  16. Quantification of Strain in a Porcine Model of Skin Expansion Using Multi-View Stereo and Isogeometric Kinematics.

    Science.gov (United States)

    Buganza Tepole, Adrian; Vaca, Elbert E; Purnell, Chad A; Gart, Michael; McGrath, Jennifer; Kuhl, Ellen; Gosain, Arun K

    2017-04-16

    Tissue expansion is a popular technique in plastic and reconstructive surgery that grows skin in vivo for correction of large defects such as burns and giant congenital nevi. Despite its widespread use, planning and executing an expansion protocol is challenging due to the difficulty in measuring the deformation imposed at each inflation step and over the length of the procedure. Quantifying the deformation fields is crucial, as the distribution of stretch over time determines the rate and amount of skin grown at the end of the treatment. In this manuscript, we present a method to study tissue expansion in order to gain quantitative knowledge of the deformations induced during an expansion process. This experimental protocol incorporates multi-view stereo and isogeometric kinematic analysis in a porcine model of tissue expansion. Multi-view stereo allows three-dimensional geometric reconstruction from uncalibrated sequences of images. The isogeometric kinematic analysis uses splines to describe the regional deformations between smooth surfaces with few mesh points. Our protocol has the potential to bridge the gap between basic scientific inquiry regarding the mechanics of skin expansion and the clinical setting. Eventually, we expect that the knowledge gained with our methodology will enable treatment planning using computational simulations of skin deformation in a personalized manner.

  17. Imagination as expansion of experience.

    Science.gov (United States)

    Zittoun, Tania; Cerchia, Frédéric

    2013-09-01

    This paper proposes a developmental view on imagination: from this perspective, imagination can be seen as triggered by some disrupting event, which generates a disjunction from the person's unfolding experience of the "real" world, and as unfolding as a loop, which eventually comes back to the actual experience. Examining recent and classical theorization of imagination in psychology, the paper opposes a deficitary view of imagination to an expansive notion of imagination. The paper explores Piaget, Vygotsky, Harris and Pelaprat & Cole consider: 1) What does provoke a "rupture" or disjunction? 2) What are the psychological processes involved in the imaginary loop? 3) What nourishes such processes? 4) What are the consequences of such imaginary loop, or what does it enable doing? The paper proposes to adopt an expansive view of imagination, as Vygotsky proposed-a perspective that has been under-explored empirically since his seminal work. To stimulate such sociocultural psychology of imagination, two empirical examples are provided, one showing how children make sense of metaphor in an experimental setting, the other showing a young person using a novel met at school as symbolic resource.

  18. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  19. Fast algorithms for Quadrature by Expansion I: Globally valid expansions

    Science.gov (United States)

    Rachh, Manas; Klöckner, Andreas; O'Neil, Michael

    2017-09-01

    The use of integral equation methods for the efficient numerical solution of PDE boundary value problems requires two main tools: quadrature rules for the evaluation of layer potential integral operators with singular kernels, and fast algorithms for solving the resulting dense linear systems. Classically, these tools were developed separately. In this work, we present a unified numerical scheme based on coupling Quadrature by Expansion, a recent quadrature method, to a customized Fast Multipole Method (FMM) for the Helmholtz equation in two dimensions. The method allows the evaluation of layer potentials in linear-time complexity, anywhere in space, with a uniform, user-chosen level of accuracy as a black-box computational method. Providing this capability requires geometric and algorithmic considerations beyond the needs of standard FMMs as well as careful consideration of the accuracy of multipole translations. We illustrate the speed and accuracy of our method with various numerical examples.

  20. Xeno-Free Strategies for Safe Human Mesenchymal Stem/Stromal Cell Expansion: Supplements and Coatings

    Directory of Open Access Journals (Sweden)

    M. Cimino

    2017-01-01

    Full Text Available Human mesenchymal stem/stromal cells (hMSCs have generated great interest in regenerative medicine mainly due to their multidifferentiation potential and immunomodulatory role. Although hMSC can be obtained from different tissues, the number of available cells is always low for clinical applications, thus requiring in vitro expansion. Most of the current protocols for hMSC expansion make use of fetal bovine serum (FBS as a nutrient-rich supplement. However, regulatory guidelines encourage novel xeno-free alternatives to define safer and standardized protocols for hMSC expansion that preserve their intrinsic therapeutic potential. Since hMSCs are adherent cells, the attachment surface and cell-adhesive components also play a crucial role on their successful expansion. This review focuses on the advantages/disadvantages of FBS-free media and surfaces/coatings that avoid the use of animal serum, overcoming ethical issues and improving the expansion of hMSC for clinical applications in a safe and reproducible way.

  1. On the equisummability of Hermite and Fourier expansions

    Indian Academy of Sciences (India)

    We prove an equisummability result for the Fourier expansions and Hermite expansions as well as special Hermite expansions. We also prove the uniform boundedness of the Bochner-Riesz means associated to the Hermite expansions for polyradial functions.

  2. Relationship Development in Greenfield Expansions

    DEFF Research Database (Denmark)

    Drogendijk, Rian; Andersson, Ulf

    2013-01-01

    This paper investigates conceptually how new Greenfield subsidiaries develop relationships over time. We focus our analysis on the earliest start-up stage of new Greenfield subsidiaries, and on the dynamics of relationships development with five different groups of actors within the MNC...... and the local environment of the new Greenfield. We argue that relationship strength, or the intensity of interaction and resource exchange, depends on the new Greenfield''s degree of dependence or interdependence within these relationships and develop propositions based on institutional theory, resource...... dependency theory and network approaches. In the concluding sections we suggest directions for future work to enhance understanding of the dynamics of relationship management in new Greenfield expansions....

  3. Expansion of Physician Assistant Education.

    Science.gov (United States)

    Cawley, James F; Jones, P. Eugene; Miller, Anthony A; Orcutt, Venetia L

    2016-12-01

    Physician assistant (PA) educational programs were created in the 1960s to prepare a new type of health care practitioner. Physician assistant programs began as experiments in medical education, and later, they proved to be highly successful in preparing capable, flexible, and productive clinicians. The growth of PA educational programs in US medical education-stimulated by grants, public policy, and anticipated shortages of providers-has gone through 3 distinct phases. At present, such programs are in the midst of the third growth spurt that is expected to continue beyond 2020, as a large number of colleges and universities seek to sponsor PA programs and attain accreditation status. Characteristics of these new programs are described, and the implications of the current expansion of PA education are examined.

  4. Serial Tissue Expansion at the Same Site in Pediatric Patients: Is the Subsequent Expansion Faster?

    Directory of Open Access Journals (Sweden)

    Moon Ki Lee

    2017-11-01

    Full Text Available Background Serial tissue expansion is performed to remove giant congenital melanocytic nevi. However, there have been no studies comparing the expansion rate between the subsequent and preceding expansions. In this study, we analyzed the rate of expansion in accordance with the number of surgeries, expander location, expander size, and sex. Methods A retrospective analysis was performed in pediatric patients who underwent tissue expansion for giant congenital melanocytic nevi. We tested four factors that may influence the expansion rate: The number of surgeries, expander location, expander size, and sex. The rate of expansion was calculated by dividing the ‘inflation amount’ by the ‘expander size’. Results The expansion rate, compared with the first-time group, was 1.25 times higher in the second-or-more group (P=0.04 and 1.84 times higher in the third-or-more group (P<0.01. The expansion rate was higher at the trunk than at other sites (P<0.01. There was a tendency of lower expansion rate for larger expanders (P=0.03. Sex did not affect the expansion rate. Conclusions There was a positive correlation between the number of surgeries and the expansion rate, a positive correlation between the expander location and the expansion rate, and a negative correlation between the expander size and the expansion rate.

  5. Timed Analysis of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.; Mader, Angelika H.

    We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols

  6. Timed Analysis of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.; Mader, Angelika H.

    2007-01-01

    We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols

  7. Pressurized electrolysis stack with thermal expansion capability

    Science.gov (United States)

    Bourgeois, Richard Scott

    2015-07-14

    The present techniques provide systems and methods for mounting an electrolyzer stack in an outer shell so as to allow for differential thermal expansion of the electrolyzer stack and shell. Generally, an electrolyzer stack may be formed from a material with a high coefficient of thermal expansion, while the shell may be formed from a material having a lower coefficient of thermal expansion. The differences between the coefficients of thermal expansion may lead to damage to the electrolyzer stack as the shell may restrain the thermal expansion of the electrolyzer stack. To allow for the differences in thermal expansion, the electrolyzer stack may be mounted within the shell leaving a space between the electrolyzer stack and shell. The space between the electrolyzer stack and the shell may be filled with a non-conductive fluid to further equalize pressure inside and outside of the electrolyzer stack.

  8. Three-dimensional assessment of buccal alveolar bone after rapid and slow maxillary expansion: a clinical trial study.

    Science.gov (United States)

    Brunetto, Mauricio; Andriani, Juliana da Silva Pereira; Ribeiro, Gerson Luiz Ulema; Locks, Arno; Correa, Marcio; Correa, Letícia Ruhland

    2013-05-01

    The purposes of this study were to analyze and compare the immediate effects of rapid and slow maxillary expansion protocols, accomplished by Haas-type palatal expanders activated in different frequencies of activation on the positioning of the maxillary first permanent molars and on the buccal alveolar bones of these teeth with cone-beam computerized tomography. The sample consisted of 33 children (18 girls, 15 boys; mean age, 9 years) randomly distributed into 2 groups: rapid maxillary expansion (n = 17) and slow maxillary expansion (n = 16). Patients in the rapid maxillary expansion group received 2 turns of activation (0.4 mm) per day, and those in the slow maxillary expansion group received 2 turns of activation (0.4 mm) per week until 8 mm of expansion was achieved in both groups. Cone-beam computerized tomography images were taken before treatment and after stabilization of the jackscrews. Data were gathered through a standardized analysis of cone-beam computerized tomography images. Intragroup statistical analysis was accomplished with the Wilcoxon matched-pairs test, and intergroup statistical analysis was accomplished with analysis of variance. Linear relationships, among all variables, were determined by Spearman correlation. Both protocols caused buccal displacement of the maxillary first permanent molars, which had more bodily displacement in the slow maxillary expansion group, whereas more inclination was observed in the rapid maxillary expansion group. Vertical and horizontal bone losses were found in both groups; however, the slow maxillary expansion group had major bone loss. Periodontal modifications in both groups should be carefully considered because of the reduction of spatial resolution in the cone-beam computerized tomography examinations after stabilization of the jackscrews. Modifications in the frequency of activation of the palatal expander might influence the dental and periodontal effects of palatal expansion. Copyright © 2013

  9. Fundamentals of Thermal Expansion and Thermal Contraction

    OpenAIRE

    Liu, Zi-Kui; Shang, Shun-Li; Wang, Yi

    2017-01-01

    Thermal expansion is an important property of substances. Its theoretical prediction has been challenging, particularly in cases the volume decreases with temperature, i.e., thermal contraction or negative thermal expansion at high temperatures. In this paper, a new theory recently developed by the authors has been reviewed and further examined in the framework of fundamental thermodynamics and statistical mechanics. Its applications to cerium with colossal thermal expansion and Fe3Pt with th...

  10. Performance Evaluation of DSDV and AODV Routing Protocols On The Basis Of TCP Variants in WSN and MANET

    OpenAIRE

    Shivangi Ranawat; Vandana Pandya

    2014-01-01

    Transmission Control Protocol (TCP) provides reliability to data transferring in all end-to-end data stream services on the internet. This protocol is utilized by major internet applications. TCP was originally created to handle the problem of network congestion collapse. This paper is prepared on the performance of different TCP variants to identify the best protocol variant for network expansion. In such context, a full comprehensive simulation environment is created for eva...

  11. Transient Particle Energies in Shortcuts to Adiabatic Expansions of Harmonic Traps.

    Science.gov (United States)

    Cui, Yang-Yang; Chen, Xi; Muga, J G

    2016-05-19

    The expansion of a harmonic potential that holds a quantum particle may be realized without any final particle excitation but much faster than adiabatically via "shortcuts to adiabaticity" (STA). While ideally the process time can be reduced to zero, practical limitations and constraints impose minimal finite times for the externally controlled time-dependent frequency protocols. We examine the role of different time-averaged energies (total, kinetic, potential, nonadiabatic) and of the instantaneous power in characterizing or selecting different protocols. Specifically, we prove a virial theorem for STA processes, set minimal energies (or times) for given times (or energies), and discuss their realizability by means of Dirac impulses or otherwise.

  12. Structure and thermal expansion of liquid bismuth

    Directory of Open Access Journals (Sweden)

    Mudry S.

    2015-12-01

    Full Text Available Experimental structural data for liquid Bi were used for estimation of the main structure parameters as well as the thermal expansion coefficient both in supercooled and superheated temperature ranges. It was shown that the equilibrium melt had a positive thermal expansion coefficient within a temperature range upon melting and a negative one at higher temperatures. The former was related to structure changes upon melting, whereas the latter with topologic disordering upon further heating. It was found that the superheated melt had a negative thermal expansion coefficient. The results obtained from structural data were compared with the thermal expansion coefficient calculated from the data of density for liquid Bi.

  13. Thermal expansion of L-ascorbic acid

    Science.gov (United States)

    Nicolaï, B.; Barrio, M.; Tamarit, J.-Ll.; Céolin, R.; Rietveld, I. B.

    2017-04-01

    The specific volume of vitamin C has been investigated by X-ray powder diffraction as a function of temperature from 110 K up to complete degradation around 440 K. Its thermal expansion is relatively small in comparison with other organic compounds with an expansivity α v of 1.2(3) × 10-4 K-1. The structure consists of strongly bound molecules in the ac plane through a dense network of hydrogen bonds. The thermal expansion is anisotropic. Along the b axis, the expansion has most leeway and is about 10 times larger than in the other directions.

  14. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    composition, and it is truly commonplace in today’s communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secure channels: For instance, on top of a VPN-connection, a browser may establish another secure channel (possibly with a different...... end point). Even using the same protocol several times in such a stack of channels is not unusual: An application may very well establish another TLS channel over an established one. We call this selfcomposition. In fact, there is nothing that tells us that all these compositions are sound, i.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  15. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...

  16. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  17. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including......In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  18. Expansion and cryopreservation of porcine and human corneal endothelial cells.

    Science.gov (United States)

    Marquez-Curtis, Leah A; McGann, Locksley E; Elliott, Janet A W

    2017-08-01

    Impairment of the corneal endothelium causes blindness that afflicts millions worldwide and constitutes the most often cited indication for corneal transplants. The scarcity of donor corneas has prompted the alternative use of tissue-engineered grafts which requires the ex vivo expansion and cryopreservation of corneal endothelial cells. The aims of this study are to culture and identify the conditions that will yield viable and functional corneal endothelial cells after cryopreservation. Previously, using human umbilical vein endothelial cells (HUVECs), we employed a systematic approach to optimize the post-thaw recovery of cells with high membrane integrity and functionality. Here, we investigated whether improved protocols for HUVECs translate to the cryopreservation of corneal endothelial cells, despite the differences in function and embryonic origin of these cell types. First, we isolated endothelial cells from pig corneas and then applied an interrupted slow cooling protocol in the presence of dimethyl sulfoxide (Me 2 SO), with or without hydroxyethyl starch (HES). Next, we isolated and expanded endothelial cells from human corneas and applied the best protocol verified using porcine cells. We found that slow cooling at 1 °C/min in the presence of 5% Me 2 SO and 6% HES, followed by rapid thawing after liquid nitrogen storage, yields membrane-intact cells that could form monolayers expressing the tight junction marker ZO-1 and cytoskeleton F-actin, and could form tubes in reconstituted basement membrane matrix. Thus, we show that a cryopreservation protocol optimized for HUVECs can be applied successfully to corneal endothelial cells, and this could provide a means to address the need for off-the-shelf cryopreserved cells for corneal tissue engineering and regenerative medicine. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  19. Cone-Beam computed tomography evaluation of maxillary expansion in twins with cleft lip and palate

    Directory of Open Access Journals (Sweden)

    Luciane Macedo de Menezes

    2012-04-01

    Full Text Available OBJECTIVE: The establishment of normal occlusal relationships in patients with cleft lip and palate using rapid maxillary expansion may promote good conditions for future rehabilitation. OBJECTIVE: This study describes the clinical case of monozygotic twins with unilateral cleft lip and palate at the age of mixed dentition, who were treated using the same rapid maxillary expansion protocol, but with two different screws (conventional and fan-type expansion screw. Results were evaluated using plaster models, intraoral and extraoral photographs, and Cone-Beam computed tomography (CBCT scans obtained before the beginning of the treatment, (T1. METHODS: The patients were followed up for 6 months after maxillary expansion, when the same tests requested at T1 were obtained again for review (T2. T1 and T2 results were compared using lateral cephalometric tracings and measurements of the intercanine and intermolar distances in the plaster models using a digital caliper. RESULTS: The two types of expansion screws corrected the transverse discrepancy in patients with cleft lip and palate. The shape of the upper arches improved at 10 days after activation. CONCLUSION: CBCT scans provide detailed information about craniofacial, maxillary and mandibular changes resulting from rapid maxillary expansion. The most adequate screw for each type of malocclusion should be chosen after detailed examination of the dental arches.

  20. An upper bound on the second order asymptotic expansion for the quantum communication cost of state redistribution

    Energy Technology Data Exchange (ETDEWEB)

    Datta, Nilanjana, E-mail: n.datta@statslab.cam.ac.uk [Statistical Laboratory, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA (United Kingdom); Hsieh, Min-Hsiu, E-mail: Min-Hsiu.Hsieh@uts.edu.au [Centre for Quantum Computation and Intelligent Systems, Faculty of Engineering and Information Technology, University of Technology Sydney, NSW 2007 (Australia); Oppenheim, Jonathan, E-mail: j.oppenheim@ucl.ac.uk [Department of Physics and Astronomy, University College London, Gower Street, London WC1E 6BT (United Kingdom); Department of Computer Science and Centre for Quantum Technologies, National University of Singapore, Singapore 119615 (Singapore)

    2016-05-15

    State redistribution is the protocol in which given an arbitrary tripartite quantum state, with two of the subsystems initially being with Alice and one being with Bob, the goal is for Alice to send one of her subsystems to Bob, possibly with the help of prior shared entanglement. We derive an upper bound on the second order asymptotic expansion for the quantum communication cost of achieving state redistribution with a given finite accuracy. In proving our result, we also obtain an upper bound on the quantum communication cost of this protocol in the one-shot setting, by using the protocol of coherent state merging as a primitive.

  1. Primordial vorticity and gradient expansion

    CERN Document Server

    Giovannini, Massimo

    2012-01-01

    The evolution equations of the vorticities of the electrons, ions and photons in a pre-decoupling plasma are derived, in a fully inhomogeneous geometry, by combining the general relativistic gradient expansion and the drift approximation within the Adler-Misner-Deser decomposition. The vorticity transfer between the different species is discussed in this novel framework and a set of general conservation laws, connecting the vorticities of the three-component plasma with the magnetic field intensity, is derived. After demonstrating that a source of large-scale vorticity resides in the spatial gradients of the geometry and of the electromagnetic sources, the total vorticity is estimated to lowest order in the spatial gradients and by enforcing the validity of the momentum constraint. By acknowledging the current bounds on the tensor to scalar ratio in the (minimal) tensor extension of the $\\Lambda$CDM paradigm the maximal comoving magnetic field induced by the total vorticity turns out to be, at most, of the or...

  2. Local expansions and accretive mappings

    Directory of Open Access Journals (Sweden)

    W. A. Kirk

    1983-01-01

    Full Text Available Let X and Y be complete metric spaces with Y metrically convex, let D⊂X be open, fix u0∈X, and let d(u=d(u0,u for all u∈D. Let f:X→2Y be a closed mapping which maps open subsets of D onto open sets in Y, and suppose f is locally expansive on D in the sense that there exists a continuous nonincreasing function c:R+→R+ with ∫+∞c(sds=+∞ such that each point x∈D has a neighborhood N for which dist(f(u,f(v≥c(max{d(u,d(v}d(u,v for all u,v∈N. Then, given y∈Y, it is shown that y∈f(D iff there exists x0∈D such that for x∈X\\D, dist(y,f(x0≤dist(u,f(x. This result is then applied to the study of existence of zeros of (set-valued locally strongly accretive and ϕ-accretive mappings in Banach spaces

  3. The Master Protocol Concept.

    Science.gov (United States)

    Redman, Mary W; Allegra, Carmen J

    2015-10-01

    During the past decade, biomedical technologies have undergone an explosive evolution-from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars-to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next-generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demands the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study). Copyright © 2015 Elsevier Inc. All rights reserved.

  4. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  5. Frameworks for Protocol Implementation

    NARCIS (Netherlands)

    de Barros Barbosa, Ciro; de barros Barbosa, C.; Ferreira Pires, Luis; Pires, L.F.; van Sinderen, Marten J.

    1998-01-01

    This paper reports on the development of a catalogue of frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be re-used in the implementation of various different concrete systems in this domain. By using frameworks we aim

  6. Clothing Longevity Protocol: final

    OpenAIRE

    Cooper, T.; Claxton, S; Hill, H; Holbrook, K; Hughes, M.; Knox, A.; Oxborrow, L; Nottingham Trent University

    2014-01-01

    The Clothing Longevity Protocol offers guidelines for good practice in order to aid moves towards garments that will last longer and thus to help protect brand value, screen out garments which fail prematurely and reduce the environmental impact of the clothing sector.

  7. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  8. Earnings Returns to the British Education Expansion

    Science.gov (United States)

    Devereux, Paul J.; Fan, Wen

    2011-01-01

    We study the effects of the large expansion in British educational attainment that took place for cohorts born between 1970 and 1975. Using the Quarterly Labour Force Survey, we find that the expansion caused men to increase education by about a year on average and gain about 8% higher wages; women obtained a slightly greater increase in education…

  9. Series expansion of the modified Einstein Procedure

    Science.gov (United States)

    Seema Chandrakant Shah-Fairbank

    2009-01-01

    This study examines calculating total sediment discharge based on the Modified Einstein Procedure (MEP). A new procedure based on the Series Expansion of the Modified Einstein Procedure (SEMEP) has been developed. This procedure contains four main modifications to MEP. First, SEMEP solves the Einstein integrals quickly and accurately based on a series expansion. Next,...

  10. Virial expansion coefficients in the harmonic approximation

    DEFF Research Database (Denmark)

    R. Armstrong, J.; Zinner, Nikolaj Thomas; V. Fedorov, D.

    2012-01-01

    The virial expansion method is applied within a harmonic approximation to an interacting N-body system of identical fermions. We compute the canonical partition functions for two and three particles to get the two lowest orders in the expansion. The energy spectrum is carefully interpolated...

  11. Platform Expansion Design as Strategic Choice

    DEFF Research Database (Denmark)

    Staykova, Kalina S.; Damsgaard, Jan

    2016-01-01

    In this paper, we address how the strategic choice of platform expansion design impacts the subse-quent platform strategy. We identify two distinct approaches to platform expansion – platform bun-dling and platform constellations, which currently co-exist. The purpose of this paper is to outline...

  12. The heavy quark expansion of QCD

    Energy Technology Data Exchange (ETDEWEB)

    Falk, A.F. [Johns Hopkins Univ., Baltimore, MD (United States). Dept. of Physics and Astronomy

    1997-06-01

    These lectures contain an elementary introduction to heavy quark symmetry and the heavy quark expansion. Applications such as the expansion of heavy meson decay constants and the treatment of inclusive and exclusive semileptonic B decays are included. Heavy hadron production via nonperturbative fragmentation processes is also discussed. 54 refs., 7 figs.

  13. Expansion techniques for collisionless stellar dynamical simulations

    Energy Technology Data Exchange (ETDEWEB)

    Meiron, Yohai [Kavli Institute for Astronomy and Astrophysics at Peking University, Beijing 100871 (China); Li, Baile; Holley-Bockelmann, Kelly [Department of Physics and Astronomy, Vanderbilt University, Nashville, TN 37235 (United States); Spurzem, Rainer, E-mail: ymeiron@pku.edu.cn [National Astronomical Observatories of China, Chinese Academy of Sciences, Beijing 100012 (China)

    2014-09-10

    We present graphics processing unit (GPU) implementations of two fast force calculation methods based on series expansions of the Poisson equation. One method is the self-consistent field (SCF) method, which is a Fourier-like expansion of the density field in some basis set; the other method is the multipole expansion (MEX) method, which is a Taylor-like expansion of the Green's function. MEX, which has been advocated in the past, has not gained as much popularity as SCF. Both are particle-field methods and optimized for collisionless galactic dynamics, but while SCF is a 'pure' expansion, MEX is an expansion in just the angular part; thus, MEX is capable of capturing radial structure easily, while SCF needs a large number of radial terms. We show that despite the expansion bias, these methods are more accurate than direct techniques for the same number of particles. The performance of our GPU code, which we call ETICS, is profiled and compared to a CPU implementation. On the tested GPU hardware, a full force calculation for one million particles took ∼0.1 s (depending on expansion cutoff), making simulations with as many as 10{sup 8} particles fast for a comparatively small number of nodes.

  14. A Novel MAC Protocol for QoS in Ad Hoc Wireless Networks

    Science.gov (United States)

    Takahashi, Kiyoshi; Terasawa, Takuya; Tsuboi, Toshinori

    We propose a medium access control (MAC) protocol for real-time applications in one-hop ad-hoc wireless networks. It is a distributed mechanism that takes account of priority and has a bounded packet delay. Nodes use energy signals to contend for the right to access the channel. Nodes, which have a packet to transmit, send energy signals or listen to the channel based on their binary frame. The node that has sent energy signals and has not heard any energy signals wins the right to access the channel. We use two schemes to determine the binary frame: at the beginning of a session, a node determines it based on its priority level and a random number; after successful transmission, based on a count of successful packet transmissions. With the first scheme, in order to reduce contention losses, the nodes that had won the right to access the channel but failed in transmission have priority over the other nodes. With the second scheme, the node that has the largest count, the one that has been waiting the longest, can send a packet without risking collision. The protocol provides higher probability of successful transmission and a limit on maximum packet delay. An analysis of the protocol provides conditions for the protocol to be stable. We evaluate the performance of the proposed protocol using simulations of a network with a mixed population of data and real-time nodes, whose source is constant bit rate (CBR) and a two state Markov on/off process.

  15. Business information query expansion through semantic network

    Science.gov (United States)

    Gong, Zhiguo; Muyeba, Maybin; Guo, Jingzhi

    2010-02-01

    In this article, we propose a method for business information query expansions. In our approach, hypernym/hyponymy and synonym relations in WordNet are used as the basic expansion rules. Then we use WordNet Lexical Chains and WordNet semantic similarity to assign terms in the same query into different groups with respect to their semantic similarities. For each group, we expand the highest terms in the WordNet hierarchies with hypernym and synonym, the lowest terms with hyponym and synonym and all other terms with only synonym. In this way, the contradictory caused by full expansion can be well controlled. Furthermore, we use collection-related term semantic network to further improve the expansion performance. And our experiment reveals that our solution for query expansion can improve the query performance dramatically.

  16. Maxwell superalgebras and Abelian semigroup expansion

    Directory of Open Access Journals (Sweden)

    P.K. Concha

    2014-09-01

    Full Text Available The Abelian semigroup expansion is a powerful and simple method to derive new Lie algebras from a given one. Recently it was shown that the S-expansion of so(3,2 leads us to the Maxwell algebra M. In this paper we extend this result to superalgebras, by proving that different choices of abelian semigroups S lead to interesting D=4 Maxwell Superalgebras. In particular, the minimal Maxwell superalgebra sM and the N-extended Maxwell superalgebra sM(N recently found by the Maurer–Cartan expansion procedure, are derived alternatively as an S-expansion of osp(4|N. Moreover, we show that new minimal Maxwell superalgebras type sMm+2 and their N-extended generalization can be obtained using the S-expansion procedure.

  17. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  18. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  19. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...... the bottleneck of sorting networks. And we show how to utilize this construction for four-player MPC. Another line of work has results about the power of correlated randomness; meaning in a preprocessing phase the participants in a MPC protocol receive samples from some joint distribution to aid them implement...

  20. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  1. Giant negative thermal expansion in magnetic nanocrystals

    Science.gov (United States)

    Zheng, X. G.; Kubozono, H.; Yamada, H.; Kato, K.; Ishiwata, Y.; Xu, C. N.

    2008-12-01

    Most solids expand when they are heated, but a property known as negative thermal expansion has been observed in a number of materials, including the oxide ZrW2O8 (ref. 1) and the framework material ZnxCd1-x(CN)2 (refs 2,3). This unusual behaviour can be understood in terms of low-energy phonons, while the colossal values of both positive and negative thermal expansion recently observed in another framework material, Ag3[Co(CN)6], have been explained in terms of the geometric flexibility of its metal-cyanide-metal linkages. Thermal expansion can also be stopped in some magnetic transition metal alloys below their magnetic ordering temperature, a phenomenon known as the Invar effect, and the possibility of exploiting materials with tuneable positive or negative thermal expansion in industrial applications has led to intense interest in both the Invar effect and negative thermal expansion. Here we report the results of thermal expansion experiments on three magnetic nanocrystals-CuO, MnF2 and NiO-and find evidence for negative thermal expansion in both CuO and MnF2 below their magnetic ordering temperatures, but not in NiO. Larger particles of CuO and MnF2 also show prominent magnetostriction (that is, they change shape in response to an applied magnetic field), which results in significantly reduced thermal expansion below their magnetic ordering temperatures; this behaviour is not observed in NiO. We propose that the negative thermal expansion effect in CuO (which is four times larger than that observed in ZrW2O8) and MnF2 is a general property of nanoparticles in which there is strong coupling between magnetism and the crystal lattice.

  2. Composing Interfering Abstract Protocols

    Science.gov (United States)

    2016-04-01

    system by discussing how our core shared memory protocol framework is capable of expressing safe, typeful message-passing idioms . Next, we briefly...ends with discussions of expressiveness , related work, and conclusions. 1.1 Preliminaries: Language Overview Our language supports fork/join concurrency...the expressiveness of the full language , how we can model some high-level synchronization mechanisms, and clarify modularity gains when compared to

  3. Spermiologic examination protocol

    Directory of Open Access Journals (Sweden)

    Ye. Ye. Bragina

    2014-01-01

    Full Text Available The 2010 World Health Organization (WHO guidelines for semiological examinations describe standard, additional tests and tests of scientific value and analyze in detail different situations and possible errors. This paper gives an abstract of the WHO guidelines, a concise protocol for using the standard methods of a spermiolofic examination, and a number of commentaries that reflect the alternative view of a number of problems.

  4. On the equisummability of Hermite and Fourier expansions

    Indian Academy of Sciences (India)

    We prove an equisummability result for the Fourier expansions and. Hermite expansions as well as special Hermite expansions. We also prove the uniform boundedness of the Bochner-Riesz means associated to the Hermite expansions for polyradial functions. Keywords. Hermite functions; special Hermite expansions; ...

  5. Offset protocols review report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-04-15

    A detailed offset system was established by the Western Climate Initiative (WCI) in an effort to support its cap-and-trade program. This report presented the results of evaluation of protocols that were identified by the partners of the WCI. The purpose of the evaluation was to help the WCI identify opportunities to incorporate existing protocols into the new offset system. The WCI's offset criteria were outlined in its offset system essential elements draft recommendations paper in which a WCI offset was defined as a quantified, independently verified reduction or removal of a greenhouse gas. Several findings were presented according to the commonalities and differences found in the protocols by project type, including soil sequestration; manure management; rangeland management; afforestation and reforestation; forest management; forest preservation and conservation; forest products; urban forestry; landfill gas; and waste and wastewater treatment. In addition, this report discussed the general evaluation approach used, work process flowchart, and stakeholder process of each offset system. refs., tabs., figs., appendices.

  6. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  7. Expansion Coefficient on Oxides and Oxide Ceramics.

    Science.gov (United States)

    1986-05-01

    Classification) EXPANSION COEFFICIENTS ON OXIDES AND OXIDE CERAMICS 12 PFRSONAL AUTHOR(S) Josephine Covino 13a TYPE OF REPORT 13b TIME COVERED 114 DATE OF REPORT...drastically alter expansion properties of oxides. It has been found that fine-grained (᝺ tm) anisotropic ceramic materials, such as hafnium oxide, hafnium ...Gokhale. "Thermal Expansion of Zircon ," Jap. J. AppZ. Phys., 7 (1968), p. 1126. 34 -- ’-a.’! nw-W’W L. .WW U. .PV _ 77 NWC TP 6663 81. J. L. Amoros, M

  8. Some Improved Nonperturbative Bounds for Fermionic Expansions

    Energy Technology Data Exchange (ETDEWEB)

    Lohmann, Martin, E-mail: marlohmann@gmail.com [Universita di Roma Tre, Dipartimento di Matematica (Italy)

    2016-06-15

    We reconsider the Gram-Hadamard bound as it is used in constructive quantum field theory and many body physics to prove convergence of Fermionic perturbative expansions. Our approach uses a recursion for the amplitudes of the expansion, discovered in a model problem by Djokic (2013). It explains the standard way to bound the expansion from a new point of view, and for some of the amplitudes provides new bounds, which avoid the use of Fourier transform, and are therefore superior to the standard bounds for models like the cold interacting Fermi gas.

  9. Thermal expansion: Metallic elements and alloys. [Handbook

    Science.gov (United States)

    Touloukian, Y. S.; Kirby, R. K.; Taylor, R. E.; Desai, P. D.

    1975-01-01

    The introductory sections of the work are devoted to the theory of thermal expansion of solids and to methods for the measurement of the linear thermal expansion of solids (X-ray methods, high speed methods, interferometry, push-rod dilatometry, etc.). The bulk of the work is devoted to numerical data on the thermal linear expansion of all the metallic elements, a large number of intermetallics, and a large number of binary alloy systems and multiple alloy systems. A comprehensive bibliography is provided along with an index to the materials examined.

  10. A standardised protocol for the validation of banking methodologies for arterial allografts.

    Science.gov (United States)

    Lomas, R J; Dodd, P D F; Rooney, P; Pegg, D E; Hogg, P A; Eagle, M E; Bennett, K E; Clarkson, A; Kearney, J N

    2013-09-01

    The objective of this study was to design and test a protocol for the validation of banking methodologies for arterial allografts. A series of in vitro biomechanical and biological assessments were derived, and applied to paired fresh and banked femoral arteries. The ultimate tensile stress and strain, suture pullout stress and strain, expansion/rupture under hydrostatic pressure, histological structure and biocompatibility properties of disinfected and cryopreserved femoral arteries were compared to those of fresh controls. No significant differences were detected in any of the test criteria. This validation protocol provides an effective means of testing and validating banking protocols for arterial allografts.

  11. Evaluation of the effect of cryopreservation on ex vivo expansion of hematopoietic progenitors from cord blood.

    Science.gov (United States)

    Lazzari, L; Lucchi, S; Montemurro, T; Porretti, L; Lopa, R; Rebulla, P; Sirchia, G

    2001-10-01

    In previous studies, we identified a cytokine cocktail including thrombopoietin, Flt-3 ligand, interleukin (IL)-6 and IL-11 in serum-free medium, suitable to induce significant and sustained ex vivo expansion of primitive hematopoietic stem cells (HSCs) from cord blood (CB) for up to 10 weeks. The aim of the present study was to evaluate the effects of cryopreservation on ex vivo expansion of HSCs and their committed progenitors. CD34+ cells were purified from CB units, each of which was processed in part as such and in part as cryopreserved and thawed, then expanded for 5 weeks in serum-free medium with the cytokine cocktail described above. We determined the number of nucleated cells (NC), CD34+, CD34+/38(-)/33(-), CD34+/61+, CD61+ cells and the clonogenic potential. After 2 weeks the median fold expansion of NC, CD34+ and CD34+/38(-)/33(-) cells was around two log both with fresh and cryopreserved CB and the expansion continued similarly until week 5. Our data suggest that this serum free protocol induces similar ex vivo expansion of HSCs and their committed progenitors from both fresh and cryopreserved CB. Our findings can be useful in view of clinical applications, since CB used for transplantation is stored in the cryopreserved state.

  12. Cell Expansion During Directed Differentiation of Stem Cells Toward the Hepatic Lineage.

    Science.gov (United States)

    Raju, Ravali; Chau, David; Cho, Dong Seong; Park, Yonsil; Verfaillie, Catherine M; Hu, Wei-Shou

    2017-02-15

    The differentiation of human pluripotent stem cells toward the hepatocyte lineage can potentially provide an unlimited source of functional hepatocytes for transplantation and extracorporeal bioartificial liver applications. It is anticipated that the quantities of cells needed for these applications will be in the order of 109-1010 cells, because of the size of the liver. An ideal differentiation protocol would be to enable directed differentiation to the hepatocyte lineage with simultaneous cell expansion. We introduced a cell expansion stage after the commitment of human embryonic stem cells to the endodermal lineage, to allow for at least an eightfold increase in cell number, with continuation of cell maturation toward the hepatocyte lineage. The progressive changes in the transcriptome were measured by expression array, and the expression dynamics of certain lineage markers was measured by mass cytometry during the differentiation and expansion process. The findings revealed that while cells were expanding they were also capable of progressing in their differentiation toward the hepatocyte lineage. In addition, our transcriptome, protein and functional studies, including albumin secretion, drug-induced CYP450 expression and urea production, all indicated that the hepatocyte-like cells obtained with or without cell expansion are very similar. This method of simultaneous cell expansion and hepatocyte differentiation should facilitate obtaining large quantities of cells for liver cell applications.

  13. Collisional and collisionless expansion of Yukawa balls.

    Science.gov (United States)

    Piel, Alexander; Goree, John A

    2013-12-01

    The expansion of Yukawa balls is studied by means of molecular dynamics simulations of collisionless and collisional situations. High computation speed was achieved by using the parallel computing power of graphics processing units. When the radius of the Yukawa ball is large compared to the shielding length, the expansion process starts with the blow-off of the outermost layer. A rarefactive wave subsequently propagates radially inward at the speed of longitudinal phonons. This mechanism is fundamentally different from Coulomb explosions, which employ a self-similar expansion of the entire system. In the collisionless limit, the outer layers carry away most of the available energy. The simulations are compared with analytical estimates. In the collisional case, the expansion process can be described by a nonlinear diffusion equation that is a special case of the porous medium equation.

  14. Thermal expansion of doped lanthanum gallates

    Indian Academy of Sciences (India)

    Thermal expansion of several compositions of Sr and Mg-doped LaGaO3 including an -site deficient composition (La0.9Sr0.1)0.98(Ga0.8Mg0.2)O2.821 were measured in the temperature range from 298 to 1273 K. The effect of doping on thermal expansion was studied by varying the composition at one site of the ...

  15. Expansion and rupture of charged microcapsules

    OpenAIRE

    Datta, Sujit S.; Abbaspourrad, Alireza; Weitz, David A

    2014-01-01

    We study the deformations of pH-responsive spherical microcapsules -- micrometer-scale liquid drops surrounded by thin, solid shells -- under the influence of electrostatic forces. When exposed to a large concentration of NaOH, the microcapsules become highly charged, and expand isotropically. We find that the extent of this expansion can be understood by coupling electrostatics with shell theory; moreover, the expansion dynamics is well described by Darcy's law for fluid flow through the mic...

  16. Tissue expansion: Concepts, techniques and unfavourable results

    OpenAIRE

    Milind S Wagh; Varun Dixit

    2013-01-01

    The phenomenon of tissue expansion is observed in nature all the time. The same properties of the human skin to stretch and expand and yield extra skin if placed under continuous stress over a prolonged period of time has been utilised for reconstructive purposes with the help of a silicon balloon inserted under the skin and progressively filled with saline. The technique of tissue expansion is now more than three decades old and has been a value addition to our armamentarium in reconstructiv...

  17. Negative thermal expansion in framework compounds

    Indian Academy of Sciences (India)

    2015-11-27

    Nov 27, 2015 ... We have studied negative thermal expansion (NTE) compounds with chemi- cal compositions of NX2O8 and NX2O7 (N=Zr, Hf and X=W, Mo, V) and M2O (M=Cu, Ag) using the techniques of inelastic neutron scattering and lattice dynamics. There is a large variation in the negative thermal expansion ...

  18. Russia and the Future Expansion of NATO

    Science.gov (United States)

    2011-03-24

    2001 that he did not intend to let enlargement undermine the potential for U.S.- Russia cooperation. Later in the summer, Putin took a further step...St ra te gy R es ea rc h Pr oj ec t RUSSIA AND THE FUTURE EXPANSION OF NATO BY COLONEL RADEK CERNY Czech Army DISTRIBUTION STATEMENT A...Strategy Research Project 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Russia and the Future Expansion of NATO 5a. CONTRACT

  19. The. delta. expansion and local gauge invariance

    Energy Technology Data Exchange (ETDEWEB)

    Bender, C.M. (Department of Physics, Washington University, St. Louis, Missouri 63130 (US)); Cooper, F. (Department of Physics, Brown University, Providence, Rhode Island 02912 Theoretical Division, Los Alamos National Laboratory, Los Alamos, New Mexic o 87545); Milton, K.A. (Department of Physics, The Ohio State University, Columbus, Ohio 43210 Department of Physics and Astronomy, University of Oklahoma, Norman, Oklaho ma 73019)

    1989-08-15

    A recently proposed approximation method, called the {delta} expansion, was introduced in the context of a self-interacting scalar field theory. This approximation method offers the hope of obtaining nonperturbative information about a quantum field theory using perturbative techniques. In this paper we extend formally the {delta}-expansion methods to field theories having local gauge symmetry. We then compute the anomaly in the Schwinger model.

  20. Stochastic quantization and 1/N expansion

    Energy Technology Data Exchange (ETDEWEB)

    Brunelli, J.C. [Instituto de Fisica Teorica (IFT), Sao Paulo, SP (Brazil); Mendes, R.S. [Sao Paulo Univ., SP (Brazil). Inst. de Fisica

    1992-10-01

    We study the 1/N expansion of field theories in the stochastic quantization method of Parisi and Wu using the supersymmetric functional approach. This formulation provides a systematic procedure to implement the 1/N expansion which resembles the ones used in the equilibrium. The 1/N perturbation theory for the non linear sigma model in two dimensions is worked out as an example. (author). 19 refs., 5 figs.

  1. Fixed Point Theorems for Times Reasonable Expansive Mapping

    Directory of Open Access Journals (Sweden)

    Chen Chunfang

    2008-01-01

    Full Text Available Abstract Based on previous notions of expansive mapping, times reasonable expansive mapping is defined. The existence of fixed point for times reasonable expansive mapping is discussed and some new results are obtained.

  2. Expansive Soil Crack Depth under Cumulative Damage

    Directory of Open Access Journals (Sweden)

    Bei-xiao Shi

    2014-01-01

    Full Text Available The crack developing depth is a key problem to slope stability of the expansive soil and its project governance and the crack appears under the roles of dry-wet cycle and gradually develops. It is believed from the analysis that, because of its own cohesion, the expansive soil will have a certain amount of deformation under pulling stress but without cracks. The soil body will crack only when the deformation exceeds the ultimate tensile strain that causes cracks. And it is also believed that, due to the combined effect of various environmental factors, particularly changes of the internal water content, the inherent basic physical properties of expansive soil are weakened, and irreversible cumulative damages are eventually formed, resulting in the development of expansive soil cracks in depth. Starting from the perspective of volumetric strain that is caused by water loss, considering the influences of water loss rate and dry-wet cycle on crack developing depth, the crack developing depth calculation model which considers the water loss rate and the cumulative damages is established. Both the proposal of water loss rate and the application of cumulative damage theory to the expansive soil crack development problems try to avoid difficulties in matrix suction measurement, which will surely play a good role in promoting and improving the research of unsaturated expansive soil.

  3. Internet Protocol Transition Workbook

    Science.gov (United States)

    1982-03-01

    VGC] 020.rrr.rrr.rrr DC-PR D.C. Packet Radio Network [VGCJ 021.rrr.rrr.rrr EDN OCEC EON [EC5] 022.rrr.rrr.rrr DIALNET DIALNE1 (26, 16.MRCJ 023...41953. 7 October 1977. Also in [17]. [16] Crispin. M. and I. Zabala. " DIALNET Protocols". Stanford University Artificial Intelligence Laboratory, July...34. IEN 158. October 1980. (26] McCarthy, J. and L. Earnest, " DIALNET ", Stanford University Artificial Intelligence Laboratory, Undated. (27] McKenzie

  4. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  5. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  6. Effect of a low-level laser on bone regeneration after rapid maxillary expansion.

    Science.gov (United States)

    Cepera, Fernanda; Torres, Fernando C; Scanavini, Marco A; Paranhos, Luiz R; Capelozza Filho, Leopoldino; Cardoso, Mauricio A; Siqueira, Danieli C R; Siqueira, Danilo F

    2012-04-01

    In this study, we evaluated the effects of a low-level laser on bone regeneration in rapid maxillary expansion procedures. Twenty-seven children, aged 8 to 12 years, took part in the experiment, with a mean age of 10.2 years, divided into 2 groups: the laser group (n = 14), in which rapid maxillary expansion was performed in conjunction with laser use, and the no-laser group (n = 13), with rapid maxillary expansion only. The activation protocol of the expansion screw was 1 full turn on the first day and a half turn daily until achieving overcorrection. The laser type used was a laser diode (TWIN Laser; MMOptics, São Carlos, Brazil), according to the following protocol: 780 nm wavelength, 40 mW power, and 10 J/cm(2) density at 10 points located around the midpalatal suture. The application stages were 1 (days 1-5 of activation), 2 (at screw locking, on 3 consecutive days), 3, 4, and 5 (7, 14, and 21 days after stage 2). Occlusal radiographs of the maxilla were taken with the aid of an aluminum scale ruler as a densitometry reference at different times: T1 (initial), T2 (day of locking), T3 (3-5 days after T2), T4 (30 days after T3), and T5 (60 days after T4). The radiographs were digitized and submitted to imaging software (Image Tool; UTHSCSA, San Antonio, Tex) to measure the optic density of the previously selected areas. To perform the statistical test, analysis of covariance was used, with the time for the evaluated stage as the covariable. In all tests, a significance level of 5% (P maxillary expansion, provided efficient opening of the midpalatal suture and influenced the bone regeneration process of the suture, accelerating healing. Copyright © 2012 American Association of Orthodontists. Published by Mosby, Inc. All rights reserved.

  7. GMP-compliant isolation and large-scale expansion of bone marrow-derived MSC.

    Directory of Open Access Journals (Sweden)

    Natalie Fekete

    Full Text Available BACKGROUND: Mesenchymal stromal cells (MSC have gained importance in tissue repair, tissue engineering and in immunosupressive therapy during the last years. Due to the limited availability of MSC in the bone marrow, ex vivo amplification prior to clinical application is requisite to obtain therapeutic applicable cell doses. Translation of preclinical into clinical-grade large-scale MSC expansion necessitates precise definition and standardization of all procedural parameters including cell seeding density, culture medium and cultivation devices. While xenogeneic additives such as fetal calf serum are still widely used for cell culture, its use in the clinical context is associated with many risks, such as prion and viral transmission or adverse immunological reactions against xenogeneic components. METHODS AND FINDINGS: We established animal-free expansion protocols using platelet lysate as medium supplement and thereby could confirm its safety and feasibility for large-scale MSC isolation and expansion. Five different GMP-compliant standardized protocols designed for the safe, reliable, efficient and economical isolation and expansion of MSC was performed and MSC obtained were analyzed for differentiation capacity by qPCR and histochemistry. Expression of standard MSC markers as defined by the International Society for Cellular Therapy as well as expression of additional MSC markers and of various chemokine and cytokine receptors was analysed by flow cytometry. Changes of metabolic markers and cytokines in the medium were addressed using the LUMINEX platform. CONCLUSIONS: The five different systems for isolation and expansion of MSC described in this study are all suitable to produce at least 100 millions of MSC, which is commonly regarded as a single clinical dose. Final products are equal according to the minimal criteria for MSC defined by the ISCT. We showed that chemokine and integrin receptors analyzed had the same expression pattern

  8. GMP-compliant isolation and large-scale expansion of bone marrow-derived MSC.

    Science.gov (United States)

    Fekete, Natalie; Rojewski, Markus T; Fürst, Daniel; Kreja, Ludwika; Ignatius, Anita; Dausend, Julia; Schrezenmeier, Hubert

    2012-01-01

    Mesenchymal stromal cells (MSC) have gained importance in tissue repair, tissue engineering and in immunosupressive therapy during the last years. Due to the limited availability of MSC in the bone marrow, ex vivo amplification prior to clinical application is requisite to obtain therapeutic applicable cell doses. Translation of preclinical into clinical-grade large-scale MSC expansion necessitates precise definition and standardization of all procedural parameters including cell seeding density, culture medium and cultivation devices. While xenogeneic additives such as fetal calf serum are still widely used for cell culture, its use in the clinical context is associated with many risks, such as prion and viral transmission or adverse immunological reactions against xenogeneic components. We established animal-free expansion protocols using platelet lysate as medium supplement and thereby could confirm its safety and feasibility for large-scale MSC isolation and expansion. Five different GMP-compliant standardized protocols designed for the safe, reliable, efficient and economical isolation and expansion of MSC was performed and MSC obtained were analyzed for differentiation capacity by qPCR and histochemistry. Expression of standard MSC markers as defined by the International Society for Cellular Therapy as well as expression of additional MSC markers and of various chemokine and cytokine receptors was analysed by flow cytometry. Changes of metabolic markers and cytokines in the medium were addressed using the LUMINEX platform. The five different systems for isolation and expansion of MSC described in this study are all suitable to produce at least 100 millions of MSC, which is commonly regarded as a single clinical dose. Final products are equal according to the minimal criteria for MSC defined by the ISCT. We showed that chemokine and integrin receptors analyzed had the same expression pattern, suggesting that MSC from either of the systems show equal

  9. Negative thermal expansion materials: technological key for control of thermal expansion

    Directory of Open Access Journals (Sweden)

    Koshi Takenaka

    2012-01-01

    Full Text Available Most materials expand upon heating. However, although rare, some materials contract upon heating. Such negative thermal expansion (NTE materials have enormous industrial merit because they can control the thermal expansion of materials. Recent progress in materials research enables us to obtain materials exhibiting negative coefficients of linear thermal expansion over −30 ppm K−1. Such giant NTE is opening a new phase of control of thermal expansion in composites. Specifically examining practical aspects, this review briefly summarizes materials and mechanisms of NTE as well as composites containing NTE materials, based mainly on activities of the last decade.

  10. Mapping Brazilian Cropland Expansion, 2000-2013

    Science.gov (United States)

    Zalles, V.; Hansen, M.; Potapov, P.

    2016-12-01

    Brazil is one of the world's leading producers and exporters of agricultural goods. Despite undergoing significant increases in its cropland area in the last decades, it remains one of the countries with the most potential for further agricultural expansion. Most notably, the expansion in production areas of commodity crops such as soybean, corn, and sugarcane has become the leading cause of land cover conversion in Brazil. Natural land covers, such as the Amazon and Cerrado forests, have been negatively affected by this agricultural expansion, causing carbon emissions, biodiversity loss, altered water cycles, and many other disturbances to ecosystem services. Monitoring of change in cropland area extent can provide relevant information to decision makers seeking to understand and manage land cover change drivers and their impacts. In this study, the freely-available Landsat archive was leveraged to produce a large-scale, methodologically consistent map of cropland cover at 30 m. resolution for the entire Brazilian territory in the year 2000. Additionally, we mapped cropland expansion from 2000 to 2013, and used statistical sampling techniques to accurately estimate cropland area per Brazilian state. Using the Global Forest Change product produced by Hansen et al. (2013), we can disaggregate forest cover loss due to cropland expansion by year, revealing spatiotemporal trends that could advance our understanding of the drivers of forest loss.

  11. Supercritical flow characteristics at abrupt expansion structure

    Science.gov (United States)

    Lim, Jia Jun; Puay, How Tion; Zakaria, Nor Azazi

    2017-10-01

    When dealing with the design of a hydraulic structure, lateral expansion is often necessary for flow emerging at high velocity served as a cross-sectional transition. If the abrupt expansion structure is made to diverge rapidly, it will cause the major part of the flow fail to follow the boundaries. If the transition is too gradual, it will result in a waste of structural material. A preliminary study on the flow structure near the expansion and its relationship with flow parameter is carried out in this study. A two-dimensional depth-averaged model is developed to simulate the supercritical flow at the abrupt expansion structure. Constrained Interpolation Profile (CIP) scheme (which is of third order accuracy) is adopted in the numerical model. Results show that the flow structure and flow characteristics at the abrupt expansion can be reproduced numerically. The validation of numerical result is done against analytical studies. The result from numerical simulation showed good agreement with the analytical solution.

  12. Dental and skeletal effects of combined headgear used alone or in association with rapid maxillary expansion.

    Science.gov (United States)

    Farret, Milton Meri Benitez; Lima, Eduardo Martinelli de; Farret, Marcel M; Araújo, Laura Lutz de

    2015-10-01

    The aim of this study was to assess the effects of combined headgear used alone or in association with rapid maxillary expansion, as the first step for Class II malocclusion treatment. The sample comprised 61 patients divided into three groups: Group 1, combined headgear (CH); Group 2, CH + rapid maxillary expansion (CH + RME); and Group 3, control (CG). In Group 1, patients were treated with combined headgear until Class I molar relationship was achieved. In Group 2, the protocol for headgear was the same; however, patients were previously subject to rapid maxillary expansion. Results showed distal displacement of maxillary molars for both experimental groups (p < 0.001), with distal tipping only in Group 1 (CH) (p < 0.001). There was restriction of forward maxillary growth in Group 2 (CH + RME) (p < 0.05) and clockwise rotation of the maxilla in Group 1 (CH) (p < 0.05). Based on the results, it is possible to suggest that treatment with both protocols was efficient; however, results were more significant for Group 2 (CH + RME) with less side effects.

  13. Dental and skeletal effects of combined headgear used alone or in association with rapid maxillary expansion

    Directory of Open Access Journals (Sweden)

    Milton Meri Benitez Farret

    2015-10-01

    Full Text Available Objective: The aim of this study was to assess the effects of combined headgear used alone or in association with rapid maxillary expansion, as the first step for Class II malocclusion treatment.Methods:The sample comprised 61 patients divided into three groups: Group 1, combined headgear (CH; Group 2, CH + rapid maxillary expansion (CH + RME; and Group 3, control (CG. In Group 1, patients were treated with combined headgear until Class I molar relationship was achieved. In Group 2, the protocol for headgear was the same; however, patients were previously subject to rapid maxillary expansion.Results:Results showed distal displacement of maxillary molars for both experimental groups (p < 0.001, with distal tipping only in Group 1 (CH (p < 0.001. There was restriction of forward maxillary growth in Group 2 (CH + RME (p < 0.05 and clockwise rotation of the maxilla in Group 1 (CH (p < 0.05.Conclusion: Based on the results, it is possible to suggest that treatment with both protocols was efficient; however, results were more significant for Group 2 (CH + RME with less side effects.

  14. A protected password change protocol

    OpenAIRE

    Wang, Ren-Chiun; Yang, Chou-Chen; Mo, Kun-Ru

    2005-01-01

    Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation atacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors shall show that password guessing, denial of service and known-key attacks can work in their password...

  15. An Improved Resource Reservation Protocol

    OpenAIRE

    Desire Oulai; Steven Chamberland; Samuel Pierre

    2007-01-01

    The classical resource reservation protocol (RSVP) is a flow-based signaling protocol used for reserving resources in the network for a given session. RSVP maintains state information for each reservation at every router along the path. Even though this protocol is very popular, he has some weaknesses. Indeed, RSVP does not include a bidirectional reservation process and it requires refresh messages to maintain the soft states in the routers for each session. In this paper, we propose a...

  16. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  17. Ultra-low thermal expansion realized in giant negative thermal expansion materials through self-compensation

    Science.gov (United States)

    Shen, Fei-Ran; Kuang, Hao; Hu, Feng-Xia; Wu, Hui; Huang, Qing-Zhen; Liang, Fei-Xiang; Qiao, Kai-Ming; Li, Jia; Wang, Jing; Liu, Yao; Zhang, Lei; He, Min; Zhang, Ying; Zuo, Wen-Liang; Sun, Ji-Rong; Shen, Bao-Gen

    2017-10-01

    Materials with zero thermal expansion (ZTE) or precisely tailored thermal expansion are in urgent demand of modern industries. However, the overwhelming majority of materials show positive thermal expansion. To develop ZTE or negative thermal expansion (NTE) materials as compensators has become an important challenge. Here, we present the evidence for the realization of ultra-low thermal expansion in Mn-Co-Ge-In particles. The bulk with the Ni2In-type hexagonal structure undergoes giant NTE owing to a martensitic magnetostructural transition. The major finding is that the thermal expansion behavior can be totally controlled by modulating the crystallinity degree and phase transition from atomic scale. Self-compensation effect leads to ultra-low thermal expansion with a linear expansion coefficient as small as +0.68 × 10-6/K over a wide temperature range around room temperature. The present study opens an avenue to reach ZTE particularly from the large class of giant NTE materials based on phase transition.

  18. Expansions and Extensions : Ergodic, combinatorial and geometric properties of β-expansions with arbitrary digits

    NARCIS (Netherlands)

    Kalle, C.C.C.J.

    2009-01-01

    Let beta be a real number bigger than 1 and A a finite set of arbitrary real numbers. A beta-expansion with digits in A of a real number x is an expression for x by an infinite sum of fractions with powers of beta in the denominators and elements from A in the numerators. Such expansions can be

  19. [Forum on tissue expansion. Expansion of the scalp. Surgical techniques and clinical applications].

    Science.gov (United States)

    Foyatier, J L; Delay, E; Comparin, J P; Latarjet, J; Masson, C L

    1993-02-01

    Repair of all forms of alopecia is one of the principal applications of scalp expansion. The authors have inserted 400 expansion prostheses, including 20 in the scalp. The surgical technique, choice of material and various types of flaps are described and illustrated by clinical cases of extensive alopecia.

  20. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  1. Anisotropic thermal expansion in flexible materials

    Science.gov (United States)

    Romao, Carl P.

    2017-10-01

    A definition of the Grüneisen parameters for anisotropic materials is derived based on the response of phonon frequencies to uniaxial stress perturbations. This Grüneisen model relates the thermal expansion in a given direction (αi i) to one element of the elastic compliance tensor, which corresponds to the Young's modulus in that direction (Yi i). The model is tested through ab initio prediction of thermal expansion in zinc, graphite, and calcite using density functional perturbation theory, indicating that it could lead to increased accuracy for structurally complex systems. The direct dependence of αi i on Yi i suggests that materials which are flexible along their principal axes but rigid in other directions will generally display both positive and negative thermal expansion.

  2. Extrudate Expansion Modelling through Dimensional Analysis Method

    DEFF Research Database (Denmark)

    A new model framework is proposed to correlate extrudate expansion and extrusion operation parameters for a food extrusion cooking process through dimensional analysis principle, i.e. Buckingham pi theorem. Three dimensionless groups, i.e. energy, water content and temperature, are suggested...... to describe the extrudates expansion. From the three dimensionless groups, an equation with three experimentally determined parameters is derived to express the extrudate expansion. The model is evaluated with whole wheat flour and aquatic feed extrusion experimental data. The average deviations...... of the correlation are respectively 5.9% and 9% for the whole wheat flour and the aquatic feed extrusion. An alternative 4-coefficient equation is also suggested from the 3 dimensionless groups. The average deviations of the alternative equation are respectively 5.8% and 2.5% in correlation with the same set...

  3. Rapid palatal expansion: the role of microcirculation.

    Science.gov (United States)

    Bilello, G; Currò, G; Messina, P; Scardina, G

    2015-08-01

    Transverse palate modifications fall under expansive orthopedic therapy of the upper maxilla. The only practical approach to the problem on the transverse plane is that of performing the expansion of the maxillary arch through an opening of the median palatal suture. It is important to understand the changes of the vascular network in midpalatal suture following the starting of rapid maxillary expansion. It is critical to maintain the blood supply and circulation for the osteogenesis and bone remodeling after the expansion. The aim of this research was to evaluate the effects of rapid orthopedic expansion (REP) at the microcirculatory level through capillaroscopic examination. Fifteen patients in their developing years between 9 and 15 years of age (average age 12.16 years) were examined. The application of the REP was the first step in the planning of orthopedic-orthodontic treatment which foresaw further stages in the odonto-osseous movement. The method of Biomicroscopic Video-Imaging of the microcirculation of oral mucosa is performed through the technique of computerized capillaroscopy and the related software. From the results it is evident that immediately after achieving the expansion of the upper maxilla (t1), a slight decrease in the number of vessels per mm² can be observed. In addition, a slight ectasia can be observed in these vessels in comparison to t0. Comparing the videocapillaroscopic images of t1 and t2, an increase in the capillaries per mm² can be observed. Ectasia of the capillaries, though subject to strictly individual variables, can be considered perfectly normal and it is compatible with the normal biology and physiology of vessel microcirculation.

  4. Longitudinal expansion of field line dipolarization

    Science.gov (United States)

    Saka, O.; Hayashi, K.

    2017-11-01

    We examine the substorm expansions that started at 1155 UT 10 August 1994 in the midnight sector focusing on the longitudinal (eastward) expansion of field line dipolarization in the auroral zone. Eastward expansion of the dipolarization region was observed in all of the H, D, and Z components. The dipolarization that started at 1155 UT (0027 MLT) from 260° of geomagnetic longitude (CMO) expanded to 351°(PBQ) in about 48 min. The expansion velocity was 0.03-0.04°/s, or 1.9 km/s at 62°N of geomagnetic latitude. The dipolarization region expanding to the east was accompanied by a bipolar event at the leading edge of the expansion in latitudes equatorward of the westward electrojet (WEJ). In the midnight sector at the onset meridian, the Magnetospheric Plasma Analyzer (MAP) on board geosynchronous satellite L9 measured electrons and ions between 10 eV and 40 keV. We conclude from the satellite observations that this dipolarization was characterized by the evolution of temperature anisotropies, an increase of the electron and ion temperatures, and a rapid change in the symmetry axis of the temperature tensor. The field line dipolarization and its longitudinal expansion were interpreted in terms of the slow MHD mode triggered by the current disruption. We propose a new magnetosphere-ionosphere coupling (MI-coupling) mechanism based on the scenario that transmitted westward electric fields from the magnetosphere in association with expanding dipolarization produced electrostatic potential (negative) in the ionosphere through differences in the mobility of collisional ions and collisionless electrons. The field-aligned currents that emerged from the negative potential region are arranged in a concentric pattern around the negative potential region, upward toward the center and downward on the peripheral.

  5. Parabolic cyclinder functions : examples of error bounds for asymptotic expansions

    NARCIS (Netherlands)

    R. Vidunas; N.M. Temme (Nico)

    2002-01-01

    textabstractSeveral asymptotic expansions of parabolic cylinder functions are discussedand error bounds for remainders in the expansions are presented. Inparticular Poincaré-type expansions for large values of the argument$z$ and uniform expansions for large values of the parameter areconsidered.

  6. Soft Manifold Dynamics behind Negative Thermal Expansion

    Science.gov (United States)

    Schlesinger, Z.; Rosen, J. A.; Hancock, J. N.; Ramirez, A. P.

    2008-07-01

    Minimal models are developed to examine the origin of large negative thermal expansion in underconstrained systems. The dynamics of these models reveals how underconstraint can organize a thermodynamically extensive manifold of low-energy modes which not only drives negative thermal expansion but extends across the Brillioun zone. Mixing of twist and translation in the eigenvectors of these modes, for which in ZrW2O8 there is evidence from infrared and neutron scattering measurements, emerges naturally in our model as a signature of the dynamics of underconstraint.

  7. Air expansion in the water rocket

    CERN Document Server

    Romanelli, Alejandro; Madina, Federico González

    2012-01-01

    We study the thermodynamics of the water rocket in the thrust phase, taking into account the expansion of the air with water vapor, vapor condensation and the energy taken from the environment. We set up a simple experimental device with a stationary bottle and verified that the gas expansion in the bottle is well approximated by a polytropic process $PV^\\beta$= constant, where the parameter $\\beta$ depends on the initial conditions. We find an analytical expression for $\\beta $ that only depends on the thermodynamic initial conditions and is in good agreement with the experimental results.

  8. NATO Expansion and Alternative Future Security Alignments,

    Science.gov (United States)

    1995-04-01

    International Security," a joint paper by the Institute for USA and Canada and the Center for Naval Analysis, June 1992. 11. Malcolm Mackintosh , "Reform in the...former Under Secretary of Defense for Policy Fred C. Ikle, who opposes NATO expansion, has observed that "This remedy may seem all the more urgent as...opposition to NATO expansion include Fred C. Ikl6, former Under Secretary of Defense for Policy Charles Kupchan, a former member of the U.S. National

  9. Large J expansion in ABJM theory revisited.

    Science.gov (United States)

    Dimov, H; Mladenov, S; Rashkov, R C

    Recently there has been progress in the computation of the anomalous dimensions of gauge theory operators at strong coupling by making use of the AdS/CFT correspondence. On the string theory side they are given by dispersion relations in the semiclassical regime. We revisit the problem of a large-charge expansion of the dispersion relations for simple semiclassical strings in an [Formula: see text] background. We present the calculation of the corresponding anomalous dimensions of the gauge theory operators to an arbitrary order using three different methods. Although the results of the three methods look different, power series expansions show their consistency.

  10. The Monetary Policy – Restrictive or Expansive?

    Directory of Open Access Journals (Sweden)

    Adam Szafarczyk

    2007-12-01

    Full Text Available The monetary policy plays an important role in macroeconomic policy of government. There is a question concerning type of this policy ñ expansive or restrictive (easy or tidy monetary policy. Unfortunately, we have a lot of criteria. Each of them gives us other answer. So due to equitation of Irving Fisher we have dominantly expansive monetary policy. This same situation exists when we use nominal value of rediscount interest rate of central bank. Opposite result appears when we use real value of this interest rate or level of obligatory reserve. Taking under consideration liquidity on money market we know, that level of interest rate is too high.  

  11. Scenarios of Expansion to Electric Generation Capacity

    Directory of Open Access Journals (Sweden)

    José Somoza-Cabrera

    2017-06-01

    Full Text Available We show the building scenarios of expansion to electric generation capacity enough to supply the demand to 2050. We were using the LEAP facility (Long-range Energy Alternatives Planning System, to simulate dispatch of electricity at minimum cost. Finally, we show the cost-benefice analysis of the technologies availability, included externality and CO2 emission limited. However that we included the externals cost in this analysis, it results insufficient to closed gap between fossil and renewable technologies of electric generation. Nevertheless, in some opportunities the renewable options had very important participations in the minimal cost scenario of expansion.

  12. Expansion of the whole wheat flour extrusion

    DEFF Research Database (Denmark)

    Cheng, Hongyuan; Friis, Alan

    2008-01-01

    A new model framework is proposed to describe the expansion of extrudates with extruder operating conditions based on dimensional analysis principle. The Buckingham pi dimensional analysis method is applied to form the basic structure of the model from extrusion process operational parameters. Us....... Using the Central Composite Design (CCD) method, whole wheat flour was processed in a twin-screw extruder with 16 trials. The proposed model can well correlate the expansion of the 16 trials using 3 regression parameters. The average deviation of the correlation is 5.9%....

  13. PLASMA VOLUME EXPANSION 24-HOURS POST-EXERCISE: EFFECT OF DOUBLING THE VOLUME OF REPLACEMENT FLUID

    Directory of Open Access Journals (Sweden)

    Bartholomew Kay

    2005-06-01

    Full Text Available The effects of two volumes (1.5 L or 3.0 L of commercially available electrolyte beverage (1.44 mM·L-1 Na+ taken during a 24-hour recovery period post-exercise, on plasma volume (PV expansion 24-hours post-exercise were assessed. A simple random-order crossover research design was used. Subjects (n = 9 males: age 21 ± 4 years, body mass 80.0 ± 9.0 kg, peak incremental 60-second cycling power output 297 ± 45 W [means ± SD] completed an identical exercise protocol conducted in hot ambient conditions (35oC, 50% relative humidity on two occasions; separated by 7-days. On each occasion, subjects received a different volume of 24-hour fluid intake (commercial beverage in random order. In each case, the fluid was taken in five equal aliquots over 24-hours. PV expansions 24-hours post-exercise were estimated from changes in haemoglobin and haematocrit. Dependent t-testing revealed no significant differences in PV expansions between trials, however a significant expansion with respect to zero was identified in the 3.0 L trial only. Specifically, PV expansions (% were; 1.5 L trial: (mean ± SE 2.3 ± 2.0 (not significant with respect to zero, 3.0 L trial: 5.0 ± 2.0 (p < 0.05, with respect to zero. Under the conditions imposed in the current study, ingesting the greater volume of the beverage lead to larger mean PV expansion

  14. ROADM expansion and its cross-layer applications

    Science.gov (United States)

    Cvijetic, Milorad; Nakamura, Shinya

    2006-10-01

    In today's converged network environment, a rapid transition to unified packet-based core/edge network architecture is occurring. Core architecture becomes a two-layer network structure based on IP/MPLS (Internet Protocol/Multi-Protocol Label Switch) transport over DWDM bandwidth pipes, which is the most effective way of providing sharing network capacities, enabling efficient protection schemes, and delivering guaranteed end-to-end performance. The edge network is recognized as a place for an intense manipulation of both data streams and services, through traffic grooming, exchange, and service convergence. Three major groups of the end-to-end services are voice, data, and video. Today's reality is that current network structure is in transitional phase, where a number of legacy services, delivering voice and data, are still in place, while packet based services are being rapidly introduced. Optical ROADM handles the wavelength bandwidth pipes and provides flexible handling of wavelength paths (amplification, add/drop, and wavelength switching). In-service upgrade should be achievable at any particular location, which means that in line-amplifier site can be converted to ROADM site. In addition, the ROADM site should be upgradeable to full wavelength crossconnect functionality, which is required in a number of application scenarios. The ROADM functionality is not limited to wavelength related functions, but rather handles the key functions related to multiservice environment by accommodating Layer 1&2 features from a blade. Herewith, we will analyze the role of ROADM, its functions, and expansion over cross-layer applications, and present a structure that is the most appropriate to multiservice packetized environment.

  15. Cluster expansions for the correlated basis functions theory

    Energy Technology Data Exchange (ETDEWEB)

    Guardiola, R. (Granada Univ. (Spain). Dept. de Fisica Nuclear)

    1982-08-16

    Four kinds of cluster expansions for the calculation of non-diagonal matrix elements of the hamiltonian between correlated states have been derived. The derivation is based on a linearization mechanism for the standard cluster expansions in a configuration mixed state. Particulary simple formulae result for the multiplicative Factor-Aviles-Hartog-Tolhoek expansion and for the exponential form of the Gaudin-Gillespie-Ripka cluster expansion. The resulting expansions are directly usable in finite nuclei.

  16. Protocols for Robotic Telescope Networks

    Directory of Open Access Journals (Sweden)

    Alain Klotz

    2010-01-01

    This paper is addressed to astronomers who are not specialists in computer science. We give explanations of some basic and advanced protocols to receive events and how to implement them in a robotic observatory software. We describe messages such as GCN notices, VOEvents or RTML, and protocols such as CGI, HTTP, SOAP, RSS, and XMPP.

  17. Publishing protocols for partnered research.

    Science.gov (United States)

    Hysong, Sylvia J; Woodard, LeChauncy; Garvin, Jennifer H; Murawsky, Jeffrey; Petersen, Laura A

    2014-12-01

    Published scientific protocols are advocated as a means of controlling bias in research reporting. Indeed, many journals require a study protocol with manuscript submission. However, publishing protocols of partnered research (PPR) can be challenging in light of the research model's dynamic nature, especially as no current reporting standards exist. Nevertheless, as these protocols become more prevalent, a priori documentation of methods in partnered research studies becomes increasingly important. Using as illustration a suite of studies aimed at improving coordination and communication in the primary care setting, we sought to identify challenges in publishing PPR relative to traditional designs, present alternative solutions to PPR publication, and propose an initial checklist of content to be included in protocols of partnered research. Challenges to publishing PPR include reporting details of research components intended to be co-created with operational partners, changes to sampling and entry strategy, and alignment of scientific and operational goals. Proposed solutions include emulating reporting standards of qualitative research, participatory action research, and adaptive trial designs, as well as embracing technological tools that facilitate publishing adaptive protocols, with version histories that are able to be updated as major protocol changes occur. Finally, we present a proposed checklist of reporting elements for partnered research protocols.

  18. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Rapley, Ralph; Aquino de Muro, Marilena

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  19. Risk Balance in Exchange Protocols

    NARCIS (Netherlands)

    M.T. Dashti (Mohammad); Y. Wang (Yanjing); I. Cervesato

    2007-01-01

    htmlabstractWe study the behaviour of rational agents in exchange protocols which rely on trustees. We allow malicious parties to compromise the trustee by paying a cost and, thereby, present a game analysis that advocates exchange protocols which induce balanced risks on the participants. We also

  20. Perturbative expansion of irreversible work in Fokker-Planck equation à la quantum mechanics

    Science.gov (United States)

    Koide, T.

    2017-08-01

    We discuss the systematic expansion of the solution of the Fokker-Planck equation with the help of the eigenfunctions of the time-dependent Fokker-Planck operator. The expansion parameter is the time derivative of the external parameter which controls the form of an external potential. Our expansion corresponds to the perturbative calculation of the adiabatic motion in quantum mechanics. With this method, we derive a new formula to calculate the irreversible work order by order, which is expressed as the expectation value with a pseudo density matrix. Applying this method to the case of the harmonic potential, we show that the first order term of the expansion gives the exact result. Because we do not need to solve the coupled differential equations of moments, our method simplifies the calculations of various functions such as the fluctuation of the irreversible work per unit time. We further investigate the exact optimized protocol to minimize the irreversible work by calculating its variation with respect to the control parameter itself.

  1. Virtual Orbital Many-Body Expansions: A Possible Route towards the Full Configuration Interaction Limit.

    Science.gov (United States)

    Eriksen, Janus J; Lipparini, Filippo; Gauss, Jürgen

    2017-09-21

    It is demonstrated how full configuration interaction (FCI) results in extended basis sets may be obtained to within sub-kJ/mol accuracy by decomposing the energy in terms of many-body expansions in the virtual orbitals of the molecular system at hand. This extension of the FCI application range lends itself to two unique features of the current approach, namely, that the total energy calculation can be performed entirely within considerably reduced orbital subspaces and may be so by means of embarrassingly parallel programming. Facilitated by a rigorous and methodical screening protocol and further aided by expansion points different from the Hartree-Fock solution, all-electron numerical results are reported for H2O in polarized core-valence basis sets ranging from double-ζ (10 e, 28 o) to quadruple-ζ (10 e, 144 o) quality.

  2. Les Protheses d'Expansion dans le Traitement des Sequelles de Brulures

    Science.gov (United States)

    Tourabi, K.; Ribag, Y.; Arrob, A.; Moussaoui, A.; Ihrai, H.

    2010-01-01

    Summary Les Auteurs présentent leur protocole pour l'expansion cutanée et rapportent quatre cas colligés au service des brûlures de leur hôpital au Maroc. Ils décrivent leur technique opératoire et les résultats obtenus. L'expansion cutanée reste la méthode de choix pour la couverture des pertes de substance étendues et la correction des séquelles de brûlure, et l'expérience rapportée par les Auteurs confirme les bons résultats que l'on peut obtenir avec cette technique, y compris les résultats esthétiques. PMID:21991194

  3. Safety and efficient ex vivo expansion of stem cells using platelet-rich plasma technology.

    Science.gov (United States)

    Anitua, Eduardo; Prado, Roberto; Orive, Gorka

    2013-09-01

    The goal of this Review is to provide an overview of the cell culture media supplements used in the ex vivo expansion of stem cells intended for cell therapy. Currently, the gold standard is the culture supplemented with fetal bovine serum, however, their use in cell therapy raises many concerns. The alternatives to its use are presented, ranging from the use of human serum to platelet-rich plasma (PRP), to serum-free media or extracellular matrix components. Finally, various growth factors present in PRP are described, which make it a safe and effective stem cell expansion supplement. These growth factors could be responsible for their efficiency, as they increase both stem cell proliferation and survival. The different PRP formulations are also discussed, as well as the need for protocol standardization.

  4. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Romberger, J.

    2014-11-01

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  5. On Learning Ring-Sum-Expansions

    DEFF Research Database (Denmark)

    Fischer, Paul; Simon, H. -U.

    1992-01-01

    The problem of learning ring-sum-expansions from examples is studied. Ring-sum-expansions (RSE) are representations of Boolean functions over the base {#123;small infinum, (+), 1}#125;, which reflect arithmetic operations in GF(2). k-RSE is the class of ring-sum-expansions containing only monomials...... of length at most k:. term-RSE is the class of ring-sum-expansions having at most I: monomials. It is shown that k-RSE, k>or=1, is learnable while k-term-RSE, k>2, is not learnable if RPnot=NP. Without using a complexity-theoretical hypothesis, it is proven that k-RSE, k>or=1, and k-term-RSE, k>or=2 cannot...... be learned from positive (negative) examples alone. However, if the restriction that the hypothesis which is output by the learning algorithm is also a k-RSE is suspended, then k-RSE is learnable from positive (negative) examples only. Moreover, it is proved that 2-term-RSE is learnable by a conjunction...

  6. Negative thermal expansion in framework compounds

    Indian Academy of Sciences (India)

    electron microscopy, EXAFS and differential scanning calorimetry have been used to study structural properties as a function of temperature for these compounds. In this paper we report the results obtained from our study [14–20] of negative thermal expansion (NTE) compounds with chemical compositions of NX2O8 and.

  7. Polytope expansion of Lie characters and applications

    Energy Technology Data Exchange (ETDEWEB)

    Walton, Mark A., E-mail: walton@uleth.ca [Department of Physics and Astronomy, University of Lethbridge, Lethbridge, Alberta T1K 3M4 (Canada)

    2013-12-15

    The weight systems of finite-dimensional representations of complex, simple Lie algebras exhibit patterns beyond Weyl-group symmetry. These patterns occur because weight systems can be decomposed into lattice polytopes in a natural way. Since lattice polytopes are relatively simple, this decomposition is useful, in addition to being more economical than the decomposition into single weights. An expansion of characters into polytope sums follows from the polytope decomposition of weight systems. We study this polytope expansion here. A new, general formula is given for the polytope sums involved. The combinatorics of the polytope expansion are analyzed; we point out that they are reduced from those of the Weyl character formula (described by the Kostant partition function) in an optimal way. We also show that the weight multiplicities can be found easily from the polytope multiplicities, indicating explicitly the equivalence of the two descriptions. Finally, we demonstrate the utility of the polytope expansion by showing how polytope multiplicities can be used in the calculation of tensor product decompositions, and subalgebra branching rules.

  8. Resonant state expansion of the resolvent

    Energy Technology Data Exchange (ETDEWEB)

    Berggren, T.; Lind, P. (Department of Mathematical Physics, Lund Institute of Technology, P.O. Box 118, S-22100 Lund (Sweden))

    1993-02-01

    An analytic method of generating resonant state expansions from the standard completeness relation of nonrelativistic quantum mechanics is described and shown to reproduce the generalized completeness relations, earlier derived, involving resonant states. The method is then applied to the expansion of the resolvent (the complete Green's function), the symmetry properties of which [ital seem] to be destroyed if a conventional application of the completeness relations is made. These forms of expansions have a continuum term which contains symmetry-restoring contributions and can therefore never vanish identically, nor can it be neglected. The symmetry-conserving form of the expansion has a set of discrete terms which are identical in form to those of the Mittag-Leffler series for the resolvent. In addition, it contains a continuum contribution which in some cases vanishes identically, but in general does not. We illustrate these findings with numerical applictions in which the potential (a square well) is chosen so as to permit analytic evaluation of practically all functions and quantities involved.

  9. Annual cropped area expansion and agricultural production ...

    African Journals Online (AJOL)

    This paper assesses the relationship between annual cropped area expansion and crop output and discusses the implication of such a relationship for environmental management in Benue State, Nigeria. The study was carried out using agricultural production survey (APS) data of five selected crops, namely: rice, sorghum, ...

  10. Hole expansion test of third generation steels

    Science.gov (United States)

    Agirre, Julen; Mendiguren, Joseba; Galdos, Lander; de Argandoña, Eneko Sáenz

    2017-10-01

    The trend towards the implementation of new materials in the chassis of the automobiles is considerably making more complex the manufacturing of the components that built it up. In this scenario materials with higher strengths and lower formabilities are daily faced by tool makers and component producers what reduces the process windows and makes the forming processes to be in the limits of the materials. One of the concerns that tool makers must face during the definition of the tools is the expansion ratios that the holes in the sheet may reach before producing a breakage due to the stretching of the material (also known as edge cracks). For the characterization of such limits, a standard test, the hole expansion test, can be applied so that the limits of the material are known. At the present study, hole expansion tests of a third generation steel, Fortiform1050 with a thickness of 1.2 millimeters have been carried out and compared them to a mild steel, DX54D with a thickness of 0.6 millimeters. A comparison for each material in terms of technology used to punch the hole, mechanical punching vs laser cutting has also been conducted. In addition, the measurement technique (online measurement vs offline measurement) followed in the Hole Expansion Ratio (HER) identification has also been analyzed. Finally, differences between both materials and techniques are presented.

  11. The Asymptotic Expansion Method via Symbolic Computation

    Directory of Open Access Journals (Sweden)

    Juan F. Navarro

    2012-01-01

    Full Text Available This paper describes an algorithm for implementing a perturbation method based on an asymptotic expansion of the solution to a second-order differential equation. We also introduce a new symbolic computation system which works with the so-called modified quasipolynomials, as well as an implementation of the algorithm on it.

  12. Hydrodynamic Gradient Expansion in Gauge Theory Plasmas,

    NARCIS (Netherlands)

    Heller, M.P.; Janik, R.A.; Witaszczyk, P

    2013-01-01

    We utilize the fluid-gravity duality to investigate the large order behavior of hydrodynamic gradient expansion of the dynamics of a gauge theory plasma system. This corresponds to the inclusion of dissipative terms and transport coefficients of very high order. Using the dual gravity description,

  13. Expansion and contraction of finite states

    NARCIS (Netherlands)

    Tamminga, Allard

    2004-01-01

    We present a theory that copes with the dynamics of inconsistent information. A method is set forth to represent possibly inconsistent information by a *finite state*. Next, finite operations for expansion and contraction of finite states are given. No extra-logical element -- a choice function or

  14. A Computational Approach to Competitive Range Expansions

    Science.gov (United States)

    Weber, Markus F.; Poxleitner, Gabriele; Hebisch, Elke; Frey, Erwin; Opitz, Madeleine

    2014-03-01

    Bacterial communities represent complex and dynamic ecological systems. Environmental conditions and microbial interactions determine whether a bacterial strain survives an expansion to new territory. In our work, we studied competitive range expansions in a model system of three Escherichia coli strains. In this system, a colicin producing strain competed with a colicin resistant, and with a colicin sensitive strain for new territory. Genetic engineering allowed us to tune the strains' growth rates and to study their expansion in distinct ecological scenarios (with either cyclic or hierarchical dominance). The control over growth rates also enabled us to construct and to validate a predictive computational model of the bacterial dynamics. The model rested on an agent-based, coarse-grained description of the expansion process and we conducted independent experiments on the growth of single-strain colonies for its parametrization. Furthermore, the model considered the long-range nature of the toxin interaction between strains. The integration of experimental analysis with computational modeling made it possible to quantify how the level of biodiversity depends on the interplay between bacterial growth rates, the initial composition of the inoculum, and the toxin range.

  15. Effects of forest expansion on mountain grassland

    DEFF Research Database (Denmark)

    Guidi, Claudia; Magid, Jakob; Rodeghiero, Mirco

    2014-01-01

    Background and aims. Grassland abandonment followed by forest succession is the dominant land-use change in the European Alps. We studied the impact of current forest expansion on mountain grassland on changes in physical soil organic carbon (SOC) fractions along a land-use and management gradient...

  16. Stakeholder Support for School Food Policy Expansions

    Science.gov (United States)

    Pettigrew, Simone; Pescud, Melanie; Donovan, Robert J.

    2012-01-01

    The aim of this study was to assess the extent to which parents and school-based stakeholders (principals, teachers, canteen managers and Parents & Citizen Committee presidents) are supportive of potential expansions to a new school food policy. Eight additional policy components elicited in preliminary focus groups with parents and 19 additional…

  17. Global Expansion and English Language Learning

    Science.gov (United States)

    Andrade, Maureen Snow

    2016-01-01

    Demand for higher education is global. As institutions extend opportunities beyond their borders, English language proficiency must be considered. This chapter focuses on considerations related to global expansion, with an emphasis on the role of distance English language courses and the distinct considerations in their development.

  18. Taylor series expansions for stationary Markov chains

    NARCIS (Netherlands)

    Heidergott, B.F.; Hordijk, A.

    2003-01-01

    We study Taylor series expansions of stationary characteristics of general-state-space Markov chains. The elements of the Taylor series are explicitly calculated and a lower bound for the radius of convergence of the Taylor series is established. The analysis provided in this paper applies to the

  19. Term Dependence: Truncating the Bahadur Lazarsfeld Expansion.

    Science.gov (United States)

    Losee, Robert M., Jr.

    1994-01-01

    Studies the performance of probabilistic information retrieval systems using differing statistical dependence assumptions when estimating the probabilities inherent in the retrieval model. Experimental results using the Bahadur Lazarsfeld expansion on the Cystic Fibrosis database are discussed that suggest that incorporating term dependence…

  20. Revisting expansive learning for knowledge production and ...

    African Journals Online (AJOL)

    Revisting expansive learning for knowledge production and capability development at postgraduate level in Higher Education Studies. R Niemann. Abstract. Higher education in South Africa is challenged by academic and social demands. Universities, therefore, have to produce graduates who will be able to function ...

  1. On the Convergence of the Virial Expansion

    NARCIS (Netherlands)

    Ramawadh, S.D.

    2015-01-01

    The virial expansion appears in statistical mechanics, an area where physics and mathematics intersect. Throughout this thesis we will mostly ignore the physics and mainly focus on the mathematical aspects. This is a deliberate choice, made for two reasons. Firstly, there are several books that

  2. Critical point anomalies include expansion shock waves

    NARCIS (Netherlands)

    Nannen, N.R.; Guardone, A.; Colonna, P.

    2014-01-01

    From first-principle fluid dynamics, complemented by a rigorous state equation accounting for critical anomalies, we discovered that expansion shock waves may occur in the vicinity of the liquid-vapor critical point in the two-phase region. Due to universality of near-critical thermodynamics, the

  3. The replication of expansive production knowledge

    DEFF Research Database (Denmark)

    Wæhrens, Brian Vejrum; Yang, Cheng; Madsen, Erik Skov

    2012-01-01

    Purpose – With the aim to support offshore production line replication, this paper specifically aims to explore the use of templates and principles to transfer expansive productive knowledge embedded in a production line and understand the contingencies that influence the mix of these approaches....

  4. Expansion patterns and parallaxes for planetary nebulae

    Science.gov (United States)

    Schönberner, D.; Balick, B.; Jacob, R.

    2018-02-01

    Aims: We aim to determine individual distances to a small number of rather round, quite regularly shaped planetary nebulae by combining their angular expansion in the plane of the sky with a spectroscopically measured expansion along the line of sight. Methods: We combined up to three epochs of Hubble Space Telescope imaging data and determined the angular proper motions of rim and shell edges and of other features. These results are combined with measured expansion speeds to determine individual distances by assuming that line of sight and sky-plane expansions are equal. We employed 1D radiation-hydrodynamics simulations of nebular evolution to correct for the difference between the spectroscopically measured expansion velocities of rim and shell and of their respective shock fronts. Results: Rim and shell are two independently expanding entities, driven by different physical mechanisms, although their model-based expansion timescales are quite similar. We derive good individual distances for 15 objects, and the main results are as follows: (i) distances derived from rim and shell agree well; (ii) comparison with the statistical distances in the literature gives reasonable agreement; (iii) our distances disagree with those derived by spectroscopic methods; (iv) central-star "plateau" luminosities range from about 2000 L⊙ to well below 10 000 L⊙, with a mean value at about 5000 L⊙, in excellent agreement with other samples of known distance (Galactic bulge, Magellanic Clouds, and K648 in the globular cluster M 15); (v) the central-star mass range is rather restricted: from about 0.53 to about 0.56 M⊙, with a mean value of 0.55 M⊙. Conclusions: The expansion measurements of nebular rim and shell edges confirm the predictions of radiation-hydrodynamics simulations and offer a reliable method for the evaluation of distances to suited objects. Results of this paper are based on observations made with the NASA/ESA Hubble Space Telescope in Cycle 16 (GO11122

  5. 216-B-3 expansion ponds closure plan

    Energy Technology Data Exchange (ETDEWEB)

    1994-10-01

    This document describes the activities for clean closure under the Resource Conservation and Recovery Act of 1976 (RCRA) of the 216-B-3 Expansion Ponds. The 216-B-3 Expansion Ponds are operated by the US Department of Energy, Richland Operations Office (DOE-RL) and co-operated by Westinghouse Hanford Company (Westinghouse Hanford). The 216-B-3 Expansion Ponds consists of a series of three earthen, unlined, interconnected ponds that receive waste water from various 200 East Area operating facilities. The 3A, 3B, and 3C ponds are referred to as Expansion Ponds because they expanded the capability of the B Pond System. Waste water (primarily cooling water, steam condensate, and sanitary water) from various 200 East Area facilities is discharged to the Bypass pipe (Project X-009). Water discharged to the Bypass pipe flows directly into the 216-B-3C Pond. The ponds were operated in a cascade mode, where the Main Pond overflowed into the 3A Pond and the 3A Pond overflowed into the 3C Pond. The 3B Pond has not received waste water since May 1985; however, when in operation, the 3B Pond received overflow from the 3A Pond. In the past, waste water discharges to the Expansion Ponds had the potential to have contained mixed waste (radioactive waste and dangerous waste). The radioactive portion of mixed waste has been interpreted by the US Department of Energy (DOE) to be regulated under the Atomic Energy Act of 1954; the dangerous waste portion of mixed waste is regulated under RCRA.

  6. Experimental Analysis on Flow Expansion Over Fan

    Science.gov (United States)

    Sittoni, L.; Paola, C.

    2005-12-01

    We present experimental evidence on the occurrence of large angles of flow expansion with no flow separation over depositional fans. The evolution of a number of self-formed experimental fans was analyzed using overhead images and detailed topographic surveys. Angles of flow expansion up to 45 degrees were found in association with a characteristic bed curvature. Although precise measurements indicate that transverse curvature appeared to slightly decrease downstream over the fans, an approximately constant value of curvature of about 0.1 (r/W = 0.1, where r is the dimensional curvature and W is the maximum width of the fan) fits well all fan sections analyzed. In addition, we found that bed curvature shows a weak proportional dependence with fan expansion angles (alpha around 20 degrees, where alpha is the local plan angle). The curvature appears sufficient to explain the common occurrence of unchannelized, simple fans with opening angles, and hence rates of bedload divergence, much larger than would be predicted from jet theory. We have also analyzed fan development. In our experiments, an instability phenomenon causes a sudden increase in channel width, in association with the formation of a scour. A common development pattern was observed: the upstream-migrating scour initiates flow expansion, inducing in turn the formation of a transient concave heart-shaped fan shape that then slowly develops into a final, steady cone-shaped deposit. Most of the deposition appears to occur during the initial expansion phase. During final steady conditions, fans were also observed to reach values of L/0.5W (L is the final fan length and W is the fan width) approximately constant and in the range 2-4.

  7. VoIP Session Capacity Expansion with Packet Transmission Suppression Control in Wireless LAN

    Science.gov (United States)

    Morioka, Yasufumi; Higashino, Takeshi; Tsukamoto, Katsutoshi; Komaki, Shozo

    This paper proposes a VoIP (Voice over Internet Protocol) session capacity expansion method that uses periodic packet transmission suppression control for wireless LANs. The proposed method expands the VoIP session capacity of an AP without critically degrading the QoS (Quality of Service) of all stations. Simulation results show the proposed method with 0.5% packet suppression control on each station expands a VoIP session capacity by up to 5% compared to a legacy method while satisfying required QoS for all stations.

  8. Testing, Selection, and Implementation of Random Number Generators

    Science.gov (United States)

    2008-07-01

    according to the Cayley -Hamilton theorem (any linear transformation is a zero of its own CP). Therefore Bk can be expressed as a combination of lower...Canada, February 2007. To appear with minor revisions in Advancing the Frontiers of Simulation: A Festschrift in Honor of George S. Fishman. 16

  9. Impact of random numbers on parallel Monte Carlo application

    Energy Technology Data Exchange (ETDEWEB)

    Pandey, Ras B.

    2002-10-22

    A number of graduate students are involved at various level of research in this project. We investigate the basic issues in materials using Monte Carlo simulations with specific interest in heterogeneous materials. Attempts have been made to seek collaborations with the DOE laboratories. Specific details are given.

  10. Framework for testing random numbers in parallel calculations

    DEFF Research Database (Denmark)

    Vattulainen, Ilpo Tapio

    1999-01-01

    sequence. The asymptotic power-law behavior of the corresponding correlation functions yields exponents, which can be compared with exact theoretical results. Correlations prior to the asymptotic regime can be further investigated by other complementary methods. We demonstrate this approach by three...

  11. Pseudo-random number generator based on asymptotic deterministic randomness

    Energy Technology Data Exchange (ETDEWEB)

    Wang Kai [Department of Radio Engineering, Southeast University, Nanjing (China)], E-mail: kaiwang@seu.edu.cn; Pei Wenjiang; Xia Haishan [Department of Radio Engineering, Southeast University, Nanjing (China); Cheung Yiuming [Department of Computer Science, Hong Kong Baptist University, Hong Kong (China)

    2008-06-09

    A novel approach to generate the pseudorandom-bit sequence from the asymptotic deterministic randomness system is proposed in this Letter. We study the characteristic of multi-value correspondence of the asymptotic deterministic randomness constructed by the piecewise linear map and the noninvertible nonlinearity transform, and then give the discretized systems in the finite digitized state space. The statistic characteristics of the asymptotic deterministic randomness are investigated numerically, such as stationary probability density function and random-like behavior. Furthermore, we analyze the dynamics of the symbolic sequence. Both theoretical and experimental results show that the symbolic sequence of the asymptotic deterministic randomness possesses very good cryptographic properties, which improve the security of chaos based PRBGs and increase the resistance against entropy attacks and symbolic dynamics attacks.

  12. Lightweight PUF-based Key and Random Number Generation

    OpenAIRE

    Van Herrewege, Anthony

    2015-01-01

    As embedded electronics continue to be integrated into our daily lives at such a pace that there are nowadays more cellphones than people on the planet, security is becoming ever more crucial. Unfortunately, this is all too often realized as an afterthought and thus the security implementations in many embedded devices offer little to no practical protection. Security does not require only cryptographic algorithms; two other critical modules in a secure system are a key generation module and ...

  13. Analisis SIM Card Cloning Terhadap Algoritma Random Number Generator

    OpenAIRE

    Anwar, Nuril; Riadi, Imam; Luthfi, Ahmad

    2016-01-01

    . Crime in telecommunication sector has increased prevalently, especially with the use of mobile phone which is detrimental both for customers and the providers. In the GSM security system, several weaknesses are found concerning data security outside the network. SIM card clone is part of the security problem in which the data can be transferred to SIM card cloning media. SIM card cloning research can be presented in the form of SRES analysis algorithms A3 and A8 RAND to get Ki Auc for furth...

  14. Medicaid Expansion and Infant Mortality in the United States.

    Science.gov (United States)

    Bhatt, Chintan B; Beck-Sagué, Consuelo M

    2018-01-18

    To explore the effect of Medicaid expansion on US infant mortality rate. We examined data from 2010 to 2016 and 2014 to 2016 to compare infant mortality rates in states and Washington, DC, that accepted the Affordable Care Act Medicaid expansion (Medicaid expansion states) and states that did not (non-Medicaid expansion states), stratifying data by race/ethnicity. Mean infant mortality rate in non-Medicaid expansion states rose (6.4 to 6.5) from 2014 to 2016 but declined in Medicaid expansion states (5.9 to 5.6). Mean difference in infant mortality rate in Medicaid expansion versus non-Medicaid expansion states increased from 0.573 (P = .08) in 2014 to 0.838 in 2016 (P = .006) because of smaller declines in non-Medicaid expansion (11.0%) than in Medicaid expansion (15.2%) states. The 14.5% infant mortality rate decline from 11.7 to 10.0 in African American infants in Medicaid expansion states was more than twice that in non-Medicaid expansion states (6.6%: 12.2 to 11.4; P = .012). Infant mortality rate decline was greater in Medicaid expansion states, with greater declines among African American infants. Future research should explore what aspects of Medicaid expansion may improve infant survival. (Am J Public Health. Published online ahead of print January 18, 2018: e1-e3. doi:10.2105/AJPH.2017.304218).

  15. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  16. Robust Expansion of Human Pluripotent Stem Cells: Integration of Bioprocess Design With Transcriptomic and Metabolomic Characterization.

    Science.gov (United States)

    Silva, Marta M; Rodrigues, Ana F; Correia, Cláudia; Sousa, Marcos F Q; Brito, Catarina; Coroadinha, Ana S; Serra, Margarida; Alves, Paula M

    2015-07-01

    : Human embryonic stem cells (hESCs) have an enormous potential as a source for cell replacement therapies, tissue engineering, and in vitro toxicology applications. The lack of standardized and robust bioprocesses for hESC expansion has hindered the application of hESCs and their derivatives in clinical settings. We developed a robust and well-characterized bioprocess for hESC expansion under fully defined conditions and explored the potential of transcriptomic and metabolomic tools for a more comprehensive assessment of culture system impact on cell proliferation, metabolism, and phenotype. Two different hESC lines (feeder-dependent and feeder-free lines) were efficiently expanded on xeno-free microcarriers in stirred culture systems. Both hESC lines maintained the expression of stemness markers such as Oct-4, Nanog, SSEA-4, and TRA1-60 and the ability to spontaneously differentiate into the three germ layers. Whole-genome transcriptome profiling revealed a phenotypic convergence between both hESC lines along the expansion process in stirred-tank bioreactor cultures, providing strong evidence of the robustness of the cultivation process to homogenize cellular phenotype. Under low-oxygen tension, results showed metabolic rearrangement with upregulation of the glycolytic machinery favoring an anaerobic glycolysis Warburg-effect-like phenotype, with no evidence of hypoxic stress response, in contrast to two-dimensional culture. Overall, we report a standardized expansion bioprocess that can guarantee maximal product quality. Furthermore, the "omics" tools used provided relevant findings on the physiological and metabolic changes during hESC expansion in environmentally controlled stirred-tank bioreactors, which can contribute to improved scale-up production systems. The clinical application of human pluripotent stem cells (hPSCs) has been hindered by the lack of robust protocols able to sustain production of high cell numbers, as required for regenerative medicine

  17. Expansion of World Drylands Under Global Warming

    Science.gov (United States)

    Feng, S.; Fu, Q.; Hu, Q. S.

    2012-12-01

    The world drylands including both semi-arid and arid regions comprise of one-third of the global land surfaces, which support 14% of the world's inhabitants and a significant share of the world agriculture. Because of meager annual precipitation and large potential evaporative water loss, the ecosystems over drylands are fragile and sensitive to the global change. By analyzing the observations during 1948-2008 and 20 fully coupled climate model simulations from CMIP5 for the period 1900-2100, this study evaluated the changes of the world drylands that are defined with a modified form of the Thornthwaite's moisture index. The results based on observational data showed that the world drylands are steadily expanding during the past 60 years. The areas occupied by drylands in 1994-2008 is about 2.0×10^6km^2 (or 4%) larger than the average during the 1950s. Such an expansion is also a robust feature in the simulations of the 20 global climate models, though the rate is much smaller in the models. A stronger expanding rate is projected during the first half of this century than the simulations in the last century, followed by accelerating expansion after 2050s under the high greenhouse gas emission scenario (RCP8.5). By the end of this century, the world drylands are projected to be over 58×10^6km^2 (or 11% increase compared to the 1961-1990 climatology). The projected expansion of drylands, however, is not homogeneous over the world drylands, with major expansion of arid regions over the southwest North America, the northern fringe of Africa, southern Africa and Australia. Major expansions of semi-arid regions are projected over the north side of the Mediterranean, southern Africa, North and South America. The global warming is the main factor causing the increase of potential evapotranspiration estimated by Penman-Monteith algorithm, which in turn dominants the expansion of drylands. The widening of Hadley cell, which has impact on both temperature and precipitation

  18. Defining chemical expansion: the choice of units for the stoichiometric expansion coefficient

    DEFF Research Database (Denmark)

    Marrocchelli, Dario; Chatzichristodoulou, Christodoulos; Bishop, Sean R.

    2014-01-01

    Chemical expansion refers to the spatial dilation of a material that occurs upon changes in its composition. When this dilation is caused by a gradual, iso-structural increase in the lattice parameter with composition, it is related to the composition change by the stoichiometric expansion coeffi...... are provided for changes in oxygen content in fluorite, perovskite, and Ruddlesden-Popper (K2NiF4) phase materials used in solid oxide fuel cells....

  19. An Empirical Analysis of the Cascade Secret Key Reconciliation Protocol for Quantum Key Distribution

    Science.gov (United States)

    2011-09-01

    sifted key generation, the simulation utilizes the pseudo-random number generator Mersenne Twister developed by Matsumoto and Nishimura (Matsumoto...Mersenne Twister pseudo-random number generator. A cryptographically secure pseudo-random number generator may be a better choice for future... twister : a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model. Comput. Simul. , 8 (1), 3-30. Maurer, U. M

  20. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is formali......The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol...

  1. REGENERATIVE GAS TURBINES WITH DIVIDED EXPANSION

    DEFF Research Database (Denmark)

    Elmegaard, Brian; Qvale, Einar Bjørn

    2004-01-01

    their efficiency are always of interest. Recently, two independent studies have proposed recuperated gas turbines to be configured with the turbine expansion divided, in order to obtain higher efficiency. The idea is to operate the system with a gas generator and a power turbine, and use the gas from the gas......Recuperated gas turbines are currently drawing an increased attention due to the recent commercialization of micro gas turbines with recuperation. This system may reach a high efficiency even for the small units of less than 100 kW. In order to improve the economics of the plants, ways to improve...... divided expansion can be advantageous under certain circumstances. But, in order for todays micro gas turbines to be competitive, the thermodynamic efficiencies will have to be rather high. This requires that all component efficiencies including the recuperator effectiveness will have to be high...

  2. Off-diagonal expansion quantum Monte Carlo.

    Science.gov (United States)

    Albash, Tameem; Wagenbreth, Gene; Hen, Itay

    2017-12-01

    We propose a Monte Carlo algorithm designed to simulate quantum as well as classical systems at equilibrium, bridging the algorithmic gap between quantum and classical thermal simulation algorithms. The method is based on a decomposition of the quantum partition function that can be viewed as a series expansion about its classical part. We argue that the algorithm not only provides a theoretical advancement in the field of quantum Monte Carlo simulations, but is optimally suited to tackle quantum many-body systems that exhibit a range of behaviors from "fully quantum" to "fully classical," in contrast to many existing methods. We demonstrate the advantages, sometimes by orders of magnitude, of the technique by comparing it against existing state-of-the-art schemes such as path integral quantum Monte Carlo and stochastic series expansion. We also illustrate how our method allows for the unification of quantum and classical thermal parallel tempering techniques into a single algorithm and discuss its practical significance.

  3. Locally-smeared operator product expansions

    Energy Technology Data Exchange (ETDEWEB)

    Monahan, Christopher; Orginos, Kostantinos

    2014-12-01

    We propose a "locally-smeared Operator Product Expansion" (sOPE) to decompose non-local operators in terms of a basis of locally-smeared operators. The sOPE formally connects nonperturbative matrix elements of smeared degrees of freedom, determined numerically using the gradient flow, to non-local operators in the continuum. The nonperturbative matrix elements do not suffer from power-divergent mixing on the lattice, provided the smearing scale is kept fixed in the continuum limit. The presence of this smearing scale prevents a simple connection to the standard operator product expansion and therefore requires the construction of a two-scale formalism. We demonstrate the feasibility of our approach using the example of real scalar field theory.

  4. Morse basis expansion applied to diatomic molecules

    Energy Technology Data Exchange (ETDEWEB)

    Lima, Emanuel F. de, E-mail: eflima@rc.unesp.br [Departamento de Estatística, Matemática Aplicada e Computação, Instituto de Geociências e Ciências Exatas, Universidade Estadual Paulista – UNESP, Rio Claro, São Paulo 13506-900 (Brazil)

    2012-02-20

    This work explores the use of the eigenfunctions of the Morse potential with a infinite barrier at long range to solve the radial Schrödinger equation for diatomic molecules. Analytical formulas are obtained for the kinetic energy operator matrix elements in the Morse basis. The Morse basis expansion is applied to find the vibrational–rotational levels of the sodium molecule in the electronic ground state. -- Highlights: ► The Morse potential basis is invoked to find the rovibrational levels of diatomic molecules. ► Analytical formulas for the kinetic energy operator in the Morse basis are obtained. ► The results of the Morse basis expansion show good agreement with the Fourier Grid technique.

  5. Off-diagonal expansion quantum Monte Carlo

    Science.gov (United States)

    Albash, Tameem; Wagenbreth, Gene; Hen, Itay

    2017-12-01

    We propose a Monte Carlo algorithm designed to simulate quantum as well as classical systems at equilibrium, bridging the algorithmic gap between quantum and classical thermal simulation algorithms. The method is based on a decomposition of the quantum partition function that can be viewed as a series expansion about its classical part. We argue that the algorithm not only provides a theoretical advancement in the field of quantum Monte Carlo simulations, but is optimally suited to tackle quantum many-body systems that exhibit a range of behaviors from "fully quantum" to "fully classical," in contrast to many existing methods. We demonstrate the advantages, sometimes by orders of magnitude, of the technique by comparing it against existing state-of-the-art schemes such as path integral quantum Monte Carlo and stochastic series expansion. We also illustrate how our method allows for the unification of quantum and classical thermal parallel tempering techniques into a single algorithm and discuss its practical significance.

  6. 6th International Symposium on Thermal Expansion

    CERN Document Server

    1978-01-01

    This 6th International Symposium on Thermal Expansion, the first outside the USA, was held on August 29-31, 1977 at the Gull Harbour Resort on Hecla Island, Manitoba, Canada. Symposium Chairman was Ian D. Peggs, Atomic Energy of Canada Limited, and our continuing sponsor was CINDAS/Purdue University. We made considerable efforts to broaden the base this year to include more users of expansion data but with little success. We were successful, however, in establishing a session on liquids, an area which is receiving more attention as a logical extension to the high-speed thermophysical property measurements on materials at temperatures close to their melting points. The Symposium had good international representation but the overall attendance was, disappointingly, relatively low. Neverthe­ less, this enhanced the informal atmosphere throughout the meeting with a resultant frank exchange of information and ideas which all attendees appreciated. A totally new item this year was the presentation of a bursary to ...

  7. Asymptotic expansions for the Gaussian unitary ensemble

    DEFF Research Database (Denmark)

    Haagerup, Uffe; Thorbjørnsen, Steen

    2012-01-01

    Let g : R ¿ C be a C8-function with all derivatives bounded and let trn denote the normalized trace on the n × n matrices. In Ref. 3 Ercolani and McLaughlin established asymptotic expansions of the mean value ¿{trn(g(Xn))} for a rather general class of random matrices Xn, including the Gaussian...... aj(g), j ¿ N, as distributions (in the sense of L. Schwarts). We derive a similar asymptotic expansion for the covariance Cov{Trn[f(Xn)], Trn[g(Xn)]}, where f is a function of the same kind as g, and Trn = n trn. Special focus is drawn to the case where and for ¿, µ in C\\R. In this case the mean...

  8. Frostless heat pump having thermal expansion valves

    Science.gov (United States)

    Chen, Fang C [Knoxville, TN; Mei, Viung C [Oak Ridge, TN

    2002-10-22

    A heat pump system having an operable relationship for transferring heat between an exterior atmosphere and an interior atmosphere via a fluid refrigerant and further having a compressor, an interior heat exchanger, an exterior heat exchanger, a heat pump reversing valve, an accumulator, a thermal expansion valve having a remote sensing bulb disposed in heat transferable contact with the refrigerant piping section between said accumulator and said reversing valve, an outdoor temperature sensor, and a first means for heating said remote sensing bulb in response to said outdoor temperature sensor thereby opening said thermal expansion valve to raise suction pressure in order to mitigate defrosting of said exterior heat exchanger wherein said heat pump continues to operate in a heating mode.

  9. Bond return predictability in expansions and recessions

    DEFF Research Database (Denmark)

    Engsted, Tom; Møller, Stig Vinther; Jensen, Magnus David Sander

    We document that over the period 1953-2011 US bond returns are predictable in expansionary periods but unpredictable during recessions. This result holds in both in-sample and out-of-sample analyses and using both univariate regressions and combination forecasting techniques. A simulation study...... but negative in recessions. The results are also consistent with tests showing that the expectations hypothesis of the term structure holds in recessions but not in expansions. However, the results for bonds are in sharp contrast to results for stocks showing that stock returns are predictable in recessions...... but not in expansions. Thus, our results indicate that there is not a common predictive pattern of stock and bond returns associated with the state of the economy....

  10. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  11. National Elk Refuge vaccination protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Proposal by the State of Wyoming, Wyoming Game and Fish Department, to vaccinate elk on the National Elk Refuge. The proposal provides a protocol for vaccinating elk...

  12. Recommended protocols for sampling macrofungi

    Science.gov (United States)

    Gregory M. Mueller; John Paul Schmit; Sabine M. Hubndorf Leif Ryvarden; Thomas E. O' Dell; D. Jean Lodge; Patrick R. Leacock; Milagro Mata; Loengrin Umania; Qiuxin (Florence) Wu; Daniel L. Czederpiltz

    2004-01-01

    This chapter discusses several issues regarding reommended protocols for sampling macrofungi: Opportunistic sampling of macrofungi, sampling conspicuous macrofungi using fixed-size, sampling small Ascomycetes using microplots, and sampling a fixed number of downed logs.

  13. Automata-theoretic protocol programming

    NARCIS (Netherlands)

    Jongmans, Sung-Shik Theodorus Quirinus

    2016-01-01

    Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As

  14. Cellular Responses to Auxin: Division versus Expansion

    OpenAIRE

    Perrot-Rechenmann, Catherine

    2010-01-01

    The phytohormone auxin is a major regulator of plant growth and development. Many aspects of these processes depend on the multiple controls exerted by auxin on cell division and cell expansion. The detailed mechanisms by which auxin controls these essential cellular responses are still poorly understood, despite recent progress in the identification of auxin receptors and components of auxin signaling pathways. The purpose of this review is to provide an overview of the present knowledge of ...

  15. Multipole expansion in the quantum hall effect

    Energy Technology Data Exchange (ETDEWEB)

    Cappelli, Andrea [INFN, Sezione di Firenze,Via G. Sansone 1, 50019 Sesto Fiorentino, Firenze (Italy); Randellini, Enrico [INFN, Sezione di Firenze,Via G. Sansone 1, 50019 Sesto Fiorentino, Firenze (Italy); Dipartimento di Fisica, Università di Firenze,Via G. Sansone 1, 50019 Sesto Fiorentino, Firenze (Italy)

    2016-03-15

    The effective action for low-energy excitations of Laughlin’s states is obtained by systematic expansion in inverse powers of the magnetic field. It is based on the W-infinity symmetry of quantum incompressible fluids and the associated higher-spin fields. Besides reproducing the Wen and Wen-Zee actions and the Hall viscosity, this approach further indicates that the low-energy excitations are extended objects with dipolar and multipolar moments.

  16. Spatial Linkage and Urban Expansion: AN Urban Agglomeration View

    Science.gov (United States)

    Jiao, L. M.; Tang, X.; Liu, X. P.

    2017-09-01

    Urban expansion displays different characteristics in each period. From the perspective of the urban agglomeration, studying the spatial and temporal characteristics of urban expansion plays an important role in understanding the complex relationship between urban expansion and network structure of urban agglomeration. We analyze urban expansion in the Yangtze River Delta Urban Agglomeration (YRD) through accessibility to and spatial interaction intensity from core cities as well as accessibility of road network. Results show that: (1) Correlation between urban expansion intensity and spatial indicators such as location and space syntax variables is remarkable and positive, while it decreases after rapid expansion. (2) Urban expansion velocity displays a positive correlation with spatial indicators mentioned above in the first (1980-1990) and second (1990-2000) period. However, it exhibits a negative relationship in the third period (2000-2010), i.e., cities located in the periphery of urban agglomeration developing more quickly. Consequently, the hypothesis of convergence of urban expansion in rapid expansion stage is put forward. (3) Results of Zipf's law and Gibrat's law show urban expansion in YRD displays a convergent trend in rapid expansion stage, small and medium-sized cities growing faster. This study shows that spatial linkage plays an important but evolving role in urban expansion within the urban agglomeration. In addition, it serves as a reference to the planning of Yangtze River Delta Urban Agglomeration and regulation of urban expansion of other urban agglomerations.

  17. SPATIAL LINKAGE AND URBAN EXPANSION: AN URBAN AGGLOMERATION VIEW

    Directory of Open Access Journals (Sweden)

    L. M. Jiao

    2017-09-01

    Full Text Available Urban expansion displays different characteristics in each period. From the perspective of the urban agglomeration, studying the spatial and temporal characteristics of urban expansion plays an important role in understanding the complex relationship between urban expansion and network structure of urban agglomeration. We analyze urban expansion in the Yangtze River Delta Urban Agglomeration (YRD through accessibility to and spatial interaction intensity from core cities as well as accessibility of road network. Results show that: (1 Correlation between urban expansion intensity and spatial indicators such as location and space syntax variables is remarkable and positive, while it decreases after rapid expansion. (2 Urban expansion velocity displays a positive correlation with spatial indicators mentioned above in the first (1980–1990 and second (1990–2000 period. However, it exhibits a negative relationship in the third period (2000–2010, i.e., cities located in the periphery of urban agglomeration developing more quickly. Consequently, the hypothesis of convergence of urban expansion in rapid expansion stage is put forward. (3 Results of Zipf’s law and Gibrat's law show urban expansion in YRD displays a convergent trend in rapid expansion stage, small and medium-sized cities growing faster. This study shows that spatial linkage plays an important but evolving role in urban expansion within the urban agglomeration. In addition, it serves as a reference to the planning of Yangtze River Delta Urban Agglomeration and regulation of urban expansion of other urban agglomerations.

  18. Frequency dependent thermal expansion in binary viscoelasticcomposites

    Energy Technology Data Exchange (ETDEWEB)

    Berryman, James G.

    2007-12-01

    The effective thermal expansion coefficient beta* of abinary viscoelastic composite is shown to be frequency dependent even ifthe thermal expansion coefficients beta A and beta B of both constituentsare themselves frequency independent. Exact calculations for binaryviscoelastic systems show that beta* is related to constituent valuesbeta A, beta B, volume fractions, and bulk moduli KA, KB, as well as tothe overall bulk modulus K* of the composite system. Then, beta* isdetermined for isotropic systems by first bounding (or measuring) K* andtherefore beta*. For anisotropic systems with hexagonal symmetry, theprincipal values of the thermal expansion beta*perp and beta*para can bedetermined exactly when the constituents form a layered system. In allthe examples studied, it is shown explicitly that the eigenvectors of thethermoviscoelastic system possess non-negative dissipation -- despite thecomplicated analytical behavior of the frequency dependent thermalexpansivities themselves. Methods presented have a variety ofapplications from fluid-fluid mixtures to fluid-solid suspensions, andfrom fluid-saturated porous media to viscoelastic solid-solidcomposites.

  19. Tissue expansion: Concepts, techniques and unfavourable results

    Directory of Open Access Journals (Sweden)

    Milind S Wagh

    2013-01-01

    Full Text Available The phenomenon of tissue expansion is observed in nature all the time. The same properties of the human skin to stretch and expand and yield extra skin if placed under continuous stress over a prolonged period of time has been utilised for reconstructive purposes with the help of a silicon balloon inserted under the skin and progressively filled with saline. The technique of tissue expansion is now more than three decades old and has been a value addition to our armamentarium in reconstructive surgery in all parts of the body. However, it still requires careful patient selection, meticulous planning and faultless execution to successfully carry out the process, which usually lasts for more than 8-12 weeks and involves two sittings of surgery. Any compromise in this process can lead to unfavourable results and complications, some minor, which allow continuance of the process to attain the expected goal and others major, which force abandonment of the process without reaching the expected goal. This article seeks to highlight the intricacies of the concept of tissue expansion, the technique related to flawless execution of the process and likely complications with emphasis on their management. We also present our results from a personal series of 138 patients operated over a period of 18 years between 1994 and 2012.

  20. Precision Quantum Chromodynamics From Heavy Quark Expansions

    CERN Document Server

    Benson, D G

    2005-01-01

    The heavy quark expansion is applied to the semileptonic width of b → c and b → u transitions along with the moments of various decay distributions in the semileptonic b → c transitions. The resulting expressions can be used to improve the precision with which we can extract the values of the CKM matrix elements Vcb and Vub from the data. Heavy quark parameters like mb and m2p are also obtained with values that are completely consistent with theoretical expectations. The observed agreement between the theoretical predictions of the heavy quark expansion and the experimental data tightly constrain the theoretical uncertainty. The heavy quark expansion can also be applied to the photon energy moments in B → Xsγ. The first two of these moments are directly related to mb and m2p . The experimentally imposed cuts on the photon energy spectrum introduce biases into the extracted values of these parameters. Correcting for these biases generates a remarkable agreem...

  1. Protocols for Late Maxillary Protraction in Cleft Lip and Palate Patients at Childrens Hospital Los Angeles

    Science.gov (United States)

    Yen, Stephen L-K

    2011-01-01

    This paper describes the protocols used at Childrens Hospital Los Angeles (CHLA) to protract the maxilla during early adolescence. It is a modification of techniques introduced by Eric Liou with his Alternate Rapid Maxillary Expansion and Constriction (ALT-RAMEC) technique. The main differences between the CHLA protocol and previous maxillary protraction protocols are the age the protraction is attempted, the sutural loosening by alternating weekly expansion with constriction and the use of Class III elastics to support and redirect the protraction by nightly facemask wear. The CHLA protocol entirely depends on patient compliance and must be carefully taught and monitored. In a cooperative patient, the technique can correct a Class III malocclusion that previously would have been treated with LeFort 1 maxillary advancement surgery. Thus, it is not appropriate for patients requiring 2 jaw surgeries to correct mandibular prognathism, occlusal cants or facial asymmetry. The maxillary protraction appears to work by a combination of skeletal advancement, dental compensation and rotation of the occlusal planes. Microscrew/microimplant/temporary anchorage devices have been used with these maxillary protraction protocols to assist in expanding the maxilla, increasing skeletal anchorage during protraction, limiting dental compensations and reducing skeletal relapse. PMID:21765629

  2. Lessons from Early Medicaid Expansions Under Health Reform..

    Data.gov (United States)

    U.S. Department of Health & Human Services — Lessons from Early Medicaid Expansions Under Health Reform, Interviews with Medicaid Officials In a new study entitled Lessons from Early Medicaid Expansions Under...

  3. NiTi Expansion in Operated Unilateral Cleft Palate Patients

    Directory of Open Access Journals (Sweden)

    K Y Poornima

    2011-01-01

    Conclusion : NiTi expansion in operated cleft patients, showed mainly orthodontic expansion. The significant change in the maxillary inter- molar region is due to the direct placement of NiTi palatal expander to 16, 26.

  4. Following Surgically Assisted Rapid Palatal Expansion, Do Tooth-Borne or Bone-Borne Appliances Provide More Skeletal Expansion and Dental Expansion?

    Science.gov (United States)

    Hamedi-Sangsari, Adrien; Chinipardaz, Zahra; Carrasco, Lee

    2017-10-01

    The aim of this study was to compare outcome measurements of skeletal and dental expansion with bone-borne (BB) versus tooth-borne (TB) appliances after surgically assisted rapid palatal expansion (SARPE). This study was performed to provide quantitative measurements that will help the oral surgeon and orthodontist in selecting the appliance with, on average, the greatest amount of skeletal expansion and the least amount of dental expansion. A computerized database search was performed using PubMed, EBSCO, Cochrane, Scopus, Web of Science, and Google Scholar on publications in reputable oral surgery and orthodontic journals. A systematic review and meta-analysis was completed with the predictor variable of expansion appliance (TB vs BB) and outcome measurement of expansion (in millimeters). Of 487 articles retrieved from the 6 databases, 5 articles were included, 4 with cone-beam computed tomographic (CBCT) data and 1 with non-CBCT 3-dimensional cast data. There was a significant difference in skeletal expansion (standardized mean difference [SMD], 0.92; 95% confidence interval [CI], 0.54-1.30; P < .001) in favor of BB rather than TB appliances. However, there was no significant difference in dental expansion (SMD, 0.05; 95% CI, -0.24 to 0.34; P = .03). According to the literature, to achieve more effective skeletal expansion and minimize dental expansion after SARPE, a BB appliance should be favored. Copyright © 2017 American Association of Oral and Maxillofacial Surgeons. Published by Elsevier Inc. All rights reserved.

  5. Detection automatique de bulles HI en expansion

    Science.gov (United States)

    Daigle, Anik

    Plusieurs cavités en expansion observées dans le gaz d'hydrogène neutre galactique ont été associées à la présence d'étoiles massives présentant d'intenses vents stellaires ou à des explosions de supernovae. Ces bulles, qui sont remplies de gaz très chaud ( T = 10 5 -10 7 K), tracent donc à la fois les étoiles massives et la phase chaude et ionisée du gaz interstellaire. La morphologie de ces bulles est instable et généralement perturbée par la multitude de structures et de phénomènes existant dans le milieu interstellaire. Leur détection par inspection visuelle est donc difficile et subjective. L'objet de cette thèse est le développement d'une technique de détection automatique et objective de bulles en expansion dans le gaz d'hydrogène neutre de la Voie lactée. Les bulles à progéniteurs stellaires présentent toutes des vitesses d'expansion comprises entre 6 et 19 km s -1 . Une telle caractéristique peut généralement être reconnue dans les spectres en vitesse des cubes de données à 21 cm de l'hydrogène neutre. Notre technique de détection a donc été fondée sur la reconnaissance automatique de la signature d'une expansion à [6, 19] km s -1 dans les spectres en vitesse. La caractérisation et la généralisation de la signature dynamique propre à une bulle en expansion a été confiée à des réseaux de neurones artificiels. Des validations subséquentes, dont certaines liées à la morphologie, ont ensuite été appliquées. La technique a été testée sur onze bulles connues, dont dix ont pu être détectées. La technique a aussi été employée pour la réalisation d'un relevé dans la région du bras de Persée. La distribution spatiale des objets détectés s'est révélée suivre la distribution des étoiles du disque de la Voie lactée. De plus, la distribution selon le rayon et selon la vitesse d'expansion des bulles détectées de rayons plus petits que 10 pc correspondent aux distributions dérivées du mod

  6. 36 CFR 72.42 - Expansion and new development.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Expansion and new development... INTERIOR URBAN PARK AND RECREATION RECOVERY ACT OF 1978 Grants for Recovery Action Program Development, Rehabilitation and Innovation § 72.42 Expansion and new development. (a) Expansion. Because the UPARR Program is...

  7. Electrical Resistance Alloys and Low-Expansion Alloys

    DEFF Research Database (Denmark)

    Kjer, Torben

    1996-01-01

    The article gives an overview of electrical resistance alloys and alloys with low thermal expansion. The electrical resistance alloys comprise resistance alloys, heating alloys and thermostat alloys. The low expansion alloys comprise alloys with very low expansion coefficients, alloys with very low...

  8. Rapid replacement of bridge deck expansion joints study - phase I.

    Science.gov (United States)

    2014-12-01

    Bridge deck expansion joints are used to allow for movement of the bridge deck due to thermal expansion, dynamics loading, and : other factors. More recently, expansion joints have also been utilized to prevent the passage of winter de-icing chemical...

  9. 46 CFR 61.15-12 - Nonmetallic expansion joints.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Nonmetallic expansion joints. 61.15-12 Section 61.15-12... INSPECTIONS Periodic Tests of Piping Systems § 61.15-12 Nonmetallic expansion joints. (a) Nonmetallic expansion joints must be examined externally at each inspection for certification and periodic inspection...

  10. 14 CFR 23.969 - Fuel tank expansion space.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Fuel tank expansion space. 23.969 Section 23.969 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT....969 Fuel tank expansion space. Each fuel tank must have an expansion space of not less than two...

  11. Keyboard with Universal Communication Protocol Applied to CNC Machine

    Directory of Open Access Journals (Sweden)

    Mejía-Ugalde Mario

    2014-04-01

    Full Text Available This article describes the use of a universal communication protocol for industrial keyboard based microcontroller applied to computer numerically controlled (CNC machine. The main difference among the keyboard manufacturers is that each manufacturer has its own programming of source code, producing a different communication protocol, generating an improper interpretation of the function established. The above results in commercial industrial keyboards which are expensive and incompatible in their connection with different machines. In the present work the protocol allows to connect the designed universal keyboard and the standard keyboard of the PC at the same time, it is compatible with all the computers through the communications USB, AT or PS/2, to use in CNC machines, with extension to other machines such as robots, blowing, injection molding machines and others. The advantages of this design include its easy reprogramming, decreased costs, manipulation of various machine functions and easy expansion of entry and exit signals. The results obtained of performance tests were satisfactory, because each key has the programmed and reprogrammed facility in different ways, generating codes for different functions, depending on the application where it is required to be used.

  12. High flux expansion divertor studies in NSTX

    Energy Technology Data Exchange (ETDEWEB)

    Soukhanovskii, V A; Maingi, R; Bell, R E; Gates, D A; Kaita, R; Kugel, H W; LeBlanc, B P; Maqueda, R; Menard, J E; Mueller, D; Paul, S F; Raman, R; Roquemore, A L

    2009-06-29

    Projections for high-performance H-mode scenarios in spherical torus (ST)-based devices assume low electron collisionality for increased efficiency of the neutral beam current drive. At lower collisionality (lower density), the mitigation techniques based on induced divertor volumetric power and momentum losses may not be capable of reducing heat and material erosion to acceptable levels in a compact ST divertor. Divertor geometry can also be used to reduce high peak heat and particle fluxes by flaring a scrape-off layer (SOL) flux tube at the divertor plate, and by optimizing the angle at which the flux tube intersects the divertor plate, or reduce heat flow to the divertor by increasing the length of the flux tube. The recently proposed advanced divertor concepts [1, 2] take advantage of these geometry effects. In a high triangularity ST plasma configuration, the magnetic flux expansion at the divertor strike point (SP) is inherently high, leading to a reduction of heat and particle fluxes and a facilitated access to the outer SP detachment, as has been demonstrated recently in NSTX [3]. The natural synergy of the highly-shaped high-performance ST plasmas with beneficial divertor properties motivated a further systematic study of the high flux expansion divertor. The National Spherical Torus Experiment (NSTX) is a mid-sized device with the aspect ratio A = 1.3-1.5 [4]. In NSTX, the graphite tile divertor has an open horizontal plate geometry. The divertor magnetic configuration geometry was systematically changed in an experiment by either (1) changing the distance between the lower divertor X-point and the divertor plate (X-point height h{sub X}), or by (2) keeping the X-point height constant and increasing the outer SP radius. An initial analysis of the former experiment is presented below. Since in the divertor the poloidal field B{sub {theta}} strength is proportional to h{sub X}, the X-point height variation changed the divertor plasma wetted area due to

  13. Zirconium titanate: stability and thermal expansion; Titanato de circonio: estabilidad termodinamica y expansion termica

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Lopez, E.; Moreno, R.; Baudin, C.

    2011-07-01

    Zirconium titanate is a well known compound in the field of electro ceramics, although it has also been used in catalyst and sensors applications. The crystallographic thermal expansion anisotropy of this compound makes it a potential candidate as constituent of structural components. In general, to assure the structural integrity and microstructural homogeneity of a ceramic piece, relatively low cooling rates from the fabrication temperature are required. This requirement is essential for zirconium titanate because thermal expansion as well as phase distribution is affected by small variations in the composition and cooling rate. This work reviews the available data on the phase equilibrium relationships in the systems ZrO{sub 2}-TiO{sub 2} and ZrO{sub 2}-TiO{sub 2}-Y{sub 2}O{sub 3}. The main discrepancies as well as the possible origins of them are discussed. Additionally, the crystallographic thermal expansion data in the current literature are reviewed. (Author) 56 refs.

  14. Superselection rules and quantum protocols

    Science.gov (United States)

    Kitaev, Alexei; Mayers, Dominic; Preskill, John

    2004-05-01

    We show that superselection rules do not enhance the information-theoretic security of quantum cryptographic protocols. Our analysis employs two quite different methods. The first method uses the concept of a reference system—in a world subject to a superselection rule, unrestricted operations can be simulated by parties who share access to a reference system with suitable properties. By this method, we prove that if an n -party protocol is secure in a world subject to a superselection rule, then the security is maintained even if the superselection rule is relaxed. However, the proof applies only to a limited class of superselection rules, those in which the superselection sectors are labeled by unitary irreducible representations of a compact symmetry group. The second method uses the concept of the format of a message sent between parties—by verifying the format, the recipient of a message can check whether the message could have been sent by a party who performed charge-conserving operations. By this method, we prove that protocols subject to general superselection rules (including those pertaining to non-Abelian anyons in two dimensions) are no more secure than protocols in the unrestricted world. However, the proof applies only to two-party protocols. Our results show in particular that, if no assumptions are made about the computational power of the cheater, then secure quantum bit commitment and strong quantum coin flipping with arbitrarily small bias are impossible in a world subject to superselection rules.

  15. Embedded Network Protocols for Mobile Devices

    Science.gov (United States)

    Galataki, Despo; Radulescu, Andrei; Verstoep, Kees; Fokkink, Wan

    Embedded networks for chip-to-chip networks are emerging as communication infrastructure in mobile devices. We present three novel embedded network protocols: a sliding window protocol, a protocol for opening and closing connections, and a bandwidth reservation protocol. The design of these protocols is tailored to the low power and low cost requirements of mobile devices. The model checker SPIN played an important role in the design and analysis of these protocols. Large instances of the protocols could be analyzed successfully using the distributed model checker DiVinE.

  16. Comparison between rapid and mixed maxillary expansion through an assessment of arch changes on dental casts.

    Science.gov (United States)

    Grassia, Vincenzo; d'Apuzzo, Fabrizia; Jamilian, Abdolreza; Femiano, Felice; Favero, Lorenzo; Perillo, Letizia

    2015-01-01

    Aim of this retrospective observational study was to compare upper and lower dental changes in patients treated with Rapid Maxillary Expansion (RME) and Mixed Maxillary Expansion (MME), assessed by dental cast analysis. Treatment groups consisted of 42 patients: the RME group (n = 21) consisted of 13 female and 8 male subjects with the mean age of 8.8 years ± 1.37 at T0 and 9.6 years ± 1.45 at T1; the MME group (n = 21) consisted of 12 female and 9 male patients with a mean age of 8.9 years ± 2.34 at T0 and 10.5 years ± 2.08 at T1. The upper and lower arch analysis was performed on four dental bilateral landmarks, on upper and lower casts; also upper and lower arch depths were measured. The groups were compared using independent sample t-test to estimate dental changes in upper and lower arches. Before expansion treatment (T0), the groups were similar for all examined variables (p>0.05). In both RME and MME group, significant increments in all the variables for maxillary and mandibular arch widths were observed after treatment. No significant differences in maxillary and mandibular arch depths were observed at the end of treatment in both groups. An evaluation of the changes after RME and MME (T1) showed statistically significant differences in mandibular arch depth (plip bumper effects" observed in the MME protocol.

  17. Microencapsulation technology: a powerful tool for integrating expansion and cryopreservation of human embryonic stem cells.

    Science.gov (United States)

    Serra, Margarida; Correia, Cláudia; Malpique, Rita; Brito, Catarina; Jensen, Janne; Bjorquist, Petter; Carrondo, Manuel J T; Alves, Paula M

    2011-01-01

    The successful implementation of human embryonic stem cells (hESCs)-based technologies requires the production of relevant numbers of well-characterized cells and their efficient long-term storage. In this study, cells were microencapsulated in alginate to develop an integrated bioprocess for expansion and cryopreservation of pluripotent hESCs. Different three-dimensional (3D) culture strategies were evaluated and compared, specifically, microencapsulation of hESCs as: i) single cells, ii) aggregates and iii) immobilized on microcarriers. In order to establish a scalable bioprocess, hESC-microcapsules were cultured in stirred tank bioreactors.The combination of microencapsulation and microcarrier technology resulted in a highly efficient protocol for the production and storage of pluripotent hESCs. This strategy ensured high expansion ratios (an approximately twenty-fold increase in cell concentration) and high cell recovery yields (>70%) after cryopreservation. When compared with non-encapsulated cells, cell survival post-thawing demonstrated a three-fold improvement without compromising hESC characteristics.Microencapsulation also improved the culture of hESC aggregates by protecting cells from hydrodynamic shear stress, controlling aggregate size and maintaining cell pluripotency for two weeks.This work establishes that microencapsulation technology may prove a powerful tool for integrating the expansion and cryopreservation of pluripotent hESCs. The 3D culture strategy developed herein represents a significant breakthrough towards the implementation of hESCs in clinical and industrial applications.

  18. Microencapsulation technology: a powerful tool for integrating expansion and cryopreservation of human embryonic stem cells.

    Directory of Open Access Journals (Sweden)

    Margarida Serra

    Full Text Available The successful implementation of human embryonic stem cells (hESCs-based technologies requires the production of relevant numbers of well-characterized cells and their efficient long-term storage. In this study, cells were microencapsulated in alginate to develop an integrated bioprocess for expansion and cryopreservation of pluripotent hESCs. Different three-dimensional (3D culture strategies were evaluated and compared, specifically, microencapsulation of hESCs as: i single cells, ii aggregates and iii immobilized on microcarriers. In order to establish a scalable bioprocess, hESC-microcapsules were cultured in stirred tank bioreactors.The combination of microencapsulation and microcarrier technology resulted in a highly efficient protocol for the production and storage of pluripotent hESCs. This strategy ensured high expansion ratios (an approximately twenty-fold increase in cell concentration and high cell recovery yields (>70% after cryopreservation. When compared with non-encapsulated cells, cell survival post-thawing demonstrated a three-fold improvement without compromising hESC characteristics.Microencapsulation also improved the culture of hESC aggregates by protecting cells from hydrodynamic shear stress, controlling aggregate size and maintaining cell pluripotency for two weeks.This work establishes that microencapsulation technology may prove a powerful tool for integrating the expansion and cryopreservation of pluripotent hESCs. The 3D culture strategy developed herein represents a significant breakthrough towards the implementation of hESCs in clinical and industrial applications.

  19. Microencapsulation Technology: A Powerful Tool for Integrating Expansion and Cryopreservation of Human Embryonic Stem Cells

    Science.gov (United States)

    Malpique, Rita; Brito, Catarina; Jensen, Janne; Bjorquist, Petter; Carrondo, Manuel J. T.; Alves, Paula M.

    2011-01-01

    The successful implementation of human embryonic stem cells (hESCs)-based technologies requires the production of relevant numbers of well-characterized cells and their efficient long-term storage. In this study, cells were microencapsulated in alginate to develop an integrated bioprocess for expansion and cryopreservation of pluripotent hESCs. Different three-dimensional (3D) culture strategies were evaluated and compared, specifically, microencapsulation of hESCs as: i) single cells, ii) aggregates and iii) immobilized on microcarriers. In order to establish a scalable bioprocess, hESC-microcapsules were cultured in stirred tank bioreactors. The combination of microencapsulation and microcarrier technology resulted in a highly efficient protocol for the production and storage of pluripotent hESCs. This strategy ensured high expansion ratios (an approximately twenty-fold increase in cell concentration) and high cell recovery yields (>70%) after cryopreservation. When compared with non-encapsulated cells, cell survival post-thawing demonstrated a three-fold improvement without compromising hESC characteristics. Microencapsulation also improved the culture of hESC aggregates by protecting cells from hydrodynamic shear stress, controlling aggregate size and maintaining cell pluripotency for two weeks. This work establishes that microencapsulation technology may prove a powerful tool for integrating the expansion and cryopreservation of pluripotent hESCs. The 3D culture strategy developed herein represents a significant breakthrough towards the implementation of hESCs in clinical and industrial applications. PMID:21850261

  20. Homogeneous expansion of human T-regulatory cells via tumor necrosis factor receptor 2.

    Science.gov (United States)

    Okubo, Yoshiaki; Mera, Toshiyuki; Wang, Limei; Faustman, Denise L

    2013-11-06

    T-regulatory cells (T(regs)) are a rare lymphocyte subtype that shows promise for treating infectious disease, allergy, graft-versus-host disease, autoimmunity, and asthma. Clinical applications of T(regs) have not been fully realized because standard methods of expansion ex vivo produce heterogeneous progeny consisting of mixed populations of CD4 + T cells. Heterogeneous progeny are risky for human clinical trials and face significant regulatory hurdles. With the goal of producing homogeneous T(regs), we developed a novel expansion protocol targeting tumor necrosis factor receptors (TNFR) on T(regs). In in vitro studies, a TNFR2 agonist was found superior to standard methods in proliferating human T(regs) into a phenotypically homogeneous population consisting of 14 cell surface markers. The TNFR2 agonist-expanded T(regs) also were functionally superior in suppressing a key T(reg) target cell, cytotoxic T-lymphocytes. Targeting the TNFR2 receptor during ex vivo expansion is a new means for producing homogeneous and potent human T(regs) for clinical opportunities.

  1. Maxillary protraction after surgically assisted maxillary expansion

    Directory of Open Access Journals (Sweden)

    Laurindo Zanco Furquim

    2010-06-01

    Full Text Available This case report describes the orthodontic treatment of a 32-year-old woman with a Class III malocclusion, whose chief compliant was her dentofacial esthetics. The pretreatment lateral cephalometric tracings showed the presence of a Class III dentoskeletal malocclusion with components of maxillary deficiency. After discussion with the patient, the treatment option included surgically assisted rapid maxillary expansion (SARME followed by orthopedic protraction (Sky Hook and Class III elastics. Patient compliance was excellent and satisfactory dentofacial esthetics was achieved after treatment completion.

  2. Eta-Expansion Does The Trick

    DEFF Research Database (Denmark)

    Danvy, Olivier; Malmkjær, Karoline; Palsberg, Jens

    1995-01-01

    Partial-evaluation folklore has it that massaging one's source programs can make them specialize better. In Jones, Gomard, and Sestoft's recent textbook, a whole chapter is dedicated to listing such “binding-time improvements”: nonstandard use of continuation-passing style, eta-expansion, and a p......Partial-evaluation folklore has it that massaging one's source programs can make them specialize better. In Jones, Gomard, and Sestoft's recent textbook, a whole chapter is dedicated to listing such “binding-time improvements”: nonstandard use of continuation-passing style, eta...

  3. Eta-Expansion Does The Trick

    DEFF Research Database (Denmark)

    Danvy, Olivier; Malmkjær, Karoline; Palsberg, Jens

    1996-01-01

    Partial-evaluation folklore has it that massaging one's source programs can make them specialize better. In Jones, Gomard, and Sestoft's recent textbook, a whole chapter is dedicated to listing such “binding-time improvements”: nonstandard use of continuation-passing style, eta-expansion, and a p......Partial-evaluation folklore has it that massaging one's source programs can make them specialize better. In Jones, Gomard, and Sestoft's recent textbook, a whole chapter is dedicated to listing such “binding-time improvements”: nonstandard use of continuation-passing style, eta...

  4. Eta-expansion does The Trick

    DEFF Research Database (Denmark)

    Danvy, Olivier; Malmkjær, Karoline; Palsberg, Jens

    1996-01-01

    Partial-evaluation folklore has it that massaging one's source programs can make them specialize better. In Jones, Gomard, and Sestoft's recent textbook, a whole chapter is dedicated to listing such “binding-time improvements”: nonstandard use of continuation-passing style, eta-expansion, and a p......Partial-evaluation folklore has it that massaging one's source programs can make them specialize better. In Jones, Gomard, and Sestoft's recent textbook, a whole chapter is dedicated to listing such “binding-time improvements”: nonstandard use of continuation-passing style, eta...

  5. Exploring the expansion history of the universe.

    Science.gov (United States)

    Linder, Eric V

    2003-03-07

    Exploring the recent expansion history of the universe promises insights into the cosmological model, the nature of dark energy, and potentially clues to high energy physics theories and gravitation. We examine the extent to which precision distance-redshift observations can map out the history, including the acceleration-deceleration transition, and the components and equations of state of the energy density. We consider the ability to distinguish between various dynamical scalar field models for the dark energy, as well as higher dimension and alternate gravity theories. Finally, we present a new, advantageous parametrization for the study of dark energy.

  6. Unique expansions and intersections of Cantor sets

    Science.gov (United States)

    Baker, Simon; Kong, Derong

    2017-04-01

    To each α \\in (1/3,1/2) we associate the Cantor set Γα:={∑i=1∞ɛiαi:ɛi∈{0,1}, i⩾1}. In this paper we consider the intersection {{ Γ }α}{\\cap}≤ft({{ Γ }α}+t\\right) for any translation t\\in {R} . We pay special attention to those t with a unique {-1, 0, 1} α-expansion, and study the set Dα:={dimH(Γα∩(Γα+t)):t has a unique {-1,0,1} α-expansion}. We prove that there exists a transcendental number {αKL}≈ 0.394 33\\ldots such that: {{D}α} is finite for α \\in ≤ft({αKL},1/2\\right), {{D}{αKL}}} is infinitely countable, and {{D}α} contains an interval for α \\in ≤ft(1/3,{{αKL}\\right). We also prove that {{D}α} equals ≤ft[0,\\frac{log 2}{-log α}\\right] if and only if α \\in ≤ft(1/3,\\frac{3-\\sqrt{5}}{2}\\right] . As a consequence of our investigation we prove some results on the possible values of \\text{di}{{\\text{m}}H}≤ft({{ Γ }α}{\\cap}≤ft({{ Γ }α}+t\\right)\\right) when {{ Γ }α}{\\cap}≤ft({{ Γ }α}+t\\right) is a self-similar set. We also give examples of t with a continuum of {-1, 0, 1} α-expansions for which we can explicitly calculate \\text{di}{{\\text{m}}H}≤ft({{ Γ }α}{\\cap}≤ft({{ Γ }α}+t\\right)\\right), and for which {{ Γ }α}{\\cap}≤ft({{ Γ }α}+t\\right) is a self-similar set. We also construct α and t for which {{ Γ }α}{\\cap}≤ft({{ Γ }α}+t\\right) contains only transcendental numbers. Our approach makes use of digit frequency arguments and a lexicographic characterisation of those t with a unique {-1, 0, 1} α-expansion.

  7. Capacity Expansion Modeling for Storage Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Hale, Elaine; Stoll, Brady; Mai, Trieu

    2017-04-03

    The Resource Planning Model (RPM) is a capacity expansion model designed for regional power systems and high levels of renewable generation. Recent extensions capture value-stacking for storage technologies, including batteries and concentrating solar power with storage. After estimating per-unit capacity value and curtailment reduction potential, RPM co-optimizes investment decisions and reduced-form dispatch, accounting for planning reserves; energy value, including arbitrage and curtailment reduction; and three types of operating reserves. Multiple technology cost scenarios are analyzed to determine level of deployment in the Western Interconnection under various conditions.

  8. Landownership Concentration and the Expansion of Education

    DEFF Research Database (Denmark)

    Cinnirella, Francesco; Hornung, Erik

    2016-01-01

    We study the relationship between large landownership concentration and the expansion of mass education in nineteenth-century Prussia. Cross-sectional estimates show a negative association between landownership concentration and enrollment rates. Fixed-effects panel estimates indicate that regions...... with an initially stronger landownership concentration exhibit increasing enrollment rates. This relationship is not driven by differences in the supply of schooling. We argue that the implementation of agricultural reforms including the stepwise abolition of serfdom is an important driver of the change...

  9. Exploring the expansion history of the universe

    Energy Technology Data Exchange (ETDEWEB)

    Linder, Eric V.

    2002-08-30

    Exploring the recent expansion history of the universe promises insights into the cosmological model, the nature of dark energy, and potentially clues to high energy physics theories and gravitation. They examine the extent to which precision distance-redshift observations can map out the history, including the acceleration-deceleration transition, and the components and equations of state of the energy density. They consider the ability to distinguish between various dynamical scalar field models for the dark energy, as well as higher dimension and alternate gravity theories. Finally, they present a new, advantageous parametrization for the study of dark energy.

  10. Further analysis of the connected moments expansion

    Energy Technology Data Exchange (ETDEWEB)

    Amore, Paolo; Rodriguez, Martin [Facultad de Ciencias, Universidad de Colima, Bernal Diaz del Castillo 340, Colima, Colima (Mexico); Fernandez, Francisco M, E-mail: paolo.amore@gmail.com, E-mail: fernande@quimica.unlp.edu.ar, E-mail: martinalexander.rv@gmail.com [INIFTA (UNLP, CCT La Plata-CONICET), Division Quimica Teorica, Blvd. 113 S/N, Sucursal 4, Casilla de Correo 16, 1900 La Plata (Argentina)

    2011-12-16

    By means of simple quantum-mechanical models we show that under certain conditions the main assumptions of the connected moments expansion (CMX) are no longer valid. In particular, we consider two-level systems: the harmonic oscillator and the pure quartic oscillator. Although derived from such simple models, we think that the results of this investigation may be of utility in future applications of the approach to realistic problems. We show that a straightforward analysis of the CMX exponential parameters may provide a clear indication of the success of the approach. (paper)

  11. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort......-Spaces aids several steps in the development of a security protocolprotocol executions can be simulated in hostile environments, a security protocol can be implemented, and security properties of implementations can be formally verified....

  12. Distance hijacking attacks on distance bounding protocols

    OpenAIRE

    Cremers, Cas; Rasmussen, Kasper Bonne; Čapkun, Srdjan

    2011-01-01

    Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define and analyze a fourth main type of attack on distance bounding protocols, called Distance Hijacking. We show that many proposed distance bounding protocols are vulnerable to this type of attack, and we propose solutions to make these protocols resilient to Distance Hijacking. We further show that verifying distance bounding protocols using exist...

  13. On the Correctness of Sliding Window Protocols

    OpenAIRE

    van de Snepscheut, Jan L.A.

    1991-01-01

    In this note some struggles with the sliding window protocol and the special case known as the alternating bit protocol, are reported. We try to give a correctness proof, and discover that we cannot do so for one of the versions of the sliding window protocol. One may either require channels that satisfy stronger assumptions or, as we will do, adapt the protocol and stick to the weaker assumptions. The alternating bit protocol can be traced back to [Bartlett]. We have been unab...

  14. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  15. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  16. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  17. Protocols of myocardial perfusion SPECT

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Seong Min [College of Medicine, Chungnam National University, Daejeon (Korea, Republic of)

    2005-02-15

    In myocardial perfusion scintigraphy, the results of this evaluation now confront the practitioner of nuclear medicine with methodological options. Most nuclear cardiologic studies are performed using thallium-201, Tc-99m sestamibi and Tc-99m tertrofosmin. Some part of these studies use some form of pharmacologic stress test. While tailoring each test to the individual is ideal, this may be impractical for a busy department. Accordingly, established protocols to be used for patients with similar clinical presentations will be helpful. The following review presents methodology of various imaging protocols mainly according to the guidelines of nuclear cardiology procedures in American Society of Nuclear Cardiology.

  18. Laboratory simulation of Hot Jupiters atmosphere expansion

    Science.gov (United States)

    Prokopov, P. A.; Shaikhislamov, I. F.; Zakharov, Yu P.; Posukh, V. G.; Melekhov, A. V.; Boyarintsev, E. L.; Ponomarenko, A. G.

    2017-11-01

    Hot Jupiters (HJ) are exoplanets, gas giants with low orbits (≤ 0.1 a.u.). The stellar X-ray and ultraviolet (XUV) radiation energy deposition result in heating ionization and the consequent expansion of planetary atmosphere. Expansion of upper atmosphere under certain conditions could be so large that the majority of light atmospheric constituents overcome the gravitational binding and escape from the planet in a form of hydrodynamic wind. Besides interaction of two counter-streaming plasma flows (stellar wind and ionized upper layers of planet atmosphere), each of this flows interact with planetary magnetic field. In such complex situation laboratory simulation can provide data that can’t be obtained by computer simulation or observation. Experiment was carried out on KI-1 facility: high-vacuum chamber 5m long, 1.2 m in diameter with pressure ∼ 10-6 Torr. Magnetic dipole with two attached laser targets played the role of a planet, and background plasma from θ-pinch used for simulation of stellar wind. As a result, data on a behavior of plasma density and magnetic field were obtained. The novel phenomenon was registered: magnetic field is transferred by the cloud of laser plasma, which was not observed before in experiments or calculations.

  19. Improved Expansion of Random Cayley Graphs

    Directory of Open Access Journals (Sweden)

    Po-Shen Loh

    2004-12-01

    Full Text Available In Random Cayley Graphs and Expanders, N. Alon and Y. Roichman proved that for every ε > 0 there is a finite c(ε such that for any sufficiently large group G, the expected value of the second largest (in absolute value eigenvalue of the normalized adjacency matrix of the Cayley graph with respect to c(ε log |G| random elements is less than ε. We reduce the number of elements to c(εlog D(G (for the same c, where D(G is the sum of the dimensions of the irreducible representations of G. In sufficiently non-abelian families of groups (as measured by these dimensions, log D(G is asymptotically (1/2log|G|. As is well known, a small eigenvalue implies large graph expansion (and conversely; see Tanner84 and AlonMilman84-2,AlonMilman84-1. For any specified eigenvalue or expansion, therefore, random Cayley graphs (of sufficiently non-abelian groups require only half as many edges as was previously known.

  20. Completeness relations and resonant state expansions

    Energy Technology Data Exchange (ETDEWEB)

    Lind, P. (Department of Mathematical Physics, Lund Institute of Technology, P.O. Box 118, S-221 00 Lund (Sweden))

    1993-05-01

    The completeness properties of the discrete set of bound states, virtual states, and resonant states characterizing the system of a single nonrelativistic particle moving in a central cutoff potential are investigated. We do not limit ourselves to the restricted form of completeness that can be obtained from Mittag-Leffler theory in this case. Instead we will make use of the information contained in the asymptotic behavior of the discrete states to get a new approach to the question of eventual overcompleteness. Using the theory of analytic functions we derive a number of completeness relations in terms of discrete states and complex continuum states and give some criteria for how to use them to form resonant state expansions of functions, matrix elements, and Green's functions. In cases where the integral contribution vanishes, the discrete part of the expansions is of the same form as that given by Mittag-Leffler theory but with regularized inner products. We also consider the possibility of using the discrete states as basis in a matrix representation.

  1. Contradictions of TNCs’ Foreign Economic Expansion

    Directory of Open Access Journals (Sweden)

    Melnikov Aleksandr Borisovich

    2014-11-01

    Full Text Available Some directions of the external economic expansion of multinational corporations in modern conditions of globalization, the contradictions generated by these conditions and the conflicts in the system of world economy are presented in the article. The global strategy of functioning of multinational corporation professes the principle of “double standards”. Multinational corporations, on the one hand, support liberalization and internationalization in scales of world reproduction, on the other hand – further redistribution of spheres of influence, and imposing the new world economic order. The functional role of modern multinational corporations is inconsistent. Though they stimulate the tendency of increasing the competitiveness, concentration of the capital and production, at the same time, the monopolization and institutional barriers created by multinational corporation and its structural divisions. Multinational corporations determine the competitive struggle, implement the sanitation mechanism and optimization of world economy. The diversification of multinational corporations’ activity promotes the generation of new requirements and the markets (information, innovations, technologies, services, etc. where individual subjects and competitive forces are formed. It is caused by a progressive functional role of modern multinational corporations in the global economy. Massive penetration into the international business, external expansion of transnational monopolies stimulates economic growth in host countries, promotes specialization, division of labor, cooperation. At the same time, the monopolist form of these processes inevitably leads to numerous negative phenomena, a slow down and inconsistent development of production in the countries-recipients.

  2. Extended Plefka expansion for stochastic dynamics

    Science.gov (United States)

    Bravi, B.; Sollich, P.; Opper, M.

    2016-05-01

    We propose an extension of the Plefka expansion, which is well known for the dynamics of discrete spins, to stochastic differential equations with continuous degrees of freedom and exhibiting generic nonlinearities. The scenario is sufficiently general to allow application to e.g. biochemical networks involved in metabolism and regulation. The main feature of our approach is to constrain in the Plefka expansion not just first moments akin to magnetizations, but also second moments, specifically two-time correlations and responses for each degree of freedom. The end result is an effective equation of motion for each single degree of freedom, where couplings to other variables appear as a self-coupling to the past (i.e. memory term) and a coloured noise. This constitutes a new mean field approximation that should become exact in the thermodynamic limit of a large network, for suitably long-ranged couplings. For the analytically tractable case of linear dynamics we establish this exactness explicitly by appeal to spectral methods of random matrix theory, for Gaussian couplings with arbitrary degree of symmetry.

  3. Thin metastructures with engineered thermal expansion

    Science.gov (United States)

    Gdoutos, Eleftherios E.

    The geometry and constituent materials of metastructures can be used to engineer the thermal expansion coefficient. In this thesis, we design, fabricate, and test thin thermally stable metastructures consisting of bi-metallic unit cells and show how the coefficient of thermal expansion (CTE) of these metastructures can be finely and coarsely tuned by varying the CTE of the constituent materials and the unit cell geometry. Planar and three-dimensional finite element method modeling is used to drive the design and inform experiments, and predict the response of these metastructures. We demonstrate computationally the significance of out-of-plane effects in the metastructure response. We develop an experimental setup using digital image correlation and an infrared camera to experimentally measure full displacement and temperature fields during testing and accurately measure the metastructures' CTE. We experimentally demonstrate high aspect ratio metastructures of Ti/Al and Kovar/Al which exhibit near-zero and negative CTE, respectively. We demonstrate robust fabrication procedures for thermally stable samples with high aspect ratios in thin foil and thin film scales. We investigate the lattice structure and mechanical properties of thin films comprising a near-zero CTE metastructure. The mechanics developed in this work can be used to engineer metastructures of arbitrary CTE and can be extended to three dimensions.

  4. Spontaneous thermal expansion of nematic elastomers

    Science.gov (United States)

    Tajbakhsh, A. R.; Terentjev, E. M.

    2001-10-01

    We study the monodomain (single-crystal) nematic elastomer materials, all side-chain siloxane polymers with the same mesogenic groups and crosslinking density, but differing in the type of crosslinking. Increasing the proportion of long di-functional segments of main-chain nematic polymer, acting as network crosslinking, results in dramatic changes in the uniaxial equilibrium thermal expansion on cooling from the isotropic phase. At higher concentration of main chains their behaviour dominates the elastomer properties. At low concentration of main-chain material, we detect two distinct transitions at different temperatures, one attributed to the main-chain, the other to the side-chain component. The effective uniaxial anisotropy of nematic rubber, r(T)=ell_{allel}/ell_{bot} proportional to the effective nematic order parameter Q(T), is given by an average of the two components and thus reflects the two-transition nature of thermal expansion. The experimental data is compared with the theoretical model of ideal nematic elastomers; applications in high-amplitude thermal actuators are discussed in the end.

  5. Optimizing a Query by Transformation and Expansion.

    Science.gov (United States)

    Glocker, Katrin; Knurr, Alexander; Dieter, Julia; Dominick, Friederike; Forche, Melanie; Koch, Christian; Pascoe Pérez, Analie; Roth, Benjamin; Ückert, Frank

    2017-01-01

    In the biomedical sector not only the amount of information produced and uploaded into the web is enormous, but also the number of sources where these data can be found. Clinicians and researchers spend huge amounts of time on trying to access this information and to filter the most important answers to a given question. As the formulation of these queries is crucial, automated query expansion is an effective tool to optimize a query and receive the best possible results. In this paper we introduce the concept of a workflow for an optimization of queries in the medical and biological sector by using a series of tools for expansion and transformation of the query. After the definition of attributes by the user, the query string is compared to previous queries in order to add semantic co-occurring terms to the query. Additionally, the query is enlarged by an inclusion of synonyms. The translation into database specific ontologies ensures the optimal query formulation for the chosen database(s). As this process can be performed in various databases at once, the results are ranked and normalized in order to achieve a comparable list of answers for a question.

  6. Transmission network expansion planning with simulation optimization

    Energy Technology Data Exchange (ETDEWEB)

    Bent, Russell W [Los Alamos National Laboratory; Berscheid, Alan [Los Alamos National Laboratory; Toole, G. Loren [Los Alamos National Laboratory

    2010-01-01

    Within the electric power literatW''e the transmi ssion expansion planning problem (TNEP) refers to the problem of how to upgrade an electric power network to meet future demands. As this problem is a complex, non-linear, and non-convex optimization problem, researchers have traditionally focused on approximate models. Often, their approaches are tightly coupled to the approximation choice. Until recently, these approximations have produced results that are straight-forward to adapt to the more complex (real) problem. However, the power grid is evolving towards a state where the adaptations are no longer easy (i.e. large amounts of limited control, renewable generation) that necessitates new optimization techniques. In this paper, we propose a generalization of the powerful Limited Discrepancy Search (LDS) that encapsulates the complexity in a black box that may be queJied for information about the quality of a proposed expansion. This allows the development of a new optimization algOlitlun that is independent of the underlying power model.

  7. Tensor integrand reduction via Laurent expansion

    Energy Technology Data Exchange (ETDEWEB)

    Hirschi, Valentin [SLAC, National Accelerator Laboratory,2575 Sand Hill Road, Menlo Park, CA 94025-7090 (United States); Peraro, Tiziano [Higgs Centre for Theoretical Physics, School of Physics and Astronomy,The University of Edinburgh,Edinburgh EH9 3JZ, Scotland (United Kingdom)

    2016-06-09

    We introduce a new method for the application of one-loop integrand reduction via the Laurent expansion algorithm, as implemented in the public C++ library Ninja. We show how the coefficients of the Laurent expansion can be computed by suitable contractions of the loop numerator tensor with cut-dependent projectors, making it possible to interface Ninja to any one-loop matrix element generator that can provide the components of this tensor. We implemented this technique in the Ninja library and interfaced it to MADLOOP, which is part of the public MADGRAPH5{sub A}MC@NLO framework. We performed a detailed performance study, comparing against other public reduction tools, namely CUTTOOLS, SAMURAI, IREGI, PJFRY++ and GOLEM95. We find that Ninja outperforms traditional integrand reduction in both speed and numerical stability, the latter being on par with that of the tensor integral reduction tool GOLEM95 which is however more limited and slower than Ninja. We considered many benchmark multi-scale processes of increasing complexity, involving QCD and electro-weak corrections as well as effective non-renormalizable couplings, showing that Ninja’s performance scales well with both the rank and multiplicity of the considered process.

  8. Renormalized Wick expansion for a modified PQCD

    Energy Technology Data Exchange (ETDEWEB)

    Cabo Montes de Oca, Alejandro [Instituto de Cibernetica, Matematica y Fisica, Group of Theoretical Physics, Vedado, La Habana (Cuba); Abdus Salam International Centre for Theoretical Physics, Trieste (Italy)

    2008-05-15

    The renormalization scheme for the Wick expansion of a modified version of the perturbative QCD introduced in previous works is discussed. Massless QCD is considered by implementing the usual multiplicative scaling of the gluon and quark wave functions and vertices. However, also massive quark and gluon counterterms are allowed in this massless theory since the condensates are expected to generate masses. A natural set of expansion parameters of the physical quantities is introduced: the coupling itself and the two masses m{sub q} and m{sub g} associated to quarks and gluons, respectively. This procedure allows one to implement a dimensional transmutation effect through these new mass scales. A general expression for the new generating functional in terms of the mass parameters m{sub q} and m{sub g} is obtained in terms of integrals over arbitrary but constant gluon or quark fields in each case. Further, the one loop potential is evaluated in more detail in the case when only the quark condensate is retained. This lowest order result again indicates the dynamical generation of quark condensates in the vacuum. (orig.)

  9. The Game Object Model and Expansive Learning: Creation, Instantiation, Expansion, and Re-representation

    Science.gov (United States)

    Amory, Alan; Molomo, Bolepo; Blignaut, Seugnet

    2011-01-01

    In this paper, the collaborative development, instantiation, expansion and re-representation as research instrument of the Game Object Model (GOM) are explored from a Cultural Historical Activity Theory perspective. The aim of the paper is to develop insights into the design, integration, evaluation and use of video games in learning and teaching.…

  10. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  11. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  12. Protocol Natuurplan voor biologische landbouwbedrijven.

    NARCIS (Netherlands)

    Smeding, F.W.

    1996-01-01

    The Protocol Nature Plan is a step by step approach leading to the design of a Nature Plan for a biological farm. The aim is to increase nature values and ecological relationships on the farm. Research results are translated into easy practical measures

  13. Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analysis...

  14. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  15. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  16. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    during distributed transmit beamforming. We may, for example, assume that cooperative nodes are satellites in specific orbits with known velocities...communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer...form a foundation for achieving effective spectrum coexistence, interoperability and improved reliability in satellite transceivers in the presence of

  17. The SWAP Upper Atmosphere Expansion Benchmark

    Science.gov (United States)

    Fuller-Rowell, T. J.; Zesta, E.; Basu, S.; Black, C.; Emmert, J. T.; Sutton, E. K.; Thayer, J. P.; Codrescu, M.; Fedrizzi, M.; Tobiska, W. K.; Crowley, G.; Pilinski, M.; Bowman, B. R.; Woods, T. N.; Chamberlin, P. C.

    2016-12-01

    Atmospheric expansion during extreme events gives rise to increases in neutral density at low-Earth orbit altitudes, which poses two distinct risks to operational spacecraft. The first is the direct effect of enhanced drag on the spacecraft, changing its orbit, increasing the uncertainty of its position, and reducing the orbital lifetime. The second is the indirect effect of atmospheric expansion on the ability to monitor the trajectories of debris, including objects with high area-to-mass ratios, for collision avoidance at all times. The Benchmark for neutral density is defined relative to the empirical neutral density reference models, e.g., JB2008 or NRLMSIS-00. These models are used as a reference in order to extrapolate the response to a 100-year and theoretical maximum event. The Benchmark is also defined for neutral winds: in-track winds change apparent density along an orbit; cross-track winds influence orbit trajectory. The Benchmark is established at three altitudes: 250 km, 400 km, and 850 km, and quantifies the impact from solar ultraviolet radiation (EUV and FUV) at low, medium, and high solar activity on timescales greater than one day; EUV enhancement during impulsive events, such as solar flares; and coronal mass ejections (CMEs) driving geomagnetic storms. A 100-year and theoretical maximum estimate of the peak daily F10.7 proxy are 390 and 500 units, respectively, which would increase global mean density by 100% and 160% at 400 km altitude above the empirical model values at an F10.7 of 240 units. Estimates for a 100-year flare are X30 with a theoretical maximum of X40. The response to an X30 or X40 flare would produce a 75% and 135% density increase, respectively, on the dayside at 400 km altitude at a median solar flux level of 150 sfu. For a Carrington storm the thermospheric temperature is expected to exceed 4000 K, and neutral density is predicted to exceed empirical model estimates of the response to a Bastille or Halloween-like storm by a

  18. Progressive GAA.TTC repeat expansion in human cell lines.

    Science.gov (United States)

    Ditch, Scott; Sammarco, Mimi C; Banerjee, Ayan; Grabczyk, Ed

    2009-10-01

    Trinucleotide repeat expansion is the genetic basis for a sizeable group of inherited neurological and neuromuscular disorders. Friedreich ataxia (FRDA) is a relentlessly progressive neurodegenerative disorder caused by GAA.TTC repeat expansion in the first intron of the FXN gene. The expanded repeat reduces FXN mRNA expression and the length of the repeat tract is proportional to disease severity. Somatic expansion of the GAA.TTC repeat sequence in disease-relevant tissues is thought to contribute to the progression of disease severity during patient aging. Previous models of GAA.TTC instability have not been able to produce substantial levels of expansion within an experimentally useful time frame, which has limited our understanding of the molecular basis for this expansion. Here, we present a novel model for studying GAA.TTC expansion in human cells. In our model system, uninterrupted GAA.TTC repeat sequences display high levels of genomic instability, with an overall tendency towards progressive expansion. Using this model, we characterize the relationship between repeat length and expansion. We identify the interval between 88 and 176 repeats as being an important length threshold where expansion rates dramatically increase. We show that expansion levels are affected by both the purity and orientation of the repeat tract within the genomic context. We further demonstrate that GAA.TTC expansion in our model is independent of cell division. Using unique reporter constructs, we identify transcription through the repeat tract as a major contributor to GAA.TTC expansion. Our findings provide novel insight into the mechanisms responsible for GAA.TTC expansion in human cells.

  19. Institutionalizing a Comprehensive Tobacco-Cessation Protocol in an Indigenous Health System: Lessons Learned

    Science.gov (United States)

    Santos, LorrieAnn; Braun, Kathryn; Aea, Kamuela; Shearer, Leimomi

    2008-01-01

    Background Native Hawaiians have high smoking prevalence and high lung cancer mortality rates. Objectives To describe a comprehensive tobacco cessation protocol and share lessons learned in institutionalizing it across the five Native Hawaiian Health Care Systems (NHHCS). Methods NHHCS representatives worked together to culturally tailor the Agency for Healthcare Research and Quality protocol for smoking cessation. Process objectives included number of staff trained in tobacco cessation, inclusion of the Tobacco User Guide Sheet (TUGS) in the intake process and medical record, and expansion of programs for smokers who want to quit. Outcome objectives included percent of individuals asked about smoking status and percent of identified smokers that received brief intervention, set a quit date, were linked to services, and remained smoke-free for 90 days. Results After 18 months, the NHHCS were at different stages of protocol adoption. More successful NHHCS were more likely to have several champions for the program and administrative support for staff training, new programs, and integrating the TUGS into client charts. They also showed greater success in getting smokers to set a quit date and remain smoke-free for 90 days. Conclusion Although the five NHHCS helped design the protocol, each operates independently. More effort and time are needed to help each system overcome internal barriers to institutionalizing a new protocol and to facilitate support for tobacco-cessation champions among medical records and data management supervisors. These lessons may be useful to other organizations that want to institutionalize a comprehensive tobacco-cessation protocol. PMID:20208308

  20. OPM Scheme Editor 2: A graphical editor for specifying object-protocol structures

    Energy Technology Data Exchange (ETDEWEB)

    Chen, I-Min A.; Markowitz, V.M.; Pang, F.; Ben-Shachar, O.

    1993-07-01

    This document describes an X-window based Schema Editor for the Object-Protocol Model (OPM). OPM is a data model that supports the specification of complex object and protocol classes. objects and protocols are qualified in OPM by attributes that are defined over (associated with) value classes. Connections of object and protocol classes are expressed in OPM via attributes. OPM supports the specification (expansion) of protocols in terms of alternative and sequences of component (sub) protocols. The OPM Schema Editor allows specifying, displaying, modifying, and browsing through OPM schemas. The OPM Schema Editor generates an output file that can be used as input to an OPM schema translation tool that maps OPM schemas into definitions for relational database management systems. The OPM Schema Editor was implemented using C++ and the X11 based Motif toolkit, on Sun SPARCstation under Sun Unix OS 4.1. This document consists of the following parts: (1) A tutorial consisting of seven introductory lessons for the OPM Schema Editor. (2) A reference manual describing all the windows and functions of the OPM Schema Editor. (3) An appendix with an overview of OPM.

  1. Protocol for the ostomized person in the trans-hospital and outpatient period: Integrative Review

    Directory of Open Access Journals (Sweden)

    Stella Godoy Silva Lima

    2017-06-01

    Full Text Available Objective: To review the literature about the application of the evidence-based protocol concept for clinical assessment and interventions in nursing consultation to ostomized people. Method: integrative review to increase the knowledge about stomata. A search was made in the databases BIREME, CINAHL, SCOPUS, WEB OF SCIENCE and PUBMED with descriptors Ostomy OR Colostomy OR Colonic Pouches OR Surgical Stomata OR Colorectal Neoplasms OR Colorectal Cancer AND Protocols. It was selected 21 articles in the period of 2011-2015. Results: The articles were systematized into five categories: quality of life, nursing assistance, protocols, complications and surgery. The categories are complementary and demonstrate a work carried out by a multiprofessional team. Conclusion: the themes analysis made it possible to identify the need for expansion in research that addresses specific aspects such as teaching strategies in the levels of assistance in the trans-operative, postoperative and in the outpatient phase in nursing consultations.

  2. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    uncompromised subset of the participants are still guar- anteed that their interaction will respect sessions. A protocol transfor- mation turns any protocol into a session-respecting protocol. We do this via a general theory of separability. Our main theorem ap- plies to different separability requirements......, and characterizes when we can separate protocol executions sufficiently to meet a particular require- ment. This theorem also gives direct proofs of some old and new protocol composition results. Thus, our theory of separability appears to cover protocol composition and session-like behavior within a uniform frame...

  3. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...

  4. Conflation: a new type of accelerated expansion

    Energy Technology Data Exchange (ETDEWEB)

    Fertig, Angelika; Lehners, Jean-Luc; Mallwitz, Enno [Max-Planck-Institute for Gravitational Physics (Albert-Einstein-Institute),Am Mühlenberg 1, Potsdam-Golm, 14476 (Germany)

    2016-08-31

    In the framework of scalar-tensor theories of gravity, we construct a new kind of cosmological model that conflates inflation and ekpyrosis. During a phase of conflation, the universe undergoes accelerated expansion, but with crucial differences compared to ordinary inflation. In particular, the potential energy is negative, which is of interest for supergravity and string theory where both negative potentials and the required scalar-tensor couplings are rather natural. A distinguishing feature of the model is that, for a large parameter range, it does not significantly amplify adiabatic scalar and tensor fluctuations, and in particular does not lead to eternal inflation and the associated infinities. We also show how density fluctuations in accord with current observations may be generated by adding a second scalar field to the model. Conflation may be viewed as complementary to the recently proposed anamorphic universe of Ijjas and Steinhardt.

  5. DISRUPTING SHOCKS IN POSTWAR GLOBAL ECONOMIC EXPANSION

    Directory of Open Access Journals (Sweden)

    Dumitru FILIPEANU

    2016-06-01

    Full Text Available The coherence of the global economic system, created by its upswing in the first postwar decades, started to crumble in the ’70s. The destabilizing shocks affected the entire world, but in an uneven manner, in different geographical areas and at different times, being felt most acutely, with devastating economic and social effects, in Third World countries. Although the developed countries were affected as well, they always had means to combat or to diminish the adverse effects of the crises, leading to "gentler" consequences. This paper focuses on four main aspects in postwar global economic expansion, namely: the ’70s – the international monetary crisis and the oil shocks; the foreign debt crisis; the Latin American debt crisis, the Asian financial crises and the current global crisis.

  6. A non-perturbative operator product expansion

    Energy Technology Data Exchange (ETDEWEB)

    Bietenholz, W. [Universidad Nacional Autonoma de Mexico, Distrito Federal (Mexico). Inst. de Ciencias Nucleares; Cundy, N.; Goeckeler, M. [Regensburg Univ. (DE). Inst. fuer Theoretische Physik] (and others)

    2009-10-15

    Nucleon structure functions can be observed in Deep Inelastic Scattering experiments, but it is an outstanding challenge to confront them with fully non-perturbative QCD results. For this purpose we investigate the product of electromagnetic currents (with large photonmomenta) between quark states (of low momenta). By means of an Operator Product Expansion the structure function can be decomposed into matrix elements of local operators, and Wilson coefficients. For consistency both have to be computed non-perturbatively. Here we present precision results for a set of Wilson coefficients. They are evaluated from propagators for numerous quark momenta on the lattice, where the use of chiral fermions suppresses undesired operator mixing. This overdetermines the Wilson coefficients, but reliable results can be extracted by means of a Singular Value Decomposition. (orig.)

  7. The replication of expansive production knowledge

    DEFF Research Database (Denmark)

    Wæhrens, Brian Vejrum; Yang, Cheng; Madsen, Erik Skov

    2012-01-01

    ; and (2) rather than being viewed as alternative approaches, templates and principles should be seen as complementary once the transfer motive moves beyond pure replication. Research limitations – The concepts introduced in this paper were derived from two Danish cases. While acceptable for theory......Purpose – With the aim to support offshore production line replication, this paper specifically aims to explore the use of templates and principles to transfer expansive productive knowledge embedded in a production line and understand the contingencies that influence the mix of these approaches...... exploration, the small sample size is an obvious limitation for generalisation. Practical implications – A roadmap for knowledge transfer within the replication of a production line is suggested, which, together with four managerial suggestions, provides strong support and clear directions to managers...

  8. Sectoral and regional expansion of emissions trading

    Energy Technology Data Exchange (ETDEWEB)

    Boehringer, Christoph; Bouwe, Dijkstra; Rosendahl, Knut Einar

    2011-07-01

    We consider an international emissions trading scheme with partial sectoral and regional coverage. Sectoral and regional expansion of the trading scheme is beneficial in aggregate, but not necessarily for individual countries. We simulate international CO{sub 2} emission quota markets using marginal abatement cost functions and the Copenhagen 2020 climate policy targets for selected countries that strategically allocate emissions in a bid to manipulate the quota price. Quota exporters and importers generally have conflicting interests about admitting more countries to the trading coalition, and our results indicate that some countries may lose substantially when the coalition expands in terms of new countries. For a given coalition, expanding sectoral coverage makes most countries better off, but some countries (notably the USA and Russia) may lose out due to loss of strategic advantages. In general, exporters tend to have stronger strategic power than importers.(Author)

  9. Population Genetics of Three Dimensional Range Expansions

    Science.gov (United States)

    Lavrentovich, Maxim; Nelson, David

    2014-03-01

    We develop a simple model of genetic diversity in growing spherical cell clusters, where the growth is confined to the cluster surface. This kind of growth occurs in cells growing in soft agar, and can also serve as a simple model of avascular tumors. Mutation-selection balance in these radial expansions is strongly influenced by scaling near a neutral, voter model critical point and by the inflating frontier. We develop a scaling theory to describe how the dynamics of mutation-selection balance is cut off by inflation. Genetic drift, i.e., local fluctuations in the genetic diversity, also plays an important role, and can lead to the extinction even of selectively advantageous strains. We calculate this extinction probability, taking into account the effect of rough population frontiers.

  10. Expansion of museums in Central Europe?

    Directory of Open Access Journals (Sweden)

    Jagodzińska, Katarzyna

    2015-06-01

    Full Text Available The paper presents reflections on the specificity of collections and museums of contemporary art in Central Europe and considers a possibility of creating a regional alternative for the West. The analysis is conducted in the context of the expansionist policy of contemporary museums – notably the Louvre, the Guggenheim Foundation, and the Hermitage – whose numerous new development projects gave rise to a number of dilemmas in the museological world. The author discusses global "museum brands" that invest in Central Europe and addresses the possible profits of the expansion of such "concerns" for culture in the region, as well as emphasises the potential of the region itself, which may be used for its development without the avail of the internationally renowned collectors' names.

  11. Large-spin expansions of GKP strings

    Science.gov (United States)

    Floratos, Emmanuel; Georgiou, George; Linardopoulos, Georgios

    2014-03-01

    We demonstrate that the large-spin expansion of the energy of Gubser-Klebanov-Polyakov (GKP) strings that rotate in ℝ × S2 and AdS3 can be expressed in terms of Lambert's W-function. We compute the leading, subleading and next-to-subleading series of exponential corrections to the infinite-volume dispersion relation of GKP strings that rotate in ℝ × S2. These strings are dual to the long = 4 SYM operators +… and provide their scaling dimensions at strong coupling. We also show that the strings obey a short-long (strings) duality. For the folded GKP strings that spin inside AdS3 and are dual to twist-2 operators, we confirm the known formulas for the leading and next-to-leading coefficients of their anomalous dimensions and derive the corresponding expressions for the next-to-next-to-leading coefficients.

  12. EMPIRE ULTIMATE EXPANSION: RESONANCES AND COVARIANCES.

    Energy Technology Data Exchange (ETDEWEB)

    HERMAN,M.; MUGHABGHAB, S.F.; OBLOZINSKY, P.; ROCHMAN, D.; PIGNI, M.T.; KAWANO, T.; CAPOTE, R.; ZERKIN, V.; TRKOV, A.; SIN, M.; CARSON, B.V.; WIENKE, H. CHO, Y.-S.

    2007-04-22

    The EMPIRE code system is being extended to cover the resolved and unresolved resonance region employing proven methodology used for the production of new evaluations in the recent Atlas of Neutron Resonances. Another directions of Empire expansion are uncertainties and correlations among them. These include covariances for cross sections as well as for model parameters. In this presentation we concentrate on the KALMAN method that has been applied in EMPIRE to the fast neutron range as well as to the resonance region. We also summarize role of the EMPIRE code in the ENDF/B-VII.0 development. Finally, large scale calculations and their impact on nuclear model parameters are discussed along with the exciting perspectives offered by the parallel supercomputing.

  13. The worldwide expansion of the Argentine ant

    DEFF Research Database (Denmark)

    Vogel, Valerie; Pedersen, Jes Søe; Giraud, Tatiana

    2010-01-01

    Aim The aim of this study was to determine the number of successful establishments of the invasive Argentine ant outside native range and to see whether introduced supercolonies have resulted from single or multiple introductions. We also compared the genetic diversity of native versus introduced...... supercolonies to assess the size of the propagules (i.e. the number of founding individuals) at the origin of the introduced supercolonies. Location Global. Methods We used mitochondrial DNA (mtDNA) markers and microsatellite loci to study 39 supercolonies of the Argentine ant Linepithema humile covering both......) and secondary introductions (from sites with established invasive supercolonies) were important in the global expansion of the Argentine ant. In combination with the similar social organization of colonies in the native and introduced range, this indicates that invasiveness did not evolve recently as a unique...

  14. Quantization Noise Shaping on Arbitrary Frame Expansions

    Directory of Open Access Journals (Sweden)

    Boufounos Petros T

    2006-01-01

    Full Text Available Quantization noise shaping is commonly used in oversampled A/D and D/A converters with uniform sampling. This paper considers quantization noise shaping for arbitrary finite frame expansions based on generalizing the view of first-order classical oversampled noise shaping as a compensation of the quantization error through projections. Two levels of generalization are developed, one a special case of the other, and two different cost models are proposed to evaluate the quantizer structures. Within our framework, the synthesis frame vectors are assumed given, and the computational complexity is in the initial determination of frame vector ordering, carried out off-line as part of the quantizer design. We consider the extension of the results to infinite shift-invariant frames and consider in particular filtering and oversampled filter banks.

  15. The new Medicaid debate: expansion or retrenchment?

    Science.gov (United States)

    2001-01-01

    Health advocates are facing a sea-change in Washington. Comprehensive federal health care reform eluded the nation under the Clinton Administration, but incremental progress through state-based Medicaid expansions and new CHIP programs was widespread, giving rise to some innovative state efforts to cover more of the uninsured. Washington's support was instrumental in those efforts, but the second Bush Administration seems intent on reversing that direction. To protect--and build upon--these nascent Medicaid efforts, advocates will have to mount careful strategies in defense of Medicaid. This States of Health looks at the dangers that may lie ahead and suggests how advocates can respond to keep Medicaid moving in the right direction.

  16. A collisionless plasma thruster plume expansion model

    Science.gov (United States)

    Merino, Mario; Cichocki, Filippo; Ahedo, Eduardo

    2015-06-01

    A two-fluid model of the unmagnetized, collisionless far region expansion of the plasma plume for gridded ion thrusters and Hall effect thrusters is presented. The model is integrated into two semi-analytical solutions valid in the hypersonic case. These solutions are discussed and compared against the results from the (exact) method of characteristics; the relative errors in density and velocity increase slowly axially and radially and are of the order of 10-2-10-3 in the cases studied. The plasma density, ion flux and ambipolar electric field are investigated. A sensitivity analysis of the problem parameters and initial conditions is carried out in order to characterize the far plume divergence angle in the range of interest for space electric propulsion. A qualitative discussion of the physics of the secondary plasma plume is also provided.

  17. The Dynamics of Regional and Global Expansion

    DEFF Research Database (Denmark)

    Geisler Asmussen, Christian; Nielsen, Bo Bernhard; Osegowitsch, Tom

    2015-01-01

    presence over time. The authors test the resulting hypotheses using sales data from a sample of 220 of the world’s largest MNEs over the period 1995-2005. The authors focus specifically on the relationship between levels of market penetration inside and outside the home region and rates of change in each......Purpose – The purpose of this paper is to model and test the dynamics of home-regional and global penetration by multi-national enterprises (MNEs). Design/methodology/approach – Drawing on international business (IB) theory, the authors model MNEs adjusting their home-regional and global market...... domain. Findings – The authors demonstrate that MNEs do penetrate both home-regional and global markets, often simultaneously, and that penetration levels often oscillate within an MNE over time. The authors show firms’ rates of regional and global expansion to be affected by their existing regional...

  18. Expansive focal cemento-osseous dysplasia.

    Science.gov (United States)

    Bulut, Emel Uzun; Acikgoz, Aydan; Ozan, Bora; Zengin, Ayse Zeynep; Gunhan, Omer

    2012-01-01

    To present a case of expansive focal cemento-osseous dysplasia and emphasize the importance of differential diagnosis. Cemento-osseous dysplasia is categorized into three subtypes on the basis of the clinical and radiographic features: Periapical, focal and florid. The focal type exhibits a single site of involvement in any tooth-bearing or edentulous area of the jaws. These lesions are usually asymptomatic; therefore, they are frequently diagnosed incidentally during routine radiographic examinations. Lesions are usually benign, show limited growth, and do not require further surgical intervention, but periodic follow-up is recommended because occasionally, this type of dysplasia progresses into florid osseous dysplasia and simple bone cysts are formed. A 24-year-old female patient was referred to our clinic for swelling in the left edentulous mandibular premolarmolar region and felt discomfort when she wore her prosthetics. She had no pain, tenderness or paresthesia. Clinical examination showed that the swelling in the posterior mandible that was firm, nonfluctuant and covered by normal mucosa. On panoramic radiography and computed tomography, a well defined lesion of approximately 1.5 cm in diameter of mixed density was observed. The swelling increased slightly in size over 2 years making it difficult to use prosthetics and, therefore, the lesion was totally excised under local anesthesia, and surgical specimens were submitted for histopathological examination. The histopathological diagnosis was focal cemento-osseous dysplasia. In the present case, because of the increasing size of the swelling making it difficult to use prosthetics, young age of the patient and localization of the lesion, in the initial examination, cemento-ossifying fibroma was suspected, and the lesion was excised surgically; the histopathological diagnosis confirmed it as focal cemento-osseous dysplasia. We present a case of expansive focal cemento-osseous dysplasia. Differential diagnosis

  19. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  20. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  1. Preparation, quality criteria, and properties of human blood platelet lysate supplements for ex vivo stem cell expansion.

    Science.gov (United States)

    Shih, Daniel Tzu-Bi; Burnouf, Thierry

    2015-01-25

    Most clinical applications of human multipotent mesenchymal stromal cells (MSCs) for cell therapy, tissue engineering, regenerative medicine, and treatment of immune and inflammatory diseases require a phase of isolation and ex vivo expansion allowing a clinically meaningful cell number to be reached. Conditions used for cell isolation and expansion should meet strict quality and safety requirements. This is particularly true for the growth medium used for MSC isolation and expansion. Basal growth media used for MSC expansion are supplemented with multiple nutrients and growth factors. Fetal bovine serum (FBS) has long been the gold standard medium supplement for laboratory-scale MSC culture. However, FBS has a poorly characterized composition and poses risk factors, as it may be a source of xenogenic antigens and zoonotic infections. FBS has therefore become undesirable as a growth medium supplement for isolating and expanding MSCs for human therapy protocols. In recent years, human blood materials, and most particularly lysates and releasates of platelet concentrates have emerged as efficient medium supplements for isolating and expanding MSCs from various origins. This review analyzes the advantages and limits of using human platelet materials as medium supplements for MSC isolation and expansion. We present the modes of production of allogeneic and autologous platelet concentrates, measures taken to ensure optimal pathogen safety profiles, and methods of preparing PLs for MSC expansion. We also discuss the supply of such blood preparations. Produced under optimal conditions of standardization and safety, human platelet materials can become the future 'gold standard' supplement for ex vivo production of MSCs for translational medicine and cell therapy applications. Copyright © 2014 Elsevier B.V. All rights reserved.

  2. A fully defined and scalable 3D culture system for human pluripotent stem cell expansion and differentiation

    Science.gov (United States)

    Lei, Yuguo; Schaffer, David V.

    2013-12-01

    Human pluripotent stem cells (hPSCs), including human embryonic stem cells and induced pluripotent stem cells, are promising for numerous biomedical applications, such as cell replacement therapies, tissue and whole-organ engineering, and high-throughput pharmacology and toxicology screening. Each of these applications requires large numbers of cells of high quality; however, the scalable expansion and differentiation of hPSCs, especially for clinical utilization, remains a challenge. We report a simple, defined, efficient, scalable, and good manufacturing practice-compatible 3D culture system for hPSC expansion and differentiation. It employs a thermoresponsive hydrogel that combines easy manipulation and completely defined conditions, free of any human- or animal-derived factors, and entailing only recombinant protein factors. Under an optimized protocol, the 3D system enables long-term, serial expansion of multiple hPSCs lines with a high expansion rate (∼20-fold per 5-d passage, for a 1072-fold expansion over 280 d), yield (∼2.0 × 107 cells per mL of hydrogel), and purity (∼95% Oct4+), even with single-cell inoculation, all of which offer considerable advantages relative to current approaches. Moreover, the system enabled 3D directed differentiation of hPSCs into multiple lineages, including dopaminergic neuron progenitors with a yield of ∼8 × 107 dopaminergic progenitors per mL of hydrogel and ∼80-fold expansion by the end of a 15-d derivation. This versatile system may be useful at numerous scales, from basic biological investigation to clinical development.

  3. Expansion by regions: revealing potential and Glauber regions automatically

    Energy Technology Data Exchange (ETDEWEB)

    Jantzen, Bernd [RWTH Aachen University, Institut fuer Theoretische Teilchenphysik und Kosmologie, Aachen (Germany); Smirnov, Alexander V. [Moscow State University, Scientific Research Computing Center, Moscow (Russian Federation); KIT, Institut fuer Theoretische Teilchenphysik, Karlsruhe (Germany); Smirnov, Vladimir A. [Moscow State University, Skobeltsyn Institute of Nuclear Physics, Moscow (Russian Federation); KIT, Institut fuer Theoretische Teilchenphysik, Karlsruhe (Germany)

    2012-09-15

    When performing asymptotic expansions using the strategy of expansion by regions, it is a non-trivial task to find the relevant regions. The recently published Mathematica code asy.m automates this task, but it has not been able to detect potential regions in threshold expansions or Glauber regions. In this work we present an algorithm and its implementation in the update asy2.m which also reveals potential and Glauber regions automatically. (orig.)

  4. Anisotropic thermal expansion in crystals of different categories

    Science.gov (United States)

    Zamkovskaya, A.; Maksimova, E.

    2015-12-01

    The three-dimensional (3D) indicatory surfaces of thermal expansion in crystals of different categories were constructed in program MathCad. Indicatory surface of thermal expansion is a sphere, spheroid, ellipsoid or surface of multiple parts, depending on the category of the crystal symmetry. The symmetry elements of thermal expansion include the symmetry elements of the point group of the crystal according Neumann's Principle.

  5. Effect of rapid maxillary expansion on sleep characteristics in children

    OpenAIRE

    Navya Ashok; N. K. Sapna Varma; Ajith, V. V.; Siby Gopinath

    2014-01-01

    Introduction: Rapid maxillary expansion (RME) is an orthopedic treatment procedure routinely used to treat constricted maxillary arches and also a potential additional treatment in children presenting with sleep-disordered breathing (SDB). Aims and Objectives: The main objective of this study was to evaluate the effects of RME on sleep characteristics in children. Materials and Methods: Polysomnography was done on children of 8-13 years of age before expansion (T0), after expansion (T1) and a...

  6. Flow in axisymmetric expansion in a catalytic converter

    OpenAIRE

    Gotfredsen, Erik; Meyer, Knud Erik

    2017-01-01

    The flow in an axisymmetric expansion (circular diffusor) is used in many different engineering applications, such as heat exchangers, catalytic converters and filters. These applications require a relatively uniform flow at the inlet. To minimise the pressure loss, an ideal solution would be to use a quite long expansion, but this is often not possible due to space restrictions. Therefore a short expansion combined with e.g. guide vanes is often used. The present study will use a Selective C...

  7. Series expansions of rotating two and three dimensional sound fields.

    Science.gov (United States)

    Poletti, M A

    2010-12-01

    The cylindrical and spherical harmonic expansions of oscillating sound fields rotating at a constant rate are derived. These expansions are a generalized form of the stationary sound field expansions. The derivations are based on the representation of interior and exterior sound fields using the simple source approach and determination of the simple source solutions with uniform rotation. Numerical simulations of rotating sound fields are presented to verify the theory.

  8. [Pullout test in expansive unilateral open-door laminoplasty of the cervical spine with OsteoMed M3 plate and screws: the screw orientation matters].

    Science.gov (United States)

    Hu, Kong-he; Jin, An-min; Duan, Yang; Liu, Cheng-long; Min, Shao-xiong; Zhu, Li-xin; Zhao, Wei-dong

    2011-05-01

    To study the impact of screw orientation on the pullout strength of OsteoMed M3 titanium screws in expansive unilateral open-door laminoplasty of the cervical spine. Six fresh human cervical spine specimens were randomly numbered and OsteoMed M3 plate and screws were used for an expansive unilateral open-door laminoplasty. The screws were inserted in the lateral mass at different extraversion angles (0°, 30° and 45°). The maximum pullout strength was tested on the ElectroForce material testing machine. The maximum pullout strength was 81.60∓7.33 N, 150.05∓15.57 N, and 160.08∓17.77 N in extraversion angle 0°, 30°, and 45° groups, respectively. The maximum pullout strength was significantly less in extraversion angle 0° group than in 30° and 45° groups (P<0.05), but similar in the latter two groups. The pullout strength of the screws inserted at an extraversion angle over 30° provides stronger fixation than an angle of 0° in the unilateral open-door laminoplasty using OsteoMed M3 titanium plate and screws.

  9. Does query expansion limit our learning? A comparison of social-based expansion to content-based expansion for medical queries on the internet.

    Science.gov (United States)

    Pentoney, Christopher; Harwell, Jeff; Leroy, Gondy

    2014-01-01

    Searching for medical information online is a common activity. While it has been shown that forming good queries is difficult, Google's query suggestion tool, a type of query expansion, aims to facilitate query formation. However, it is unknown how this expansion, which is based on what others searched for, affects the information gathering of the online community. To measure the impact of social-based query expansion, this study compared it with content-based expansion, i.e., what is really in the text. We used 138,906 medical queries from the AOL User Session Collection and expanded them using Google's Autocomplete method (social-based) and the content of the Google Web Corpus (content-based). We evaluated the specificity and ambiguity of the expansion terms for trigram queries. We also looked at the impact on the actual results using domain diversity and expansion edit distance. Results showed that the social-based method provided more precise expansion terms as well as terms that were less ambiguous. Expanded queries do not differ significantly in diversity when expanded using the social-based method (6.72 different domains returned in the first ten results, on average) vs. content-based method (6.73 different domains, on average).

  10. Expansion ortopedica maxilar con ortodoncia osteogenica periodontalmente acelerada

    National Research Council Canada - National Science Library

    Lopez Buitrago, Diego Fernando; Jaramillo Abadia, Isabel Cristina

    2014-01-01

    .... Historicamente, el tratamiento de la discrepancia esqueletica transversal ha estado acompanado de procedimientos de cirugia ortognatica que separan las suturas para permitir la expansion mediante...

  11. Expansion of Tubular with Elastomers in Multilateral Wells

    Directory of Open Access Journals (Sweden)

    Md Velden

    2013-06-01

    Full Text Available The use of solid expandable tubular technology during the last decade has focused on solving many challenges in well drilling and delivery including zonal isolation, deep drilling, conservation of hole sizes, etc. not only as pioneered solution but also providing cost effective and long lasting solutions. Concurrently, the technology was extended for construction of multilateral in typical wells. The process of horizontal tubular expansion is similar to the vertical expansion of expandable tubular in down-hole environment with the addition of uniformly distributed force due to its weight. The expansion is targeted to increase its diameter such that post expansion characteristics remain within allowable limits. In this study a typical expandable tubular of 57.15 mm outer diameter and 6.35 mm wall thickness was used with two different elastomer seals of 5 and 7 mm thickness placed at equal spacing of 200 mm. The developed stress contours during expansion process clearly showed the high stress areas in the vicinity of expansion region which lies around the mandrel. These high stresses may result in excessive wear of the mandrel. It was also found out that the drawing force increases as the mandrel angle, expansion ratio, and friction coefficient increases. A mandrel angle of 20o  requires minimum expansion force and can be considered as an optimum geometrical parameter to lower the power required for expansion.

  12. The reliable multicast protocol application programming interface

    Science.gov (United States)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  13. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    are determined once and for all. The net semantics allows the derivation of general properties and proof principles the use of which is demonstrated in establishing security properties for a number of protocols. The NSL public-key protocol, the ISO 5-pass authentication and the key-translation protocols......Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  14. A Wiki Based CT Protocol Management System.

    Science.gov (United States)

    Szczykutowicz, Timothy P; Rubert, Nicholas; Belden, Daryn; Ciano, Amanda; Duplissis, Andrew; Hermanns, Ashley; Monette, Stephen; Saldivar, Elliott Janssen

    2015-01-01

    At the University of Wisconsin Madison Department of Radiology, CT protocol management requires maintenance of thousands of parameters for each scanner. Managing CT protocols is further complicated by the unique configurability of each scanner. Due to recent Joint Commission requirements, now all CT protocol changes must be documented and reviewed by a site's CT protocol optimization team. The difficulty of managing the CT protocols was not in assembling the protocols, but in managing and implementing changes. This is why a wiki based solution for protocol management was implemented. A wiki inherently keeps track of all changes, logging who made the changes and when, allowing for editing and viewing permissions to be controlled, as well as allowing protocol changes to be instantly relayed to all scanner locations.

  15. 3D automatic expansion: clinical application; L`expansion 3D automatique: application clinique

    Energy Technology Data Exchange (ETDEWEB)

    Gaboriaud, G.; Pontvert, D.; Rosenwald, J.C. [Institut Curie, 75 - Paris (France)

    1998-09-01

    The determination of the various volumes (GTV: gross target volume, CTV: clinical target volume, PTV: planned target volume) recommended by the ICRU 50 report is a critical step in conformal treatment planning, since treatment optimisation procedures and documentation rely on accurate dose-volume histograms. The shape and the size of the CTV vary with the computer algorithm, the patient image acquisition parameters, the definition of the GTV and the margins surrounding it. The automatic expansion programs included in commercially available treatment planning system require careful validation and control before and during their routine use by the clinicians. Significant differences have been observed between 2D- and 3D-based expansions, with a usual underestimation of the PTV by 2D algorithms. (author)

  16. Human expansion precipitates niche expansion for an opportunistic apex predator (Puma concolor).

    Science.gov (United States)

    Moss, Wynne E; Alldredge, Mathew W; Logan, Kenneth A; Pauli, Jonathan N

    2016-12-23

    There is growing recognition that developed landscapes are important systems in which to promote ecological complexity and conservation. Yet, little is known about processes regulating these novel ecosystems, or behaviours employed by species adapting to them. We evaluated the isotopic niche of an apex carnivore, the cougar (Puma concolor), over broad spatiotemporal scales and in a region characterized by rapid landscape change. We detected a shift in resource use, from near complete specialization on native herbivores in wildlands to greater use of exotic and invasive species by cougars in contemporary urban interfaces. We show that 25 years ago, cougars inhabiting these same urban interfaces possessed diets that were intermediate. Thus, niche expansion followed human expansion over both time and space, indicating that an important top predator is interacting with prey in novel ways. Thus, though human-dominated landscapes can provide sufficient resources for apex carnivores, they do not necessarily preserve their ecological relationships.

  17. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    BACKGROUND: Unacknowledged inconsistencies in the reporting of clinical trials undermine the validity of the results of the trials. Little is known about inconsistency in the reporting of academic clinical drug trials. Therefore, we investigated the prevalence of consistency between protocols...... and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory......), primary objective, primary endpoint, and--for confirmatory trials only--hypothesis and sample size calculation. We used logistic regression, χ(2), and Fisher's exact test. RESULTS: A total of 282 applications of academic clinical drug trials were submitted to the Danish Health and Medicines Authority...

  18. Kioto protocol; Protocolo de Kioto

    Energy Technology Data Exchange (ETDEWEB)

    Romero, A.

    2005-07-01

    Atmospheric contamination by greenhouse gases is a global problem, and thus its solution requires global measures. Although the consequences of climate change are questioned and the foreseeable effects are not excessively serious, there are plenty of scientific reasons for all countries to make the necessary efforts to meet the objectives established by the Kyoto Protocol of reducing the six greenhouse gases over the period 2008-2012. Therefore, it seems essential that we understand the nature of the transformation that are occurring in the different systems, what changes they are causing and what costs they incur. Independently of its effectiveness and realism, the Kyoto Protocol is the first regulatory step in the direction of globalization in the environmental field. (Author)

  19. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    , we consider commitment multiplication proofs, which allow to prove a multiplicative relation among three commitments, and which play a crucial role in computationally secure MPC. We study a non-interactive solution which works in a distributed-verifier setting and essentially consists of a few...... executions of Pedersen’s VSS. We simplify and improve the protocol, and we point out a (previously overlooked) property which helps to construct non-interactive proofs of partial knowledge in this setting. This allows for instance to prove the knowledge of l out of m given secrets, without revealing which......While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...

  20. The information cost of quantum memoryless protocols

    OpenAIRE

    Chailloux, André; Kerenidis, Iordanis; Laurière, Mathieu

    2017-01-01

    We consider memoryless quantum communication protocols, where the two parties do not possess any memory besides their classical input and they take turns performing unitary operations on a pure quantum state that they exchange between them. Most known quantum protocols are of this type and recently a deep connection between memoryless protocols and Bell inequality violations has been explored recently by Buhrman et al. We study the information cost of memoryless quantum protocols by looking a...

  1. Distance hijacking attacks on distance bounding protocols

    OpenAIRE

    Cremers, Cas; Rasmussen, Kasper Bonne; Čapkun, Srdjan

    2011-01-01

    Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define a fourth main type of attacks on distance bounding protocols, called Distance Hijacking attacks. We show that many proposed distance bounding protocols are vulnerable to these attacks, and we propose solutions to make these protocols resilient to Distance Hijacking. Additionally, we generalize Distance Hijacking to Location Hijacking, to which ...

  2. Heuristic Methods for Security Protocols

    Directory of Open Access Journals (Sweden)

    Qurat ul Ain Nizamani

    2009-10-01

    Full Text Available Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  3. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...... how the Petri-net semantics can be used to prove security properties....

  4. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  5. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    2017-08-04

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  6. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    internet. 2. New Features in IPv6. Harsha Srinath. IPv4, the workhorse protocol of the currently popular TePI. IP protocol suite, is fast becoming obsolete. The exponen- ... required the creation of the next generation of Internet. Protocol-IPv6. ..... using multiple access providers across the same interface to have separate ...

  7. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    to ensure the finiteness of the protocol state-spaces while still being able to verify interesting protocol properties. The translations for different kinds of communication media have been implemented and successfully tested, among others, on agreement protocols from WS-Business Activity....

  8. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    IPv4, the workhorse protocol of the currently popular TePI. IP protocol suite, is fast becoming obsolete. The exponen- tial growth of the Internet is the main reason that has required the creation of the next generation of Internet. Protocol- IPv6. IPv6 is much more flexible and promises to take care of the address space and ...

  9. PCR protocols: current methods and applications

    National Research Council Canada - National Science Library

    White, Bruce Alan

    1993-01-01

    ..." between "small" and "big" labs, since its use makes certain projects, especially those related to molecular cloning, now far more feasible for the small lab with a modest budget. This new volume on PCR Protocols does not attempt the impossible task of representing all PCR-based protocols. Rather, it presents a range of protocols, both analytical ...

  10. Timed Model Checking of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.; Mader, Angelika H.

    We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol. Timing information allows the study of different attack scenarios. We illustrate the attacks by model

  11. Protocol Coordinator II | Center for Cancer Research

    Science.gov (United States)

    Provides programmatic and logistical support for the operations of clinical research for Phase I and Phase II clinical trials Provides deployment of clinical support services for clinical research  Streamlines protocol development timeline Provides data and document collection and compilation for regulatory filing with the FDA and other regulatory authorities Provides technical review and report preparation Provides administrative coordination and general logistical support for regulatory activities Ensures the provision of training for investigators and associate staff to reinforce and enhance a GCP culture Provides quality assurance and quality control oversight Performs regulatory review of clinical protocols, informed consent and other clinical documents  Tracks and facilitates a portfolio of protocols through each process step (IRB, RAC, DSMB, Office of Protocol Services) Assists clinical investigators in preparing clinical research protocols, including writing and formatting protocol documents and consent forms Prepares protocol packages for review and ensures that protocol packages include all the required material and comply with CCR, NCI and NIH policies Collaborates with investigators to resolve any protocol/data issues Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI Institutional Review Board (IRB) and the clinical trial sponsor or the FDA Monitors the review process and maintains detailed, complete and accurate records for each protocol of the approvals at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events Attends and prepares minutes for the Branch Protocol Review Committees For protocols that are performed with other research centers: contacts coordinators at other centers to obtain review committee approvals at these centers,  maintains records of

  12. Theology and development as capability expansion

    Directory of Open Access Journals (Sweden)

    Séverine Deneulin

    2016-05-01

    Full Text Available For the last 25 years, human development has become part of official development discourses. It takes the normative position that the success of policies depends on whether they have expanded human flourishing, or expanded the ‘freedoms’ or ‘capabilities’ people have ‘reason to value’, as Amartya Sen would put it. It emphasises the importance of institutions to facilitate such expansion, and the agency of people to create such institutions. The ability of institutions to be conducive to human flourishing depends on the nature of human interaction. When human interaction no longer has the flourishing of other persons as its aim, it can create structures which then constrain human agency. The article argues that the human development perspective could be enriched by theological insights such as structural sin and the contribution of religious narratives to public reasoning. It concentrates on the idea of justice of one biblical parable, and illustrates its argument with examples from the Argentine labour context.

  13. The optimizied expansion method for wavefield extrapolation

    KAUST Repository

    Wu, Zedong

    2013-01-01

    Spectral methods are fast becoming an indispensable tool for wave-field extrapolation, especially in anisotropic media, because of its dispersion and artifact free, as well as highly accurate, solutions of the wave equation. However, for inhomogeneous media, we face difficulties in dealing with the mixed space-wavenumber domain operator.In this abstract, we propose an optimized expansion method that can approximate this operator with its low rank representation. The rank defines the number of inverse FFT required per time extrapolation step, and thus, a lower rank admits faster extrapolations. The method uses optimization instead of matrix decomposition to find the optimal wavenumbers and velocities needed to approximate the full operator with its low rank representation.Thus,we obtain more accurate wave-fields using lower rank representation, and thus cheaper extrapolations. The optimization operation to define the low rank representation depends only on the velocity model, and this is done only once, and valid for a full reverse time migration (many shots) or one iteration of full waveform inversion. Applications on the BP model yielded superior results than those obtained using the decomposition approach. For transversely isotopic media, the solutions were free of the shear wave artifacts, and does not require that eta>0.

  14. Technology portfolio and capacity expansion under uncertainty

    Science.gov (United States)

    Filomena, Tiago Pascoal

    We analyze the problem of generation capacity expansion and portfolio of technologies choice in a restructured electricity market in which marginal costs are uncertain. In our investment model, firms behave as Cournot players and they make three different decisions in equilibrium: (i) the portfolio of technologies, (ii) technologies capacity and (iii) technologies production for every scenario. The decisions related to the portfolio and capacity are ex-ante and the production is ex-post to the realization of uncertainty. We consider the marginal cost as the uncertain parameter and we show with a simple transformation that the model is also flexible to allow for general load curves. Our main result is that portfolio diversification arises even with risk-neutral firms and technologies with different cost expectations. Furthermore, we characterize the production level of each firm for each possible scenario realization. All the conditions that yield (or do not yield) to diversification in a duopoly with two scenarios are discussed in the dissertation. Under our assumptions, we point out that in aggregate terms firms always invest and produce the same quantities. Asymmetry on the use of technologies between players can occur, but it just happens when technologies have the same cost expectation. We show that when technologies present different cost expectation the equilibrium results are unique and symmetric.

  15. Survivial Strategies in Bacterial Range Expansions

    Science.gov (United States)

    Frey, Erwin

    2014-03-01

    Bacterial communities represent complex and dynamic ecological systems. Different environmental conditions as well as bacterial interactions determine the establishment and sustainability of bacterial diversity. In this talk we discuss the competition of three Escherichia coli strains during range expansions on agar plates. In this bacterial model system, a colicin E2 producing strain C competes with a colicin resistant strain R and with a colicin sensitive strain S for new territory. Genetic engineering allows us to tune the growth rates of the strains and to study distinct ecological scenarios. These scenarios may lead to either single-strain dominance, pairwise coexistence, or to the coexistence of all three strains. In order to elucidate the survival mechanisms of the individual strains, we also developed a stochastic agent-based model to capture the ecological scenarios in silico. In a combined theoretical and experimental approach we are able to show that the level of biodiversity depends crucially on the composition of the inoculum, on the relative growth rates of the three strains, and on the effective reach of colicin toxicity.

  16. Medicaid Expansion: A Tale of Two Governors.

    Science.gov (United States)

    Flagg, Robin

    2016-10-01

    This is a study of why two seemingly similar governors made divergent decisions on expanding Medicaid under the Patient Protection and Affordable Care Act (ACA). Performing a case study of Governors John Kasich (OH) and Scott Walker (WI), I explore the roles played by electoral pressures, political party, governor's ideology, the state's policy heritage, stakeholder advocacy, and the economy in each governor's decision about whether to expand Medicaid. Electoral pressure was the most significant factor for both governors. I demonstrate that even Walker succumbed to state electoral pressures and expanded Medicaid, albeit in a manner unique to Wisconsin. He did this despite his emphatic national rhetoric rejecting Obamacare and expansion. Additionally, existing state political institutions drove each governor to decide in a manner unique to his state: previous Medicaid decisions in Wisconsin and direct democracy in Ohio provided additional pressures and divergent starting points. The remaining factors served less as a driving force behind the decision and more as a frame to justify the decision ex post facto. Case studies allow for a more complex view of how political pressures fit together; differences can be explained and expanded, and an enhanced understanding of political processes can be gleaned. Copyright © 2016 by Duke University Press.

  17. Semiquantum chaos and the large N expansion

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, F.; Habib, S.; Kluger, Y. [Los Alamos National Lab., NM (United States); Dawson, J.; Meredith, D.; Shepard, H. [New Hampshire Univ., Durham, NH (United States). Dept. of Physics

    1994-06-29

    When a classical oscillator is interacting with a purely quantum mechanical oscillator, described by the Lagrangian L = 1/2 x{sup 2} + 1/2A{sup 2} - 1/2 (m{sup 2} + e{sup 2} A{sup 2})x{sup 2}, where A is a classical variable and x is a quantum operator the relevant degrees of freedom for the quantum oscillator when {l_angle}x(t)x(t){r_angle} = G(t). The classical Hamiltonian dynamics governing the variables A(t). {Pi}{sub A}(t). G(t) and {Pi}{sub G}(t) is chaotic so that the results of making measurements on the quantum system at later times are sensitive to initial conditions. We review this system and discuss how this behavior is altered when the quantum fluctuations of the A oscillator are determined exactly and in a 1/N expansion where N is the number of copies of the x oscillator.

  18. [Feedback control mechanisms of plant cell expansion

    Energy Technology Data Exchange (ETDEWEB)

    Cosgrove, D.J.

    1992-01-01

    We have generated considerable evidence for the significance of wall stress relaxation in the control of plant growth and found that several agents (gibberellin, light, genetic loci for dwarf stature) influence growth rate via alteration of wall relaxation. We have refined our methods for measuring wall relaxation and, moreover, have found that wall relaxation properties bear only a distance relationship to wall mechanical properties. We have garnered novel insights into the nature of cell expansion mechanisms by analyzing spontaneous fluctuations of plant growth rate in seedlings. These experiments involved the application of mathematical techniques for analyzing growth rate fluctuations and the development of new instrumentation for measuring and forcing plant growth in a controlled fashion. These studies conclude that growth rate fluctuations generated by the plant as consequence of a feedback control system. This conclusion has important implications for the nature of wall loosening processes and demands a different framework for thinking about growth control. It also implies the existence of a growth rate sensor.

  19. Progesterone induces adult mammary stem cell expansion.

    Science.gov (United States)

    Joshi, Purna A; Jackson, Hartland W; Beristain, Alexander G; Di Grappa, Marco A; Mote, Patricia A; Clarke, Christine L; Stingl, John; Waterhouse, Paul D; Khokha, Rama

    2010-06-10

    Reproductive history is the strongest risk factor for breast cancer after age, genetics and breast density. Increased breast cancer risk is entwined with a greater number of ovarian hormone-dependent reproductive cycles, yet the basis for this predisposition is unknown. Mammary stem cells (MaSCs) are located within a specialized niche in the basal epithelial compartment that is under local and systemic regulation. The emerging role of MaSCs in cancer initiation warrants the study of ovarian hormones in MaSC homeostasis. Here we show that the MaSC pool increases 14-fold during maximal progesterone levels at the luteal dioestrus phase of the mouse. Stem-cell-enriched CD49fhi cells amplify at dioestrus, or with exogenous progesterone, demonstrating a key role for progesterone in propelling this expansion. In aged mice, CD49fhi cells display stasis upon cessation of the reproductive cycle. Progesterone drives a series of events where luminal cells probably provide Wnt4 and RANKL signals to basal cells which in turn respond by upregulating their cognate receptors, transcriptional targets and cell cycle markers. Our findings uncover a dynamic role for progesterone in activating adult MaSCs within the mammary stem cell niche during the reproductive cycle, where MaSCs are putative targets for cell transformation events leading to breast cancer.

  20. Testing option pricing with the Edgeworth expansion

    Science.gov (United States)

    Balieiro Filho, Ruy Gabriel; Rosenfeld, Rogerio

    2004-12-01

    There is a well-developed framework, the Black-Scholes theory, for the pricing of contracts based on the future prices of certain assets, called options. This theory assumes that the probability distribution of the returns of the underlying asset is a Gaussian distribution. However, it is observed in the market that this hypothesis is flawed, leading to the introduction of a fudge factor, the so-called volatility smile. Therefore, it would be interesting to explore extensions of the Black-Scholes theory to non-Gaussian distributions. In this paper, we provide an explicit formula for the price of an option when the distributions of the returns of the underlying asset is parametrized by an Edgeworth expansion, which allows for the introduction of higher independent moments of the probability distribution, namely skewness and kurtosis. We test our formula with options in the Brazilian and American markets, showing that the volatility smile can be reduced. We also check whether our approach leads to more efficient hedging strategies of these instruments.

  1. Can snowshoe hares control treeline expansions?

    Science.gov (United States)

    Olnes, Justin; Kielland, Knut; Juday, Glenn P; Mann, Daniel H; Genet, Hélène; Ruess, Roger W

    2017-10-01

    Treelines in Alaska are advancing in elevation and latitude because of climate warming, which is expanding the habitat available for boreal wildlife species, including snowshoe hares (Lepus americanus). Snowshoe hares are already present in tall shrub communities beyond treeline and are the main browser of white spruce (Picea glauca), the dominant tree species at treeline in Alaska. We investigated the processes involved in a "snowshoe hare filter" to white spruce establishment near treeline in Denali National Park, Alaska, USA. We modeled the pattern of spruce establishment from 1970 to 2009 and found that fewer spruce established during periods of high hare abundance. Multiple factors interact to influence browsing of spruce, including the hare cycle, snow depth and the characteristics of surrounding vegetation. Hares are abundant at treeline and may exclude spruce from otherwise optimal establishment sites, particularly floodplain locations with closed shrub canopies. The expansion of white spruce treeline in response to warming climate will be strongly modified by the spatial and temporal dynamics of the snowshoe hare filter. © 2017 by the Ecological Society of America.

  2. Oil sector expansion hits small road bump

    Energy Technology Data Exchange (ETDEWEB)

    Budd, G.

    2002-04-01

    Indications are that the upward production trend in Saskatchewan's oil industry, evident in recent years, will be reversed in 2002. Predictions are that the drop in production will be a modest one, reflecting the slower economy and the lag time between drilling activity and produced barrels of oil. Also a contributing factor is the fact that the year 2001 marked a decline of 20 per cent in oil well drilling from the previous year, down from 2,401 wells drilled to 1,931 wells. Expansions of last year such as PanCanadian's carbon dioxide project, Husky Energy's heavy oil project at Pike's Peak, northeast of Lloydminster, PanCanadian's SAGD project, Conoco's project at the Kerrobert Pool and Apache Canada's Midale area project southeast of Regina, are all likely to see more modest development during 2002. Similar retrenchment is expected at Nexen's (Wascana) Williston Basin area operations, due in part to the increased drilling cost resulting from the intense activity during 2001, and a 5 to 10 per cent rise in operating costs.

  3. Modeling the expansion of a contactor plasma

    Science.gov (United States)

    Hogan, E. A.; Delzanno, G.; Camporeale, E.; Borovsky, J. E.; MacDonald, E.; Thomsen, M. F.

    2012-12-01

    Plasma contactor technology is widely used on board spacecraft to keep spacecraft charging levels under control. On the International Space Station, for instance, it is used to prevent high current discharges between differently charged surfaces. It consists of emitting a neutral plasma to create a plasma reservoir near the spacecraft in order to balance the currents collected by the spacecraft from the magnetospheric environment. One approach to modeling the contactor plasma plume applies a self-similar solution in order to gain insight into the plume dynamics without requiring expensive numerical simulations [1, 2]. Typically, hydrodynamic fluid equations are used to model the plasma behavior. We present a comparison of different self-similar plume models existing in the literature [1, 2] and compare these with our Particle-In-Cell simulations in the near-field to assess their validity. We will consider both the unmagnetized and the magnetized limit, treating the magnitude and angle (relative to the plasma injection velocity) of the magnetic field as a parameter. [1] F. F. Gabdullin, A. G. Korsun, E. M. Tverdokhlebova, 'The plasma plume emitted onboard the international space station under the effect of the geomagnetic field', IEEE Trans. Plasma Science 36(5) 2207 (2008). [2] M. Merino, E. Ahedo, C. Bombardelli, H. Urrutxua, J. Pelaez, 'Hypersonic plasma plume expansion in space', 32nd International Electric Propulsion Conference, IEPC-2011-086, Wiesbaden, Germany, 2011.

  4. CTLA-4 blockade during dendritic cell based booster vaccination influences dendritic cell survival and CTL expansion

    DEFF Research Database (Denmark)

    Pedersen, Anders E; Ronchese, Franca

    2007-01-01

    and the lysis of relevant in vivo targets. However, the CTLA-4 blockage dependent expansion of CTLs also affect DC survival during booster DC injections and our data suggest that during a booster DC vaccine, the largest increase in CTL levels is already obtained during the first vaccination.......Dendritic cells (DCs) are potent antigen-presenting cells and critical for the priming of CD8+ T cells. Therefore the use of these cells as adjuvant cells has been tested in a large number of experimental and clinical vaccination studies, in particular cancer vaccine studies. A number of protocols...... are emerging that combine vaccination with CTL expanding strategies, such as e.g. blockade of CTLA-4 signalling. On the other hand, the lifespan and in vivo survival of therapeutic DCs have only been addressed in a few studies, although this is of importance for the kinetics of CTL induction during vaccination...

  5. Harmonious Expansion of China's Higher Education: A New Growth Pattern

    Science.gov (United States)

    Gu, Jiafeng

    2012-01-01

    How can one country narrow the regional disparity during the tremendous expansion of higher education? This issue remains unexamined and critical analysis is needed to unveil the spatial dynamics behind expansion of higher education. The spatial analysis shows that there is significant strategic interaction among neighboring provinces in China…

  6. Analysis of Factors Influencing Agritourism Businesses in Expansion

    OpenAIRE

    Jensen, Kimberly; Bruch Leffew, Megan; Menard, Jamey; English, Burton C.

    2014-01-01

    This study assesses how characteristics of agritourism operations may influence future expansion plans. Differences in barriers which agritourism operations face, as well as types of promotion methods used are examined for expansion-minded agritourism operators. This information will be useful to agritourism operators, as they look for contributors to future growth.

  7. STABILIZATION OF EXPANSIVE SOIL USING BAGASSE ASH & LIME

    African Journals Online (AJOL)

    tekimerry

    (MDD) and plasticity of the soil for all additives. But there was also a tremendous improvement in the CBR value when the soil is stabilized with a combination of lime and bagasse ash. This shows a potential of using bagasse ash as admixture in lime stabilized expansive soil. Keywords: Expansive soil, bagasse ash, lime,.

  8. Impact of size and temperature on thermal expansion of nanomaterials

    Indian Academy of Sciences (India)

    A theoretical method has been discussed to study the size dependency of thermal expansion of nanomaterials at higher temperature by considering the surface effect. A thermodynamical analysis of the equation of state (EoS) is studied from the knowledge of thermal expansion of nano-materials based on theoretical ...

  9. Did the Higgs boson drive the universe's expansion?

    CERN Multimedia

    2008-01-01

    The Higgs boson has been moonlighting. Not content with its day job of giving other particles their mass, it may also have driven the expansion of the early universe, given a little tinkering, according to two separate studies. Soon after the big bang the early universe is believed to have undergone a period of rapid expansion, known as inflation.

  10. Implementation of centrifuge testing of expansive soils for pavement design.

    Science.gov (United States)

    2017-03-01

    The novel centrifuge-based method for testing of expansive soils from project 5-6048-01 was implemented into : use for the determination of the Potential Vertical Rise (PVR) of roadways that sit on expansive subgrades. The : centrifuge method was mod...

  11. Studies of Expansive Learning: Foundations, Findings and Future Challenges

    Directory of Open Access Journals (Sweden)

    Yrjö Engeström

    2013-07-01

    Full Text Available The paper examines studies based on the theory of expansive learning, formulated in 1987. In recent years the theory has been used in a wide variety of studies and interventions. The theory builds on foundational ideas put forward by Vygotsky, Leont’ev, Il’enkov, and Davydov, key figures in the Russian school of cultural-historical activity theory. Studies based on the theory are reviewed in six sections: expansive learning as transformation of the object, expansive learning as movement in the zone of proximal development, expansive learning as cycles of learning actions, expansive learning as boundary crossing and network building, expansive learning as distributed and discontinuous movement, and formative interventions.A separate section is devoted to critiques of expansive learning. It is concluded that the ultimate test of learning theories is how they help practitioners to generate learning that grasps pressing issues the humankind is facing. The theory of expansive learning currently expands its analyses both up and down, outward and inward. Moving up and outward, it tackles learning in fields or networks of interconnected activity systems with their partially shared and often contested objects. Moving down and inward, it tackles issues of subjectivity, experiencing, personal sense, emotion, embodiment, identity, and moral commitment.

  12. Clusters of Organic Molecules in a Supersonic Jet Expansion

    NARCIS (Netherlands)

    Jonkman, Harry T.; Even, Uzi; Kommandeur, Jan

    1985-01-01

    A wide variety of clusters were obtained in seeded supersonic conical jet expansions of organic molecules. It was shown that mixed clusters probably are formed statistically in the collisional region of the expansion, although kinetic effects cannot be excluded. The molecular fragmentation in the

  13. Shrub expansion in SW Greenland under modest regional warming

    DEFF Research Database (Denmark)

    Jørgensen, Rasmus Halfdan; Meilby, Henrik; Kollmann, Johannes

    2013-01-01

    Shrub expansion has been observed widely in tundra areas across the Arctic. This phenomenon has been partially attributed to increasing temperatures over the past century. However, relationships among shrub expansion, grazing, and human disturbance have been studied little. SW Greenland is a suba...

  14. Dynamics of plasma expansion in the pulsed laser material interaction

    Indian Academy of Sciences (India)

    process results from the anisotropic expansion velocities associated with different species. These velocities are mainly controlled by the initial dimension of the expanding plasma. An attempt was undertaken to estimate the length of the plume at different ambient gas pressures using an adiabatic expansion model. The rate.

  15. Surgical Splint Design Influences Transverse Expansion in Segmental Maxillary Osteotomies

    DEFF Research Database (Denmark)

    Stokbro, Kasper; Aagaard, Esben; Torkov, Peter

    2017-01-01

    Purpose: In segmental maxillary procedures, it is imperative to obtain as much of the planned expansion as possible. Lack of obtained expansion, in addition to late relapse after splint removal, can result in relapse of the posterior crossbite. This study investigated the influence of 2 surgical ...

  16. Expansion of U. S. uranium enrichment capacity. Final environmental statement

    Energy Technology Data Exchange (ETDEWEB)

    1976-04-01

    Reasonably foreseeable environmental, social, economic, and technological costs and benefits of postulated expansion of U. S. enrichment capacity through the year 2000 and reasonably available alternatives to such expansion are described. Both the gas centrifuge and gaseous diffusion methods for the enrichment of uranium are considered in this impact assessment. (JGB)

  17. 1 INVESTIGATIONS ON THE EXPANSIVE SOILS OF ADDIS ABABA ...

    African Journals Online (AJOL)

    group comprises of basic igneous rocks. Here feldspar and pyroxene minerals of the parent rocks decompose to form montmorillonite - the predominant mineral of expansive soil - and other secondary minerals. The second group comprises of sedimentary rocks that contain montmorillonite. The expansive soils of Ethiopia ...

  18. Higher Education in Ethiopia: Expansion, Quality Assurance and Institutional Autonomy

    Science.gov (United States)

    Akalu, Girmaw Abebe

    2014-01-01

    This article chronicles the key challenges facing Ethiopia as it embarks on an ambitious, ideologically-driven and aggressive expansion of its higher education system in an effort to address its national goals of economic growth and poverty reduction. It is argued that the urge for higher education expansion has placed undue pressures particularly…

  19. 12 CFR 34.84 - Future bank expansion.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Future bank expansion. 34.84 Section 34.84 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY REAL ESTATE LENDING AND APPRAISALS Other Real Estate Owned § 34.84 Future bank expansion. A national bank normally should use real...

  20. Asymptotic expansions for high-contrast linear elasticity

    KAUST Repository

    Poveda, Leonardo A.

    2015-03-01

    We study linear elasticity problems with high contrast in the coefficients using asymptotic limits recently introduced. We derive an asymptotic expansion to solve heterogeneous elasticity problems in terms of the contrast in the coefficients. We study the convergence of the expansion in the H1 norm. © 2015 Elsevier B.V.