WorldWideScience

Sample records for random-number expansion protocol

  1. Security of Semi-Device-Independent Random Number Expansion Protocols.

    Science.gov (United States)

    Li, Dan-Dan; Wen, Qiao-Yan; Wang, Yu-Kun; Zhou, Yu-Qian; Gao, Fei

    2015-10-27

    Semi-device-independent random number expansion (SDI-RNE) protocols require some truly random numbers to generate fresh ones, with making no assumptions on the internal working of quantum devices except for the dimension of the Hilbert space. The generated randomness is certified by non-classical correlation in the prepare-and-measure test. Until now, the analytical relations between the amount of the generated randomness and the degree of non-classical correlation, which are crucial for evaluating the security of SDI-RNE protocols, are not clear under both the ideal condition and the practical one. In the paper, first, we give the analytical relation between the above two factors under the ideal condition. As well, we derive the analytical relation under the practical conditions, where devices' behavior is not independent and identical in each round and there exists deviation in estimating the non-classical behavior of devices. Furthermore, we choose a different randomness extractor (i.e., two-universal random function) and give the security proof.

  2. Semi-device-independent random-number expansion without entanglement

    International Nuclear Information System (INIS)

    Li Hongwei; Yin Zhenqiang; Wu Yuchun; Zou Xubo; Wang Shuang; Chen Wei; Guo Guangcan; Han Zhengfu

    2011-01-01

    By testing the classical correlation violation between two systems, true random numbers can be generated and certified without applying classical statistical method. In this work, we propose a true random-number expansion protocol without entanglement, where the randomness can be guaranteed only by the two-dimensional quantum witness violation. Furthermore, we only assume that the dimensionality of the system used in the protocol has a tight bound, and the whole protocol can be regarded as a semi-device-independent black-box scenario. Compared with the device-independent random-number expansion protocol based on entanglement, our protocol is much easier to implement and test.

  3. Random number generation

    International Nuclear Information System (INIS)

    Coveyou, R.R.

    1974-01-01

    The subject of random number generation is currently controversial. Differing opinions on this subject seem to stem from implicit or explicit differences in philosophy; in particular, from differing ideas concerning the role of probability in the real world of physical processes, electronic computers, and Monte Carlo calculations. An attempt is made here to reconcile these views. The role of stochastic ideas in mathematical models is discussed. In illustration of these ideas, a mathematical model of the use of random number generators in Monte Carlo calculations is constructed. This model is used to set up criteria for the comparison and evaluation of random number generators. (U.S.)

  4. Quantum random number generator

    Science.gov (United States)

    Pooser, Raphael C.

    2016-05-10

    A quantum random number generator (QRNG) and a photon generator for a QRNG are provided. The photon generator may be operated in a spontaneous mode below a lasing threshold to emit photons. Photons emitted from the photon generator may have at least one random characteristic, which may be monitored by the QRNG to generate a random number. In one embodiment, the photon generator may include a photon emitter and an amplifier coupled to the photon emitter. The amplifier may enable the photon generator to be used in the QRNG without introducing significant bias in the random number and may enable multiplexing of multiple random numbers. The amplifier may also desensitize the photon generator to fluctuations in power supplied thereto while operating in the spontaneous mode. In one embodiment, the photon emitter and amplifier may be a tapered diode amplifier.

  5. Uniform random number generators

    Science.gov (United States)

    Farr, W. R.

    1971-01-01

    Methods are presented for the generation of random numbers with uniform and normal distributions. Subprogram listings of Fortran generators for the Univac 1108, SDS 930, and CDC 3200 digital computers are also included. The generators are of the mixed multiplicative type, and the mathematical method employed is that of Marsaglia and Bray.

  6. Quantum random number generator

    Science.gov (United States)

    Soubusta, Jan; Haderka, Ondrej; Hendrych, Martin

    2001-03-01

    Since reflection or transmission of a quantum particle on a beamsplitter is inherently random quantum process, a device built on this principle does not suffer from drawbacks of neither pseudo-random computer generators or classical noise sources. Nevertheless, a number of physical conditions necessary for high quality random numbers generation must be satisfied. Luckily, in quantum optics realization they can be well controlled. We present an easy random number generator based on the division of weak light pulses on a beamsplitter. The randomness of the generated bit stream is supported by passing the data through series of 15 statistical test. The device generates at a rate of 109.7 kbit/s.

  7. Drawing a random number

    DEFF Research Database (Denmark)

    Wanscher, Jørgen Bundgaard; Sørensen, Majken Vildrik

    2006-01-01

    Random numbers are used for a great variety of applications in almost any field of computer and economic sciences today. Examples ranges from stock market forecasting in economics, through stochastic traffic modelling in operations research to photon and ray tracing in graphics. The construction...... distributions into others with most of the required characteristics. In essence, a uniform sequence which is transformed into a new sequence with the required distribution. The subject of this article is to consider the well known highly uniform Halton sequence and modifications to it. The intent is to generate...

  8. [Intel random number generator-based true random number generator].

    Science.gov (United States)

    Huang, Feng; Shen, Hong

    2004-09-01

    To establish a true random number generator on the basis of certain Intel chips. The random numbers were acquired by programming using Microsoft Visual C++ 6.0 via register reading from the random number generator (RNG) unit of an Intel 815 chipset-based computer with Intel Security Driver (ISD). We tested the generator with 500 random numbers in NIST FIPS 140-1 and X(2) R-Squared test, and the result showed that the random number it generated satisfied the demand of independence and uniform distribution. We also compared the random numbers generated by Intel RNG-based true random number generator and those from the random number table statistically, by using the same amount of 7500 random numbers in the same value domain, which showed that the SD, SE and CV of Intel RNG-based random number generator were less than those of the random number table. The result of u test of two CVs revealed no significant difference between the two methods. Intel RNG-based random number generator can produce high-quality random numbers with good independence and uniform distribution, and solves some problems with random number table in acquisition of the random numbers.

  9. Random Numbers and Quantum Computers

    Science.gov (United States)

    McCartney, Mark; Glass, David

    2002-01-01

    The topic of random numbers is investigated in such a way as to illustrate links between mathematics, physics and computer science. First, the generation of random numbers by a classical computer using the linear congruential generator and logistic map is considered. It is noted that these procedures yield only pseudo-random numbers since…

  10. Microcomputer Unit: Generating Random Numbers.

    Science.gov (United States)

    Haigh, William E.

    1986-01-01

    Presents an activity, suitable for students in grades 6-12, on generating random numbers. Objectives, equipment needed, list of prerequisite experiences, instructional strategies, and ready-to-copy student worksheets are included. (JN)

  11. Digital random-number generator

    Science.gov (United States)

    Brocker, D. H.

    1973-01-01

    For binary digit array of N bits, use N noise sources to feed N nonlinear operators; each flip-flop in digit array is set by nonlinear operator to reflect whether amplitude of generator which feeds it is above or below mean value of generated noise. Fixed-point uniform distribution random number generation method can also be used to generate random numbers with other than uniform distribution.

  12. Random numbers from vacuum fluctuations

    International Nuclear Information System (INIS)

    Shi, Yicheng; Kurtsiefer, Christian; Chng, Brenda

    2016-01-01

    We implement a quantum random number generator based on a balanced homodyne measurement of vacuum fluctuations of the electromagnetic field. The digitized signal is directly processed with a fast randomness extraction scheme based on a linear feedback shift register. The random bit stream is continuously read in a computer at a rate of about 480 Mbit/s and passes an extended test suite for random numbers.

  13. Random numbers from vacuum fluctuations

    Energy Technology Data Exchange (ETDEWEB)

    Shi, Yicheng; Kurtsiefer, Christian, E-mail: christian.kurtsiefer@gmail.com [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542 (Singapore); Center for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543 (Singapore); Chng, Brenda [Center for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore 117543 (Singapore)

    2016-07-25

    We implement a quantum random number generator based on a balanced homodyne measurement of vacuum fluctuations of the electromagnetic field. The digitized signal is directly processed with a fast randomness extraction scheme based on a linear feedback shift register. The random bit stream is continuously read in a computer at a rate of about 480 Mbit/s and passes an extended test suite for random numbers.

  14. Pseudo-Random Number Generators

    Science.gov (United States)

    Howell, L. W.; Rheinfurth, M. H.

    1984-01-01

    Package features comprehensive selection of probabilistic distributions. Monte Carlo simulations resorted to whenever systems studied not amenable to deterministic analyses or when direct experimentation not feasible. Random numbers having certain specified distribution characteristic integral part of simulations. Package consists of collector of "pseudorandom" number generators for use in Monte Carlo simulations.

  15. The MIXMAX random number generator

    Science.gov (United States)

    Savvidy, Konstantin G.

    2015-11-01

    In this paper, we study the randomness properties of unimodular matrix random number generators. Under well-known conditions, these discrete-time dynamical systems have the highly desirable K-mixing properties which guarantee high quality random numbers. It is found that some widely used random number generators have poor Kolmogorov entropy and consequently fail in empirical tests of randomness. These tests show that the lowest acceptable value of the Kolmogorov entropy is around 50. Next, we provide a solution to the problem of determining the maximal period of unimodular matrix generators of pseudo-random numbers. We formulate the necessary and sufficient condition to attain the maximum period and present a family of specific generators in the MIXMAX family with superior performance and excellent statistical properties. Finally, we construct three efficient algorithms for operations with the MIXMAX matrix which is a multi-dimensional generalization of the famous cat-map. First, allowing to compute the multiplication by the MIXMAX matrix with O(N) operations. Second, to recursively compute its characteristic polynomial with O(N2) operations, and third, to apply skips of large number of steps S to the sequence in O(N2 log(S)) operations.

  16. Random number generation and creativity.

    Science.gov (United States)

    Bains, William

    2008-01-01

    A previous paper suggested that humans can generate genuinely random numbers. I tested this hypothesis by repeating the experiment with a larger number of highly numerate subjects, asking them to call out a sequence of digits selected from 0 through 9. The resulting sequences were substantially non-random, with an excess of sequential pairs of numbers and a deficit of repeats of the same number, in line with previous literature. However, the previous literature suggests that humans generate random numbers with substantial conscious effort, and distractions which reduce that effort reduce the randomness of the numbers. I reduced my subjects' concentration by asking them to call out in another language, and with alcohol - neither affected the randomness of their responses. This suggests that the ability to generate random numbers is a 'basic' function of the human mind, even if those numbers are not mathematically 'random'. I hypothesise that there is a 'creativity' mechanism, while not truly random, provides novelty as part of the mind's defence against closed programming loops, and that testing for the effects seen here in people more or less familiar with numbers or with spontaneous creativity could identify more features of this process. It is possible that training to perform better at simple random generation tasks could help to increase creativity, through training people to reduce the conscious mind's suppression of the 'spontaneous', creative response to new questions.

  17. Fast integration using quasi-random numbers

    International Nuclear Information System (INIS)

    Bossert, J.; Feindt, M.; Kerzel, U.

    2006-01-01

    Quasi-random numbers are specially constructed series of numbers optimised to evenly sample a given s-dimensional volume. Using quasi-random numbers in numerical integration converges faster with a higher accuracy compared to the case of pseudo-random numbers. The basic properties of quasi-random numbers are introduced, various generators are discussed and the achieved gain is illustrated by examples

  18. Fast integration using quasi-random numbers

    Science.gov (United States)

    Bossert, J.; Feindt, M.; Kerzel, U.

    2006-04-01

    Quasi-random numbers are specially constructed series of numbers optimised to evenly sample a given s-dimensional volume. Using quasi-random numbers in numerical integration converges faster with a higher accuracy compared to the case of pseudo-random numbers. The basic properties of quasi-random numbers are introduced, various generators are discussed and the achieved gain is illustrated by examples.

  19. Self-correcting random number generator

    Science.gov (United States)

    Humble, Travis S.; Pooser, Raphael C.

    2016-09-06

    A system and method for generating random numbers. The system may include a random number generator (RNG), such as a quantum random number generator (QRNG) configured to self-correct or adapt in order to substantially achieve randomness from the output of the RNG. By adapting, the RNG may generate a random number that may be considered random regardless of whether the random number itself is tested as such. As an example, the RNG may include components to monitor one or more characteristics of the RNG during operation, and may use the monitored characteristics as a basis for adapting, or self-correcting, to provide a random number according to one or more performance criteria.

  20. Analysis of android random number generator

    OpenAIRE

    Sarıtaş, Serkan

    2013-01-01

    Ankara : The Department of Computer Engineering and the Graduate School of Engineering and Science of Bilkent University, 2013. Thesis (Master's) -- Bilkent University, 2013. Includes bibliographical references leaves 61-65. Randomness is a crucial resource for cryptography, and random number generators are critical building blocks of almost all cryptographic systems. Therefore, random number generation is one of the key parts of secure communication. Random number generatio...

  1. Quality pseudo-random number generator

    International Nuclear Information System (INIS)

    Tarasiuk, J.

    1996-01-01

    The pseudo-random number generator (RNG) was written to match needs of nuclear and high-energy physics computation which in some cases require very long and independent random number sequences. In this random number generator the repetition period is about 10 36 what should be sufficient for all computers in the world. In this article the test results of RNG correlation, speed and identity of computations for PC, Sun4 and VAX computer tests are presented

  2. Generation of pseudo-random numbers

    Science.gov (United States)

    Howell, L. W.; Rheinfurth, M. H.

    1982-01-01

    Practical methods for generating acceptable random numbers from a variety of probability distributions which are frequently encountered in engineering applications are described. The speed, accuracy, and guarantee of statistical randomness of the various methods are discussed.

  3. Microcomputer-Assisted Discoveries: Random Numbers.

    Science.gov (United States)

    Kimberling, Clark

    1983-01-01

    A programing contest was designed to promote interest in mathematical randomness. Student-developed programs making clever uses of random numbers are presented. Modifications users might make are suggested. (MNS)

  4. Using Random Numbers in Science Research Activities.

    Science.gov (United States)

    Schlenker, Richard M.; And Others

    1996-01-01

    Discusses the importance of science process skills and describes ways to select sets of random numbers for selection of subjects for a research study in an unbiased manner. Presents an activity appropriate for grades 5-12. (JRH)

  5. All-optical fast random number generator.

    Science.gov (United States)

    Li, Pu; Wang, Yun-Cai; Zhang, Jian-Zhong

    2010-09-13

    We propose a scheme of all-optical random number generator (RNG), which consists of an ultra-wide bandwidth (UWB) chaotic laser, an all-optical sampler and an all-optical comparator. Free from the electric-device bandwidth, it can generate 10Gbit/s random numbers in our simulation. The high-speed bit sequences can pass standard statistical tests for randomness after all-optical exclusive-or (XOR) operation.

  6. Random numbers spring from alpha decay

    International Nuclear Information System (INIS)

    Frigerio, N.A.; Sanathanan, L.P.; Morley, M.; Clark, N.A.; Tyler, S.A.

    1980-05-01

    Congruential random number generators, which are widely used in Monte Carlo simulations, are deficient in that the number they generate are concentrated in a relatively small number of hyperplanes. While this deficiency may not be a limitation in small Monte Carlo studies involving a few variables, it introduces a significant bias in large simulations requiring high resolution. This bias was recognized and assessed during preparations for an accident analysis study of nuclear power plants. This report describes a random number device based on the radioactive decay of alpha particles from a 235 U source in a high-resolution gas proportional counter. The signals were fed to a 4096-channel analyzer and for each channel the frequency of signals registered in a 20,000-microsecond interval was recorded. The parity bits of these frequency counts (0 for an even count and 1 for an odd count) were then assembled in sequence to form 31-bit binary random numbers and transcribed to a magnetic tape. This cycle was repeated as many times as were necessary to create 3 million random numbers. The frequency distribution of counts from the present device conforms to the Brockwell-Moyal distribution, which takes into account the dead time of the counter (both the dead time and decay constant of the underlying Poisson process were estimated). Analysis of the count data and tests of randomness on a sample set of the 31-bit binary numbers indicate that this random number device is a highly reliable source of truly random numbers. Its use is, therefore, recommended in Monte Carlo simulations for which the congruential pseudorandom number generators are found to be inadequate. 6 figures, 5 tables

  7. Learning Random Numbers: A Matlab Anomaly

    Czech Academy of Sciences Publication Activity Database

    Savický, Petr; Robnik-Šikonja, M.

    2008-01-01

    Roč. 22, č. 3 (2008), s. 254-265 ISSN 0883-9514 R&D Projects: GA AV ČR 1ET100300517 Institutional research plan: CEZ:AV0Z10300504 Keywords : random number s * machine learning * classification * attribute evaluation * regression Subject RIV: BA - General Mathematics Impact factor: 0.795, year: 2008

  8. True random numbers from amplified quantum vacuum.

    Science.gov (United States)

    Jofre, M; Curty, M; Steinlechner, F; Anzolin, G; Torres, J P; Mitchell, M W; Pruneri, V

    2011-10-10

    Random numbers are essential for applications ranging from secure communications to numerical simulation and quantitative finance. Algorithms can rapidly produce pseudo-random outcomes, series of numbers that mimic most properties of true random numbers while quantum random number generators (QRNGs) exploit intrinsic quantum randomness to produce true random numbers. Single-photon QRNGs are conceptually simple but produce few random bits per detection. In contrast, vacuum fluctuations are a vast resource for QRNGs: they are broad-band and thus can encode many random bits per second. Direct recording of vacuum fluctuations is possible, but requires shot-noise-limited detectors, at the cost of bandwidth. We demonstrate efficient conversion of vacuum fluctuations to true random bits using optical amplification of vacuum and interferometry. Using commercially-available optical components we demonstrate a QRNG at a bit rate of 1.11 Gbps. The proposed scheme has the potential to be extended to 10 Gbps and even up to 100 Gbps by taking advantage of high speed modulation sources and detectors for optical fiber telecommunication devices.

  9. Random Number Generation for High Performance Computing

    Science.gov (United States)

    2015-01-01

    number streams, a quality metric for the parallel random number streams. * * * * * Atty. Dkt . No.: 5660-14400 Customer No. 35690 Eric B. Meyertons...responsibility to ensure timely payment of maintenance fees when due. Pagel of3 PTOL-85 (Rev. 02/11) Atty. Dkt . No.: 5660-14400 Page 1 Meyertons...with each subtask executed by a separate thread or process (henceforth, process). Each process has Atty. Dkt . No.: 5660-14400 Page 2 Meyertons

  10. Source-Independent Quantum Random Number Generation

    Science.gov (United States)

    Cao, Zhu; Zhou, Hongyi; Yuan, Xiao; Ma, Xiongfeng

    2016-01-01

    Quantum random number generators can provide genuine randomness by appealing to the fundamental principles of quantum mechanics. In general, a physical generator contains two parts—a randomness source and its readout. The source is essential to the quality of the resulting random numbers; hence, it needs to be carefully calibrated and modeled to achieve information-theoretical provable randomness. However, in practice, the source is a complicated physical system, such as a light source or an atomic ensemble, and any deviations in the real-life implementation from the theoretical model may affect the randomness of the output. To close this gap, we propose a source-independent scheme for quantum random number generation in which output randomness can be certified, even when the source is uncharacterized and untrusted. In our randomness analysis, we make no assumptions about the dimension of the source. For instance, multiphoton emissions are allowed in optical implementations. Our analysis takes into account the finite-key effect with the composable security definition. In the limit of large data size, the length of the input random seed is exponentially small compared to that of the output random bit. In addition, by modifying a quantum key distribution system, we experimentally demonstrate our scheme and achieve a randomness generation rate of over 5 ×103 bit /s .

  11. Source-Independent Quantum Random Number Generation

    Directory of Open Access Journals (Sweden)

    Zhu Cao

    2016-02-01

    Full Text Available Quantum random number generators can provide genuine randomness by appealing to the fundamental principles of quantum mechanics. In general, a physical generator contains two parts—a randomness source and its readout. The source is essential to the quality of the resulting random numbers; hence, it needs to be carefully calibrated and modeled to achieve information-theoretical provable randomness. However, in practice, the source is a complicated physical system, such as a light source or an atomic ensemble, and any deviations in the real-life implementation from the theoretical model may affect the randomness of the output. To close this gap, we propose a source-independent scheme for quantum random number generation in which output randomness can be certified, even when the source is uncharacterized and untrusted. In our randomness analysis, we make no assumptions about the dimension of the source. For instance, multiphoton emissions are allowed in optical implementations. Our analysis takes into account the finite-key effect with the composable security definition. In the limit of large data size, the length of the input random seed is exponentially small compared to that of the output random bit. In addition, by modifying a quantum key distribution system, we experimentally demonstrate our scheme and achieve a randomness generation rate of over 5×10^{3}  bit/s.

  12. Stability comparison of two different dentoalveolar expansion treatment protocols

    Directory of Open Access Journals (Sweden)

    Ezgi Atik

    Full Text Available ABSTRACT Objective: The aim of this study was to compare the longitudinal stability of the conventional straight-wire system after the use of a quad-helix appliance with Damon self-ligating system in patients with Class I malocclusion. Methods: 27 adolescent patients were evaluated at three different periods: pre-treatment (T1, post-treatment (T2 and three years post-treatment (T3. Group 1 included 12 patients (with a mean age of 14.65 year treated with Damon 3MX bracket system; and Group 2 included 15 patients (with a mean age of 14.8 year who underwent orthodontic treatment with Roth prescribed brackets after expansion with Quad-Helix appliance. Relapse was evaluated with dental cast examination and cephalometric radiograph tracings. Statistical analysis was performed with IBM-SPSS for Windows software, version 21 (SPSS Inc., Chicago, IL. A p-value smaller than 0.05 was considered statistically significant. Results: There were significant increases in all transverse dental and postero-anterior measurements (except for UL6-ML mm in Group 1 with active treatment. There was some significant relapse in the long-term in inter-canine width in both groups and in the inter-first premolar width in Group 2 (p< 0.05. Significant decrease in all frontal measurements from T2 to T3 was seen for both groups. Upper and lower incisors significantly proclined in T1-T2 (p<0.05, however no relapse was found for both groups. When two systems were compared, there was no significant difference for the long-term follow-up period. Conclusion: Conventional (quad-helix appliance with conventional brackets and Damon systems were found similar with regard to the long-term incisor positions and transverse dimension changes of maxillary arch.

  13. Random Numbers and Monte Carlo Methods

    Science.gov (United States)

    Scherer, Philipp O. J.

    Many-body problems often involve the calculation of integrals of very high dimension which cannot be treated by standard methods. For the calculation of thermodynamic averages Monte Carlo methods are very useful which sample the integration volume at randomly chosen points. After summarizing some basic statistics, we discuss algorithms for the generation of pseudo-random numbers with given probability distribution which are essential for all Monte Carlo methods. We show how the efficiency of Monte Carlo integration can be improved by sampling preferentially the important configurations. Finally the famous Metropolis algorithm is applied to classical many-particle systems. Computer experiments visualize the central limit theorem and apply the Metropolis method to the traveling salesman problem.

  14. Astronomical random numbers for quantum foundations experiments

    Science.gov (United States)

    Leung, Calvin; Brown, Amy; Nguyen, Hien; Friedman, Andrew S.; Kaiser, David I.; Gallicchio, Jason

    2018-04-01

    Photons from distant astronomical sources can be used as a classical source of randomness to improve fundamental tests of quantum nonlocality, wave-particle duality, and local realism through Bell's inequality and delayed-choice quantum eraser tests inspired by Wheeler's cosmic-scale Mach-Zehnder interferometer gedanken experiment. Such sources of random numbers may also be useful for information-theoretic applications such as key distribution for quantum cryptography. Building on the design of an astronomical random number generator developed for the recent cosmic Bell experiment [Handsteiner et al. Phys. Rev. Lett. 118, 060401 (2017), 10.1103/PhysRevLett.118.060401], in this paper we report on the design and characterization of a device that, with 20-nanosecond latency, outputs a bit based on whether the wavelength of an incoming photon is greater than or less than ≈700 nm. Using the one-meter telescope at the Jet Propulsion Laboratory Table Mountain Observatory, we generated random bits from astronomical photons in both color channels from 50 stars of varying color and magnitude, and from 12 quasars with redshifts up to z =3.9 . With stars, we achieved bit rates of ˜1 ×106Hz/m 2 , limited by saturation of our single-photon detectors, and with quasars of magnitudes between 12.9 and 16, we achieved rates between ˜102 and 2 ×103Hz /m2 . For bright quasars, the resulting bitstreams exhibit sufficiently low amounts of statistical predictability as quantified by the mutual information. In addition, a sufficiently high fraction of bits generated are of true astronomical origin in order to address both the locality and freedom-of-choice loopholes when used to set the measurement settings in a test of the Bell-CHSH inequality.

  15. Long period pseudo random number sequence generator

    Science.gov (United States)

    Wang, Charles C. (Inventor)

    1989-01-01

    A circuit for generating a sequence of pseudo random numbers, (A sub K). There is an exponentiator in GF(2 sup m) for the normal basis representation of elements in a finite field GF(2 sup m) each represented by m binary digits and having two inputs and an output from which the sequence (A sub K). Of pseudo random numbers is taken. One of the two inputs is connected to receive the outputs (E sub K) of maximal length shift register of n stages. There is a switch having a pair of inputs and an output. The switch outputs is connected to the other of the two inputs of the exponentiator. One of the switch inputs is connected for initially receiving a primitive element (A sub O) in GF(2 sup m). Finally, there is a delay circuit having an input and an output. The delay circuit output is connected to the other of the switch inputs and the delay circuit input is connected to the output of the exponentiator. Whereby after the exponentiator initially receives the primitive element (A sub O) in GF(2 sup m) through the switch, the switch can be switched to cause the exponentiator to receive as its input a delayed output A(K-1) from the exponentiator thereby generating (A sub K) continuously at the output of the exponentiator. The exponentiator in GF(2 sup m) is novel and comprises a cyclic-shift circuit; a Massey-Omura multiplier; and, a control logic circuit all operably connected together to perform the function U(sub i) = 92(sup i) (for n(sub i) = 1 or 1 (for n(subi) = 0).

  16. Generation of Random Numbers and Parallel Random Number Streams for Monte Carlo Simulations

    Directory of Open Access Journals (Sweden)

    L. Yu. Barash

    2012-01-01

    Full Text Available Modern methods and libraries for high quality pseudorandom number generation and for generation of parallel random number streams for Monte Carlo simulations are considered. The probability equidistribution property and the parameters when the property holds at dimensions up to logarithm of mesh size are considered for Multiple Recursive Generators.

  17. Testing, Selection, and Implementation of Random Number Generators

    National Research Council Canada - National Science Library

    Collins, Joseph C

    2008-01-01

    An exhaustive evaluation of state-of-the-art random number generators with several well-known suites of tests provides the basis for selection of suitable random number generators for use in stochastic simulations...

  18. Graphical analysis of some pseudo-random number generators

    OpenAIRE

    Lewis, Peter A. W.

    1986-01-01

    There exist today many 'good' pseudo-random number generators; the problem is to retrieve them. This document discusses three commonly used pseudo- random number generators, the first being RANDU, a notoriously bad generator, but one which is still occasionally used. The next is the widely used prime modulus, multiplicative congruential generator used in LL-RANDOMII, the Naval Postgraduate School random number package, and the last is the random number generator provided for microcomputers wi...

  19. A Method of Erasing Data Using Random Number Generators

    OpenAIRE

    井上,正人

    2012-01-01

    Erasing data is an indispensable step for disposal of computers or external storage media. Except physical destruction, erasing data means writing random information on entire disk drives or media. We propose a method which erases data safely using random number generators. These random number generators create true random numbers based on quantum processes.

  20. Application of quasi-random numbers for simulation

    International Nuclear Information System (INIS)

    Kazachenko, O.N.; Takhtamyshev, G.G.

    1985-01-01

    Application of the Monte-Carlo method for multidimensional integration is discussed. The main goal is to check the statement that the application of quasi-random numbers instead of regular pseudo-random numbers provides more rapid convergency. The Sobol, Richtmayer and Halton algorithms of quasi-random sequences are described. Over 50 tests to compare these quasi-random numbers as well as pseudo-random numbers were fulfilled. In all cases quasi-random numbers have clearly demonstrated a more rapid convergency as compared with pseudo-random ones. Positive test results on quasi-random trend in Monte-Carlo method seem very promising

  1. Extracting random numbers from quantum tunnelling through a single diode.

    Science.gov (United States)

    Bernardo-Gavito, Ramón; Bagci, Ibrahim Ethem; Roberts, Jonathan; Sexton, James; Astbury, Benjamin; Shokeir, Hamzah; McGrath, Thomas; Noori, Yasir J; Woodhead, Christopher S; Missous, Mohamed; Roedig, Utz; Young, Robert J

    2017-12-19

    Random number generation is crucial in many aspects of everyday life, as online security and privacy depend ultimately on the quality of random numbers. Many current implementations are based on pseudo-random number generators, but information security requires true random numbers for sensitive applications like key generation in banking, defence or even social media. True random number generators are systems whose outputs cannot be determined, even if their internal structure and response history are known. Sources of quantum noise are thus ideal for this application due to their intrinsic uncertainty. In this work, we propose using resonant tunnelling diodes as practical true random number generators based on a quantum mechanical effect. The output of the proposed devices can be directly used as a random stream of bits or can be further distilled using randomness extraction algorithms, depending on the application.

  2. An integrable low-cost hardware random number generator

    Science.gov (United States)

    Ranasinghe, Damith C.; Lim, Daihyun; Devadas, Srinivas; Jamali, Behnam; Zhu, Zheng; Cole, Peter H.

    2005-02-01

    A hardware random number generator is different from a pseudo-random number generator; a pseudo-random number generator approximates the assumed behavior of a real hardware random number generator. Simple pseudo random number generators suffices for most applications, however for demanding situations such as the generation of cryptographic keys, requires an efficient and a cost effective source of random numbers. Arbiter-based Physical Unclonable Functions (PUFs) proposed for physical authentication of ICs exploits statistical delay variation of wires and transistors across integrated circuits, as a result of process variations, to build a secret key unique to each IC. Experimental results and theoretical studies show that a sufficient amount of variation exits across IC"s. This variation enables each IC to be identified securely. It is possible to exploit the unreliability of these PUF responses to build a physical random number generator. There exists measurement noise, which comes from the instability of an arbiter when it is in a racing condition. There exist challenges whose responses are unpredictable. Without environmental variations, the responses of these challenges are random in repeated measurements. Compared to other physical random number generators, the PUF-based random number generators can be a compact and a low-power solution since the generator need only be turned on when required. A 64-stage PUF circuit costs less than 1000 gates and the circuit can be implemented using a standard IC manufacturing processes. In this paper we have presented a fast and an efficient random number generator, and analysed the quality of random numbers produced using an array of tests used by the National Institute of Standards and Technology to evaluate the randomness of random number generators designed for cryptographic applications.

  3. Evidence of significant bias in an elementary random number generator

    International Nuclear Information System (INIS)

    Borgwaldt, H.; Brandl, V.

    1981-03-01

    An elementary pseudo random number generator for isotropically distributed unit vectors in 3-dimensional space has ben tested for bias. This generator uses the IBM-suplied routine RANDU and a transparent rejection technique. The tests show clearly that non-randomness in the pseudo random numbers generated by the primary IBM generator leads to bias in the order of 1 percent in estimates obtained from the secondary random number generator. FORTRAN listings of 4 variants of the random number generator called by a simple test programme and output listings are included for direct reference. (orig.) [de

  4. Program pseudo-random number generator for microcomputers

    International Nuclear Information System (INIS)

    Ososkov, G.A.

    1980-01-01

    Program pseudo-random number generators (PNG) intended for the test of control equipment and communication channels are considered. In the case of 8-bit microcomputers it is necessary to assign 4 words of storage to allocate one random number. The proposed economical algorithms of the random number generation are based on the idea of the ''mixing'' of such quarters of the preceeding random number to obtain the next one. Test results of the PNG are displayed for two such generators. A FORTRAN variant of the PNG is presented along with a program realizing the PNG made on the base of the INTEL-8080 autocode

  5. Pseudo-Random Number Generator Based on Coupled Map Lattices

    Science.gov (United States)

    Lü, Huaping; Wang, Shihong; Hu, Gang

    A one-way coupled chaotic map lattice is used for generating pseudo-random numbers. It is shown that with suitable cooperative applications of both chaotic and conventional approaches, the output of the spatiotemporally chaotic system can easily meet the practical requirements of random numbers, i.e., excellent random statistical properties, long periodicity of computer realizations, and fast speed of random number generations. This pseudo-random number generator system can be used as ideal synchronous and self-synchronizing stream cipher systems for secure communications.

  6. Solution-Processed Carbon Nanotube True Random Number Generator.

    Science.gov (United States)

    Gaviria Rojas, William A; McMorrow, Julian J; Geier, Michael L; Tang, Qianying; Kim, Chris H; Marks, Tobin J; Hersam, Mark C

    2017-08-09

    With the growing adoption of interconnected electronic devices in consumer and industrial applications, there is an increasing demand for robust security protocols when transmitting and receiving sensitive data. Toward this end, hardware true random number generators (TRNGs), commonly used to create encryption keys, offer significant advantages over software pseudorandom number generators. However, the vast network of devices and sensors envisioned for the "Internet of Things" will require small, low-cost, and mechanically flexible TRNGs with low computational complexity. These rigorous constraints position solution-processed semiconducting single-walled carbon nanotubes (SWCNTs) as leading candidates for next-generation security devices. Here, we demonstrate the first TRNG using static random access memory (SRAM) cells based on solution-processed SWCNTs that digitize thermal noise to generate random bits. This bit generation strategy can be readily implemented in hardware with minimal transistor and computational overhead, resulting in an output stream that passes standardized statistical tests for randomness. By using solution-processed semiconducting SWCNTs in a low-power, complementary architecture to achieve TRNG, we demonstrate a promising approach for improving the security of printable and flexible electronics.

  7. Towards a high-speed quantum random number generator

    Science.gov (United States)

    Stucki, Damien; Burri, Samuel; Charbon, Edoardo; Chunnilall, Christopher; Meneghetti, Alessio; Regazzoni, Francesco

    2013-10-01

    Randomness is of fundamental importance in various fields, such as cryptography, numerical simulations, or the gaming industry. Quantum physics, which is fundamentally probabilistic, is the best option for a physical random number generator. In this article, we will present the work carried out in various projects in the context of the development of a commercial and certified high speed random number generator.

  8. Microcomputer-Assisted Discoveries: Generate Your Own Random Numbers.

    Science.gov (United States)

    Kimberling, Clark

    1984-01-01

    Having students try to generate their own random numbers can lead to much discovery learning as one tries to create 'patternlessness' from formulas. Developing an equidistribution test and runs test, plus other ideas for generating random numbers, is discussed, with computer programs given. (MNS)

  9. Comparison of two protocols for maxillary protraction: bone anchors versus face mask with rapid maxillary expansion

    Science.gov (United States)

    Cevidanes, Lucia; Baccetti, Tiziano; Franchi, Lorenzo; McNamara, James A.; De Clerck, Hugo

    2010-01-01

    Objective To test the hypothesis that there is no difference in the active treatment effects for maxillary advancement induced by bone-anchored maxillary protraction (BAMP) and the active treatment effects for face mask in association with rapid maxillary expansion (RME/FM). Materials and Methods This is a study on consecutively treated patients. The changes in dentoskeletal cephalometric variables from start of treatment (T1) to end of active treatment (T2) with an average T1–T2 interval of about 1 year were contrasted in a BAMP sample of 21 subjects with a RME/FM sample of 34 patients. All subjects were prepubertal at T1. Statistical comparison was performed with t-tests for independent samples. Results The BAMP protocol produced significantly larger maxillary advancement than the RME/FM therapy (with a difference of 2 mm to 3 mm). Mandibular sagittal changes were similar, while vertical changes were better controlled with BAMP. The sagittal intermaxillary relationships improved 2.5 mm more in the BAMP patients. Additional favorable outcomes of BAMP treatment were the lack of clockwise rotation of the mandible as well as a lack of retroclination of the lower incisors. Conclusions The hypothesis is rejected. The BAMP protocol produced significantly larger maxillary advancement than the RME/FM therapy. PMID:20578848

  10. Self-Powered Random Number Generator Based on Coupled Triboelectric and Electrostatic Induction Effects at the Liquid-Dielectric Interface.

    Science.gov (United States)

    Yu, Aifang; Chen, Xiangyu; Cui, Haotian; Chen, Libo; Luo, Jianjun; Tang, Wei; Peng, Mingzeng; Zhang, Yang; Zhai, Junyi; Wang, Zhong Lin

    2016-12-27

    Modern cryptography increasingly employs random numbers generated from physical sources in lieu of conventional software-based pseudorandom numbers, primarily owing to the great demand of unpredictable, indecipherable cryptographic keys from true random numbers for information security. Thus, far, the sole demonstration of true random numbers has been generated through thermal noise and/or quantum effects, which suffers from expensive and complex equipment. In this paper, we demonstrate a method for self-powered creation of true random numbers by using triboelectric technology to collect random signals from nature. This random number generator based on coupled triboelectric and electrostatic induction effects at the liquid-dielectric interface includes an elaborately designed triboelectric generator (TENG) with an irregular grating structure, an electronic-optical device, and an optical-electronic device. The random characteristics of raindrops are harvested through TENG and consequently transformed and converted by electronic-optical device and an optical-electronic device with a nonlinear characteristic. The cooperation of the mechanical, electrical, and optical signals ensures that the generator possesses complex nonlinear input-output behavior and contributes to increased randomness. The random number sequences are deduced from final electrical signals received by an optical-electronic device using a familiar algorithm. These obtained random number sequences exhibit good statistical characteristics, unpredictability, and unrepeatability. Our study supplies a simple, practical, and effective method to generate true random numbers, which can be widely used in cryptographic protocols, digital signatures, authentication, identification, and other information security fields.

  11. A hybrid-type quantum random number generator

    Science.gov (United States)

    Hai-Qiang, Ma; Wu, Zhu; Ke-Jin, Wei; Rui-Xue, Li; Hong-Wei, Liu

    2016-05-01

    This paper proposes a well-performing hybrid-type truly quantum random number generator based on the time interval between two independent single-photon detection signals, which is practical and intuitive, and generates the initial random number sources from a combination of multiple existing random number sources. A time-to-amplitude converter and multichannel analyzer are used for qualitative analysis to demonstrate that each and every step is random. Furthermore, a carefully designed data acquisition system is used to obtain a high-quality random sequence. Our scheme is simple and proves that the random number bit rate can be dramatically increased to satisfy practical requirements. Project supported by the National Natural Science Foundation of China (Grant Nos. 61178010 and 11374042), the Fund of State Key Laboratory of Information Photonics and Optical Communications (Beijing University of Posts and Telecommunications), China, and the Fundamental Research Funds for the Central Universities of China (Grant No. bupt2014TS01).

  12. A pseudo-random number generator and its spectral test

    International Nuclear Information System (INIS)

    Wang Lai

    1998-01-01

    The author introduces a pseudo-random number generator and describes its algorithm and C language implementation. The performance of the generator is tested and compared with some well known LCG generators

  13. Hardware implementation of a GFSR pseudo-random number generator

    Science.gov (United States)

    Aiello, G. R.; Budinich, M.; Milotti, E.

    1989-12-01

    We describe the hardware implementation of a pseudo-random number generator of the "Generalized Feedback Shift Register" (GFSR) type. After brief theoretical considerations we describe two versions of the hardware, the tests done and the performances achieved.

  14. Random number generation based on digital differential chaos

    KAUST Repository

    Zidan, Mohammed A.; Radwan, Ahmed G.; Salama, Khaled N.

    2012-01-01

    In this paper, we present a fully digital differential chaos based random number generator. The output of the digital circuit is proved to be chaotic by calculating the output time series maximum Lyapunov exponent. We introduce a new post processing

  15. Correlations of pseudo-random numbers of multiplicative sequence

    International Nuclear Information System (INIS)

    Bukin, A.D.

    1989-01-01

    An algorithm is suggested for searching with a computer in unit n-dimensional cube the sets of planes where all the points fall whose coordinates are composed of n successive pseudo-random numbers of multiplicative sequence. This effect should be taken into account in Monte-Carlo calculations with definite constructive dimension. The parameters of these planes are obtained for three random number generators. 2 refs.; 2 tabs

  16. A Repetition Test for Pseudo-Random Number Generators

    OpenAIRE

    Gil, Manuel; Gonnet, Gaston H.; Petersen, Wesley P.

    2017-01-01

    A new statistical test for uniform pseudo-random number generators (PRNGs) is presented. The idea is that a sequence of pseudo-random numbers should have numbers reappear with a certain probability. The expectation time that a repetition occurs provides the metric for the test. For linear congruential generators (LCGs) failure can be shown theoretically. Empirical test results for a number of commonly used PRNGs are reported, showing that some PRNGs considered to have good statistical propert...

  17. Analysis of random number generators in abnormal usage conditions

    International Nuclear Information System (INIS)

    Soucarros, M.

    2012-01-01

    Random numbers have been used through the ages for games of chance, more recently for secret codes and today they are necessary to the execution of computer programs. Random number generators have now evolved from simple dices to electronic circuits and algorithms. Accordingly, the ability to distinguish between random and non-random numbers has become more difficult. Furthermore, whereas in the past dices were loaded in order to increase winning chances, it is now possible to influence the outcome of random number generators. In consequence, this subject is still very much an issue and has recently made the headlines. Indeed, there was talks about the PS3 game console which generates constant random numbers and redundant distribution of secret keys on the internet. This thesis presents a study of several generators as well as different means to perturb them. It shows the inherent defects of their conceptions and possible consequences of their failure when they are embedded inside security components. Moreover, this work highlights problems yet to be solved concerning the testing of random numbers and the post-processing eliminating bias in these numbers distribution. (author) [fr

  18. Recoverable Random Numbers in an Internet of Things Operating System

    Directory of Open Access Journals (Sweden)

    Taeill Yoo

    2017-03-01

    Full Text Available Over the past decade, several security issues with Linux Random Number Generator (LRNG on PCs and Androids have emerged. The main problem involves the process of entropy harvesting, particularly at boot time. An entropy source in the input pool of LRNG is not transferred into the non-blocking output pool if the entropy counter of the input pool is less than 192 bits out of 4098 bits. Because the entropy estimation of LRNG is highly conservative, the process may require more than one minute for starting the transfer. Furthermore, the design principle of the estimation algorithm is not only heuristic but also unclear. Recently, Google released an Internet of Things (IoT operating system called Brillo based on the Linux kernel. We analyze the behavior of the random number generator in Brillo, which inherits that of LRNG. In the results, we identify two features that enable recovery of random numbers. With these features, we demonstrate that random numbers of 700 bytes at boot time can be recovered with the success probability of 90% by using time complexity for 5.20 × 2 40 trials. Therefore, the entropy of random numbers of 700 bytes is merely about 43 bits. Since the initial random numbers are supposed to be used for sensitive security parameters, such as stack canary and key derivation, our observation can be applied to practical attacks against cryptosystem.

  19. RANDOMNUMBERS, Random Number Sequence Generated from Gas Ionisation Chamber Data

    International Nuclear Information System (INIS)

    Frigerio, N.A.; Sanathanan, L.P.; Morley, M.; Tyler, S.A.; Clark, N.A.; Wang, J.

    1989-01-01

    1 - Description of problem or function: RANDOM NUMBERS is a data collection of almost 2.7 million 31-bit random numbers generated by using a high resolution gas ionization detector chamber in conjunction with a 4096-channel multichannel analyzer to record the radioactive decay of alpha particles from a U-235 source. The signals from the decaying alpha particles were fed to the 4096-channel analyzer, and for each channel the frequency of signals registered in a 20,000-microsecond interval was recorded. The parity bits of these frequency counts, 0 for an even count and 1 for and odd count, were then assembled in sequence to form 31-bit random numbers and transcribed onto magnetic tape. This cycle was repeated to obtain the random numbers. 2 - Method of solution: The frequency distribution of counts from the device conforms to the Brockwell-Moyal distribution which takes into account the dead time of the counter. The count data were analyzed and tests for randomness on a sample indicate that the device is a highly reliable source of truly random numbers. 3 - Restrictions on the complexity of the problem: The RANDOM NUMBERS tape contains 2,669,568 31-bit numbers

  20. Quantum random number generation for loophole-free Bell tests

    Science.gov (United States)

    Mitchell, Morgan; Abellan, Carlos; Amaya, Waldimar

    2015-05-01

    We describe the generation of quantum random numbers at multi-Gbps rates, combined with real-time randomness extraction, to give very high purity random numbers based on quantum events at most tens of ns in the past. The system satisfies the stringent requirements of quantum non-locality tests that aim to close the timing loophole. We describe the generation mechanism using spontaneous-emission-driven phase diffusion in a semiconductor laser, digitization, and extraction by parity calculation using multi-GHz logic chips. We pay special attention to experimental proof of the quality of the random numbers and analysis of the randomness extraction. In contrast to widely-used models of randomness generators in the computer science literature, we argue that randomness generation by spontaneous emission can be extracted from a single source.

  1. Pseudo-random number generator for the Sigma 5 computer

    Science.gov (United States)

    Carroll, S. N.

    1983-01-01

    A technique is presented for developing a pseudo-random number generator based on the linear congruential form. The two numbers used for the generator are a prime number and a corresponding primitive root, where the prime is the largest prime number that can be accurately represented on a particular computer. The primitive root is selected by applying Marsaglia's lattice test. The technique presented was applied to write a random number program for the Sigma 5 computer. The new program, named S:RANDOM1, is judged to be superior to the older program named S:RANDOM. For applications requiring several independent random number generators, a table is included showing several acceptable primitive roots. The technique and programs described can be applied to any computer having word length different from that of the Sigma 5.

  2. The RANDOM computer program: A linear congruential random number generator

    Science.gov (United States)

    Miles, R. F., Jr.

    1986-01-01

    The RANDOM Computer Program is a FORTRAN program for generating random number sequences and testing linear congruential random number generators (LCGs). The linear congruential form of random number generator is discussed, and the selection of parameters of an LCG for a microcomputer described. This document describes the following: (1) The RANDOM Computer Program; (2) RANDOM.MOD, the computer code needed to implement an LCG in a FORTRAN program; and (3) The RANCYCLE and the ARITH Computer Programs that provide computational assistance in the selection of parameters for an LCG. The RANDOM, RANCYCLE, and ARITH Computer Programs are written in Microsoft FORTRAN for the IBM PC microcomputer and its compatibles. With only minor modifications, the RANDOM Computer Program and its LCG can be run on most micromputers or mainframe computers.

  3. Parallel random number generator for inexpensive configurable hardware cells

    Science.gov (United States)

    Ackermann, J.; Tangen, U.; Bödekker, B.; Breyer, J.; Stoll, E.; McCaskill, J. S.

    2001-11-01

    A new random number generator ( RNG) adapted to parallel processors has been created. This RNG can be implemented with inexpensive hardware cells. The correlation between neighboring cells is suppressed with smart connections. With such connection structures, sequences of pseudo-random numbers are produced. Numerical tests including a self-avoiding random walk test and the simulation of the order parameter and energy of the 2D Ising model give no evidence for correlation in the pseudo-random sequences. Because the new random number generator has suppressed the correlation between neighboring cells which is usually observed in cellular automaton implementations, it is applicable for extended time simulations. It gives an immense speed-up factor if implemented directly in configurable hardware, and has recently been used for long time simulations of spatially resolved molecular evolution.

  4. A fast random number generator for the Intel Paragon supercomputer

    Science.gov (United States)

    Gutbrod, F.

    1995-06-01

    A pseudo-random number generator is presented which makes optimal use of the architecture of the i860-microprocessor and which is expected to have a very long period. It is therefore a good candidate for use on the parallel supercomputer Paragon XP. In the assembler version, it needs 6.4 cycles for a real∗4 random number. There is a FORTRAN routine which yields identical numbers up to rare and minor rounding discrepancies, and it needs 28 cycles. The FORTRAN performance on other microprocessors is somewhat better. Arguments for the quality of the generator and some numerical tests are given.

  5. Accelerating Pseudo-Random Number Generator for MCNP on GPU

    Science.gov (United States)

    Gong, Chunye; Liu, Jie; Chi, Lihua; Hu, Qingfeng; Deng, Li; Gong, Zhenghu

    2010-09-01

    Pseudo-random number generators (PRNG) are intensively used in many stochastic algorithms in particle simulations, artificial neural networks and other scientific computation. The PRNG in Monte Carlo N-Particle Transport Code (MCNP) requires long period, high quality, flexible jump and fast enough. In this paper, we implement such a PRNG for MCNP on NVIDIA's GTX200 Graphics Processor Units (GPU) using CUDA programming model. Results shows that 3.80 to 8.10 times speedup are achieved compared with 4 to 6 cores CPUs and more than 679.18 million double precision random numbers can be generated per second on GPU.

  6. New Trends in Pseudo-Random Number Generation

    Science.gov (United States)

    Gutbrod, F.

    Properties of pseudo-random number generators are reviewed. The emphasis is on correlations between successive random numbers and their suppression by improvement steps. The generators under discussion are the linear congruential generators, lagged Fibonacci generators with various operations, and the improvement techniques combination, shuffling and decimation. The properties of the RANSHI generator are reviewed somewhat more extensively. The transition to 64-bit technology is discussed in several cases. The generators are subject to several tests, which look both for short range and for long range correlations. Some performance figures are given for a Pentium Pro PC. Recommendations are presented in the final chapter.

  7. The intermittency of vector fields and random-number generators

    Science.gov (United States)

    Kalinin, A. O.; Sokoloff, D. D.; Tutubalin, V. N.

    2017-09-01

    We examine how well natural random-number generators can reproduce the intermittency phenomena that arise in the transfer of vector fields in random media. A generator based on the analysis of financial indices is suggested as the most promising random-number generator. Is it shown that even this generator, however, fails to reproduce the phenomenon long enough to confidently detect intermittency, while the C++ generator successfully solves this problem. We discuss the prospects of using shell models of turbulence as the desired generator.

  8. GASPRNG: GPU accelerated scalable parallel random number generator library

    Science.gov (United States)

    Gao, Shuang; Peterson, Gregory D.

    2013-04-01

    Graphics processors represent a promising technology for accelerating computational science applications. Many computational science applications require fast and scalable random number generation with good statistical properties, so they use the Scalable Parallel Random Number Generators library (SPRNG). We present the GPU Accelerated SPRNG library (GASPRNG) to accelerate SPRNG in GPU-based high performance computing systems. GASPRNG includes code for a host CPU and CUDA code for execution on NVIDIA graphics processing units (GPUs) along with a programming interface to support various usage models for pseudorandom numbers and computational science applications executing on the CPU, GPU, or both. This paper describes the implementation approach used to produce high performance and also describes how to use the programming interface. The programming interface allows a user to be able to use GASPRNG the same way as SPRNG on traditional serial or parallel computers as well as to develop tightly coupled programs executing primarily on the GPU. We also describe how to install GASPRNG and use it. To help illustrate linking with GASPRNG, various demonstration codes are included for the different usage models. GASPRNG on a single GPU shows up to 280x speedup over SPRNG on a single CPU core and is able to scale for larger systems in the same manner as SPRNG. Because GASPRNG generates identical streams of pseudorandom numbers as SPRNG, users can be confident about the quality of GASPRNG for scalable computational science applications. Catalogue identifier: AEOI_v1_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEOI_v1_0.html Program obtainable from: CPC Program Library, Queen’s University, Belfast, N. Ireland Licensing provisions: UTK license. No. of lines in distributed program, including test data, etc.: 167900 No. of bytes in distributed program, including test data, etc.: 1422058 Distribution format: tar.gz Programming language: C and CUDA. Computer: Any PC or

  9. Clinical grade purification and expansion of NK cell products for an optimized manufacturing protocol

    Directory of Open Access Journals (Sweden)

    Ulrike eKoehl

    2013-05-01

    Full Text Available Allogeneic Natural Killer (NK cells are used for adoptive immunotherapy after stem cell transplantation. In order to overcome technical limitations in NK cell purification and activation, the following study investigates the impact of different variables on NK cell recovery, cytotoxicity and T cell depletion during GMP-grade NK cell selection. 40 NK cell products were derived from 54 unstimulated donor leukaphereses using immunomagnetic CD3 T-cell depletion, followed by a CD56 cell enrichment step. For T cell depletion, either the depletion 2.1 program in single or double procedure (D2.1 1depl, n=18; D2.1 2depl, n=13 or the faster depletion 3.1 (D3.1, n=9 was used on the CliniMACS instrument. 17 purified NK cell products were activated in vitro by IL-2 for 12 days. The whole process resulted in a median number of 7.59x10e8 CD56+CD3- cells with both purity and viability of 94%, respectively. The T-cell depletion was significantly better using D2.1 1depl/2depl compared to D3.1 (log 4.6/log 4.9 vs. log 3.7; p<0.01 and double procedure in two stages led always to residual T cells below 0.1%. In contrast D3.1 was superior to D2.1 1depl/2depl with regard to recovery of CD56+CD3- NK cells (68% vs 41%/38%. Concomitant monocytes and especially IL-2 activation led to increased NK cell activity against malignant target cells compared to unstimulated NK cells, which correlated with both up-regulation of natural cytotoxicity receptors and intracellular signaling. Overall, wide variations in the NK cell expansion rate and the distribution of NK cell subpopulations were found. In conclusion, our results indicate that GMP-grade purification of NK cells might be improved by a sequential processing of T cell depletion program D2.1 and D3.1. In addition NK cell expansion protocols need to be further optimized.

  10. Study on random number generator in Monte Carlo code

    International Nuclear Information System (INIS)

    Oya, Kentaro; Kitada, Takanori; Tanaka, Shinichi

    2011-01-01

    The Monte Carlo code uses a sequence of pseudo-random numbers with a random number generator (RNG) to simulate particle histories. A pseudo-random number has its own period depending on its generation method and the period is desired to be long enough not to exceed the period during one Monte Carlo calculation to ensure the correctness especially for a standard deviation of results. The linear congruential generator (LCG) is widely used as Monte Carlo RNG and the period of LCG is not so long by considering the increasing rate of simulation histories in a Monte Carlo calculation according to the remarkable enhancement of computer performance. Recently, many kinds of RNG have been developed and some of their features are better than those of LCG. In this study, we investigate the appropriate RNG in a Monte Carlo code as an alternative to LCG especially for the case of enormous histories. It is found that xorshift has desirable features compared with LCG, and xorshift has a larger period, a comparable speed to generate random numbers, a better randomness, and good applicability to parallel calculation. (author)

  11. Experimentally Generated Random Numbers Certified by the Impossibility of Superluminal Signaling

    Science.gov (United States)

    Bierhorst, Peter; Shalm, Lynden K.; Mink, Alan; Jordan, Stephen; Liu, Yi-Kai; Rommal, Andrea; Glancy, Scott; Christensen, Bradley; Nam, Sae Woo; Knill, Emanuel

    Random numbers are an important resource for applications such as numerical simulation and secure communication. However, it is difficult to certify whether a physical random number generator is truly unpredictable. Here, we exploit the phenomenon of quantum nonlocality in a loophole-free photonic Bell test experiment to obtain data containing randomness that cannot be predicted by any theory that does not also allow the sending of signals faster than the speed of light. To certify and quantify the randomness, we develop a new protocol that performs well in an experimental regime characterized by low violation of Bell inequalities. Applying an extractor function to our data, we obtain 256 new random bits, uniform to within 10- 3 .

  12. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  13. Human platelet lysate in mesenchymal stromal cell expansion according to a GMP grade protocol: a cell factory experience.

    Science.gov (United States)

    Becherucci, Valentina; Piccini, Luisa; Casamassima, Serena; Bisin, Silvia; Gori, Valentina; Gentile, Francesca; Ceccantini, Riccardo; De Rienzo, Elena; Bindi, Barbara; Pavan, Paola; Cunial, Vanessa; Allegro, Elisa; Ermini, Stefano; Brugnolo, Francesca; Astori, Giuseppe; Bambi, Franco

    2018-05-02

    The use of platelet lysate (PL) for the ex-vivo expansion of mesenchymal stromal/stem cells (MSCs) was initially proposed by Doucet et al. in 2005, as an alternative to animal serum. Moreover, regulatory authorities discourage the use of fetal bovine serum (FBS) or other animal derivatives, to avoid risk of zoonoses and xenogeneic immune reactions. Even if many studies investigated PL composition, there still are some open issues related to its use in ex-vivo MSC expansion, especially according to good manufacturing practice (GMP) grade protocols. As an authorized cell factory, we report our experience using standardized PL produced by Azienda Ospedaliero Universitaria Meyer Transfusion Service for MSC expansion according to a GMP grade clinical protocol. As suggested by other authors, we performed an in-vitro test on MSCs versus MSCs cultured with FBS that still represents the best way to test PL batches. We compared 12 MSC batches cultured with DMEM 5% PL with similar batches cultured with DMEM 10% FBS, focusing on the MSC proliferation rate, MSC surface marker expression, MSC immunomodulatory and differentiation potential, and finally MSC relative telomere length. Results confirmed the literature data as PL increases cell proliferation without affecting the MSC immunophenotype, immunomodulatory potential, differentiation potential and relative telomere length. PL can be considered a safe alternative to FBS for ex-vivo expansion of MSC according to a GMP grade protocol. Our experience confirms the literature data: a large number of MSCs for clinical applications can be obtained by expansion with PL, without affecting the MSC main features. Our experience underlines the benefits of a close collaboration between the PL producers (transfusion service) and the end users (cell factory) in a synergy of skills and experiences that can lead to standardized PL production.

  14. Generating random numbers by means of nonlinear dynamic systems

    Science.gov (United States)

    Zang, Jiaqi; Hu, Haojie; Zhong, Juhua; Luo, Duanbin; Fang, Yi

    2018-07-01

    To introduce the randomness of a physical process to students, a chaotic pendulum experiment was opened in East China University of Science and Technology (ECUST) on the undergraduate level in the physics department. It was shown chaotic motion could be initiated through adjusting the operation of a chaotic pendulum. By using the data of the angular displacements of chaotic motion, random binary numerical arrays can be generated. To check the randomness of generated numerical arrays, the NIST Special Publication 800-20 method was adopted. As a result, it was found that all the random arrays which were generated by the chaotic motion could pass the validity criteria and some of them were even better than the quality of pseudo-random numbers generated by a computer. Through the experiments, it is demonstrated that chaotic pendulum can be used as an efficient mechanical facility in generating random numbers, and can be applied in teaching random motion to the students.

  15. Chaos-based Pseudo-random Number Generation

    KAUST Repository

    Barakat, Mohamed L.

    2014-04-10

    Various methods and systems related to chaos-based pseudo-random number generation are presented. In one example, among others, a system includes a pseudo-random number generator (PRNG) to generate a series of digital outputs and a nonlinear post processing circuit to perform an exclusive OR (XOR) operation on a first portion of a current digital output of the PRNG and a permutated version of a corresponding first portion of a previous post processed output to generate a corresponding first portion of a current post processed output. In another example, a method includes receiving at least a first portion of a current output from a PRNG and performing an XOR operation on the first portion of the current PRNG output with a permutated version of a corresponding first portion of a previous post processed output to generate a corresponding first portion of a current post processed output.

  16. Chaos-based Pseudo-random Number Generation

    KAUST Repository

    Barakat, Mohamed L.; Mansingka, Abhinav S.; Radwan, Ahmed Gomaa Ahmed; Salama, Khaled N.

    2014-01-01

    Various methods and systems related to chaos-based pseudo-random number generation are presented. In one example, among others, a system includes a pseudo-random number generator (PRNG) to generate a series of digital outputs and a nonlinear post processing circuit to perform an exclusive OR (XOR) operation on a first portion of a current digital output of the PRNG and a permutated version of a corresponding first portion of a previous post processed output to generate a corresponding first portion of a current post processed output. In another example, a method includes receiving at least a first portion of a current output from a PRNG and performing an XOR operation on the first portion of the current PRNG output with a permutated version of a corresponding first portion of a previous post processed output to generate a corresponding first portion of a current post processed output.

  17. Monte Carlo learning/biasing experiment with intelligent random numbers

    International Nuclear Information System (INIS)

    Booth, T.E.

    1985-01-01

    A Monte Carlo learning and biasing technique is described that does its learning and biasing in the random number space rather than the physical phase-space. The technique is probably applicable to all linear Monte Carlo problems, but no proof is provided here. Instead, the technique is illustrated with a simple Monte Carlo transport problem. Problems encountered, problems solved, and speculations about future progress are discussed. 12 refs

  18. On the Periods of the {ranshi} Random Number Generator

    Science.gov (United States)

    Gutbrod, F.

    The stochastic properties of the pseudo-random number generator {ranshi} are discussed, with emphasis on the average period. Within a factor 2 this turns out to be the root of the maximally possible period. The actual set of periods depends on minor details of the algorithm, and the system settles down in one of only a few different cycles. These features are in perfect agreement with absolute random motion in phase space, to the extent allowed by deterministic dynamics.

  19. Note on Marsaglia\\'s Xorshift Random Number Generators

    Directory of Open Access Journals (Sweden)

    Richard P. Brent

    2004-08-01

    Full Text Available Marsaglia (2003 has described a class of Xorshift random number generators (RNGs with periods 2n - 1 for n = 32, 64, etc. We show that the sequences generated by these RNGs are identical to the sequences generated by certain linear feedback shift register (LFSR generators using "exclusive or" (xor operations on n-bit words, with a recurrence defined by a primitive polynomial of degree n.

  20. Search for a perfect generator of random numbers

    International Nuclear Information System (INIS)

    Musyck, E.

    1977-01-01

    Theoretical tests have been carried out by COVEYOU and MAC PHERSON to verify the applications of the LEHMER algorithm. In a similar way, a theoretical method is proposed to evaluate in a rigorous way the random character of numbers generated by a shift register. This theory introduces the concept of ''degree of randomness'' of the elements, taken in a definite order, of a shift register. It permits making the judicious choice of the elements of the shift register which will produce the bits of the random numbers. On the other hand, a calculation method is developed in order to verify the primitive character of any shift register of high complexity. A new test, called ''slice test'', of empirical and theoretical use is also described; it constitutes a significant contribution to the understanding of certain properties of pseudo-random sequences. As a practical example, a random number generator structure formed with 32 bits, built out of a shift register with 61 elements and 60 modulo-2 adder circuits was made. The author is convinced that this generator can be considered to be practically perfect for all empirical applications of random numbers, particularly for the solution of Monte-Carlo problems. (author)

  1. DNA-based random number generation in security circuitry.

    Science.gov (United States)

    Gearheart, Christy M; Arazi, Benjamin; Rouchka, Eric C

    2010-06-01

    DNA-based circuit design is an area of research in which traditional silicon-based technologies are replaced by naturally occurring phenomena taken from biochemistry and molecular biology. This research focuses on further developing DNA-based methodologies to mimic digital data manipulation. While exhibiting fundamental principles, this work was done in conjunction with the vision that DNA-based circuitry, when the technology matures, will form the basis for a tamper-proof security module, revolutionizing the meaning and concept of tamper-proofing and possibly preventing it altogether based on accurate scientific observations. A paramount part of such a solution would be self-generation of random numbers. A novel prototype schema employs solid phase synthesis of oligonucleotides for random construction of DNA sequences; temporary storage and retrieval is achieved through plasmid vectors. A discussion of how to evaluate sequence randomness is included, as well as how these techniques are applied to a simulation of the random number generation circuitry. Simulation results show generated sequences successfully pass three selected NIST random number generation tests specified for security applications.

  2. Cellular Automata-Based Parallel Random Number Generators Using FPGAs

    Directory of Open Access Journals (Sweden)

    David H. K. Hoe

    2012-01-01

    Full Text Available Cellular computing represents a new paradigm for implementing high-speed massively parallel machines. Cellular automata (CA, which consist of an array of locally connected processing elements, are a basic form of a cellular-based architecture. The use of field programmable gate arrays (FPGAs for implementing CA accelerators has shown promising results. This paper investigates the design of CA-based pseudo-random number generators (PRNGs using an FPGA platform. To improve the quality of the random numbers that are generated, the basic CA structure is enhanced in two ways. First, the addition of a superrule to each CA cell is considered. The resulting self-programmable CA (SPCA uses the superrule to determine when to make a dynamic rule change in each CA cell. The superrule takes its inputs from neighboring cells and can be considered itself a second CA working in parallel with the main CA. When implemented on an FPGA, the use of lookup tables in each logic cell removes any restrictions on how the super-rules should be defined. Second, a hybrid configuration is formed by combining a CA with a linear feedback shift register (LFSR. This is advantageous for FPGA designs due to the compactness of the LFSR implementations. A standard software package for statistically evaluating the quality of random number sequences known as Diehard is used to validate the results. Both the SPCA and the hybrid CA/LFSR were found to pass all the Diehard tests.

  3. Testing random number generators for Monte Carlo applications

    International Nuclear Information System (INIS)

    Sim, L.H.

    1992-01-01

    Central to any system for modelling radiation transport phenomena using Monte Carlo techniques is the method by which pseudo random numbers are generated. This method is commonly referred to as the Random Number Generator (RNG). It is usually a computer implemented mathematical algorithm which produces a series of numbers uniformly distributed on the interval [0,1]. If this series satisfies certain statistical tests for randomness, then for practical purposes the pseudo random numbers in the series can be considered to be random. Tests of this nature are important not only for new RNGs but also to test the implementation of known RNG algorithms in different computer environments. Six RNGs have been tested using six statistical tests and one visual test. The statistical tests are the moments, frequency (digit and number), serial, gap, and poker tests. The visual test is a simple two dimensional ordered pair display. In addition the RNGs have been tested in a specific Monte Carlo application. This type of test is often overlooked, however it is important that in addition to satisfactory performance in statistical tests, the RNG be able to perform effectively in the applications of interest. The RNGs tested here are based on a variety of algorithms, including multiplicative and linear congruential, lagged Fibonacci, and combination arithmetic and lagged Fibonacci. The effect of the Bays-Durham shuffling algorithm on the output of a known bad RNG has also been investigated. 18 refs., 11 tabs., 4 figs. of

  4. Superparamagnetic perpendicular magnetic tunnel junctions for true random number generators

    Science.gov (United States)

    Parks, Bradley; Bapna, Mukund; Igbokwe, Julianne; Almasi, Hamid; Wang, Weigang; Majetich, Sara A.

    2018-05-01

    Superparamagnetic perpendicular magnetic tunnel junctions are fabricated and analyzed for use in random number generators. Time-resolved resistance measurements are used as streams of bits in statistical tests for randomness. Voltage control of the thermal stability enables tuning the average speed of random bit generation up to 70 kHz in a 60 nm diameter device. In its most efficient operating mode, the device generates random bits at an energy cost of 600 fJ/bit. A narrow range of magnetic field tunes the probability of a given state from 0 to 1, offering a means of probabilistic computing.

  5. Quantum Statistical Testing of a Quantum Random Number Generator

    Energy Technology Data Exchange (ETDEWEB)

    Humble, Travis S [ORNL

    2014-01-01

    The unobservable elements in a quantum technology, e.g., the quantum state, complicate system verification against promised behavior. Using model-based system engineering, we present methods for verifying the opera- tion of a prototypical quantum random number generator. We begin with the algorithmic design of the QRNG followed by the synthesis of its physical design requirements. We next discuss how quantum statistical testing can be used to verify device behavior as well as detect device bias. We conclude by highlighting how system design and verification methods must influence effort to certify future quantum technologies.

  6. Quantum random number generator based on quantum tunneling effect

    OpenAIRE

    Zhou, Haihan; Li, Junlin; Pan, Dong; Zhang, Weixing; Long, Guilu

    2017-01-01

    In this paper, we proposed an experimental implementation of quantum random number generator(QRNG) with inherent randomness of quantum tunneling effect of electrons. We exploited InGaAs/InP diodes, whose valance band and conduction band shared a quasi-constant energy barrier. We applied a bias voltage on the InGaAs/InP avalanche diode, which made the diode works under Geiger mode, and triggered the tunneling events with a periodic pulse. Finally, after data collection and post-processing, our...

  7. Random number generation based on digital differential chaos

    KAUST Repository

    Zidan, Mohammed A.

    2012-07-29

    In this paper, we present a fully digital differential chaos based random number generator. The output of the digital circuit is proved to be chaotic by calculating the output time series maximum Lyapunov exponent. We introduce a new post processing technique to improve the distribution and statistical properties of the generated data. The post-processed output passes the NIST Sp. 800-22 statistical tests. The system is written in Verilog VHDL and realized on Xilinx Virtex® FPGA. The generator can fit into a very small area and have a maximum throughput of 2.1 Gb/s.

  8. Unbiased All-Optical Random-Number Generator

    Science.gov (United States)

    Steinle, Tobias; Greiner, Johannes N.; Wrachtrup, Jörg; Giessen, Harald; Gerhardt, Ilja

    2017-10-01

    The generation of random bits is of enormous importance in modern information science. Cryptographic security is based on random numbers which require a physical process for their generation. This is commonly performed by hardware random-number generators. These often exhibit a number of problems, namely experimental bias, memory in the system, and other technical subtleties, which reduce the reliability in the entropy estimation. Further, the generated outcome has to be postprocessed to "iron out" such spurious effects. Here, we present a purely optical randomness generator, based on the bistable output of an optical parametric oscillator. Detector noise plays no role and postprocessing is reduced to a minimum. Upon entering the bistable regime, initially the resulting output phase depends on vacuum fluctuations. Later, the phase is rigidly locked and can be well determined versus a pulse train, which is derived from the pump laser. This delivers an ambiguity-free output, which is reliably detected and associated with a binary outcome. The resulting random bit stream resembles a perfect coin toss and passes all relevant randomness measures. The random nature of the generated binary outcome is furthermore confirmed by an analysis of resulting conditional entropies.

  9. Pseudo random number generator based on quantum chaotic map

    Science.gov (United States)

    Akhshani, A.; Akhavan, A.; Mobaraki, A.; Lim, S.-C.; Hassan, Z.

    2014-01-01

    For many years dissipative quantum maps were widely used as informative models of quantum chaos. In this paper, a new scheme for generating good pseudo-random numbers (PRNG), based on quantum logistic map is proposed. Note that the PRNG merely relies on the equations used in the quantum chaotic map. The algorithm is not complex, which does not impose high requirement on computer hardware and thus computation speed is fast. In order to face the challenge of using the proposed PRNG in quantum cryptography and other practical applications, the proposed PRNG is subjected to statistical tests using well-known test suites such as NIST, DIEHARD, ENT and TestU01. The results of the statistical tests were promising, as the proposed PRNG successfully passed all these tests. Moreover, the degree of non-periodicity of the chaotic sequences of the quantum map is investigated through the Scale index technique. The obtained result shows that, the sequence is more non-periodic. From these results it can be concluded that, the new scheme can generate a high percentage of usable pseudo-random numbers for simulation and other applications in scientific computing.

  10. Analysis of entropy extraction efficiencies in random number generation systems

    Science.gov (United States)

    Wang, Chao; Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; Han, Zheng-Fu

    2016-05-01

    Random numbers (RNs) have applications in many areas: lottery games, gambling, computer simulation, and, most importantly, cryptography [N. Gisin et al., Rev. Mod. Phys. 74 (2002) 145]. In cryptography theory, the theoretical security of the system calls for high quality RNs. Therefore, developing methods for producing unpredictable RNs with adequate speed is an attractive topic. Early on, despite the lack of theoretical support, pseudo RNs generated by algorithmic methods performed well and satisfied reasonable statistical requirements. However, as implemented, those pseudorandom sequences were completely determined by mathematical formulas and initial seeds, which cannot introduce extra entropy or information. In these cases, “random” bits are generated that are not at all random. Physical random number generators (RNGs), which, in contrast to algorithmic methods, are based on unpredictable physical random phenomena, have attracted considerable research interest. However, the way that we extract random bits from those physical entropy sources has a large influence on the efficiency and performance of the system. In this manuscript, we will review and discuss several randomness extraction schemes that are based on radiation or photon arrival times. We analyze the robustness, post-processing requirements and, in particular, the extraction efficiency of those methods to aid in the construction of efficient, compact and robust physical RNG systems.

  11. Quantifiers for randomness of chaotic pseudo-random number generators.

    Science.gov (United States)

    De Micco, L; Larrondo, H A; Plastino, A; Rosso, O A

    2009-08-28

    We deal with randomness quantifiers and concentrate on their ability to discern the hallmark of chaos in time series used in connection with pseudo-random number generators (PRNGs). Workers in the field are motivated to use chaotic maps for generating PRNGs because of the simplicity of their implementation. Although there exist very efficient general-purpose benchmarks for testing PRNGs, we feel that the analysis provided here sheds additional didactic light on the importance of the main statistical characteristics of a chaotic map, namely (i) its invariant measure and (ii) the mixing constant. This is of help in answering two questions that arise in applications: (i) which is the best PRNG among the available ones? and (ii) if a given PRNG turns out not to be good enough and a randomization procedure must still be applied to it, which is the best applicable randomization procedure? Our answer provides a comparative analysis of several quantifiers advanced in the extant literature.

  12. Primitive polynomials selection method for pseudo-random number generator

    Science.gov (United States)

    Anikin, I. V.; Alnajjar, Kh

    2018-01-01

    In this paper we suggested the method for primitive polynomials selection of special type. This kind of polynomials can be efficiently used as a characteristic polynomials for linear feedback shift registers in pseudo-random number generators. The proposed method consists of two basic steps: finding minimum-cost irreducible polynomials of the desired degree and applying primitivity tests to get the primitive ones. Finally two primitive polynomials, which was found by the proposed method, used in pseudorandom number generator based on fuzzy logic (FRNG) which had been suggested before by the authors. The sequences generated by new version of FRNG have low correlation magnitude, high linear complexity, less power consumption, is more balanced and have better statistical properties.

  13. Ultrafast quantum random number generation based on quantum phase fluctuations.

    Science.gov (United States)

    Xu, Feihu; Qi, Bing; Ma, Xiongfeng; Xu, He; Zheng, Haoxuan; Lo, Hoi-Kwong

    2012-05-21

    A quantum random number generator (QRNG) can generate true randomness by exploiting the fundamental indeterminism of quantum mechanics. Most approaches to QRNG employ single-photon detection technologies and are limited in speed. Here, we experimentally demonstrate an ultrafast QRNG at a rate over 6 Gbits/s based on the quantum phase fluctuations of a laser operating near threshold. Moreover, we consider a potential adversary who has partial knowledge on the raw data and discuss how one can rigorously remove such partial knowledge with postprocessing. We quantify the quantum randomness through min-entropy by modeling our system and employ two randomness extractors--Trevisan's extractor and Toeplitz-hashing--to distill the randomness, which is information-theoretically provable. The simplicity and high-speed of our experimental setup show the feasibility of a robust, low-cost, high-speed QRNG.

  14. An investigation of the uniform random number generator

    Science.gov (United States)

    Temple, E. C.

    1982-01-01

    Most random number generators that are in use today are of the congruential form X(i+1) + AX(i) + C mod M where A, C, and M are nonnegative integers. If C=O, the generator is called the multiplicative type and those for which C/O are called mixed congruential generators. It is easy to see that congruential generators will repeat a sequence of numbers after a maximum of M values have been generated. The number of numbers that a procedure generates before restarting the sequence is called the length or the period of the generator. Generally, it is desirable to make the period as long as possible. A detailed discussion of congruential generators is given. Also, several promising procedures that differ from the multiplicative and mixed procedure are discussed.

  15. Random number generators tested on quantum Monte Carlo simulations.

    Science.gov (United States)

    Hongo, Kenta; Maezono, Ryo; Miura, Kenichi

    2010-08-01

    We have tested and compared several (pseudo) random number generators (RNGs) applied to a practical application, ground state energy calculations of molecules using variational and diffusion Monte Carlo metheds. A new multiple recursive generator with 8th-order recursion (MRG8) and the Mersenne twister generator (MT19937) are tested and compared with the RANLUX generator with five luxury levels (RANLUX-[0-4]). Both MRG8 and MT19937 are proven to give the same total energy as that evaluated with RANLUX-4 (highest luxury level) within the statistical error bars with less computational cost to generate the sequence. We also tested the notorious implementation of linear congruential generator (LCG), RANDU, for comparison. (c) 2010 Wiley Periodicals, Inc.

  16. How random are random numbers generated using photons?

    International Nuclear Information System (INIS)

    Solis, Aldo; Angulo Martínez, Alí M; Ramírez Alarcón, Roberto; Cruz Ramírez, Hector; U’Ren, Alfred B; Hirsch, Jorge G

    2015-01-01

    Randomness is fundamental in quantum theory, with many philosophical and practical implications. In this paper we discuss the concept of algorithmic randomness, which provides a quantitative method to assess the Borel normality of a given sequence of numbers, a necessary condition for it to be considered random. We use Borel normality as a tool to investigate the randomness of ten sequences of bits generated from the differences between detection times of photon pairs generated by spontaneous parametric downconversion. These sequences are shown to fulfil the randomness criteria without difficulties. As deviations from Borel normality for photon-generated random number sequences have been reported in previous work, a strategy to understand these diverging findings is outlined. (paper)

  17. Generative Learning Objects Instantiated with Random Numbers Based Expressions

    Directory of Open Access Journals (Sweden)

    Ciprian Bogdan Chirila

    2015-12-01

    Full Text Available The development of interactive e-learning content requires special skills like programming techniques, web integration, graphic design etc. Generally, online educators do not possess such skills and their e-learning products tend to be static like presentation slides and textbooks. In this paper we propose a new interactive model of generative learning objects as a compromise betweenstatic, dull materials and dynamic, complex software e-learning materials developed by specialized teams. We find that random numbers based automatic initialization learning objects increases content diversity, interactivity thus enabling learners’ engagement. The resulted learning object model is at a limited level of complexity related to special e-learning software, intuitive and capable of increasing learners’ interactivity, engagement and motivation through dynamic content. The approach was applied successfully on several computer programing disciplines.

  18. Statistical evaluation of PACSTAT random number generation capabilities

    Energy Technology Data Exchange (ETDEWEB)

    Piepel, G.F.; Toland, M.R.; Harty, H.; Budden, M.J.; Bartley, C.L.

    1988-05-01

    This report summarizes the work performed in verifying the general purpose Monte Carlo driver-program PACSTAT. The main objective of the work was to verify the performance of PACSTAT's random number generation capabilities. Secondary objectives were to document (using controlled configuration management procedures) changes made in PACSTAT at Pacific Northwest Laboratory, and to assure that PACSTAT input and output files satisfy quality assurance traceability constraints. Upon receipt of the PRIME version of the PACSTAT code from the Basalt Waste Isolation Project, Pacific Northwest Laboratory staff converted the code to run on Digital Equipment Corporation (DEC) VAXs. The modifications to PACSTAT were implemented using the WITNESS configuration management system, with the modifications themselves intended to make the code as portable as possible. Certain modifications were made to make the PACSTAT input and output files conform to quality assurance traceability constraints. 10 refs., 17 figs., 6 tabs.

  19. Fully Digital Chaotic Oscillators Applied to Pseudo Random Number Generation

    KAUST Repository

    Mansingka, Abhinav S.

    2012-05-01

    adapted for pseudo random number generation by truncating statistically defective bits. Finally, a novel post-processing technique using the Fibonacci series is proposed and implemented with a non-autonomous driven hyperchaotic system to provide pseudo random number generators with high nonlinear complexity and controllable period length that enables full utilization of all branches of the chaotic output as statistically secure pseudo random output.

  20. Assessing Community Cancer care after insurance ExpanSionS (ACCESS study protocol

    Directory of Open Access Journals (Sweden)

    H. Angier

    2017-09-01

    Full Text Available Background: Cancer is the second most common cause of mortality in the United States. Cancer screening and prevention services have contributed to improved overall cancer survival rates in the past 40 years. Vulnerable populations (i.e., uninsured, low-income, and racial/ethnic minorities are disproportionately affected by cancer, receive significantly fewer cancer prevention services, poorer healthcare, and subsequently lower survival rates than insured, white, non-Hispanic populations. The Affordable Care Act (ACA aims to provide health insurance to all low-income citizens and legal residents, including an expansion of Medicaid eligibility for those earning ≤138% of federal poverty level. As of 2012, Medicaid was expanded in 32 states and the District of Columbia, while 18 states did not expand, creating a ‘natural experiment’ to assess the impact of Medicaid expansion on cancer prevention and care. Methods: We will use electronic health record data from up to 990 community health centers available up to 24-months before and at least one year after Medicaid expansion. Primary outcomes include health insurance and coverage status, and type of insurance. Additional outcomes include healthcare delivery, number and types of encounters, and receipt of cancer prevention and screening for all patients and preventive care and screening services for cancer survivors. Discussion: Cancer morbidity and mortality is greatly reduced through screening and prevention, but uninsured patients are much less likely than insured patients to receive these services as recommended. This natural policy experiment will provide valuable information about cancer-related healthcare services as the US tackles the distribution of healthcare resources and future health reform. Trial Registration: Clinicaltrails.gov identifier NCT02936609. Keywords: Cancer, Medicaid, Affordable Care Act, Natural experiment, Screening, Preventive services

  1. Brain potentials index executive functions during random number generation.

    Science.gov (United States)

    Joppich, Gregor; Däuper, Jan; Dengler, Reinhard; Johannes, Sönke; Rodriguez-Fornells, Antoni; Münte, Thomas F

    2004-06-01

    The generation of random sequences is considered to tax different executive functions. To explore the involvement of these functions further, brain potentials were recorded in 16 healthy young adults while either engaging in random number generation (RNG) by pressing the number keys on a computer keyboard in a random sequence or in ordered number generation (ONG) necessitating key presses in the canonical order. Key presses were paced by an external auditory stimulus to yield either fast (1 press/800 ms) or slow (1 press/1300 ms) sequences in separate runs. Attentional demands of random and ordered tasks were assessed by the introduction of a secondary task (key-press to a target tone). The P3 amplitude to the target tone of this secondary task was reduced during RNG, reflecting the greater consumption of attentional resources during RNG. Moreover, RNG led to a left frontal negativity peaking 140 ms after the onset of the pacing stimulus, whenever the subjects produced a true random response. This negativity could be attributed to the left dorsolateral prefrontal cortex and was absent when numbers were repeated. This negativity was interpreted as an index for the inhibition of habitual responses. Finally, in response locked ERPs a negative component was apparent peaking about 50 ms after the key-press that was more prominent during RNG. Source localization suggested a medial frontal source. This effect was tentatively interpreted as a reflection of the greater monitoring demands during random sequence generation.

  2. Random number generation as an index of controlled processing.

    Science.gov (United States)

    Jahanshahi, Marjan; Saleem, T; Ho, Aileen K; Dirnberger, Georg; Fuller, R

    2006-07-01

    Random number generation (RNG) is a functionally complex process that is highly controlled and therefore dependent on Baddeley's central executive. This study addresses this issue by investigating whether key predictions from this framework are compatible with empirical data. In Experiment 1, the effect of increasing task demands by increasing the rate of the paced generation was comprehensively examined. As expected, faster rates affected performance negatively because central resources were increasingly depleted. Next, the effects of participants' exposure were manipulated in Experiment 2 by providing increasing amounts of practice on the task. There was no improvement over 10 practice trials, suggesting that the high level of strategic control required by the task was constant and not amenable to any automatization gain with repeated exposure. Together, the results demonstrate that RNG performance is a highly controlled and demanding process sensitive to additional demands on central resources (Experiment 1) and is unaffected by repeated performance or practice (Experiment 2). These features render the easily administered RNG task an ideal and robust index of executive function that is highly suitable for repeated clinical use. ((c) 2006 APA, all rights reserved).

  3. Very high performance pseudo-random number generation on DAP

    Science.gov (United States)

    Smith, K. A.; Reddaway, S. F.; Scott, D. M.

    1985-07-01

    Since the National DAP Service began at QMC in 1980, extensive use has been made of pseudo-random numbers in Monte Carlo simulation. Matrices of uniform numbers have been produced by various generators: (a) multiplicative ( x+ 1 = 13 13xn mod 2 59); (b) very long period shift register ( x4423 + x271 + 1); (c) multiple shorter period ( x127 + x7 + 1) shift registers generating several matrices per iteration. The above uniform generators can also feed a normal distribution generator that uses the Box-Muller transformation. This paper describes briefly the generators, their implementation and speed. Generator (b) has been greatly speeded-up by re-implementation, and now produces more than 100 × 10 6 high quality 16-bit numbers/s. Generator (c) is under development and will achieve even higher performance, mainly due to producing data in greater bulk. High quality numbers are expected, and performance will range from 400 to 800 × 10 6 numbers/s, depending on how the generator is used.

  4. Effects of changing the random number stride in Monte Carlo calculations

    International Nuclear Information System (INIS)

    Hendricks, J.S.

    1991-01-01

    This paper reports on a common practice in Monte Carlo radiation transport codes which is to start each random walk a specified number of steps up the random number sequence from the previous one. This is called the stride in the random number sequence between source particles. It is used for correlated sampling or to provide tree-structured random numbers. A new random number generator algorithm for the major Monte Carlo code MCNP has been written to allow adjustment of the random number stride. This random number generator is machine portable. The effects of varying the stride for several sample problems are examined

  5. A method for generating skewed random numbers using two overlapping uniform distributions

    International Nuclear Information System (INIS)

    Ermak, D.L.; Nasstrom, J.S.

    1995-02-01

    The objective of this work was to implement and evaluate a method for generating skewed random numbers using a combination of uniform random numbers. The method provides a simple and accurate way of generating skewed random numbers from the specified first three moments without an a priori specification of the probability density function. We describe the procedure for generating skewed random numbers from unifon-n random numbers, and show that it accurately produces random numbers with the desired first three moments over a range of skewness values. We also show that in the limit of zero skewness, the distribution of random numbers is an accurate approximation to the Gaussian probability density function. Future work win use this method to provide skewed random numbers for a Langevin equation model for diffusion in skewed turbulence

  6. Using Computer-Generated Random Numbers to Calculate the Lifetime of a Comet.

    Science.gov (United States)

    Danesh, Iraj

    1991-01-01

    An educational technique to calculate the lifetime of a comet using software-generated random numbers is introduced to undergraduate physiques and astronomy students. Discussed are the generation and eligibility of the required random numbers, background literature related to the problem, and the solution to the problem using random numbers.…

  7. Random-Number Generator Validity in Simulation Studies: An Investigation of Normality.

    Science.gov (United States)

    Bang, Jung W.; Schumacker, Randall E.; Schlieve, Paul L.

    1998-01-01

    The normality of number distributions generated by various random-number generators were studied, focusing on when the random-number generator reached a normal distribution and at what sample size. Findings suggest the steps that should be followed when using a random-number generator in a Monte Carlo simulation. (SLD)

  8. Super fast physical-random number generation using laser diode frequency noises

    Science.gov (United States)

    Ushiki, Tetsuro; Doi, Kohei; Maehara, Shinya; Sato, Takashi; Ohkawa, Masashi; Ohdaira, Yasuo

    2011-02-01

    Random numbers can be classified as either pseudo- or physical-random in character. Pseudo-random numbers' periodicity renders them inappropriate for use in cryptographic applications, but naturally-generated physical-random numbers have no calculable periodicity, thereby making them ideally-suited to the task. The laser diode naturally produces a wideband "noise" signal that is believed to have tremendous capacity and great promise, for the rapid generation of physical-random numbers for use in cryptographic applications. We measured a laser diode's output, at a fast photo detector and generated physical-random numbers from frequency noises. We then identified and evaluated the binary-number-line's statistical properties. The result shows that physical-random number generation, at speeds as high as 40Gbps, is obtainable, using the laser diode's frequency noise characteristic.

  9. Pseudo-random number generation using a 3-state cellular automaton

    Science.gov (United States)

    Bhattacharjee, Kamalika; Paul, Dipanjyoti; Das, Sukanta

    This paper investigates the potentiality of pseudo-random number generation of a 3-neighborhood 3-state cellular automaton (CA) under periodic boundary condition. Theoretical and empirical tests are performed on the numbers, generated by the CA, to observe the quality of it as pseudo-random number generator (PRNG). We analyze the strength and weakness of the proposed PRNG and conclude that the selected CA is a good random number generator.

  10. An empirical test of pseudo random number generators by means of an exponential decaying process

    International Nuclear Information System (INIS)

    Coronel B, H.F.; Hernandez M, A.R.; Jimenez M, M.A.; Mora F, L.E.

    2007-01-01

    Empirical tests for pseudo random number generators based on the use of processes or physical models have been successfully used and are considered as complementary to theoretical tests of randomness. In this work a statistical methodology for evaluating the quality of pseudo random number generators is presented. The method is illustrated in the context of the so-called exponential decay process, using some pseudo random number generators commonly used in physics. (Author)

  11. Matrix-assisted laser desorption/ionization-time of flight mass spectrometry: protocol standardization and database expansion for rapid identification of clinically important molds.

    Science.gov (United States)

    Paul, Saikat; Singh, Pankaj; Rudramurthy, Shivaprakash M; Chakrabarti, Arunaloke; Ghosh, Anup K

    2017-12-01

    To standardize the matrix-assisted laser desorption ionization-time of flight mass spectrometry protocols and expansion of existing Bruker Biotyper database for mold identification. Four different sample preparation methods (protocol A, B, C and D) were evaluated. On analyzing each protein extraction method, reliable identification and best log scores were achieved through protocol D. The same protocol was used to identify 153 clinical isolates. Of these 153, 123 (80.3%) were accurately identified by using existing database and remaining 30 (19.7%) were not identified due to unavailability in database. On inclusion of missing main spectrum profile in existing database, all 153 isolates were identified. Matrix-assisted laser desorption ionization-time of flight mass spectrometry can be used for routine identification of clinically important molds.

  12. Problems with the random number generator RANF implemented on the CDC cyber 205

    Science.gov (United States)

    Kalle, Claus; Wansleben, Stephan

    1984-10-01

    We show that using RANF may lead to wrong results when lattice models are simulated by Monte Carlo methods. We present a shift-register sequence random number generator which generates two random numbers per cycle on a two pipe CDC Cyber 205.

  13. Simulation of a directed random-walk model: the effect of pseudo-random-number correlations

    OpenAIRE

    Shchur, L. N.; Heringa, J. R.; Blöte, H. W. J.

    1996-01-01

    We investigate the mechanism that leads to systematic deviations in cluster Monte Carlo simulations when correlated pseudo-random numbers are used. We present a simple model, which enables an analysis of the effects due to correlations in several types of pseudo-random-number sequences. This model provides qualitative understanding of the bias mechanism in a class of cluster Monte Carlo algorithms.

  14. Humans can consciously generate random number sequences: a possible test for artificial intelligence.

    Science.gov (United States)

    Persaud, Navindra

    2005-01-01

    Computer algorithms can only produce seemingly random or pseudorandom numbers whereas certain natural phenomena, such as the decay of radioactive particles, can be utilized to produce truly random numbers. In this study, the ability of humans to generate random numbers was tested in healthy adults. Subjects were simply asked to generate and dictate random numbers. Generated numbers were tested for uniformity, independence and information density. The results suggest that humans can generate random numbers that are uniformly distributed, independent of one another and unpredictable. If humans can generate sequences of random numbers then neural networks or forms of artificial intelligence, which are purported to function in ways essentially the same as the human brain, should also be able to generate sequences of random numbers. Elucidating the precise mechanism by which humans generate random number sequences and the underlying neural substrates may have implications in the cognitive science of decision-making. It is possible that humans use their random-generating neural machinery to make difficult decisions in which all expected outcomes are similar. It is also possible that certain people, perhaps those with neurological or psychiatric impairments, are less able or unable to generate random numbers. If the random-generating neural machinery is employed in decision making its impairment would have profound implications in matters of agency and free will.

  15. 25 CFR 547.14 - What are the minimum technical standards for electronic random number generation?

    Science.gov (United States)

    2010-04-01

    ... random number generation? 547.14 Section 547.14 Indians NATIONAL INDIAN GAMING COMMISSION, DEPARTMENT OF... CLASS II GAMES § 547.14 What are the minimum technical standards for electronic random number generation...) Unpredictability; and (3) Non-repeatability. (b) Statistical Randomness.(1) Numbers produced by an RNG shall be...

  16. On the limiting characteristics of quantum random number generators at various clusterings of photocounts

    Science.gov (United States)

    Molotkov, S. N.

    2017-03-01

    Various methods for the clustering of photocounts constituting a sequence of random numbers are considered. It is shown that the clustering of photocounts resulting in the Fermi-Dirac distribution makes it possible to achieve the theoretical limit of the random number generation rate.

  17. Treatment of skeletal class III malocclusion using face mask therapy with alternate rapid maxillary expansion and constriction (Alt-RAMEC protocol

    Directory of Open Access Journals (Sweden)

    Anand Ramchandra Rathi

    2015-01-01

    Full Text Available Class III malocclusion is very common malocclusion and can be due to maxillary retrusion, mandibular prognathism, or combination. Ellis and McNamara found a combination of maxillary retrusion and mandibular protrusion to be the most common skeletal relationship (30%. The treatment should be carried out as early as possible for permitting normal growth of the skeletal bases. Reverse pull head gear combined with maxillary expansion can effectively correct skeletal Class III malocclusion due to maxillary deficiency in growing patient. An eight-year-old female patient with chief complaint of prognathic mandible and anterior crossbite was successfully treated in duration of 5 months with facemask and expansion therapy based on Alternate Rapid Maxillary Expansion and Constriction (Alt-RAMEC protocol.

  18. Fast random-number generation using a diode laser's frequency noise characteristic

    Science.gov (United States)

    Takamori, Hiroki; Doi, Kohei; Maehara, Shinya; Kawakami, Kohei; Sato, Takashi; Ohkawa, Masashi; Ohdaira, Yasuo

    2012-02-01

    Random numbers can be classified as either pseudo- or physical-random, in character. Pseudo-random numbers are generated by definite periodicity, so, their usefulness in cryptographic applications is somewhat limited. On the other hand, naturally-generated physical-random numbers have no calculable periodicity, thereby making them ideal for the task. Diode lasers' considerable wideband noise gives them tremendous capacity for generating physical-random numbers, at a high rate of speed. We measured a diode laser's output with a fast photo detector, and evaluated the binary-numbers from the diode laser's frequency noise characteristics. We then identified and evaluated the binary-number-line's statistical properties. We also investigate the possibility that much faster physical-random number parallel-generation is possible, using separate outputs of different optical-path length and character, which we refer to as "coherence collapse".

  19. a Pseudo-Random Number Generator Employing Multiple RÉNYI Maps

    Science.gov (United States)

    Lui, Oi-Yan; Yuen, Ching-Hung; Wong, Kwok-Wo

    2013-11-01

    The increasing risk along with the drastic development of multimedia data transmission has raised a big concern on data security. A good pseudo-random number generator is an essential tool in cryptography. In this paper, we propose a novel pseudo-random number generator based on the controlled combination of the outputs of several digitized chaotic Rényi maps. The generated pseudo-random sequences have passed both the NIST 800-22 Revision 1a and the DIEHARD tests. Moreover, simulation results show that the proposed pseudo-random number generator requires less operation time than existing generators and is highly sensitive to the seed.

  20. Three-dimensional pseudo-random number generator for implementing in hybrid computer systems

    International Nuclear Information System (INIS)

    Ivanov, M.A.; Vasil'ev, N.P.; Voronin, A.V.; Kravtsov, M.Yu.; Maksutov, A.A.; Spiridonov, A.A.; Khudyakova, V.I.; Chugunkov, I.V.

    2012-01-01

    The algorithm for generating pseudo-random numbers oriented to implementation by using hybrid computer systems is considered. The proposed solution is characterized by a high degree of parallel computing [ru

  1. A true random number generator based on mouse movement and chaotic cryptography

    International Nuclear Information System (INIS)

    Hu Yue; Liao Xiaofeng; Wong, Kwok-wo; Zhou Qing

    2009-01-01

    True random number generators are in general more secure than pseudo random number generators. In this paper, we propose a novel true random number generator which generates a 256-bit random number by computer mouse movement. It is cheap, convenient and universal for personal computers. To eliminate the effect of similar movement patterns generated by the same user, three chaos-based approaches, namely, discretized 2D chaotic map permutation, spatiotemporal chaos and 'MASK' algorithm, are adopted to post-process the captured mouse movements. Random bits generated by three users are tested using NIST statistical tests. Both the spatiotemporal chaos approach and the 'MASK' algorithm pass the tests successfully. However, the latter has a better performance in terms of efficiency and effectiveness and so is more practical for common personal computer applications.

  2. High-speed true random number generation based on paired memristors for security electronics

    Science.gov (United States)

    Zhang, Teng; Yin, Minghui; Xu, Changmin; Lu, Xiayan; Sun, Xinhao; Yang, Yuchao; Huang, Ru

    2017-11-01

    True random number generator (TRNG) is a critical component in hardware security that is increasingly important in the era of mobile computing and internet of things. Here we demonstrate a TRNG using intrinsic variation of memristors as a natural source of entropy that is otherwise undesirable in most applications. The random bits were produced by cyclically switching a pair of tantalum oxide based memristors and comparing their resistance values in the off state, taking advantage of the more pronounced resistance variation compared with that in the on state. Using an alternating read scheme in the designed TRNG circuit, the unbiasedness of the random numbers was significantly improved, and the bitstream passed standard randomness tests. The Pt/TaO x /Ta memristors fabricated in this work have fast programming/erasing speeds of ˜30 ns, suggesting a high random number throughput. The approach proposed here thus holds great promise for physically-implemented random number generation.

  3. Unidirectional interference in use of nondominant hand during concurrent Grooved Pegboard and random number generation tasks.

    Science.gov (United States)

    Strenge, Hans; Niederberger, Uwe

    2008-06-01

    The interference effect between Grooved Pegboard task with either hand and the executive task of cued verbal random number generation was investigated. 24 normal right-handed subjects performed each task under separate (single-task) and concurrent (dual-task) conditions. Articulatory suppression was required as an additional secondary task during pegboard performance. Analysis indicated an unambiguous distinction between the two hands. Comparisons of single-task and dual-task conditions showed an asymmetrical pattern of unidirectional interference with no practice effects during pegboard performance. Concurrent performance with nondominant hand but not the dominant hand of random number generation performance became continuously slower. There was no effect of divided attention on pegboard performance. Findings support the idea that the nondominant hand on the pegboard and random number tasks draw from the same processing resources but that for the executive aspect random number generation is more sensitive to changes in allocation of attentional resources.

  4. Using pseudo-random number generator for making iterative algorithms of hashing data

    International Nuclear Information System (INIS)

    Ivanov, M.A.; Vasil'ev, N.P.; Kozyrskij, B.L.

    2014-01-01

    The method of stochastic data transformation made for usage in cryptographic methods of information protection has been analyzed. The authors prove the usage of cryptographically strong pseudo-random number generators as a basis for Sponge construction. This means that the analysis of the quality of the known methods and tools for assessing the statistical security of pseudo-random number generators can be used effectively [ru

  5. High-Performance Pseudo-Random Number Generation on Graphics Processing Units

    OpenAIRE

    Nandapalan, Nimalan; Brent, Richard P.; Murray, Lawrence M.; Rendell, Alistair

    2011-01-01

    This work considers the deployment of pseudo-random number generators (PRNGs) on graphics processing units (GPUs), developing an approach based on the xorgens generator to rapidly produce pseudo-random numbers of high statistical quality. The chosen algorithm has configurable state size and period, making it ideal for tuning to the GPU architecture. We present a comparison of both speed and statistical quality with other common parallel, GPU-based PRNGs, demonstrating favourable performance o...

  6. Properties making a chaotic system a good Pseudo Random Number Generator

    OpenAIRE

    Falcioni, Massimo; Palatella, Luigi; Pigolotti, Simone; Vulpiani, Angelo

    2005-01-01

    We discuss two properties making a deterministic algorithm suitable to generate a pseudo random sequence of numbers: high value of Kolmogorov-Sinai entropy and high-dimensionality. We propose the multi dimensional Anosov symplectic (cat) map as a Pseudo Random Number Generator. We show what chaotic features of this map are useful for generating Pseudo Random Numbers and investigate numerically which of them survive in the discrete version of the map. Testing and comparisons with other generat...

  7. What parental characteristics can predict child maltreatment at the Emergency Department? Considering expansion of the Hague Protocol

    NARCIS (Netherlands)

    Diderich, H.M.; Dechesne, M.; Fekkes, M.; Verkerk, P.H.; Buitendijk, S.E.; Oudesluys-Murphy, A.M.

    2015-01-01

    The Hague Protocol considers three parental characteristics of Emergency Department adult patients to identify child abuse: (a) domestic violence, (b) intoxication, and (c) suicide attempt or auto mutilation. This study investigated whether additional parental characteristics could be included to

  8. Development and testing of high performance pseudo random number generator for Monte Carlo simulation

    International Nuclear Information System (INIS)

    Chakraborty, Brahmananda

    2009-01-01

    Random number plays an important role in any Monte Carlo simulation. The accuracy of the results depends on the quality of the sequence of random numbers employed in the simulation. These include randomness of the random numbers, uniformity of their distribution, absence of correlation and long period. In a typical Monte Carlo simulation of particle transport in a nuclear reactor core, the history of a particle from its birth in a fission event until its death by an absorption or leakage event is tracked. The geometry of the core and the surrounding materials are exactly modeled in the simulation. To track a neutron history one needs random numbers for determining inter collision distance, nature of the collision, the direction of the scattered neutron etc. Neutrons are tracked in batches. In one batch approximately 2000-5000 neutrons are tracked. The statistical accuracy of the results of the simulation depends on the total number of particles (number of particles in one batch multiplied by the number of batches) tracked. The number of histories to be generated is usually large for a typical radiation transport problem. To track a very large number of histories one needs to generate a long sequence of independent random numbers. In other words the cycle length of the random number generator (RNG) should be more than the total number of random numbers required for simulating the given transport problem. The number of bits of the machine generally limits the cycle length. For a binary machine of p bits the maximum cycle length is 2 p . To achieve higher cycle length in the same machine one has to use either register arithmetic or bit manipulation technique

  9. Recommendations and illustrations for the evaluation of photonic random number generators

    Science.gov (United States)

    Hart, Joseph D.; Terashima, Yuta; Uchida, Atsushi; Baumgartner, Gerald B.; Murphy, Thomas E.; Roy, Rajarshi

    2017-09-01

    The never-ending quest to improve the security of digital information combined with recent improvements in hardware technology has caused the field of random number generation to undergo a fundamental shift from relying solely on pseudo-random algorithms to employing optical entropy sources. Despite these significant advances on the hardware side, commonly used statistical measures and evaluation practices remain ill-suited to understand or quantify the optical entropy that underlies physical random number generation. We review the state of the art in the evaluation of optical random number generation and recommend a new paradigm: quantifying entropy generation and understanding the physical limits of the optical sources of randomness. In order to do this, we advocate for the separation of the physical entropy source from deterministic post-processing in the evaluation of random number generators and for the explicit consideration of the impact of the measurement and digitization process on the rate of entropy production. We present the Cohen-Procaccia estimate of the entropy rate h (𝜖 ,τ ) as one way to do this. In order to provide an illustration of our recommendations, we apply the Cohen-Procaccia estimate as well as the entropy estimates from the new NIST draft standards for physical random number generators to evaluate and compare three common optical entropy sources: single photon time-of-arrival detection, chaotic lasers, and amplified spontaneous emission.

  10. Recommendations and illustrations for the evaluation of photonic random number generators

    Directory of Open Access Journals (Sweden)

    Joseph D. Hart

    2017-09-01

    Full Text Available The never-ending quest to improve the security of digital information combined with recent improvements in hardware technology has caused the field of random number generation to undergo a fundamental shift from relying solely on pseudo-random algorithms to employing optical entropy sources. Despite these significant advances on the hardware side, commonly used statistical measures and evaluation practices remain ill-suited to understand or quantify the optical entropy that underlies physical random number generation. We review the state of the art in the evaluation of optical random number generation and recommend a new paradigm: quantifying entropy generation and understanding the physical limits of the optical sources of randomness. In order to do this, we advocate for the separation of the physical entropy source from deterministic post-processing in the evaluation of random number generators and for the explicit consideration of the impact of the measurement and digitization process on the rate of entropy production. We present the Cohen-Procaccia estimate of the entropy rate h(,τ as one way to do this. In order to provide an illustration of our recommendations, we apply the Cohen-Procaccia estimate as well as the entropy estimates from the new NIST draft standards for physical random number generators to evaluate and compare three common optical entropy sources: single photon time-of-arrival detection, chaotic lasers, and amplified spontaneous emission.

  11. The generation of 68 Gbps quantum random number by measuring laser phase fluctuations

    International Nuclear Information System (INIS)

    Nie, You-Qi; Liu, Yang; Zhang, Jun; Pan, Jian-Wei; Huang, Leilei; Payne, Frank

    2015-01-01

    The speed of a quantum random number generator is essential for practical applications, such as high-speed quantum key distribution systems. Here, we push the speed of a quantum random number generator to 68 Gbps by operating a laser around its threshold level. To achieve the rate, not only high-speed photodetector and high sampling rate are needed but also a very stable interferometer is required. A practical interferometer with active feedback instead of common temperature control is developed to meet the requirement of stability. Phase fluctuations of the laser are measured by the interferometer with a photodetector and then digitalized to raw random numbers with a rate of 80 Gbps. The min-entropy of the raw data is evaluated by modeling the system and is used to quantify the quantum randomness of the raw data. The bias of the raw data caused by other signals, such as classical and detection noises, can be removed by Toeplitz-matrix hashing randomness extraction. The final random numbers can pass through the standard randomness tests. Our demonstration shows that high-speed quantum random number generators are ready for practical usage

  12. A Comparison of Three Random Number Generators for Aircraft Dynamic Modeling Applications

    Science.gov (United States)

    Grauer, Jared A.

    2017-01-01

    Three random number generators, which produce Gaussian white noise sequences, were compared to assess their suitability in aircraft dynamic modeling applications. The first generator considered was the MATLAB (registered) implementation of the Mersenne-Twister algorithm. The second generator was a website called Random.org, which processes atmospheric noise measured using radios to create the random numbers. The third generator was based on synthesis of the Fourier series, where the random number sequences are constructed from prescribed amplitude and phase spectra. A total of 200 sequences, each having 601 random numbers, for each generator were collected and analyzed in terms of the mean, variance, normality, autocorrelation, and power spectral density. These sequences were then applied to two problems in aircraft dynamic modeling, namely estimating stability and control derivatives from simulated onboard sensor data, and simulating flight in atmospheric turbulence. In general, each random number generator had good performance and is well-suited for aircraft dynamic modeling applications. Specific strengths and weaknesses of each generator are discussed. For Monte Carlo simulation, the Fourier synthesis method is recommended because it most accurately and consistently approximated Gaussian white noise and can be implemented with reasonable computational effort.

  13. Direct generation of all-optical random numbers from optical pulse amplitude chaos.

    Science.gov (United States)

    Li, Pu; Wang, Yun-Cai; Wang, An-Bang; Yang, Ling-Zhen; Zhang, Ming-Jiang; Zhang, Jian-Zhong

    2012-02-13

    We propose and theoretically demonstrate an all-optical method for directly generating all-optical random numbers from pulse amplitude chaos produced by a mode-locked fiber ring laser. Under an appropriate pump intensity, the mode-locked laser can experience a quasi-periodic route to chaos. Such a chaos consists of a stream of pulses with a fixed repetition frequency but random intensities. In this method, we do not require sampling procedure and external triggered clocks but directly quantize the chaotic pulses stream into random number sequence via an all-optical flip-flop. Moreover, our simulation results show that the pulse amplitude chaos has no periodicity and possesses a highly symmetric distribution of amplitude. Thus, in theory, the obtained random number sequence without post-processing has a high-quality randomness verified by industry-standard statistical tests.

  14. A generator for unique quantum random numbers based on vacuum states

    DEFF Research Database (Denmark)

    Gabriel, C.; Wittmann, C.; Sych, D.

    2010-01-01

    the purity of a continuous-variable quantum vacuum state to generate unique random numbers. We use the intrinsic randomness in measuring the quadratures of a mode in the lowest energy vacuum state, which cannot be correlated to any other state. The simplicity of our source, combined with its verifiably......Random numbers are a valuable component in diverse applications that range from simulations(1) over gambling to cryptography(2,3). The quest for true randomness in these applications has engendered a large variety of different proposals for producing random numbers based on the foundational...... unpredictability of quantum mechanics(4-11). However, most approaches do not consider that a potential adversary could have knowledge about the generated numbers, so the numbers are not verifiably random and unique(12-15). Here we present a simple experimental setup based on homodyne measurements that uses...

  15. Private random numbers produced by entangled ions and certified by Bell's theorem

    Science.gov (United States)

    Hayes, David; Matsukevich, Dzmitry; Maunz, Peter; Monroe, Chris; Olmschenk, Steven

    2010-03-01

    It has been shown that entangled particles can be used to generate numbers whose privacy and randomness are guaranteed by the violation of a Bell inequality [1,2]. The authenticity of the bit stream produced is guaranteed when the system used can close the detection loophole and when the entangled particles are non-interacting. We report the use of remotely located trapped ions with near perfect state detection efficiency as a private random number generator. By entangling the ions through photon interference and choosing the measurement settings using a pseudo-random number generator, we measure a CHSH correlation function that is more than seven standard deviations above the classical limit. With a total of 3016 events, we are able to certify the generation of 42 new random numbers with 99% confidence. [1] S. Pironio et al.(submitted to Nature, arXiv:0911.3427) [2] Colbeck, R. PhD Dissertation (2007)

  16. Non-periodic pseudo-random numbers used in Monte Carlo calculations

    Science.gov (United States)

    Barberis, Gaston E.

    2007-09-01

    The generation of pseudo-random numbers is one of the interesting problems in Monte Carlo simulations, mostly because the common computer generators produce periodic numbers. We used simple pseudo-random numbers generated with the simplest chaotic system, the logistic map, with excellent results. The numbers generated in this way are non-periodic, which we demonstrated for 1013 numbers, and they are obtained in a deterministic way, which allows to repeat systematically any calculation. The Monte Carlo calculations are the ideal field to apply these numbers, and we did it for simple and more elaborated cases. Chemistry and Information Technology use this kind of simulations, and the application of this numbers to quantum Monte Carlo and cryptography is immediate. I present here the techniques to calculate, analyze and use these pseudo-random numbers, show that they lack periodicity up to 1013 numbers and that they are not correlated.

  17. Modular Transformations, Order-Chaos Transitions and Pseudo-Random Number Generation

    Science.gov (United States)

    Bonelli, Antonio; Ruffo, Stefano

    Successive pairs of pseudo-random numbers generated by standard linear congruential transformations display ordered patterns of parallel lines. We study the "ordered" and "chaotic" distribution of such pairs by solving the eigenvalue problem for two-dimensional modular transformations over integers. We conjecture that the optimal uniformity for pair distribution is obtained when the slope of linear modular eigenspaces takes the value n opt =maxint (p/√ {p-1}), where p is a prime number. We then propose a new generator of pairs of independent pseudo-random numbers, which realizes an optimal uniform distribution (in the "statistical" sense) of points on the unit square (0, 1] × (0, 1]. The method can be easily generalized to the generation of k-tuples of random numbers (with k>2).

  18. Compact Quantum Random Number Generator with Silicon Nanocrystals Light Emitting Device Coupled to a Silicon Photomultiplier

    Science.gov (United States)

    Bisadi, Zahra; Acerbi, Fabio; Fontana, Giorgio; Zorzi, Nicola; Piemonte, Claudio; Pucker, Georg; Pavesi, Lorenzo

    2018-02-01

    A small-sized photonic quantum random number generator, easy to be implemented in small electronic devices for secure data encryption and other applications, is highly demanding nowadays. Here, we propose a compact configuration with Silicon nanocrystals large area light emitting device (LED) coupled to a Silicon photomultiplier to generate random numbers. The random number generation methodology is based on the photon arrival time and is robust against the non-idealities of the detector and the source of quantum entropy. The raw data show high quality of randomness and pass all the statistical tests in national institute of standards and technology tests (NIST) suite without a post-processing algorithm. The highest bit rate is 0.5 Mbps with the efficiency of 4 bits per detected photon.

  19. Compact Quantum Random Number Generator with Silicon Nanocrystals Light Emitting Device Coupled to a Silicon Photomultiplier

    Directory of Open Access Journals (Sweden)

    Zahra Bisadi

    2018-02-01

    Full Text Available A small-sized photonic quantum random number generator, easy to be implemented in small electronic devices for secure data encryption and other applications, is highly demanding nowadays. Here, we propose a compact configuration with Silicon nanocrystals large area light emitting device (LED coupled to a Silicon photomultiplier to generate random numbers. The random number generation methodology is based on the photon arrival time and is robust against the non-idealities of the detector and the source of quantum entropy. The raw data show high quality of randomness and pass all the statistical tests in national institute of standards and technology tests (NIST suite without a post-processing algorithm. The highest bit rate is 0.5 Mbps with the efficiency of 4 bits per detected photon.

  20. Non-periodic pseudo-random numbers used in Monte Carlo calculations

    International Nuclear Information System (INIS)

    Barberis, Gaston E.

    2007-01-01

    The generation of pseudo-random numbers is one of the interesting problems in Monte Carlo simulations, mostly because the common computer generators produce periodic numbers. We used simple pseudo-random numbers generated with the simplest chaotic system, the logistic map, with excellent results. The numbers generated in this way are non-periodic, which we demonstrated for 10 13 numbers, and they are obtained in a deterministic way, which allows to repeat systematically any calculation. The Monte Carlo calculations are the ideal field to apply these numbers, and we did it for simple and more elaborated cases. Chemistry and Information Technology use this kind of simulations, and the application of this numbers to quantum Monte Carlo and cryptography is immediate. I present here the techniques to calculate, analyze and use these pseudo-random numbers, show that they lack periodicity up to 10 13 numbers and that they are not correlated

  1. 40 CFR 761.308 - Sample selection by random number generation on any two-dimensional square grid.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Sample selection by random number... § 761.79(b)(3) § 761.308 Sample selection by random number generation on any two-dimensional square... area created in accordance with paragraph (a) of this section, select two random numbers: one each for...

  2. Efficient Raman generation in a waveguide: A route to ultrafast quantum random number generation

    Energy Technology Data Exchange (ETDEWEB)

    England, D. G.; Bustard, P. J.; Moffatt, D. J.; Nunn, J.; Lausten, R.; Sussman, B. J., E-mail: ben.sussman@nrc.ca [National Research Council of Canada, 100 Sussex Drive, Ottawa, Ontario K1A 0R6 (Canada)

    2014-02-03

    The inherent uncertainty in quantum mechanics offers a source of true randomness which can be used to produce unbreakable cryptographic keys. We discuss the development of a high-speed random number generator based on the quantum phase fluctuations in spontaneously initiated stimulated Raman scattering (SISRS). We utilize the tight confinement and long interaction length available in a Potassium Titanyl Phosphate waveguide to generate highly efficient SISRS using nanojoule pulse energies, reducing the high pump power requirements of the previous approaches. We measure the random phase of the Stokes output using a simple interferometric setup to yield quantum random numbers at 145 Mbps.

  3. Pseudo-random number generators for Monte Carlo simulations on ATI Graphics Processing Units

    Science.gov (United States)

    Demchik, Vadim

    2011-03-01

    Basic uniform pseudo-random number generators are implemented on ATI Graphics Processing Units (GPU). The performance results of the realized generators (multiplicative linear congruential (GGL), XOR-shift (XOR128), RANECU, RANMAR, RANLUX and Mersenne Twister (MT19937)) on CPU and GPU are discussed. The obtained speed up factor is hundreds of times in comparison with CPU. RANLUX generator is found to be the most appropriate for using on GPU in Monte Carlo simulations. The brief review of the pseudo-random number generators used in modern software packages for Monte Carlo simulations in high-energy physics is presented.

  4. Quantum random-number generator based on a photon-number-resolving detector

    International Nuclear Information System (INIS)

    Ren Min; Wu, E; Liang Yan; Jian Yi; Wu Guang; Zeng Heping

    2011-01-01

    We demonstrated a high-efficiency quantum random number generator which takes inherent advantage of the photon number distribution randomness of a coherent light source. This scheme was realized by comparing the photon flux of consecutive pulses with a photon number resolving detector. The random bit generation rate could reach 2.4 MHz with a system clock of 6.0 MHz, corresponding to a random bit generation efficiency as high as 40%. The random number files passed all the stringent statistical tests.

  5. An efficient algorithm for generating random number pairs drawn from a bivariate normal distribution

    Science.gov (United States)

    Campbell, C. W.

    1983-01-01

    An efficient algorithm for generating random number pairs from a bivariate normal distribution was developed. Any desired value of the two means, two standard deviations, and correlation coefficient can be selected. Theoretically the technique is exact and in practice its accuracy is limited only by the quality of the uniform distribution random number generator, inaccuracies in computer function evaluation, and arithmetic. A FORTRAN routine was written to check the algorithm and good accuracy was obtained. Some small errors in the correlation coefficient were observed to vary in a surprisingly regular manner. A simple model was developed which explained the qualities aspects of the errors.

  6. Employing online quantum random number generators for generating truly random quantum states in Mathematica

    Science.gov (United States)

    Miszczak, Jarosław Adam

    2013-01-01

    The presented package for the Mathematica computing system allows the harnessing of quantum random number generators (QRNG) for investigating the statistical properties of quantum states. The described package implements a number of functions for generating random states. The new version of the package adds the ability to use the on-line quantum random number generator service and implements new functions for retrieving lists of random numbers. Thanks to the introduced improvements, the new version provides faster access to high-quality sources of random numbers and can be used in simulations requiring large amount of random data. New version program summaryProgram title: TRQS Catalogue identifier: AEKA_v2_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/AEKA_v2_0.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 18 134 No. of bytes in distributed program, including test data, etc.: 2 520 49 Distribution format: tar.gz Programming language: Mathematica, C. Computer: Any supporting Mathematica in version 7 or higher. Operating system: Any platform supporting Mathematica; tested with GNU/Linux (32 and 64 bit). RAM: Case-dependent Supplementary material: Fig. 1 mentioned below can be downloaded. Classification: 4.15. External routines: Quantis software library (http://www.idquantique.com/support/quantis-trng.html) Catalogue identifier of previous version: AEKA_v1_0 Journal reference of previous version: Comput. Phys. Comm. 183(2012)118 Does the new version supersede the previous version?: Yes Nature of problem: Generation of random density matrices and utilization of high-quality random numbers for the purpose of computer simulation. Solution method: Use of a physical quantum random number generator and an on-line service providing access to the source of true random

  7. A portable high-quality random number generator for lattice field theory simulations

    International Nuclear Information System (INIS)

    Luescher, M.

    1993-09-01

    The theory underlying a proposed random number generator for numerical simulations in elementary particle physics and statistical mechanics is discussed. The generator is based on an algorithm introduced by Marsaglia and Zaman, with an important added feature leading to demonstrably good statistical properties. It can be implemented exactly on any computer complying with the IEEE-754 standard for single precision floating point arithmetic. (orig.)

  8. Pseudo-Random Number Generators for Vector Processors and Multicore Processors

    DEFF Research Database (Denmark)

    Fog, Agner

    2015-01-01

    Large scale Monte Carlo applications need a good pseudo-random number generator capable of utilizing both the vector processing capabilities and multiprocessing capabilities of modern computers in order to get the maximum performance. The requirements for such a generator are discussed. New ways...

  9. Pseudo-random-number generators and the square site percolation threshold.

    Science.gov (United States)

    Lee, Michael J

    2008-09-01

    Selected pseudo-random-number generators are applied to a Monte Carlo study of the two-dimensional square-lattice site percolation model. A generator suitable for high precision calculations is identified from an application specific test of randomness. After extended computation and analysis, an ostensibly reliable value of p_{c}=0.59274598(4) is obtained for the percolation threshold.

  10. Learning Binomial Probability Concepts with Simulation, Random Numbers and a Spreadsheet

    Science.gov (United States)

    Rochowicz, John A., Jr.

    2005-01-01

    This paper introduces the reader to the concepts of binomial probability and simulation. A spreadsheet is used to illustrate these concepts. Random number generators are great technological tools for demonstrating the concepts of probability. Ideas of approximation, estimation, and mathematical usefulness provide numerous ways of learning…

  11. Random Numbers Demonstrate the Frequency of Type I Errors: Three Spreadsheets for Class Instruction

    Science.gov (United States)

    Duffy, Sean

    2010-01-01

    This paper describes three spreadsheet exercises demonstrating the nature and frequency of type I errors using random number generation. The exercises are designed specifically to address issues related to testing multiple relations using correlation (Demonstration I), t tests varying in sample size (Demonstration II) and multiple comparisons…

  12. Examining Psychokinesis: The Interaction of Human Intention with Random Number Generators--A Meta-Analysis

    Science.gov (United States)

    Bosch, Holger; Steinkamp, Fiona; Boller, Emil

    2006-01-01

    Seance-room and other large-scale psychokinetic phenomena have fascinated humankind for decades. Experimental research has reduced these phenomena to attempts to influence (a) the fall of dice and, later, (b) the output of random number generators (RNGs). The meta-analysis combined 380 studies that assessed whether RNG output correlated with human…

  13. Generating log-normally distributed random numbers by using the Ziggurat algorithm

    International Nuclear Information System (INIS)

    Choi, Jong Soo

    2016-01-01

    Uncertainty analyses are usually based on the Monte Carlo method. Using an efficient random number generator(RNG) is a key element in success of Monte Carlo simulations. Log-normal distributed variates are very typical in NPP PSAs. This paper proposes an approach to generate log normally distributed variates based on the Ziggurat algorithm and evaluates the efficiency of the proposed Ziggurat RNG. The proposed RNG can be helpful to improve the uncertainty analysis of NPP PSAs. This paper focuses on evaluating the efficiency of the Ziggurat algorithm from a NPP PSA point of view. From this study, we can draw the following conclusions. - The Ziggurat algorithm is one of perfect random number generators to product normal distributed variates. - The Ziggurat algorithm is computationally much faster than the most commonly used method, Marsaglia polar method

  14. True random number generation from mobile telephone photo based on chaotic cryptography

    International Nuclear Information System (INIS)

    Zhao Liang; Liao Xiaofeng; Xiao Di; Xiang Tao; Zhou Qing; Duan Shukai

    2009-01-01

    A cheap, convenient and universal TRNG based on mobile telephone photo for producing random bit sequence is proposed. To settle the problem of sequential pixels and comparability, three chaos-based approaches are applied to post-process the generated binary image. The random numbers produced by three users are tested using US NIST RNG statistical test software. The experimental results indicate that the Arnold cat map is the fastest way to generate a random bit sequence and can be accepted on general PC. The 'MASK' algorithm also performs well. Finally, comparing with the TRNG of Hu et al. [Hu Y, Liao X, Wong KW, Zhou Q. A true random number generator based on mouse movement and chaotic cryptography. Chaos, Solitons and Fractals 2007. doi: 10.1016/j.chaos.2007.10.022] which is presented by Hu et al., many merits of the proposed TRNG in this paper has been found.

  15. A revision of the subtract-with-borrow random number generators

    Science.gov (United States)

    Sibidanov, Alexei

    2017-12-01

    The most popular and widely used subtract-with-borrow generator, also known as RANLUX, is reimplemented as a linear congruential generator using large integer arithmetic with the modulus size of 576 bits. Modern computers, as well as the specific structure of the modulus inferred from RANLUX, allow for the development of a fast modular multiplication - the core of the procedure. This was previously believed to be slow and have too high cost in terms of computing resources. Our tests show a significant gain in generation speed which is comparable with other fast, high quality random number generators. An additional feature is the fast skipping of generator states leading to a seeding scheme which guarantees the uniqueness of random number sequences. Licensing provisions: GPLv3 Programming language: C++, C, Assembler

  16. A robust random number generator based on differential comparison of chaotic laser signals.

    Science.gov (United States)

    Zhang, Jianzhong; Wang, Yuncai; Liu, Ming; Xue, Lugang; Li, Pu; Wang, Anbang; Zhang, Mingjiang

    2012-03-26

    We experimentally realize a robust real-time random number generator by differentially comparing the signal from a chaotic semiconductor laser and its delayed signal through a 1-bit analog-to-digital converter. The probability density distribution of the output chaotic signal based on the differential comparison method possesses an extremely small coefficient of Pearson's median skewness (1.5 × 10⁻⁶), which can yield a balanced random sequence much easily than the previously reported method that compares the signal from the chaotic laser with a certain threshold value. Moveover, we experimently demonstrate that our method can stably generate good random numbers at rates of 1.44 Gbit/s with excellent immunity from external perturbations while the previously reported method fails.

  17. Note: Fully integrated 3.2 Gbps quantum random number generator with real-time extraction

    International Nuclear Information System (INIS)

    Zhang, Xiao-Guang; Nie, You-Qi; Liang, Hao; Zhang, Jun; Pan, Jian-Wei; Zhou, Hongyi; Ma, Xiongfeng

    2016-01-01

    We present a real-time and fully integrated quantum random number generator (QRNG) by measuring laser phase fluctuations. The QRNG scheme based on laser phase fluctuations is featured for its capability of generating ultra-high-speed random numbers. However, the speed bottleneck of a practical QRNG lies on the limited speed of randomness extraction. To close the gap between the fast randomness generation and the slow post-processing, we propose a pipeline extraction algorithm based on Toeplitz matrix hashing and implement it in a high-speed field-programmable gate array. Further, all the QRNG components are integrated into a module, including a compact and actively stabilized interferometer, high-speed data acquisition, and real-time data post-processing and transmission. The final generation rate of the QRNG module with real-time extraction can reach 3.2 Gbps.

  18. Post-processing Free Quantum Random Number Generator Based on Avalanche Photodiode Array

    International Nuclear Information System (INIS)

    Li Yang; Liao Sheng-Kai; Liang Fu-Tian; Shen Qi; Liang Hao; Peng Cheng-Zhi

    2016-01-01

    Quantum random number generators adopting single photon detection have been restricted due to the non-negligible dead time of avalanche photodiodes (APDs). We propose a new approach based on an APD array to improve the generation rate of random numbers significantly. This method compares the detectors' responses to consecutive optical pulses and generates the random sequence. We implement a demonstration experiment to show its simplicity, compactness and scalability. The generated numbers are proved to be unbiased, post-processing free, ready to use, and their randomness is verified by using the national institute of standard technology statistical test suite. The random bit generation efficiency is as high as 32.8% and the potential generation rate adopting the 32 × 32 APD array is up to tens of Gbits/s. (paper)

  19. Robust random number generation using steady-state emission of gain-switched laser diodes

    International Nuclear Information System (INIS)

    Yuan, Z. L.; Lucamarini, M.; Dynes, J. F.; Fröhlich, B.; Plews, A.; Shields, A. J.

    2014-01-01

    We demonstrate robust, high-speed random number generation using interference of the steady-state emission of guaranteed random phases, obtained through gain-switching a semiconductor laser diode. Steady-state emission tolerates large temporal pulse misalignments and therefore significantly improves the interference quality. Using an 8-bit digitizer followed by a finite-impulse-response unbiasing algorithm, we achieve random number generation rates of 8 and 20 Gb/s, for laser repetition rates of 1 and 2.5 GHz, respectively, with a ±20% tolerance in the interferometer differential delay. We also report a generation rate of 80 Gb/s using partially phase-correlated short pulses. In relation to the field of quantum key distribution, our results confirm the gain-switched laser diode as a suitable light source, capable of providing phase-randomized coherent pulses at a clock rate of up to 2.5 GHz.

  20. ACORN—A new method for generating sequences of uniformly distributed Pseudo-random Numbers

    Science.gov (United States)

    Wikramaratna, R. S.

    1989-07-01

    A new family of pseudo-random number generators, the ACORN ( additive congruential random number) generators, is proposed. The resulting numbers are distributed uniformly in the interval [0, 1). The ACORN generators are defined recursively, and the ( k + 1)th order generator is easily derived from the kth order generator. Some theorems concerning the period length are presented and compared with existing results for linear congruential generators. A range of statistical tests are applied to the ACORN generators, and their performance is compared with that of the linear congruential generators and the Chebyshev generators. The tests show the ACORN generators to be statistically superior to the Chebyshev generators, while being statistically similar to the linear congruential generators. However, the ACORN generators execute faster than linear congruential generators for the same statistical faithfulness. The main advantages of the ACORN generator are speed of execution, long period length, and simplicity of coding.

  1. Experimental study of a quantum random-number generator based on two independent lasers

    Science.gov (United States)

    Sun, Shi-Hai; Xu, Feihu

    2017-12-01

    A quantum random-number generator (QRNG) can produce true randomness by utilizing the inherent probabilistic nature of quantum mechanics. Recently, the spontaneous-emission quantum phase noise of the laser has been widely deployed for quantum random-number generation, due to its high rate, its low cost, and the feasibility of chip-scale integration. Here, we perform a comprehensive experimental study of a phase-noise-based QRNG with two independent lasers, each of which operates in either continuous-wave (CW) or pulsed mode. We implement the QRNG by operating the two lasers in three configurations, namely, CW + CW, CW + pulsed, and pulsed + pulsed, and demonstrate their trade-offs, strengths, and weaknesses.

  2. Note: Fully integrated 3.2 Gbps quantum random number generator with real-time extraction

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Xiao-Guang; Nie, You-Qi; Liang, Hao; Zhang, Jun, E-mail: zhangjun@ustc.edu.cn; Pan, Jian-Wei [Hefei National Laboratory for Physical Sciences at the Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); CAS Center for Excellence and Synergetic Innovation Center in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Zhou, Hongyi; Ma, Xiongfeng [Center for Quantum Information, Institute for Interdisciplinary Information Sciences, Tsinghua University, Beijing 100084 (China)

    2016-07-15

    We present a real-time and fully integrated quantum random number generator (QRNG) by measuring laser phase fluctuations. The QRNG scheme based on laser phase fluctuations is featured for its capability of generating ultra-high-speed random numbers. However, the speed bottleneck of a practical QRNG lies on the limited speed of randomness extraction. To close the gap between the fast randomness generation and the slow post-processing, we propose a pipeline extraction algorithm based on Toeplitz matrix hashing and implement it in a high-speed field-programmable gate array. Further, all the QRNG components are integrated into a module, including a compact and actively stabilized interferometer, high-speed data acquisition, and real-time data post-processing and transmission. The final generation rate of the QRNG module with real-time extraction can reach 3.2 Gbps.

  3. A homodyne detector integrated onto a photonic chip for measuring quantum states and generating random numbers

    Science.gov (United States)

    Raffaelli, Francesco; Ferranti, Giacomo; Mahler, Dylan H.; Sibson, Philip; Kennard, Jake E.; Santamato, Alberto; Sinclair, Gary; Bonneau, Damien; Thompson, Mark G.; Matthews, Jonathan C. F.

    2018-04-01

    Optical homodyne detection has found use as a characterisation tool in a range of quantum technologies. So far implementations have been limited to bulk optics. Here we present the optical integration of a homodyne detector onto a silicon photonics chip. The resulting device operates at high speed, up 150 MHz, it is compact and it operates with low noise, quantified with 11 dB clearance between shot noise and electronic noise. We perform on-chip quantum tomography of coherent states with the detector and show that it meets the requirements for characterising more general quantum states of light. We also show that the detector is able to produce quantum random numbers at a rate of 1.2 Gbps, by measuring the vacuum state of the electromagnetic field and applying off-line post processing. The produced random numbers pass all the statistical tests provided by the NIST test suite.

  4. Distributed Pseudo-Random Number Generation and Its Application to Cloud Database

    OpenAIRE

    Chen, Jiageng; Miyaji, Atsuko; Su, Chunhua

    2014-01-01

    Cloud database is now a rapidly growing trend in cloud computing market recently. It enables the clients run their computation on out-sourcing databases or access to some distributed database service on the cloud. At the same time, the security and privacy concerns is major challenge for cloud database to continue growing. To enhance the security and privacy of the cloud database technology, the pseudo-random number generation (PRNG) plays an important roles in data encryptions and privacy-pr...

  5. Pseudo-random number generator based on mixing of three chaotic maps

    Science.gov (United States)

    François, M.; Grosges, T.; Barchiesi, D.; Erra, R.

    2014-04-01

    A secure pseudo-random number generator three-mixer is proposed. The principle of the method consists in mixing three chaotic maps produced from an input initial vector. The algorithm uses permutations whose positions are computed and indexed by a standard chaotic function and a linear congruence. The performance of that scheme is evaluated through statistical analysis. Such a cryptosystem lets appear significant cryptographic qualities for a high security level.

  6. A universal algorithm to generate pseudo-random numbers based on uniform mapping as homeomorphism

    International Nuclear Information System (INIS)

    Fu-Lai, Wang

    2010-01-01

    A specific uniform map is constructed as a homeomorphism mapping chaotic time series into [0,1] to obtain sequences of standard uniform distribution. With the uniform map, a chaotic orbit and a sequence orbit obtained are topologically equivalent to each other so the map can preserve the most dynamic properties of chaotic systems such as permutation entropy. Based on the uniform map, a universal algorithm to generate pseudo random numbers is proposed and the pseudo random series is tested to follow the standard 0–1 random distribution both theoretically and experimentally. The algorithm is not complex, which does not impose high requirement on computer hard ware and thus computation speed is fast. The method not only extends the parameter spaces but also avoids the drawback of small function space caused by constraints on chaotic maps used to generate pseudo random numbers. The algorithm can be applied to any chaotic system and can produce pseudo random sequence of high quality, thus can be a good universal pseudo random number generator. (general)

  7. A universal algorithm to generate pseudo-random numbers based on uniform mapping as homeomorphism

    Science.gov (United States)

    Wang, Fu-Lai

    2010-09-01

    A specific uniform map is constructed as a homeomorphism mapping chaotic time series into [0,1] to obtain sequences of standard uniform distribution. With the uniform map, a chaotic orbit and a sequence orbit obtained are topologically equivalent to each other so the map can preserve the most dynamic properties of chaotic systems such as permutation entropy. Based on the uniform map, a universal algorithm to generate pseudo random numbers is proposed and the pseudo random series is tested to follow the standard 0-1 random distribution both theoretically and experimentally. The algorithm is not complex, which does not impose high requirement on computer hard ware and thus computation speed is fast. The method not only extends the parameter spaces but also avoids the drawback of small function space caused by constraints on chaotic maps used to generate pseudo random numbers. The algorithm can be applied to any chaotic system and can produce pseudo random sequence of high quality, thus can be a good universal pseudo random number generator.

  8. Digital-Analog Hybrid Scheme and Its Application to Chaotic Random Number Generators

    Science.gov (United States)

    Yuan, Zeshi; Li, Hongtao; Miao, Yunchi; Hu, Wen; Zhu, Xiaohua

    2017-12-01

    Practical random number generation (RNG) circuits are typically achieved with analog devices or digital approaches. Digital-based techniques, which use field programmable gate array (FPGA) and graphics processing units (GPU) etc. usually have better performances than analog methods as they are programmable, efficient and robust. However, digital realizations suffer from the effect of finite precision. Accordingly, the generated random numbers (RNs) are actually periodic instead of being real random. To tackle this limitation, in this paper we propose a novel digital-analog hybrid scheme that employs the digital unit as the main body, and minimum analog devices to generate physical RNs. Moreover, the possibility of realizing the proposed scheme with only one memory element is discussed. Without loss of generality, we use the capacitor and the memristor along with FPGA to construct the proposed hybrid system, and a chaotic true random number generator (TRNG) circuit is realized, producing physical RNs at a throughput of Gbit/s scale. These RNs successfully pass all the tests in the NIST SP800-22 package, confirming the significance of the scheme in practical applications. In addition, the use of this new scheme is not restricted to RNGs, and it also provides a strategy to solve the effect of finite precision in other digital systems.

  9. Increased certification of semi-device independent random numbers using many inputs and more post-processing

    International Nuclear Information System (INIS)

    Mironowicz, Piotr; Tavakoli, Armin; Hameedi, Alley; Marques, Breno; Bourennane, Mohamed; Pawłowski, Marcin

    2016-01-01

    Quantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness certification and computational requirements of the post-processing of experimental data. In particular, we consider semi-device independent randomness certification from an experiment using a four dimensional quantum system to violate the classical bound of a random access code. Using state-of-the-art techniques, a smaller quantum violation requires more computational power to demonstrate randomness, which at some point becomes impossible with today’s computers although the randomness is (probably) still there. We show that by dedicating more input settings of the experiment to randomness certification, then by more computational postprocessing of the experimental data which corresponds to a quantum violation, one may increase the amount of certified randomness. Furthermore, we introduce a method that significantly lowers the computational complexity of randomness certification. Our results show how more randomness can be generated without altering the hardware and indicate a path for future semi-device independent protocols to follow. (paper)

  10. Pseudo-random number generation for Brownian Dynamics and Dissipative Particle Dynamics simulations on GPU devices

    International Nuclear Information System (INIS)

    Phillips, Carolyn L.; Anderson, Joshua A.; Glotzer, Sharon C.

    2011-01-01

    Highlights: → Molecular Dynamics codes implemented on GPUs have achieved two-order of magnitude computational accelerations. → Brownian Dynamics and Dissipative Particle Dynamics simulations require a large number of random numbers per time step. → We introduce a method for generating small batches of pseudorandom numbers distributed over many threads of calculations. → With this method, Dissipative Particle Dynamics is implemented on a GPU device without requiring thread-to-thread communication. - Abstract: Brownian Dynamics (BD), also known as Langevin Dynamics, and Dissipative Particle Dynamics (DPD) are implicit solvent methods commonly used in models of soft matter and biomolecular systems. The interaction of the numerous solvent particles with larger particles is coarse-grained as a Langevin thermostat is applied to individual particles or to particle pairs. The Langevin thermostat requires a pseudo-random number generator (PRNG) to generate the stochastic force applied to each particle or pair of neighboring particles during each time step in the integration of Newton's equations of motion. In a Single-Instruction-Multiple-Thread (SIMT) GPU parallel computing environment, small batches of random numbers must be generated over thousands of threads and millions of kernel calls. In this communication we introduce a one-PRNG-per-kernel-call-per-thread scheme, in which a micro-stream of pseudorandom numbers is generated in each thread and kernel call. These high quality, statistically robust micro-streams require no global memory for state storage, are more computationally efficient than other PRNG schemes in memory-bound kernels, and uniquely enable the DPD simulation method without requiring communication between threads.

  11. Theoretical and empirical convergence results for additive congruential random number generators

    Science.gov (United States)

    Wikramaratna, Roy S.

    2010-03-01

    Additive Congruential Random Number (ACORN) generators represent an approach to generating uniformly distributed pseudo-random numbers that is straightforward to implement efficiently for arbitrarily large order and modulus; if it is implemented using integer arithmetic, it becomes possible to generate identical sequences on any machine. This paper briefly reviews existing results concerning ACORN generators and relevant theory concerning sequences that are well distributed mod 1 in k dimensions. It then demonstrates some new theoretical results for ACORN generators implemented in integer arithmetic with modulus M=2[mu] showing that they are a family of generators that converge (in a sense that is defined in the paper) to being well distributed mod 1 in k dimensions, as [mu]=log2M tends to infinity. By increasing k, it is possible to increase without limit the number of dimensions in which the resulting sequences approximate to well distributed. The paper concludes by applying the standard TestU01 test suite to ACORN generators for selected values of the modulus (between 260 and 2150), the order (between 4 and 30) and various odd seed values. On the basis of these and earlier results, it is recommended that an order of at least 9 be used together with an odd seed and modulus equal to 230p, for a small integer value of p. While a choice of p=2 should be adequate for most typical applications, increasing p to 3 or 4 gives a sequence that will consistently pass all the tests in the TestU01 test suite, giving additional confidence in more demanding applications. The results demonstrate that the ACORN generators are a reliable source of uniformly distributed pseudo-random numbers, and that in practice (as suggested by the theoretical convergence results) the quality of the ACORN sequences increases with increasing modulus and order.

  12. Generation of pseudo-random numbers from given probabilistic distribution with the use of chaotic maps

    Science.gov (United States)

    Lawnik, Marcin

    2018-01-01

    The scope of the paper is the presentation of a new method of generating numbers from a given distribution. The method uses the inverse cumulative distribution function and a method of flattening of probabilistic distributions. On the grounds of these methods, a new construction of chaotic maps was derived, which generates values from a given distribution. The analysis of the new method was conducted on the example of a newly constructed chaotic recurrences, based on the Box-Muller transformation and the quantile function of the exponential distribution. The obtained results certify that the proposed method may be successively applicable for the construction of generators of pseudo-random numbers.

  13. Efficient pseudo-random number generation for monte-carlo simulations using graphic processors

    Science.gov (United States)

    Mohanty, Siddhant; Mohanty, A. K.; Carminati, F.

    2012-06-01

    A hybrid approach based on the combination of three Tausworthe generators and one linear congruential generator for pseudo random number generation for GPU programing as suggested in NVIDIA-CUDA library has been used for MONTE-CARLO sampling. On each GPU thread, a random seed is generated on fly in a simple way using the quick and dirty algorithm where mod operation is not performed explicitly due to unsigned integer overflow. Using this hybrid generator, multivariate correlated sampling based on alias technique has been carried out using both CUDA and OpenCL languages.

  14. Scope of Various Random Number Generators in ant System Approach for TSP

    Science.gov (United States)

    Sen, S. K.; Shaykhian, Gholam Ali

    2007-01-01

    Experimented on heuristic, based on an ant system approach for traveling salesman problem, are several quasi- and pseudo-random number generators. This experiment is to explore if any particular generator is most desirable. Such an experiment on large samples has the potential to rank the performance of the generators for the foregoing heuristic. This is mainly to seek an answer to the controversial issue "which generator is the best in terms of quality of the result (accuracy) as well as cost of producing the result (time/computational complexity) in a probabilistic/statistical sense."

  15. A data based random number generator for a multivariate distribution (using stochastic interpolation)

    Science.gov (United States)

    Thompson, J. R.; Taylor, M. S.

    1982-01-01

    Let X be a K-dimensional random variable serving as input for a system with output Y (not necessarily of dimension k). given X, an outcome Y or a distribution of outcomes G(Y/X) may be obtained either explicitly or implicity. The situation is considered in which there is a real world data set X sub j sub = 1 (n) and a means of simulating an outcome Y. A method for empirical random number generation based on the sample of observations of the random variable X without estimating the underlying density is discussed.

  16. Efficient pseudo-random number generation for Monte-Carlo simulations using graphic processors

    International Nuclear Information System (INIS)

    Mohanty, Siddhant; Mohanty, A K; Carminati, F

    2012-01-01

    A hybrid approach based on the combination of three Tausworthe generators and one linear congruential generator for pseudo random number generation for GPU programing as suggested in NVIDIA-CUDA library has been used for MONTE-CARLO sampling. On each GPU thread, a random seed is generated on fly in a simple way using the quick and dirty algorithm where mod operation is not performed explicitly due to unsigned integer overflow. Using this hybrid generator, multivariate correlated sampling based on alias technique has been carried out using both CUDA and OpenCL languages.

  17. Quantum random number generator based on quantum nature of vacuum fluctuations

    Science.gov (United States)

    Ivanova, A. E.; Chivilikhin, S. A.; Gleim, A. V.

    2017-11-01

    Quantum random number generator (QRNG) allows obtaining true random bit sequences. In QRNG based on quantum nature of vacuum, optical beam splitter with two inputs and two outputs is normally used. We compare mathematical descriptions of spatial beam splitter and fiber Y-splitter in the quantum model for QRNG, based on homodyne detection. These descriptions were identical, that allows to use fiber Y-splitters in practical QRNG schemes, simplifying the setup. Also we receive relations between the input radiation and the resulting differential current in homodyne detector. We experimentally demonstrate possibility of true random bits generation by using QRNG based on homodyne detection with Y-splitter.

  18. Leveraging Random Number Generation for Mastery of Learning in Teaching Quantitative Research Courses via an E-Learning Method

    Science.gov (United States)

    Boonsathorn, Wasita; Charoen, Danuvasin; Dryver, Arthur L.

    2014-01-01

    E-Learning brings access to a powerful but often overlooked teaching tool: random number generation. Using random number generation, a practically infinite number of quantitative problem-solution sets can be created. In addition, within the e-learning context, in the spirit of the mastery of learning, it is possible to assign online quantitative…

  19. Comparison of a quantum random number generator with pseudorandom number generators for their use in molecular Monte Carlo simulations.

    Science.gov (United States)

    Ghersi, Dario; Parakh, Abhishek; Mezei, Mihaly

    2017-12-05

    Four pseudorandom number generators were compared with a physical, quantum-based random number generator using the NIST suite of statistical tests, which only the quantum-based random number generator could successfully pass. We then measured the effect of the five random number generators on various calculated properties in different Markov-chain Monte Carlo simulations. Two types of systems were tested: conformational sampling of a small molecule in aqueous solution and liquid methanol under constant temperature and pressure. The results show that poor quality pseudorandom number generators produce results that deviate significantly from those obtained with the quantum-based random number generator, particularly in the case of the small molecule in aqueous solution setup. In contrast, the widely used Mersenne Twister pseudorandom generator and a 64-bit Linear Congruential Generator with a scrambler produce results that are statistically indistinguishable from those obtained with the quantum-based random number generator. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  20. Pseudo-random number generation for Brownian Dynamics and Dissipative Particle Dynamics simulations on GPU devices

    Science.gov (United States)

    Phillips, Carolyn L.; Anderson, Joshua A.; Glotzer, Sharon C.

    2011-08-01

    Brownian Dynamics (BD), also known as Langevin Dynamics, and Dissipative Particle Dynamics (DPD) are implicit solvent methods commonly used in models of soft matter and biomolecular systems. The interaction of the numerous solvent particles with larger particles is coarse-grained as a Langevin thermostat is applied to individual particles or to particle pairs. The Langevin thermostat requires a pseudo-random number generator (PRNG) to generate the stochastic force applied to each particle or pair of neighboring particles during each time step in the integration of Newton's equations of motion. In a Single-Instruction-Multiple-Thread (SIMT) GPU parallel computing environment, small batches of random numbers must be generated over thousands of threads and millions of kernel calls. In this communication we introduce a one-PRNG-per-kernel-call-per-thread scheme, in which a micro-stream of pseudorandom numbers is generated in each thread and kernel call. These high quality, statistically robust micro-streams require no global memory for state storage, are more computationally efficient than other PRNG schemes in memory-bound kernels, and uniquely enable the DPD simulation method without requiring communication between threads.

  1. The additive congruential random number generator--A special case of a multiple recursive generator

    Science.gov (United States)

    Wikramaratna, Roy S.

    2008-07-01

    This paper considers an approach to generating uniformly distributed pseudo-random numbers which works well in serial applications but which also appears particularly well-suited for application on parallel processing systems. Additive Congruential Random Number (ACORN) generators are straightforward to implement for arbitrarily large order and modulus; if implemented using integer arithmetic, it becomes possible to generate identical sequences on any machine. Previously published theoretical analysis has demonstrated that a kth order ACORN sequence approximates to being uniformly distributed in up to k dimensions, for any given k. ACORN generators can be constructed to give period lengths exceeding any given number (for example, with period length in excess of 230p, for any given p). Results of empirical tests have demonstrated that, if p is greater than or equal to 2, then the ACORN generator can be used successfully for generating double precision uniform random variates. This paper demonstrates that an ACORN generator is a particular case of a multiple recursive generator (and, therefore, also a special case of a matrix generator). Both these latter approaches have been widely studied, and it is to be hoped that the results given in the present paper will lead to greater confidence in using the ACORN generators.

  2. Chaotic oscillation and random-number generation based on nanoscale optical-energy transfer.

    Science.gov (United States)

    Naruse, Makoto; Kim, Song-Ju; Aono, Masashi; Hori, Hirokazu; Ohtsu, Motoichi

    2014-08-12

    By using nanoscale energy-transfer dynamics and density matrix formalism, we demonstrate theoretically and numerically that chaotic oscillation and random-number generation occur in a nanoscale system. The physical system consists of a pair of quantum dots (QDs), with one QD smaller than the other, between which energy transfers via optical near-field interactions. When the system is pumped by continuous-wave radiation and incorporates a timing delay between two energy transfers within the system, it emits optical pulses. We refer to such QD pairs as nano-optical pulsers (NOPs). Irradiating an NOP with external periodic optical pulses causes the oscillating frequency of the NOP to synchronize with the external stimulus. We find that chaotic oscillation occurs in the NOP population when they are connected by an external time delay. Moreover, by evaluating the time-domain signals by statistical-test suites, we confirm that the signals are sufficiently random to qualify the system as a random-number generator (RNG). This study reveals that even relatively simple nanodevices that interact locally with each other through optical energy transfer at scales far below the wavelength of irradiating light can exhibit complex oscillatory dynamics. These findings are significant for applications such as ultrasmall RNGs.

  3. Generation of pseudo-random numbers with the use of inverse chaotic transformation

    Directory of Open Access Journals (Sweden)

    Lawnik Marcin

    2018-02-01

    Full Text Available In (Lawnik M., Generation of numbers with the distribution close to uniform with the use of chaotic maps, In: Obaidat M.S., Kacprzyk J., Ören T. (Ed., International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH (28-30 August 2014, Vienna, Austria, SCITEPRESS, 2014 Lawnik discussed a method of generating pseudo-random numbers from uniform distribution with the use of adequate chaotic transformation. The method enables the “flattening” of continuous distributions to uniform one. In this paper a inverse process to the above-mentioned method is presented, and, in consequence, a new manner of generating pseudo-random numbers from a given continuous distribution. The method utilizes the frequency of the occurrence of successive branches of chaotic transformation in the process of “flattening”. To generate the values from the given distribution one discrete and one continuous value of a random variable are required. The presented method does not directly involve the knowledge of the density function or the cumulative distribution function, which is, undoubtedly, a great advantage in comparison with other well-known methods. The described method was analysed on the example of the standard normal distribution.

  4. Application of random number generators in genetic algorithms to improve rainfall-runoff modelling

    Science.gov (United States)

    Chlumecký, Martin; Buchtele, Josef; Richta, Karel

    2017-10-01

    The efficient calibration of rainfall-runoff models is a difficult issue, even for experienced hydrologists. Therefore, fast and high-quality model calibration is a valuable improvement. This paper describes a novel methodology and software for the optimisation of a rainfall-runoff modelling using a genetic algorithm (GA) with a newly prepared concept of a random number generator (HRNG), which is the core of the optimisation. The GA estimates model parameters using evolutionary principles, which requires a quality number generator. The new HRNG generates random numbers based on hydrological information and it provides better numbers compared to pure software generators. The GA enhances the model calibration very well and the goal is to optimise the calibration of the model with a minimum of user interaction. This article focuses on improving the internal structure of the GA, which is shielded from the user. The results that we obtained indicate that the HRNG provides a stable trend in the output quality of the model, despite various configurations of the GA. In contrast to previous research, the HRNG speeds up the calibration of the model and offers an improvement of rainfall-runoff modelling.

  5. A Bidirectional Generalized Synchronization Theorem-Based Chaotic Pseudo-random Number Generator

    Directory of Open Access Journals (Sweden)

    Han Shuangshuang

    2013-07-01

    Full Text Available Based on a bidirectional generalized synchronization theorem for discrete chaos system, this paper introduces a new 5-dimensional bidirectional generalized chaos synchronization system (BGCSDS, whose prototype is a novel chaotic system introduced in [12]. Numerical simulation showed that two pair variables of the BGCSDS achieve generalized chaos synchronization via a transform H.A chaos-based pseudo-random number generator (CPNG was designed by the new BGCSDS. Using the FIPS-140-2 tests issued by the National Institute of Standard and Technology (NIST verified the randomness of the 1000 binary number sequences generated via the CPNG and the RC4 algorithm respectively. The results showed that all the tested sequences passed the FIPS-140-2 tests. The confidence interval analysis showed the statistical properties of the randomness of the sequences generated via the CPNG and the RC4 algorithm do not have significant differences.

  6. Random number generators in support of Monte Carlo problems in physics

    International Nuclear Information System (INIS)

    Dyadkin, I.G.

    1993-01-01

    The ability to support a modern users' expectations of random number generators to solve problems in physics is analyzed. The capabilities of the newest concepts and the old pseudo-random algorithms are compared. The author is in favor of multiplicative generators. Due to the 64-bit arithmetic of a modern PC, multiplicative generators have a sufficient number of periods (up to 2 62 ) and are quicker to generate and to govern independent sequences for parallel processing. In addition they are able to replicate sub-sequences (without storing their seeds) for each standard trial in any code and to simulate spatial and planar directions and EXP(-x) distributions often needed as ''bricks'' for simulating events in physics. Hundreds of multipliers for multiplicative generators have been tabulated and tested, and the required speeds have been obtained. (author)

  7. Random number generators for large-scale parallel Monte Carlo simulations on FPGA

    Science.gov (United States)

    Lin, Y.; Wang, F.; Liu, B.

    2018-05-01

    Through parallelization, field programmable gate array (FPGA) can achieve unprecedented speeds in large-scale parallel Monte Carlo (LPMC) simulations. FPGA presents both new constraints and new opportunities for the implementations of random number generators (RNGs), which are key elements of any Monte Carlo (MC) simulation system. Using empirical and application based tests, this study evaluates all of the four RNGs used in previous FPGA based MC studies and newly proposed FPGA implementations for two well-known high-quality RNGs that are suitable for LPMC studies on FPGA. One of the newly proposed FPGA implementations: a parallel version of additive lagged Fibonacci generator (Parallel ALFG) is found to be the best among the evaluated RNGs in fulfilling the needs of LPMC simulations on FPGA.

  8. Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments

    Science.gov (United States)

    Peris-Lopez, Pedro; Hernandez-Castro, Julio C.; Tapiador, Juan M. E.; Millán, Enrique San; van der Lubbe, Jan C. A.

    In 2004, Settharam and Rhee tackled the design of a lightweight Pseudo-Random Number Generator (PRNG) suitable for low-power environments (e.g. sensor networks, low-cost RFID tags). First, they explicitly fixed a set of requirements for this primitive. Then, they proposed a PRNG conforming to these requirements and using a free-running timer [9]. We analyze this primitive discovering important security faults. The proposed algorithm fails to pass even relatively non-stringent batteries of randomness such as ENT (i.e. a pseudorandom number sequence test program). We prove that their recommended PRNG has a very short period due to the flawed design of its core. The internal state can be easily revealed, compromising its backward and forward security. Additionally, the rekeying algorithm is defectively designed mainly related to the unpractical value proposed for this purpose.

  9. On the design of henon and logistic map-based random number generator

    Science.gov (United States)

    Magfirawaty; Suryadi, M. T.; Ramli, Kalamullah

    2017-10-01

    The key sequence is one of the main elements in the cryptosystem. True Random Number Generators (TRNG) method is one of the approaches to generating the key sequence. The randomness source of the TRNG divided into three main groups, i.e. electrical noise based, jitter based and chaos based. The chaos based utilizes a non-linear dynamic system (continuous time or discrete time) as an entropy source. In this study, a new design of TRNG based on discrete time chaotic system is proposed, which is then simulated in LabVIEW. The principle of the design consists of combining 2D and 1D chaotic systems. A mathematical model is implemented for numerical simulations. We used comparator process as a harvester method to obtain the series of random bits. Without any post processing, the proposed design generated random bit sequence with high entropy value and passed all NIST 800.22 statistical tests.

  10. High-Speed Device-Independent Quantum Random Number Generation without a Detection Loophole

    Science.gov (United States)

    Liu, Yang; Yuan, Xiao; Li, Ming-Han; Zhang, Weijun; Zhao, Qi; Zhong, Jiaqiang; Cao, Yuan; Li, Yu-Huai; Chen, Luo-Kan; Li, Hao; Peng, Tianyi; Chen, Yu-Ao; Peng, Cheng-Zhi; Shi, Sheng-Cai; Wang, Zhen; You, Lixing; Ma, Xiongfeng; Fan, Jingyun; Zhang, Qiang; Pan, Jian-Wei

    2018-01-01

    Quantum mechanics provides the means of generating genuine randomness that is impossible with deterministic classical processes. Remarkably, the unpredictability of randomness can be certified in a manner that is independent of implementation devices. Here, we present an experimental study of device-independent quantum random number generation based on a detection-loophole-free Bell test with entangled photons. In the randomness analysis, without the independent identical distribution assumption, we consider the worst case scenario that the adversary launches the most powerful attacks against the quantum adversary. After considering statistical fluctuations and applying an 80 Gb ×45.6 Mb Toeplitz matrix hashing, we achieve a final random bit rate of 114 bits /s , with a failure probability less than 10-5. This marks a critical step towards realistic applications in cryptography and fundamental physics tests.

  11. Engineering applications of fpgas chaotic systems, artificial neural networks, random number generators, and secure communication systems

    CERN Document Server

    Tlelo-Cuautle, Esteban; de la Fraga, Luis Gerardo

    2016-01-01

    This book offers readers a clear guide to implementing engineering applications with FPGAs, from the mathematical description to the hardware synthesis, including discussion of VHDL programming and co-simulation issues. Coverage includes FPGA realizations such as: chaos generators that are described from their mathematical models; artificial neural networks (ANNs) to predict chaotic time series, for which a discussion of different ANN topologies is included, with different learning techniques and activation functions; random number generators (RNGs) that are realized using different chaos generators, and discussions of their maximum Lyapunov exponent values and entropies. Finally, optimized chaotic oscillators are synchronized and realized to implement a secure communication system that processes black and white and grey-scale images. In each application, readers will find VHDL programming guidelines and computer arithmetic issues, along with co-simulation examples with Active-HDL and Simulink. Readers will b...

  12. Effect of Rapid Maxillary Expansion on Glenoid Fossa and Condyle-Fossa Relationship in Growing Patients (MEGP): Study Protocol for a Controlled Clinical Trial

    Science.gov (United States)

    Ghoussoub, Mona Sayegh; Rifai, Khaldoun; Garcia, Robert; Sleilaty, Ghassan

    2018-01-01

    Aims and Objectives: Rapid maxillary expansion (RME) is an orthodontic nonsurgical procedure aiming at increasing the width of the maxilla by opening mainly the intermaxillary suture in patients presenting a transverse maxillary skeletal deficiency. The objectives of the current prospective controlled clinical and radiographic study are to evaluate the hypothesis that RME in growing patients will result in radiographic changes at the level of interglenoid fossa distance, condyle-fossa relationship, and nasal cavity widths compared to the group who received no treatment initially and served as untreated control. Materials and Methods: In this prospective controlled clinical and radiographic study, forty healthy growing patients selected from a school-based population following a large screening campaign, ranging in age between 8 and 13 years, presenting a maxillary constriction with bilateral crossbite, and candidates for RME are being recruited. The first group will include participants willing to undergo treatment (n = 25) and the other group will include those inclined to postpone (n = 15). Results: The primary outcome is to compare radiologically the interglenoid fossa distance and the condyle-fossa relationship; nasal cavity width will be a secondary outcome. A multivariable analysis of Covariance model will be used, with the assessment of the time by group interaction, using age as covariate. The project protocol was reviewed and approved by the Ethics Committee of the Lebanese University, National Institute in Lebanon (CUEMB process number 31/04/2015). The study is funded by the Lebanese University and Centre National de Recherche Scientifique, Lebanon (Number: 652 on 14/04/2016). Conclusion: This prospective controlled clinical trial will give information about the effect of RME on the glenoid fossa and condyle-fossa relationship and its impact on the nasal cavity width. Trial Registration: Retrospectively registered in BioMed Central (DOI10.1186/ISRCTN

  13. An On-Demand Optical Quantum Random Number Generator with In-Future Action and Ultra-Fast Response.

    Science.gov (United States)

    Stipčević, Mario; Ursin, Rupert

    2015-06-09

    Random numbers are essential for our modern information based society e.g. in cryptography. Unlike frequently used pseudo-random generators, physical random number generators do not depend on complex algorithms but rather on a physical process to provide true randomness. Quantum random number generators (QRNG) do rely on a process, which can be described by a probabilistic theory only, even in principle. Here we present a conceptually simple implementation, which offers a 100% efficiency of producing a random bit upon a request and simultaneously exhibits an ultra low latency. A careful technical and statistical analysis demonstrates its robustness against imperfections of the actual implemented technology and enables to quickly estimate randomness of very long sequences. Generated random numbers pass standard statistical tests without any post-processing. The setup described, as well as the theory presented here, demonstrate the maturity and overall understanding of the technology.

  14. Novel pseudo-random number generator based on quantum random walks

    Science.gov (United States)

    Yang, Yu-Guang; Zhao, Qian-Qian

    2016-02-01

    In this paper, we investigate the potential application of quantum computation for constructing pseudo-random number generators (PRNGs) and further construct a novel PRNG based on quantum random walks (QRWs), a famous quantum computation model. The PRNG merely relies on the equations used in the QRWs, and thus the generation algorithm is simple and the computation speed is fast. The proposed PRNG is subjected to statistical tests such as NIST and successfully passed the test. Compared with the representative PRNG based on quantum chaotic maps (QCM), the present QRWs-based PRNG has some advantages such as better statistical complexity and recurrence. For example, the normalized Shannon entropy and the statistical complexity of the QRWs-based PRNG are 0.999699456771172 and 1.799961178212329e-04 respectively given the number of 8 bits-words, say, 16Mbits. By contrast, the corresponding values of the QCM-based PRNG are 0.999448131481064 and 3.701210794388818e-04 respectively. Thus the statistical complexity and the normalized entropy of the QRWs-based PRNG are closer to 0 and 1 respectively than those of the QCM-based PRNG when the number of words of the analyzed sequence increases. It provides a new clue to construct PRNGs and also extends the applications of quantum computation.

  15. Random Number Generation in HIV Disease: Associations with Neuropsychological Functions and Activities of Daily Living.

    Science.gov (United States)

    Sheppard, David P; Woods, Steven Paul; Doyle, Katie L; Verduzco, Marizela

    2017-02-01

    HIV is associated with frontostriatal dysregulation and executive dysfunction. This study evaluated whether HIV-infected individuals evidence deficits in random number generation (RNG), which is a strategic task requiring paced, rule-guided production of digits. In total, 74 HIV+ adults and 54 seronegative comparison participants completed a comprehensive research neuropsychological battery. Participants produced a random digit sequence by avoiding any order and using numbers 1 through 10 for 100 s at a pace of 1 digit/s. Outcomes included intrusions, repetitions, seriation (1-2-3-4), and cycling (median length of gaps between repeating digits). HIV disease was associated with higher levels of seriation and cycling (ps  .10). Among HIV+ individuals, higher seriation was associated with neuropsychological performance including poorer auditory attention, verbal learning, and delayed memory, whereas higher cycling scores were associated with poorer delayed memory and verbal fluency (ps random sequences, which showed medium associations with higher order verbal abilities and may contribute to greater declines in everyday functioning outcomes. Future studies might examine RNG's role in health behaviors such as medical decision-making or medication adherence. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. Hardware random number generator base on monostable multivibrators dedicated for distributed measurement and control systems

    Science.gov (United States)

    Czernik, Pawel

    2013-10-01

    The hardware random number generator based on the 74121 monostable multivibrators for applications in cryptographically secure distributed measurement and control systems with asymmetric resources was presented. This device was implemented on the basis of the physical electronic vibration generator in which the circuit is composed of two "loop" 74121 monostable multivibrators, D flip-flop and external clock signal source. The clock signal, witch control D flip-flop was generated by a computer on one of the parallel port pins. There was presented programmed the author's acquisition process of random data from the measuring system to a computer. The presented system was designed, builded and thoroughly tested in the term of cryptographic security in our laboratory, what there is the most important part of this publication. Real cryptographic security was tested based on the author's software and the software environment called RDieHarder. The obtained results was here presented and analyzed in detail with particular reference to the specificity of distributed measurement and control systems with asymmetric resources.

  17. Novel pseudo-random number generator based on quantum random walks.

    Science.gov (United States)

    Yang, Yu-Guang; Zhao, Qian-Qian

    2016-02-04

    In this paper, we investigate the potential application of quantum computation for constructing pseudo-random number generators (PRNGs) and further construct a novel PRNG based on quantum random walks (QRWs), a famous quantum computation model. The PRNG merely relies on the equations used in the QRWs, and thus the generation algorithm is simple and the computation speed is fast. The proposed PRNG is subjected to statistical tests such as NIST and successfully passed the test. Compared with the representative PRNG based on quantum chaotic maps (QCM), the present QRWs-based PRNG has some advantages such as better statistical complexity and recurrence. For example, the normalized Shannon entropy and the statistical complexity of the QRWs-based PRNG are 0.999699456771172 and 1.799961178212329e-04 respectively given the number of 8 bits-words, say, 16Mbits. By contrast, the corresponding values of the QCM-based PRNG are 0.999448131481064 and 3.701210794388818e-04 respectively. Thus the statistical complexity and the normalized entropy of the QRWs-based PRNG are closer to 0 and 1 respectively than those of the QCM-based PRNG when the number of words of the analyzed sequence increases. It provides a new clue to construct PRNGs and also extends the applications of quantum computation.

  18. Embedded Platform for Automatic Testing and Optimizing of FPGA Based Cryptographic True Random Number Generators

    Directory of Open Access Journals (Sweden)

    M. Varchola

    2009-12-01

    Full Text Available This paper deals with an evaluation platform for cryptographic True Random Number Generators (TRNGs based on the hardware implementation of statistical tests for FPGAs. It was developed in order to provide an automatic tool that helps to speed up the TRNG design process and can provide new insights on the TRNG behavior as it will be shown on a particular example in the paper. It enables to test sufficient statistical properties of various TRNG designs under various working conditions on the fly. Moreover, the tests are suitable to be embedded into cryptographic hardware products in order to recognize TRNG output of weak quality and thus increase its robustness and reliability. Tests are fully compatible with the FIPS 140 standard and are implemented by the VHDL language as an IP-Core for vendor independent FPGAs. A recent Flash based Actel Fusion FPGA was chosen for preliminary experiments. The Actel version of the tests possesses an interface to the Actel’s CoreMP7 softcore processor that is fully compatible with the industry standard ARM7TDMI. Moreover, identical tests suite was implemented to the Xilinx Virtex 2 and 5 in order to compare the performance of the proposed solution with the performance of already published one based on the same FPGAs. It was achieved 25% and 65% greater clock frequency respectively while consuming almost equal resources of the Xilinx FPGAs. On the top of it, the proposed FIPS 140 architecture is capable of processing one random bit per one clock cycle which results in 311.5 Mbps throughput for Virtex 5 FPGA.

  19. Systematic errors due to linear congruential random-number generators with the Swendsen-Wang algorithm: a warning.

    Science.gov (United States)

    Ossola, Giovanni; Sokal, Alan D

    2004-08-01

    We show that linear congruential pseudo-random-number generators can cause systematic errors in Monte Carlo simulations using the Swendsen-Wang algorithm, if the lattice size is a multiple of a very large power of 2 and one random number is used per bond. These systematic errors arise from correlations within a single bond-update half-sweep. The errors can be eliminated (or at least radically reduced) by updating the bonds in a random order or in an aperiodic manner. It also helps to use a generator of large modulus (e.g., 60 or more bits).

  20. Harvesting Entropy for Random Number Generation for Internet of Things Constrained Devices Using On-Board Sensors

    Directory of Open Access Journals (Sweden)

    Marcin Piotr Pawlowski

    2015-10-01

    Full Text Available Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In constrained devices of the Internet of Things ecosystem, high entropy random number generators are hard to achieve due to hardware limitations. For the purpose of the random number generation in constrained devices, this work proposes a solution based on the least-significant bits concatenation entropy harvesting method. As a potential source of entropy, on-board integrated sensors (i.e., temperature, humidity and two different light sensors have been analyzed. Additionally, the costs (i.e., time and memory consumption of the presented approach have been measured. The results obtained from the proposed method with statistical fine tuning achieved a Shannon entropy of around 7.9 bits per byte of data for temperature and humidity sensors. The results showed that sensor-based random number generators are a valuable source of entropy with very small RAM and Flash memory requirements for constrained devices of the Internet of Things.

  1. Harvesting Entropy for Random Number Generation for Internet of Things Constrained Devices Using On-Board Sensors

    Science.gov (United States)

    Pawlowski, Marcin Piotr; Jara, Antonio; Ogorzalek, Maciej

    2015-01-01

    Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In constrained devices of the Internet of Things ecosystem, high entropy random number generators are hard to achieve due to hardware limitations. For the purpose of the random number generation in constrained devices, this work proposes a solution based on the least-significant bits concatenation entropy harvesting method. As a potential source of entropy, on-board integrated sensors (i.e., temperature, humidity and two different light sensors) have been analyzed. Additionally, the costs (i.e., time and memory consumption) of the presented approach have been measured. The results obtained from the proposed method with statistical fine tuning achieved a Shannon entropy of around 7.9 bits per byte of data for temperature and humidity sensors. The results showed that sensor-based random number generators are a valuable source of entropy with very small RAM and Flash memory requirements for constrained devices of the Internet of Things. PMID:26506357

  2. Parallel Monte Carlo Particle Transport and the Quality of Random Number Generators: How Good is Good Enough?

    International Nuclear Information System (INIS)

    Procassini, R J; Beck, B R

    2004-01-01

    It might be assumed that use of a ''high-quality'' random number generator (RNG), producing a sequence of ''pseudo random'' numbers with a ''long'' repetition period, is crucial for producing unbiased results in Monte Carlo particle transport simulations. While several theoretical and empirical tests have been devised to check the quality (randomness and period) of an RNG, for many applications it is not clear what level of RNG quality is required to produce unbiased results. This paper explores the issue of RNG quality in the context of parallel, Monte Carlo transport simulations in order to determine how ''good'' is ''good enough''. This study employs the MERCURY Monte Carlo code, which incorporates the CNPRNG library for the generation of pseudo-random numbers via linear congruential generator (LCG) algorithms. The paper outlines the usage of random numbers during parallel MERCURY simulations, and then describes the source and criticality transport simulations which comprise the empirical basis of this study. A series of calculations for each test problem in which the quality of the RNG (period of the LCG) is varied provides the empirical basis for determining the minimum repetition period which may be employed without producing a bias in the mean integrated results

  3. Harvesting entropy for random number generation for internet of things constrained devices using on-board sensors.

    Science.gov (United States)

    Pawlowski, Marcin Piotr; Jara, Antonio; Ogorzalek, Maciej

    2015-10-22

    Entropy in computer security is associated with the unpredictability of a source of randomness. The random source with high entropy tends to achieve a uniform distribution of random values. Random number generators are one of the most important building blocks of cryptosystems. In constrained devices of the Internet of Things ecosystem, high entropy random number generators are hard to achieve due to hardware limitations. For the purpose of the random number generation in constrained devices, this work proposes a solution based on the least-significant bits concatenation entropy harvesting method. As a potential source of entropy, on-board integrated sensors (i.e., temperature, humidity and two different light sensors) have been analyzed. Additionally, the costs (i.e., time and memory consumption) of the presented approach have been measured. The results obtained from the proposed method with statistical fine tuning achieved a Shannon entropy of around 7.9 bits per byte of data for temperature and humidity sensors. The results showed that sensor-based random number generators are a valuable source of entropy with very small RAM and Flash memory requirements for constrained devices of the Internet of Things.

  4. The effects of transcranial magnetic stimulation over the dorsolateral prefrontal cortex on suppression of habitual counting during random number generation.

    Science.gov (United States)

    Jahanshahi, M; Profice, P; Brown, R G; Ridding, M C; Dirnberger, G; Rothwell, J C

    1998-08-01

    Random number generation is an attention-demanding task that engages working memory and executive processes. Random number generation requires holding information 'on line', suppression of habitual counting, internally driven response generation and monitoring of responses. Evidence from PET studies suggests that the dorsolateral prefrontal cortex (DLPFC) is involved in the generation of random responses. We examined the effects of short trains of transcranial magnetic stimulation (TMS) over the left or right DLPFC or medial frontal cortex on random number generation in healthy normal participants. As in previous evidence, in control trials without stimulation participants performed poorly on the random number generation task, showing repetition avoidance and a tendency to count. Brief disruption of processing with TMS over the left DLPFC changed the balance of the individuals' counting bias, increasing the most habitual counting in ones and reducing the lower probability response of counting in twos. This differential effect of TMS over the left DLPFC on the balance of the subject's counting bias was not obtained with TMS over the right DLPFC or the medial frontal cortex. The results suggest that, with disruption of the left DLPFC with TMS, habitual counting in ones that has previously been suppressed is released from inhibition. From these findings a network modulation model of random number generation is proposed, whereby suppression of habitual responses is achieved through the modulatory influence of the left DLPFC over a number-associative network in the superior temporal cortex. To allow emergence of appropriate random responses, the left DLPFC inhibits the superior temporal cortex to prevent spreading activation and habitual counting in ones.

  5. Nuclear safeguard assessment in nuclear power plants (NPPs) using loss function with modified random numbers

    International Nuclear Information System (INIS)

    Woo, Tae Ho

    2012-01-01

    Highlights: ► The safeguard is analyzed by quantification. ► Newly introduced SF is analyzed by the electrical power output. ► The relative value of SF is shown in the month level. ► The better operation could be indicated numerical values. ► There are several secure operation factors to be suggested. - Abstract: The energy production in nuclear power plants (NPPs) is investigated for the safeguard risk management using economic factors. The economic loss function is used for the life quality in the social and natural objects. For the basic event elements, the game theory is applied for the basic elements of the incidents in non-secure situations. The Safeguard Factor (SF) is introduced for the quantifications of simulation. The results are shown by the standard productivity comparisons with the designed power operations, which is obtained as the range of secure life extension in 2000 MW e is between 0.0000 and 9.1985 and the range in 600 MW e is between 0.0000 and 2.7600. So, the highest value in the range of secure power operation increases about 3.33 times higher than that of the interested power operation in this study, which means the safeguard assessment is quantified by the power rate in the life extension of the NPPs. The Nuclear Safeguard Protocol (NSP) is constructed for the safe operation successfully.

  6. PUFKEY: a high-security and high-throughput hardware true random number generator for sensor networks.

    Science.gov (United States)

    Li, Dongfang; Lu, Zhaojun; Zou, Xuecheng; Liu, Zhenglin

    2015-10-16

    Random number generators (RNG) play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF) elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST) randomness tests and is resilient to a wide range of security attacks.

  7. PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Dongfang Li

    2015-10-01

    Full Text Available Random number generators (RNG play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST randomness tests and is resilient to a wide range of security attacks.

  8. Implementation of a RANLUX Based Pseudo-Random Number Generator in FPGA Using VHDL and Impulse C

    OpenAIRE

    Agnieszka Dąbrowska-Boruch; Grzegorz Gancarczyk; Kazimierz Wiatr

    2014-01-01

    Monte Carlo simulations are widely used e.g. in the field of physics and molecular modelling. The main role played in these is by the high performance random number generators, such as RANLUX or MERSSENE TWISTER. In this paper the authors introduce the world's first implementation of the RANLUX algorithm on an FPGA platform for high performance computing purposes. A significant speed-up of one generator instance over 60 times, compared with a graphic card based solution, can be noticed. Compa...

  9. Research of the method of pseudo-random number generation based on asynchronous cellular automata with several active cells

    Directory of Open Access Journals (Sweden)

    Bilan Stepan

    2017-01-01

    Full Text Available To date, there are many tasks that are aimed at studying the dynamic changes in physical processes. These tasks do not give advance known result. The solution of such problems is based on the construction of a dynamic model of the object. Successful structural and functional implementation of the object model can give a positive result in time. This approach uses the task of constructing artificial biological objects. To solve such problems, pseudo-random number generators are used, which also find wide application for information protection tasks. Such generators should have good statistical properties and give a long repetition period of the generated pseudo-random bit sequence. This work is aimed at improving these characteristics. The paper considers the method of forming pseudo-random sequences of numbers on the basis of aperiodic cellular automata with two active cells. A pseudo-random number generator is proposed that generates three bit sequences. The first two bit sequences are formed by the corresponding two active cells in the cellular automaton. The third bit sequence is the result of executing the XOR function over the bits of the first two sequences and it has better characteristics compared to them. The use of cellular automata with two active cells allowed to improve the statistical properties of the formed bit sequence, as well as its repetition period. This is proved by using graphical tests for generators built based on cellular automata using the neighborhoods of von Neumann and Moore. The tests showed high efficiency of the generator based on an asynchronous cellular automaton with the neighborhood of Moore. The proposed pseudo-random number generators have good statistical properties, which makes it possible to use them in information security systems, as well as for simulation tasks of various dynamic processes.

  10. Changes of cerebral blood flow during the secondary expansion of a cortical contusion assessed by 14C-iodoantipyrine autoradiography in mice using a non-invasive protocol.

    Science.gov (United States)

    Engel, Doortje C; Mies, Günter; Terpolilli, Nicole A; Trabold, Raimund; Loch, Alexander; De Zeeuw, Chris I; Weber, John T; Maas, Andrew I R; Plesnila, Nikolaus

    2008-07-01

    Although changes of cerebral blood flow (CBF) in and around traumatic contusions are well documented, the role of CBF for the delayed death of neuronal cells in the traumatic penumbra ultimately resulting in secondary contusion expansion remains unclear. The aim of the current study was therefore to investigate the relationship between changes of CBF and progressive peri-contusional cell death following traumatic brain injury (TBI). CBF and contusion size were measured in C57Bl6 mice under continuous on-line monitoring of (ETp)CO2 before, and at 15 min and 24 h following controlled cortical impact by 14C-iodoantipyrine autoradiography (IAP-AR; n = 5-6 per group) and by Nissl staining, respectively. Contused and ischemic (CBF < 10%) tissue volumes were calculated and compared over time. Cortical CBF in not injured mice varied between 69 and 93 mL/100mg/min depending on the anatomical location. Fifteen minutes after trauma, CBF decreased in the whole brain by approximately 50% (39 +/- 18 mL/100mg/min; p < 0.05), except in contused tissue where it fell by more than 90% (3 +/- 2 mL/100mg/min; p < 0.001). Within 24 h after TBI, CBF recovered to normal values in all brain areas except the contusion where it remained reduced by more than 90% (p < 0.001). Contusion volume expanded from 24.9 to 35.5 mm3 (p < 0.01) from 15 min to 24 h after trauma (+43%), whereas the area of severe ischemia (CBF < 10%) showed only a minimal (+13%) and not significant increase (22.3 to 25.1 mm3). The current data therefore suggest that the delayed secondary expansion of a cortical contusion following traumatic brain injury may not be caused by a reduction of CBF alone.

  11. Quantum random flip-flop and its applications in random frequency synthesis and true random number generation

    Energy Technology Data Exchange (ETDEWEB)

    Stipčević, Mario, E-mail: mario.stipcevic@irb.hr [Photonics and Quantum Optics Research Unit, Center of Excellence for Advanced Materials and Sensing Devices, Ruđer Bošković Institute, Bijenička 54, 10000 Zagreb (Croatia)

    2016-03-15

    In this work, a new type of elementary logic circuit, named random flip-flop (RFF), is proposed, experimentally realized, and studied. Unlike conventional Boolean logic circuits whose action is deterministic and highly reproducible, the action of a RFF is intentionally made maximally unpredictable and, in the proposed realization, derived from a fundamentally random process of emission and detection of light quanta. We demonstrate novel applications of RFF in randomness preserving frequency division, random frequency synthesis, and random number generation. Possible usages of these applications in the information and communication technology, cryptographic hardware, and testing equipment are discussed.

  12. PERL-2 and LAVR-2 programs for Monte Carlo calculation of reactivity disturbances with trajectory correlation using random numbers

    International Nuclear Information System (INIS)

    Kamaeva, O.B.; Polevoj, V.B.

    1983-01-01

    Realization of BESM-6 computer of a technique is described for calculating a wide class of reactivity disturbances by plotting trajectories in undisturbed and disturbed systems using one sequence of random numbers. The technique was realized on the base of earlier created programs of calculation of widespreed (PERL) and local (LAVR) reactivity disturbances. The efficiency of the technique and programs is demonstrated by calculation of change of effective neutron-multiplication factor when absorber is substituted for fuel element in a BFS-40 critical assembly and by calculation of control drum characteristics

  13. Non-Stoichiometric SixN Metal-Oxide-Semiconductor Field-Effect Transistor for Compact Random Number Generator with 0.3 Mbit/s Generation Rate

    Science.gov (United States)

    Matsumoto, Mari; Ohba, Ryuji; Yasuda, Shin-ichi; Uchida, Ken; Tanamoto, Tetsufumi; Fujita, Shinobu

    2008-08-01

    The demand for random numbers for security applications is increasing. A conventional random number generator using thermal noise can generate unpredictable high-quality random numbers, but the circuit is extremely large because of large amplifier circuit for a small thermal signal. On the other hand, a pseudo-random number generator is small but the quality of randomness is bad. For a small circuit and a high quality of randomness, we purpose a non-stoichiometric SixN metal-oxide-semiconductor field-effect transistor (MOSFET) noise source device. This device generates a very large noise signal without an amplifier circuit. As a result, it is shown that, utilizing a SiN MOSFET, we can attain a compact random number generator with a high generation rate near 1 Mbit/s, which is suitable for almost all security applications.

  14. Random number generation in bilingual Balinese and German students: preliminary findings from an exploratory cross-cultural study.

    Science.gov (United States)

    Strenge, Hans; Lesmana, Cokorda Bagus Jaya; Suryani, Luh Ketut

    2009-08-01

    Verbal random number generation is a procedurally simple task to assess executive function and appears ideally suited for the use under diverse settings in cross-cultural research. The objective of this study was to examine ethnic group differences between young adults in Bali (Indonesia) and Kiel (Germany): 50 bilingual healthy students, 30 Balinese and 20 Germans, attempted to generate a random sequence of the digits 1 to 9. In Balinese participants, randomization was done in Balinese (native language L1) and Indonesian (first foreign language L2), in German subjects in the German (L1) and English (L2) languages. 10 of 30 Balinese (33%), but no Germans, were unable to inhibit habitual counting in more than half of the responses. The Balinese produced significantly more nonrandom responses than the Germans with higher rates of counting and significantly less occurrence of the digits 2 and 3 in L1 compared with L2. Repetition and cycling behavior did not differ between the four languages. The findings highlight the importance of taking into account culture-bound psychosocial factors for Balinese individuals when administering and interpreting a random number generation test.

  15. Assessment of the suitability of different random number generators for Monte Carlo simulations in gamma-ray spectrometry

    International Nuclear Information System (INIS)

    Cornejo Diaz, N.; Vergara Gil, A.; Jurado Vargas, M.

    2010-01-01

    The Monte Carlo method has become a valuable numerical laboratory framework in which to simulate complex physical systems. It is based on the generation of pseudo-random number sequences by numerical algorithms called random generators. In this work we assessed the suitability of different well-known random number generators for the simulation of gamma-ray spectrometry systems during efficiency calibrations. The assessment was carried out in two stages. The generators considered (Delphi's linear congruential, mersenne twister, XorShift, multiplier with carry, universal virtual array, and non-periodic logistic map based generator) were first evaluated with different statistical empirical tests, including moments, correlations, uniformity, independence of terms and the DIEHARD battery of tests. In a second step, an application-specific test was conducted by implementing the generators in our Monte Carlo program DETEFF and comparing the results obtained with them. The calculations were performed with two different CPUs, for a typical HpGe detector and a water sample in Marinelli geometry, with gamma-rays between 59 and 1800 keV. For the Non-periodic Logistic Map based generator, dependence of the most significant bits was evident. This explains the bias, in excess of 5%, of the efficiency values obtained with this generator. The results of the application-specific assessment and the statistical performance of the other algorithms studied indicate their suitability for the Monte Carlo simulation of gamma-ray spectrometry systems for efficiency calculations.

  16. Assessment of the suitability of different random number generators for Monte Carlo simulations in gamma-ray spectrometry.

    Science.gov (United States)

    Díaz, N Cornejo; Gil, A Vergara; Vargas, M Jurado

    2010-03-01

    The Monte Carlo method has become a valuable numerical laboratory framework in which to simulate complex physical systems. It is based on the generation of pseudo-random number sequences by numerical algorithms called random generators. In this work we assessed the suitability of different well-known random number generators for the simulation of gamma-ray spectrometry systems during efficiency calibrations. The assessment was carried out in two stages. The generators considered (Delphi's linear congruential, mersenne twister, XorShift, multiplier with carry, universal virtual array, and non-periodic logistic map based generator) were first evaluated with different statistical empirical tests, including moments, correlations, uniformity, independence of terms and the DIEHARD battery of tests. In a second step, an application-specific test was conducted by implementing the generators in our Monte Carlo program DETEFF and comparing the results obtained with them. The calculations were performed with two different CPUs, for a typical HpGe detector and a water sample in Marinelli geometry, with gamma-rays between 59 and 1800 keV. For the Non-periodic Logistic Map based generator, dependence of the most significant bits was evident. This explains the bias, in excess of 5%, of the efficiency values obtained with this generator. The results of the application-specific assessment and the statistical performance of the other algorithms studied indicate their suitability for the Monte Carlo simulation of gamma-ray spectrometry systems for efficiency calculations. Copyright 2009 Elsevier Ltd. All rights reserved.

  17. Thermal expansion

    International Nuclear Information System (INIS)

    Yun, Y.

    2015-01-01

    Thermal expansion of fuel pellet is an important property which limits the lifetime of the fuels in reactors, because it affects both the pellet and cladding mechanical interaction and the gap conductivity. By fitting a number of available measured data, recommended equations have been presented and successfully used to estimate thermal expansion coefficient of the nuclear fuel pellet. However, due to large scatter of the measured data, non-consensus data have been omitted in formulating the equations. Also, the equation is strongly governed by the lack of appropriate experimental data. For those reasons, it is important to develop theoretical methodologies to better describe thermal expansion behaviour of nuclear fuel. In particular, first-principles and molecular dynamics simulations have been certainly contributed to predict reliable thermal expansion without fitting the measured data. Furthermore, the two theoretical techniques have improved on understanding the change of fuel dimension by describing the atomic-scale processes associated with lattice expansion in the fuels. (author)

  18. The effect of isolation and culture methods on epithelial stem cell populations and their progeny-toward an improved cell expansion protocol for clinical application.

    Science.gov (United States)

    Lenihan, Catherine; Rogers, Caroline; Metcalfe, Anthony D; Martin, Yella H

    2014-12-01

    The use of cultured epithelial keratinocytes in the treatment of burns and skin graft donor sites is well established in clinical practice. The most widely used culture method for clinical use was originally developed by Rheinwald and Green 40 years ago. This system uses irradiated mouse dermal fibroblasts as a feeder cell layer to promote keratinocyte growth, a process that is costly and labor-intensive for health care providers. The medium formulation contains several components of animal origin, which pose further safety risks for patients. Improvements and simplification in the culturing process would lead to clear advantages: improved safety through reduction of xenobiotic components and reduction in cost for health care providers by dispensing with feeder cells. We compared the Rheinwald and Green method to culture in three commercially available, feeder-free media systems with defined/absent components of animal origin. During the isolation process, short incubation times in high-strength trypsin resulted in increased numbers of liberated keratinocyte stem cells compared with longer incubation times. All three commercially available media tested in this study could support the expansion of keratinocytes, with phenotypes comparable to cells expanded using the established Rheinwald and Green method. Growth rates varied, with two of the media displaying comparable growth rates, whereas the third was significantly slower. Our study demonstrates the suitability of such feeder-free media systems in clinical use. It further outlines a range of techniques to evaluate keratinocyte phenotype when assessing the suitability of cells for clinical application. Copyright © 2014 International Society for Cellular Therapy. Published by Elsevier Inc. All rights reserved.

  19. Benefits of Reiki therapy for a severely neutropenic patient with associated influences on a true random number generator.

    Science.gov (United States)

    Morse, Melvin L; Beem, Lance W

    2011-12-01

    Reiki therapy is documented for relief of pain and stress. Energetic healing has been documented to alter biologic markers of illness such as hematocrit. True random number generators are reported to be affected by energy healers and spiritually oriented conscious awareness. The patient was a then 54-year-old severely ill man who had hepatitis C types 1 and 2 and who did not improve with conventional therapy. He also suffered from obesity, the metabolic syndrome, asthma, and hypertension. He was treated with experimental high-dose interferon/riboviron therapy with resultant profound anemia and neutropenia. Energetic healing and Reiki therapy was administered initially to enhance the patient's sense of well-being and to relieve anxiety. Possible effects on the patient's absolute neutrophil count and hematocrit were incidentally noted. Reiki therapy was then initiated at times of profound neutropenia to assess its possible effect on the patient's absolute neutrophil count (ANC). Reiki and other energetic healing sessions were monitored with a true random number generator (RNG). Statistically significant relationships were documented between Reiki therapy, a quieting of the electronically created white noise of the RNG during healing sessions, and improvement in the patient's ANC. The immediate clinical result was that the patient could tolerate the high-dose interferon regimen without missing doses because of absolute neutropenia. The patient was initially a late responder to interferon and had been given a 5% chance of clearing the virus. He remains clear of the virus 1 year after treatment. The association between changes in the RNG, Reiki therapy, and a patient's ANC is the first to the authors' knowledge in the medical literature. Future studies assessing the effects of energetic healing on specific biologic markers of disease are anticipated. Concurrent use of a true RNG may prove to correlate with the effectiveness of energetic therapy.

  20. Random Number Simulations Reveal How Random Noise Affects the Measurements and Graphical Portrayals of Self-Assessed Competency

    Directory of Open Access Journals (Sweden)

    Edward Nuhfer

    2016-01-01

    Full Text Available Self-assessment measures of competency are blends of an authentic self-assessment signal that researchers seek to measure and random disorder or "noise" that accompanies that signal. In this study, we use random number simulations to explore how random noise affects critical aspects of self-assessment investigations: reliability, correlation, critical sample size, and the graphical representations of self-assessment data. We show that graphical conventions common in the self-assessment literature introduce artifacts that invite misinterpretation. Troublesome conventions include: (y minus x vs. (x scatterplots; (y minus x vs. (x column graphs aggregated as quantiles; line charts that display data aggregated as quantiles; and some histograms. Graphical conventions that generate minimal artifacts include scatterplots with a best-fit line that depict (y vs. (x measures (self-assessed competence vs. measured competence plotted by individual participant scores, and (y vs. (x scatterplots of collective average measures of all participants plotted item-by-item. This last graphic convention attenuates noise and improves the definition of the signal. To provide relevant comparisons across varied graphical conventions, we use a single dataset derived from paired measures of 1154 participants' self-assessed competence and demonstrated competence in science literacy. Our results show that different numerical approaches employed in investigating and describing self-assessment accuracy are not equally valid. By modeling this dataset with random numbers, we show how recognizing the varied expressions of randomness in self-assessment data can improve the validity of numeracy-based descriptions of self-assessment.

  1. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  2. Expansion dynamics

    International Nuclear Information System (INIS)

    Knoll, J.

    1985-10-01

    A quantum dynamical model is suggested which describes the expansion and disassembly phase of highly excited compounds formed in energetic heavy-ion collisions. First applications in two space and one time dimensional model world are discussed and qualitatively compared to standard freeze-out concepts. (orig.)

  3. expansion method

    Indian Academy of Sciences (India)

    of a system under investigation is to model the system in terms of some ... The organization of the paper is as follows: In §2, a brief account of the (G /G)- expansion ...... It is interesting to note that from the general results, one can easily recover.

  4. Improvement of the Gravitational Search Algorithm by means of Low-Discrepancy Sobol Quasi Random-Number Sequence Based Initialization

    Directory of Open Access Journals (Sweden)

    ALTINOZ, O. T.

    2014-08-01

    Full Text Available Nature-inspired optimization algorithms can obtain the optima by updating the position of each member in the population. At the beginning of the algorithm, the particles of the population are spread into the search space. The initial distribution of particles corresponds to the beginning points of the search process. Hence, the aim is to alter the position for each particle beginning with this initial position until the optimum solution will be found with respect to the pre-determined conditions like maximum iteration, and specific error value for the fitness function. Therefore, initial positions of the population have a direct effect on both accuracy of the optima and the computational cost. If any member in the population is close enough to the optima, this eases the achievement of the exact solution. On the contrary, individuals grouped far away from the optima might yield pointless efforts. In this study, low-discrepancy quasi-random number sequence is preferred for the localization of the population at the initialization phase. By this way, the population is distributed into the search space in a more uniform manner at the initialization phase. The technique is applied to the Gravitational Search Algorithm and compared via the performance on benchmark function solutions.

  5. High speed true random number generator with a new structure of coarse-tuning PDL in FPGA

    Science.gov (United States)

    Fang, Hongzhen; Wang, Pengjun; Cheng, Xu; Zhou, Keji

    2018-03-01

    A metastability-based TRNG (true random number generator) is presented in this paper, and implemented in FPGA. The metastable state of a D flip-flop is tunable through a two-stage PDL (programmable delay line). With the proposed coarse-tuning PDL structure, the TRNG core does not require extra placement and routing to ensure its entropy. Furthermore, the core needs fewer stages of coarse-tuning PDL at higher operating frequency, and thus saves more resources in FPGA. The designed TRNG achieves 25 Mbps @ 100 MHz throughput after proper post-processing, which is several times higher than other previous TRNGs based on FPGA. Moreover, the robustness of the system is enhanced with the adoption of a feedback system. The quality of the designed TRNG is verified by NIST (National Institute of Standards and Technology) and also accepted by class P1 of the AIS-20/31 test suite. Project supported by the S&T Plan of Zhejiang Provincial Science and Technology Department (No. 2016C31078), the National Natural Science Foundation of China (Nos. 61574041, 61474068, 61234002), and the K.C. Wong Magna Fund in Ningbo University, China.

  6. An Architecturally Constrained Model of Random Number Generation and its Application to Modelling the Effect of Generation Rate

    Directory of Open Access Journals (Sweden)

    Nicholas J. Sexton

    2014-07-01

    Full Text Available Random number generation (RNG is a complex cognitive task for human subjects, requiring deliberative control to avoid production of habitual, stereotyped sequences. Under various manipulations (e.g., speeded responding, transcranial magnetic stimulation, or neurological damage the performance of human subjects deteriorates, as reflected in a number of qualitatively distinct, dissociable biases. For example, the intrusion of stereotyped behaviour (e.g., counting increases at faster rates of generation. Theoretical accounts of the task postulate that it requires the integrated operation of multiple, computationally heterogeneous cognitive control ('executive' processes. We present a computational model of RNG, within the framework of a novel, neuropsychologically-inspired cognitive architecture, ESPro. Manipulating the rate of sequence generation in the model reproduced a number of key effects observed in empirical studies, including increasing sequence stereotypy at faster rates. Within the model, this was due to time limitations on the interaction of supervisory control processes, namely, task setting, proposal of responses, monitoring, and response inhibition. The model thus supports the fractionation of executive function into multiple, computationally heterogeneous processes.

  7. Theory and implementation of a very high throughput true random number generator in field programmable gate array

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yonggang, E-mail: wangyg@ustc.edu.cn; Hui, Cong; Liu, Chong; Xu, Chao [Department of Modern Physics, University of Science and Technology of China, Hefei 230026 (China)

    2016-04-15

    The contribution of this paper is proposing a new entropy extraction mechanism based on sampling phase jitter in ring oscillators to make a high throughput true random number generator in a field programmable gate array (FPGA) practical. Starting from experimental observation and analysis of the entropy source in FPGA, a multi-phase sampling method is exploited to harvest the clock jitter with a maximum entropy and fast sampling speed. This parametrized design is implemented in a Xilinx Artix-7 FPGA, where the carry chains in the FPGA are explored to realize the precise phase shifting. The generator circuit is simple and resource-saving, so that multiple generation channels can run in parallel to scale the output throughput for specific applications. The prototype integrates 64 circuit units in the FPGA to provide a total output throughput of 7.68 Gbps, which meets the requirement of current high-speed quantum key distribution systems. The randomness evaluation, as well as its robustness to ambient temperature, confirms that the new method in a purely digital fashion can provide high-speed high-quality random bit sequences for a variety of embedded applications.

  8. A time-series approach to random number generation: Using recurrence quantification analysis to capture executive behavior

    Directory of Open Access Journals (Sweden)

    Wouter eOomens

    2015-06-01

    Full Text Available The concept of executive functions plays a prominent role in contemporary experimental and clinical studies on cognition. One paradigm used in this framework is the random number generation (RNG task, the execution of which demands aspects of executive functioning, specifically inhibition and working memory. Data from the RNG task are best seen as a series of successive events. However, traditional RNG measures that are used to quantify executive functioning are mostly summary statistics referring to deviations from mathematical randomness. In the current study, we explore the utility of recurrence quantification analysis (RQA, a nonlinear method that keeps the entire sequence intact, as a better way to describe executive functioning compared to traditional measures. To this aim, 242 first- and second-year students completed a non-paced RNG task. Principal component analysis of their data showed that traditional and RQA measures convey more or less the same information. However, RQA measures do so more parsimoniously and have a better interpretation.

  9. Priming psychic and conjuring abilities of a magic demonstration influences event interpretation and random number generation biases

    Science.gov (United States)

    Mohr, Christine; Koutrakis, Nikolaos; Kuhn, Gustav

    2015-01-01

    Magical ideation and belief in the paranormal is considered to represent a trait-like character; people either believe in it or not. Yet, anecdotes indicate that exposure to an anomalous event can turn skeptics into believers. This transformation is likely to be accompanied by altered cognitive functioning such as impaired judgments of event likelihood. Here, we investigated whether the exposure to an anomalous event changes individuals’ explicit traditional (religious) and non-traditional (e.g., paranormal) beliefs as well as cognitive biases that have previously been associated with non-traditional beliefs, e.g., repetition avoidance when producing random numbers in a mental dice task. In a classroom, 91 students saw a magic demonstration after their psychology lecture. Before the demonstration, half of the students were told that the performance was done respectively by a conjuror (magician group) or a psychic (psychic group). The instruction influenced participants’ explanations of the anomalous event. Participants in the magician, as compared to the psychic group, were more likely to explain the event through conjuring abilities while the reverse was true for psychic abilities. Moreover, these explanations correlated positively with their prior traditional and non-traditional beliefs. Finally, we observed that the psychic group showed more repetition avoidance than the magician group, and this effect remained the same regardless of whether assessed before or after the magic demonstration. We conclude that pre-existing beliefs and contextual suggestions both influence people’s interpretations of anomalous events and associated cognitive biases. Beliefs and associated cognitive biases are likely flexible well into adulthood and change with actual life events. PMID:25653626

  10. Priming psychic and conjuring abilities of a magic demonstration influences event interpretation and random number generation biases

    Directory of Open Access Journals (Sweden)

    Christine eMohr

    2015-01-01

    Full Text Available Magical ideation and belief in the paranormal is considered to represent a trait-like character; people either believe in it or not. Yet, anecdotes indicate that exposure to an anomalous event can turn sceptics into believers. This transformation is likely to be accompanied by altered cognitive functioning such as impaired judgements of event likelihood. Here, we investigated whether the exposure to an anomalous event changes individuals’ explicit traditional (religious and non-traditional (e.g. paranormal beliefs as well as cognitive biases that have previously been associated with non-traditional beliefs, e.g. repetition avoidance when producing random numbers in a mental dice task. In a classroom, 91 students saw a magic demonstration after their psychology lecture. Before the demonstration, half of the students were told that the performance was done respectively by a conjuror (magician group or a psychic (psychic group. The instruction influenced participants’ explanations of the anomalous event. Participants in the magician, as compared to the psychic group, were more likely to explain the event through conjuring abilities while the reverse was true for psychic abilities. Moreover, these explanations correlated positively with their prior traditional and non-traditional beliefs. Finally, we observed that the psychic group showed more repetition avoidance than the magician group, and this effect remained the same regardless of whether assessed before or after the magic demonstration. We conclude that pre-existing beliefs and contextual suggestions both influence people’s interpretations of anomalous events and associated cognitive biases. Beliefs and associated cognitive biases are likely flexible well into adulthood and change with actual life events.

  11. Random number generators and the Metropolis algorithm: application to various problems in physics and mechanics as an introduction to computational physics

    International Nuclear Information System (INIS)

    Calvayrac, Florent

    2005-01-01

    We present known and new applications of pseudo random numbers and of the Metropolis algorithm to phenomena of physical and mechanical interest, such as the search of simple clusters isomers with interactive visualization, or vehicle motion planning. The progression towards complicated problems was used with first-year graduate students who wrote most of the programs presented here. We argue that the use of pseudo random numbers in simulation and extrema research programs in teaching numerical methods in physics allows one to get quick programs and physically meaningful and demonstrative results without recurring to the advanced numerical analysis methods

  12. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  13. Pseudo-Random Number Generation in Children with High-Functioning Autism and Asperger's Disorder: Further Evidence for a Dissociation in Executive Functioning?

    Science.gov (United States)

    Rinehart, Nicole J.; Bradshaw, John L.; Moss, Simon A.; Brereton, Avril V.; Tonge, Bruce J.

    2006-01-01

    The repetitive, stereotyped and obsessive behaviours, which are core diagnostic features of autism, are thought to be underpinned by executive dysfunction. This study examined executive impairment in individuals with autism and Asperger's disorder using a verbal equivalent of an established pseudo-random number generating task. Different patterns…

  14. Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals

    Directory of Open Access Journals (Sweden)

    Lara Ortiz-Martin

    2018-01-01

    Full Text Available The proliferation of wearable and implantable medical devices has given rise to an interest in developing security schemes suitable for these systems and the environment in which they operate. One area that has received much attention lately is the use of (human biological signals as the basis for biometric authentication, identification and the generation of cryptographic keys. The heart signal (e.g., as recorded in an electrocardiogram has been used by several researchers in the last few years. Specifically, the so-called Inter-Pulse Intervals (IPIs, which is the time between two consecutive heartbeats, have been repeatedly pointed out as a potentially good source of entropy and are at the core of various recent authentication protocols. In this work, we report the results of a large-scale statistical study to determine whether such an assumption is (or not upheld. For this, we have analyzed 19 public datasets of heart signals from the Physionet repository, spanning electrocardiograms from 1353 subjects sampled at different frequencies and with lengths that vary between a few minutes and several hours. We believe this is the largest dataset on this topic analyzed in the literature. We have then applied a standard battery of randomness tests to the extracted IPIs. Under the algorithms described in this paper and after analyzing these 19 public ECG datasets, our results raise doubts about the use of IPI values as a good source of randomness for cryptographic purposes. This has repercussions both in the security of some of the protocols proposed up to now and also in the design of future IPI-based schemes.

  15. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    Science.gov (United States)

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

  16. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    Science.gov (United States)

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. PMID:26823196

  17. An empirical test of pseudo random number generators by means of an exponential decaying process; Una prueba empirica de generadores de numeros pseudoaleatorios mediante un proceso de decaimiento exponencial

    Energy Technology Data Exchange (ETDEWEB)

    Coronel B, H.F.; Hernandez M, A.R.; Jimenez M, M.A. [Facultad de Fisica e Inteligencia Artificial, Universidad Veracruzana, A.P. 475, Xalapa, Veracruz (Mexico); Mora F, L.E. [CIMAT, A.P. 402, 36000 Guanajuato (Mexico)]. e-mail: hcoronel@uv.mx

    2007-07-01

    Empirical tests for pseudo random number generators based on the use of processes or physical models have been successfully used and are considered as complementary to theoretical tests of randomness. In this work a statistical methodology for evaluating the quality of pseudo random number generators is presented. The method is illustrated in the context of the so-called exponential decay process, using some pseudo random number generators commonly used in physics. (Author)

  18. On Random Numbers and Design

    Science.gov (United States)

    Ben-Ari, Morechai

    2004-01-01

    The term "random" is frequently used in discussion of the theory of evolution, even though the mathematical concept of randomness is problematic and of little relevance in the theory. Therefore, since the core concept of the theory of evolution is the non-random process of natural selection, the term random should not be used in teaching the…

  19. Random Number Generation in Autism.

    Science.gov (United States)

    Williams, Mark A.; Moss, Simon A.; Bradshaw, John L.; Rinehart, Nicole J.

    2002-01-01

    This study explored the ability of 14 individuals with autism to generate a unique series of digits. Individuals with autism were more likely to repeat previous digits than comparison individuals, suggesting they may exhibit a shortfall in response inhibition. Results support the executive dysfunction theory of autism. (Contains references.)…

  20. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  1. Fully digital jerk-based chaotic oscillators for high throughput pseudo-random number generators up to 8.77Gbits/s

    KAUST Repository

    Mansingka, Abhinav S.

    2014-06-18

    This paper introduces fully digital implementations of four di erent systems in the 3rd order jerk-equation based chaotic family using the Euler approximation. The digitization approach enables controllable chaotic systems that reliably provide sinusoidal or chaotic output based on a selection input. New systems are introduced, derived using logical and arithmetic operations between two system implementations of different bus widths, with up to 100x higher maximum Lyapunov exponent than the original jerkequation based chaotic systems. The resulting chaotic output is shown to pass the NIST sp. 800-22 statistical test suite for pseudorandom number generators without post-processing by only eliminating the statistically defective bits. The systems are designed in Verilog HDL and experimentally verified on a Xilinx Virtex 4 FPGA for a maximum throughput of 15.59 Gbits/s for the native chaotic output and 8.77 Gbits/s for the resulting pseudo-random number generators.

  2. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  3. Negative thermal expansion materials

    International Nuclear Information System (INIS)

    Evans, J.S.O.

    1997-01-01

    The recent discovery of negative thermal expansion over an unprecedented temperature range in ZrW 2 O 8 (which contracts continuously on warming from below 2 K to above 1000 K) has stimulated considerable interest in this unusual phenomenon. Negative and low thermal expansion materials have a number of important potential uses in ceramic, optical and electronic applications. We have now found negative thermal expansion in a large new family of materials with the general formula A 2 (MO 4 ) 3 . Chemical substitution dramatically influences the thermal expansion properties of these materials allowing the production of ceramics with negative, positive or zero coefficients of thermal expansion, with the potential to control other important materials properties such as refractive index and dielectric constant. The mechanism of negative thermal expansion and the phase transitions exhibited by this important new class of low-expansion materials will be discussed. (orig.)

  4. Expansion joints for LMFBR

    Energy Technology Data Exchange (ETDEWEB)

    Dzenus, M.; Hundhausen, W.; Jansing, W.

    1979-10-15

    This discourse recounts efforts put into the SNR-2 project; specifically the development of compensation devices. The various prototypes of these compensation devices are described and the state of development reviewed. The expansion joints were developed on the basis of specific design criteria whereby differentiation is made between expansion joints of small and large nominal diameter. Expansion joints for installation in the sodium-filled primary piping are equipped with safety bellows in addition to the actual working bellows.

  5. Convergence of mayer expansions

    International Nuclear Information System (INIS)

    Brydges, D.C.

    1986-01-01

    The tree graph bound of Battle and Federbush is extended and used to provide a simple criterion for the convergence of (iterated) Mayer expansions. As an application estimates on the radius of convergence of the Mayer expansion for the two-dimensional Yukawa gas (nonstable interaction) are obtained

  6. Do bacterial cell numbers follow a theoretical Poisson distribution? Comparison of experimentally obtained numbers of single cells with random number generation via computer simulation.

    Science.gov (United States)

    Koyama, Kento; Hokunan, Hidekazu; Hasegawa, Mayumi; Kawamura, Shuso; Koseki, Shigenobu

    2016-12-01

    We investigated a bacterial sample preparation procedure for single-cell studies. In the present study, we examined whether single bacterial cells obtained via 10-fold dilution followed a theoretical Poisson distribution. Four serotypes of Salmonella enterica, three serotypes of enterohaemorrhagic Escherichia coli and one serotype of Listeria monocytogenes were used as sample bacteria. An inoculum of each serotype was prepared via a 10-fold dilution series to obtain bacterial cell counts with mean values of one or two. To determine whether the experimentally obtained bacterial cell counts follow a theoretical Poisson distribution, a likelihood ratio test between the experimentally obtained cell counts and Poisson distribution which parameter estimated by maximum likelihood estimation (MLE) was conducted. The bacterial cell counts of each serotype sufficiently followed a Poisson distribution. Furthermore, to examine the validity of the parameters of Poisson distribution from experimentally obtained bacterial cell counts, we compared these with the parameters of a Poisson distribution that were estimated using random number generation via computer simulation. The Poisson distribution parameters experimentally obtained from bacterial cell counts were within the range of the parameters estimated using a computer simulation. These results demonstrate that the bacterial cell counts of each serotype obtained via 10-fold dilution followed a Poisson distribution. The fact that the frequency of bacterial cell counts follows a Poisson distribution at low number would be applied to some single-cell studies with a few bacterial cells. In particular, the procedure presented in this study enables us to develop an inactivation model at the single-cell level that can estimate the variability of survival bacterial numbers during the bacterial death process. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Load-Dependent Interference of Deep Brain Stimulation of the Subthalamic Nucleus with Switching from Automatic to Controlled Processing During Random Number Generation in Parkinson's Disease.

    Science.gov (United States)

    Williams, Isobel Anne; Wilkinson, Leonora; Limousin, Patricia; Jahanshahi, Marjan

    2015-01-01

    Deep brain stimulation of the subthalamic nucleus (STN DBS) ameliorates the motor symptoms of Parkinson's disease (PD). However, some aspects of executive control are impaired with STN DBS. We tested the prediction that (i) STN DBS interferes with switching from automatic to controlled processing during fast-paced random number generation (RNG) (ii) STN DBS-induced cognitive control changes are load-dependent. Fifteen PD patients with bilateral STN DBS performed paced-RNG, under three levels of cognitive load synchronised with a pacing stimulus presented at 1, 0.5 and 0.33 Hz (faster rates require greater cognitive control), with DBS on or off. Measures of output randomness were calculated. Countscore 1 (CS1) indicates habitual counting in steps of one (CS1). Countscore 2 (CS2) indicates a more controlled strategy of counting in twos. The fastest rate was associated with an increased CS1 score with STN DBS on compared to off. At the slowest rate, patients had higher CS2 scores with DBS off than on, such that the differences between CS1 and CS2 scores disappeared. We provide evidence for a load-dependent effect of STN DBS on paced RNG in PD. Patients could switch to more controlled RNG strategies during conditions of low cognitive load at slower rates only when the STN stimulators were off, but when STN stimulation was on, they engaged in more automatic habitual counting under increased cognitive load. These findings are consistent with the proposal that the STN implements a switch signal from the medial frontal cortex which enables a shift from automatic to controlled processing.

  8. Private randomness expansion with untrusted devices

    International Nuclear Information System (INIS)

    Colbeck, Roger; Kent, Adrian

    2011-01-01

    Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices-even ones created by an adversarial agent-while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.

  9. Private randomness expansion with untrusted devices

    Science.gov (United States)

    Colbeck, Roger; Kent, Adrian

    2011-03-01

    Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.

  10. Private randomness expansion with untrusted devices

    Energy Technology Data Exchange (ETDEWEB)

    Colbeck, Roger; Kent, Adrian, E-mail: rcolbeck@perimeterinstitute.ca, E-mail: a.p.a.kent@damtp.cam.ac.uk [Perimeter Institute for Theoretical Physics, 31 Caroline Street North, Waterloo, ON N2L 2Y5 (Canada)

    2011-03-04

    Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices-even ones created by an adversarial agent-while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.

  11. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  12. Controlled Thermal Expansion Alloys

    Data.gov (United States)

    National Aeronautics and Space Administration — There has always been a need for controlled thermal expansion alloys suitable for mounting optics and detectors in spacecraft applications.  These alloys help...

  13. Fuel Thermal Expansion (FTHEXP)

    International Nuclear Information System (INIS)

    Reymann, G.A.

    1978-07-01

    A model is presented which deals with dimensional changes in LWR fuel pellets caused by changes in temperature. It is capable of dealing with any combination of UO 2 and PuO 2 in solid, liquid or mixed phase states, and includes expansion due to the solid-liquid phase change. The function FTHEXP models fuel thermal expansion as a function of temperature, fraction of PuO 2 , and the fraction of fuel which is molten

  14. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  15. Resonant state expansions

    International Nuclear Information System (INIS)

    Lind, P.

    1993-02-01

    The completeness properties of the discrete set of bound state, virtual states and resonances characterizing the system of a single nonrelativistic particle moving in a central cutoff potential is investigated. From a completeness relation in terms of these discrete states and complex scattering states one can derive several Resonant State Expansions (RSE). It is interesting to obtain purely discrete expansion which, if valid, would significantly simplify the treatment of the continuum. Such expansions can be derived using Mittag-Leffler (ML) theory for a cutoff potential and it would be nice to see if one can obtain the same expansions starting from an eigenfunction theory that is not restricted to a finite sphere. The RSE of Greens functions is especially important, e.g. in the continuum RPA (CRPA) method of treating giant resonances in nuclear physics. The convergence of RSE is studied in simple cases using square well wavefunctions in order to achieve high numerical accuracy. Several expansions can be derived from each other by using the theory of analytic functions and one can the see how to obtain a natural discretization of the continuum. Since the resonance wavefunctions are oscillating with an exponentially increasing amplitude, and therefore have to be interpreted through some regularization procedure, every statement made about quantities involving such states is checked by numerical calculations.Realistic nuclear wavefunctions, generated by a Wood-Saxon potential, are used to test also the usefulness of RSE in a realistic nuclear calculation. There are some fundamental differences between different symmetries of the integral contour that defines the continuum in RSE. One kind of symmetry is necessary to have an expansion of the unity operator that is idempotent. Another symmetry must be used if we want purely discrete expansions. These are found to be of the same form as given by ML. (29 refs.)

  16. Expansion joints for LMFBR

    International Nuclear Information System (INIS)

    Dzenus, M.; Hundhausen, W.; Jansing, W.

    1980-01-01

    This discourse recounts efforts put into the SNR-2 project; specifically the development of compensation devices. The various prototypes of these compensation devices are described and the state of the development reviewed. Large Na (sodium)-heat transfer systems require a lot of valuable space if the component lay-out does not include compensation devices. So, in order to condense the spatial requirement as much as possible, expansion joints must be integrated into the pipe system. There are two basic types to suit the purpose: axial expansion joints and angular expansion joints. The expansion joints were developed on the basis of specific design criteria whereby differentiation is made between expansion joints of small and large nominal diameter. Expansion joints for installation in the sodium-filled primary piping are equipped with safety bellows in addition to the actual working bellows. Expansion joints must be designed and mounted in a manner to completely withstand seismic forces. The design must exclude any damage to the bellows during intermittent operations, that is, when sodium is drained the bellows' folds must be completely empty; otherwise residual solidified sodium could destroy the bellows when restarting. The expansion joints must be engineered on the basis of the following design data for the secondary system of the SNR project: working pressure: 16 bar; failure mode pressure: 5 events; failure mode: 5 sec., 28.5 bar, 520 deg. C; working temperature: 520 deg. C; temperature transients: 30 deg. C/sec.; service life: 200,000 h; number of load cycles: 10 4 ; material: 1.4948 or 1.4919; layer thickness of folds: 0.5 mm; angular deflection (DN 800): +3 deg. C or; axial expansion absorption (DN 600): ±80 mm; calculation: ASME class. The bellows' development work is not handled within this scope. The bellows are supplied by leading manufacturers, and warrant highest quality. Multiple bellows were selected on the basis of maximum elasticity - a property

  17. Accelerating the loop expansion

    International Nuclear Information System (INIS)

    Ingermanson, R.

    1986-01-01

    This thesis introduces a new non-perturbative technique into quantum field theory. To illustrate the method, I analyze the much-studied phi 4 theory in two dimensions. As a prelude, I first show that the Hartree approximation is easy to obtain from the calculation of the one-loop effective potential by a simple modification of the propagator that does not affect the perturbative renormalization procedure. A further modification then susggests itself, which has the same nice property, and which automatically yields a convex effective potential. I then show that both of these modifications extend naturally to higher orders in the derivative expansion of the effective action and to higher orders in the loop-expansion. The net effect is to re-sum the perturbation series for the effective action as a systematic ''accelerated'' non-perturbative expansion. Each term in the accelerated expansion corresponds to an infinite number of terms in the original series. Each term can be computed explicitly, albeit numerically. Many numerical graphs of the various approximations to the first two terms in the derivative expansion are given. I discuss the reliability of the results and the problem of spontaneous symmetry-breaking, as well as some potential applications to more interesting field theories. 40 refs

  18. Virial Expansion Bounds

    Science.gov (United States)

    Tate, Stephen James

    2013-10-01

    In the 1960s, the technique of using cluster expansion bounds in order to achieve bounds on the virial expansion was developed by Lebowitz and Penrose (J. Math. Phys. 5:841, 1964) and Ruelle (Statistical Mechanics: Rigorous Results. Benjamin, Elmsford, 1969). This technique is generalised to more recent cluster expansion bounds by Poghosyan and Ueltschi (J. Math. Phys. 50:053509, 2009), which are related to the work of Procacci (J. Stat. Phys. 129:171, 2007) and the tree-graph identity, detailed by Brydges (Phénomènes Critiques, Systèmes Aléatoires, Théories de Jauge. Les Houches 1984, pp. 129-183, 1986). The bounds achieved by Lebowitz and Penrose can also be sharpened by doing the actual optimisation and achieving expressions in terms of the Lambert W-function. The different bound from the cluster expansion shows some improvements for bounds on the convergence of the virial expansion in the case of positive potentials, which are allowed to have a hard core.

  19. Conformal expansions and renormalons

    Energy Technology Data Exchange (ETDEWEB)

    Rathsman, J.

    2000-02-07

    The coefficients in perturbative expansions in gauge theories are factorially increasing, predominantly due to renormalons. This type of factorial increase is not expected in conformal theories. In QCD conformal relations between observables can be defined in the presence of a perturbative infrared fixed-point. Using the Banks-Zaks expansion the authors study the effect of the large-order behavior of the perturbative series on the conformal coefficients. The authors find that in general these coefficients become factorially increasing. However, when the factorial behavior genuinely originates in a renormalon integral, as implied by a postulated skeleton expansion, it does not affect the conformal coefficients. As a consequence, the conformal coefficients will indeed be free of renormalon divergence, in accordance with previous observations concerning the smallness of these coefficients for specific observables. The authors further show that the correspondence of the BLM method with the skeleton expansion implies a unique scale-setting procedure. The BLM coefficients can be interpreted as the conformal coefficients in the series relating the fixed-point value of the observable with that of the skeleton effective charge. Through the skeleton expansion the relevance of renormalon-free conformal coefficients extends to real-world QCD.

  20. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  1. Thermal expansion data

    International Nuclear Information System (INIS)

    Taylor, D.

    1984-01-01

    This paper gives regression data for a modified second order polynomial fitted to the expansion data of, and percentage expansions for dioxides with (a) the fluorite and antifluorite structure: AmO 2 , BkO 2 , CeO 2 , CmO 2 , HfO 2 , Li 2 O, NpO 2 , PrO 2 , PuO 2 , ThO 2 , UO 2 , ZrO 2 , and (b) the rutile structure: CrO 2 , GeO 2 , IrO 2 , MnO 2 , NbO 2 , PbO 2 , SiO 2 , SnO 2 , TeO 2 , TiO 2 and VO 2 . Reduced expansion curves for the dioxides showed only partial grouping into iso-electronic series for the fluorite structures and showed that the 'law of corresponding states' did not apply to the rutile structures. (author)

  2. Uniform gradient expansions

    CERN Document Server

    Giovannini, Massimo

    2015-01-01

    Cosmological singularities are often discussed by means of a gradient expansion that can also describe, during a quasi-de Sitter phase, the progressive suppression of curvature inhomogeneities. While the inflationary event horizon is being formed the two mentioned regimes coexist and a uniform expansion can be conceived and applied to the evolution of spatial gradients across the protoinflationary boundary. It is argued that conventional arguments addressing the preinflationary initial conditions are necessary but generally not sufficient to guarantee a homogeneous onset of the conventional inflationary stage.

  3. Low-temperature thermal expansion

    International Nuclear Information System (INIS)

    Collings, E.W.

    1986-01-01

    This chapter discusses the thermal expansion of insulators and metals. Harmonicity and anharmonicity in thermal expansion are examined. The electronic, magnetic, an other contributions to low temperature thermal expansion are analyzed. The thermodynamics of the Debye isotropic continuum, the lattice-dynamical approach, and the thermal expansion of metals are discussed. Relative linear expansion at low temperatures is reviewed and further calculations of the electronic thermal expansion coefficient are given. Thermal expansions are given for Cu, Al and Ti. Phenomenologic thermodynamic relationships are also discussed

  4. Lace expansion for dummies

    NARCIS (Netherlands)

    Bolthausen, Erwin; Van Der Hofstad, Remco; Kozma, Gady

    2018-01-01

    We show Green's function asymptotic upper bound for the two-point function of weakly self-Avoiding walk in d >4, revisiting a classic problem. Our proof relies on Banach algebras to analyse the lace-expansion fixed point equation and is simpler than previous approaches in that it avoids Fourier

  5. OPEC future capacity expansions

    International Nuclear Information System (INIS)

    Sandrea, I.

    2005-01-01

    This conference presentation examined OPEC future capacity expansions including highlights from 2000-2004 from the supply perspective and actions by OPEC; OPEC spare capacity in 2005/2006; medium-term capacity expansion and investments; long-term scenarios, challenges and opportunities; and upstream policies in member countries. Highlights from the supply perspective included worst than expected non-OPEC supply response; non-OPEC supply affected by a number of accidents and strikes; geopolitical tensions; and higher than expected demand for OPEC crude. OPEC's actions included closer relationship with other producers and consumers; capacity expansions in 2004 and 2005/2006; and OPEC kept the market well supplied with crude in 2004. The presentation also provided data using graphical charts on OPEC net capacity additions until 2005/2006; OPEC production versus spare capacity from 2003 to 2005; OPEC production and capacity to 2010; and change in required OPEC production from 2005-2020. Medium term expansion to 2010 includes over 60 projects. Medium-term risks such as project execution, financing, costs, demand, reserves, depletion, integration of Iraq, and geopolitical tensions were also discussed. The presentation concluded that in the long term, large uncertainties remain; the peak of world supply is not imminent; and continued and enhanced cooperation is essential to market stability. tabs., figs

  6. AUTO-EXPANSIVE FLOW

    Science.gov (United States)

    Physics suggests that the interplay of momentum, continuity, and geometry in outward radial flow must produce density and concomitant pressure reductions. In other words, this flow is intrinsically auto-expansive. It has been proposed that this process is the key to understanding...

  7. Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number

    OpenAIRE

    Kohei Arai; Yuji Yamada

    2011-01-01

    An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images...

  8. Expansion at Olympic Dam

    International Nuclear Information System (INIS)

    Lewis, C.

    1997-01-01

    The Olympic Dam orebody is the 6th largest copper and the single largest uranium orebody in the world. Mine production commenced in June 1988, at an annual production rate of around 45,000 tonnes of copper and 1,000 tonnes of uranium. Western Mining Corporation announced in 1996 a proposed $1.25 billion expansion of the Olympic Dam operation to raise the annual production capacity of the mine to 200,000 tonnes of copper, approximately 3,700 tonnes of uranium, 75,000 ounces of gold and 950,000 ounces of silver by 2001. Further optimisation work has identified a faster track expansion route, with an increase in the capital cost to $1.487 billion but improved investment outcome, a new target completion date of end 1999, and a new uranium output of 4,600 tonnes per annum from that date

  9. Financing electricity expansion

    International Nuclear Information System (INIS)

    Hyman, L.S.

    1994-01-01

    Expansion of electricity supply is associated with economic development. The installation and enlargement of power systems in developing countries entails a huge financial burden, however. Energy consumers in such countries must pay not only for supplies but for the cost of raising the capital for expansion on the international markets. Estimates are presented for the capital expenditure for electricity supply over the period 1990 to 2020 for the major world regions, using approximations for the cost of plant and capital and for the returns earned. These data lead to the conclusion that the five regions with the lowest per capita incomes are those which will need the major part of the capital expenditure and the highest percentage of external finance. (6 tables) (UK)

  10. Bigravity from gradient expansion

    International Nuclear Information System (INIS)

    Yamashita, Yasuho; Tanaka, Takahiro

    2016-01-01

    We discuss how the ghost-free bigravity coupled with a single scalar field can be derived from a braneworld setup. We consider DGP two-brane model without radion stabilization. The bulk configuration is solved for given boundary metrics, and it is substituted back into the action to obtain the effective four-dimensional action. In order to obtain the ghost-free bigravity, we consider the gradient expansion in which the brane separation is supposed to be sufficiently small so that two boundary metrics are almost identical. The obtained effective theory is shown to be ghost free as expected, however, the interaction between two gravitons takes the Fierz-Pauli form at the leading order of the gradient expansion, even though we do not use the approximation of linear perturbation. We also find that the radion remains as a scalar field in the four-dimensional effective theory, but its coupling to the metrics is non-trivial.

  11. Expansion of magnetic clouds

    International Nuclear Information System (INIS)

    Suess, S.T.

    1987-01-01

    Magnetic clouds are a carefully defined subclass of all interplanetary signatures of coronal mass ejections whose geometry is thought to be that of a cylinder embedded in a plane. It has been found that the total magnetic pressure inside the clouds is higher than the ion pressure outside, and that the clouds are expanding at 1 AU at about half the local Alfven speed. The geometry of the clouds is such that even though the magnetic pressure inside is larger than the total pressure outside, expansion will not occur because the pressure is balanced by magnetic tension - the pinch effect. The evidence for expansion of clouds at 1 AU is nevertheless quite strong so another reason for its existence must be found. It is demonstrated that the observations can be reproduced by taking into account the effects of geometrical distortion of the low plasma beta clouds as they move away from the Sun

  12. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  13. IKEA's International Expansion

    OpenAIRE

    Harapiak, Clayton

    2013-01-01

    This case concerns a global retailing firm that is dealing with strategic management and marketing issues. Applying a scenario of international expansion, this case provides a thorough analysis of the current business environment for IKEA. Utilizing a variety of methods (e.g. SWOT, PESTLE, McKinsey Matrix) the overall objective is to provide students with the opportunity to apply their research skills and knowledge regarding a highly competitive industry to develop strategic marketing strateg...

  14. Symmetric eikonal expansion

    International Nuclear Information System (INIS)

    Matsuki, Takayuki

    1976-01-01

    Symmetric eikonal expansion for the scattering amplitude is formulated for nonrelativistic and relativistic potential scatterings and also for the quantum field theory. The first approximations coincide with those of Levy and Sucher. The obtained scattering amplitudes are time reversal invariant for all cases and are crossing symmetric for the quantum field theory in each order of approximation. The improved eikonal phase introduced by Levy and Sucher is also derived from the different approximation scheme from the above. (auth.)

  15. Series expansions without diagrams

    International Nuclear Information System (INIS)

    Bhanot, G.; Creutz, M.; Horvath, I.; Lacki, J.; Weckel, J.

    1994-01-01

    We discuss the use of recursive enumeration schemes to obtain low- and high-temperature series expansions for discrete statistical systems. Using linear combinations of generalized helical lattices, the method is competitive with diagrammatic approaches and is easily generalizable. We illustrate the approach using Ising and Potts models. We present low-temperature series results in up to five dimensions and high-temperature series in three dimensions. The method is general and can be applied to any discrete model

  16. Análise morfológica do arco superior de portadores de fissura labiopalatal submetidos a diferentes protocolos de expansão rápida maxilar: avaliação das alterações maxilares Morphological analysis of the maxillary arch in patients with cleft lip and palate submitted to different protocols of rapid maxillary expansion: maxillary alterations evaluation

    Directory of Open Access Journals (Sweden)

    Maíra Massuia de Souza

    2009-10-01

    transverse dimensions of maxillary dental arches by analysis of the dental casts of 15 patients with complete unilateral cleft lip and palate who presented sagittal and transverse maxillary constriction and were submitted to two distinct protocols of rapid maxillary expansion. METHODS: Seven patients were submitted to rapid maxillary expansion (RME by the conventional activation protocol (Group 1, and the others were treated by the protocol proposed by Liou and Tsai in 2005, with alternated expansion and constriction (Group 2. Both groups were later submitted to maxillary protraction with facial mask. Dental casts were obtained at two periods: before placement of a modified Haas expander (T1 and after 24 weeks of treatment (T2. Transverse distances were measured with a digital caliper to register the distances between first upper premolars (anterior area and first upper molars (posterior area. Data were statistically analyzed by the Student's t test. RESULTS AND CONCLUSION: Both protocols were equally effective, since no differences were observed between the groups as to the transverse increasing achieved.

  17. Expansions for Coulomb wave functions

    NARCIS (Netherlands)

    Boersma, J.

    1969-01-01

    In this paper we derive a number of expansions for Whittaker functions, regular and irregular Coulomb wave functions. The main result consists of a new expansion for the irregular Coulomb wave functions of orders zero and one in terms of regular Coulomb wave functions. The latter expansions are

  18. A RFID grouping proof protocol for medication safety of inpatient.

    Science.gov (United States)

    Huang, Hsieh-Hong; Ku, Cheng-Yuan

    2009-12-01

    In order to provide enhanced medication safety for inpatients, the medical mechanism which adopts the modified grouping proof protocol is proposed in this paper. By using the grouping proof protocol, the medical staffs could confirm the authentication and integrity of a group of Radio-Frequency Identification (RFID) tags which are embedded on inpatient bracelets and the containers of drugs. This mechanism is designed to be compatible with EPCglobal Class-1 Generation-2 standard which is the most popular specification of RFID tags. Due to the light-weight computational capacity of passive tags, only the pseudo-random number generator (PRNG) and cyclic redundancy code (CRC) are allowed to be used in the communication protocol. Furthermore, a practical scenario of using this proposed mechanism in hospital to examine the medication safety is also presented.

  19. Quantum Information Protocols with Gaussian States of Light

    DEFF Research Database (Denmark)

    Jacobsen, Christian Scheffmann

    and hardware for secure quantum key distribution. These technologies directly exploit quantum effects, and indeed this is where they offer advantages to classical products. This thesis deals with the development and implementation of quantum information protocols that utilize the rather inexpensive resource......Quantum cryptography is widely regarded as the most mature field within the context of quantum information in the sense that its application and development has produced companies that base their products on genuine quantum mechanical principles. Examples include quantum random number generators...... of Gaussian states. A quantum information protocol is essentially a sequence of state exchanges between some number of parties and a certain ordering of quantum mechanical unitary operators performed by these parties. An example of this is the famous BB84 protocol for secret key generation, where photons...

  20. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  1. Radial expansion and multifragmentation

    International Nuclear Information System (INIS)

    Angelique, J.C.; Bizard, G.; Bougault, R.; Brou, R.; Buta, A.; Colin, J.; Cussol, D.; Durand, D.; Kerambrun, A.; Le Brun, C.; Lecolley, J.F.; Lopez, O.; Louvel, M.; Meslin, C.; Nakagawa, T.; Patry, J.P.; Peter, J.; Popescu, R.; Regimbart, R.; Steckmeyer, J.C.; Tamain, B.; Vient, E.; Yuasa-Nakagawa, K.; Wieloch, A.

    1998-01-01

    The light systems 36 Ar + 27 Al and 64 Zn + nat Ti were measured at several bombarding energies between ∼ 35 and 95 MeV/nucleon. It was found that the predominant part of the cross section is due to binary collisions. In this paper the focus is placed on the properties of the quasi-projectile nuclei. In the central collisions the excitation energies of the quasi-projectile reach values exceeding largely 10 MeV/nucleon. The slope of the high energy part of the distribution can give only an upper limit of the apparent temperature (the average temperature along the decay chain). The highly excited quasi-projectile may get rapidly fragmented rather than sequentially. The heavy fragments are excited and can emit light particles (n, p, d, t, 3 He, α,...) what perturbs additionally the spectrum of these particles. Concerning the expansion energy, one can determine the average kinetic energies of the product (in the quasi-projectile-framework) and compare with simulation values. To fit the experimental data an additional radial expansion energy is to be considered. The average expansion energy depends slightly on the impact parameter but it increases with E * / A, ranging from 0.4 to 1,2 MeV/nucleon for an excitation energy increasing from 7 to 10.5 MeV/nucleon. This collective radial energy seems to be independent of the fragment mass, what is possibly valid for the case of larger quasi-projectile masses. The origin of the expansion is to be determined. It may be due to a compression in the interaction zone at the initial stage of the collision, which propagates in the quasi-projectile and quasi-target, or else, may be due, simply, to the increase of thermal energy leading to a rapid fragment emission. The sequential de-excitation calculation overestimates light particle emission and consequently heavy residues, particularly, at higher excitation energies. This disagreement indicates that a sequential process can not account for the di-excitation of very hot nuclei

  2. Rethinking expansive learning

    DEFF Research Database (Denmark)

    Kolbæk, Ditte; Lundh Snis, Ulrika

    Abstract: This paper analyses an online community of master’s students taking a course in ICT and organisational learning. The students initiated and facilitated an educational design for organisational learning called Proactive Review in the organisation where they are employed. By using an online...... discussion forum on Google groups, they created new ways of reflecting and learning. We used netnography to select qualitative postings from the online community and expansive learning concepts for data analysis. The findings show how students changed practices of organisational learning...

  3. Load regulating expansion fixture

    International Nuclear Information System (INIS)

    Wagner, L.M.; Strum, M.J.

    1998-01-01

    A free standing self contained device for bonding ultra thin metallic films, such as 0.001 inch beryllium foils is disclosed. The device will regulate to a predetermined load for solid state bonding when heated to a bonding temperature. The device includes a load regulating feature, whereby the expansion stresses generated for bonding are regulated and self adjusting. The load regulator comprises a pair of friction isolators with a plurality of annealed copper members located there between. The device, with the load regulator, will adjust to and maintain a stress level needed to successfully and economically complete a leak tight bond without damaging thin foils or other delicate components. 1 fig

  4. Thermal expansion of granite rocks

    International Nuclear Information System (INIS)

    Stephansson, O.

    1978-04-01

    The thermal expansion of rocks is strongly controlled by the thermal expansion of the minerals. The theoretical thermal expansion of the Stripa Granite is gound to be 21 . 10 -6 [deg C] -1 at 25 deg C and 38 . 10 -6 [deg C] -1 at 400 deg C. The difference in expansion for the rock forming minerals causes micro cracking at heating. The expansion due to micro cracks is found to be of the same order as the mineral expansion. Most of the micro cracks will close at pressures of the order of 10 - 20 MPa. The thermal expansion of a rock mass including the effect of joints is determined in the pilot heater test in the Stripa Mine

  5. Provincial hydro expansions

    Energy Technology Data Exchange (ETDEWEB)

    Froschauer, K J

    1993-01-01

    A study of the development of five provincial hydroelectric utilities in Canada indicates that power companies and the state invited manufacturers to use hydroelectricity and natural resources in order to diversify provincial economies. These hydro expansions also show that utilities and government designed hydro projects to serve continental requirements; serving both objectives became problematic. It is argued that when the Canadian state and firms such as utilities use hydro expansions to serve both continentalism and industrialization, then at best they foster dependent industrialization and staple processing. At worst, they overbuild the infrastructure to generate provincial surplus energy for continental, rather than national, integration. Hydro developments became subject to state intervention in Canada mainly through the failures of private utilities to provide power for the less-lucrative industrial markets within provincial subregions. Although the state and utilities invited foreign firms to manufacture hydro equipment within the provinces and others to use electricity to diversify production beyond resource processing, such a diversification did not occur. Since 1962, ca 80% of industrial energy was used to semi-process wood-derived products, chemicals, and metals. The idea for a national power network became undermined by interprovincial political-economic factors and since 1963, the federal national/continential power policy prevailed. 187 refs., 6 figs., 52 tabs.

  6. Measuring of tube expansion

    International Nuclear Information System (INIS)

    Vogeleer, J. P.

    1985-01-01

    The expansion of the primary tubes or sleeves of the steam generator of a nuclear reactor plant are measured while the tubes or sleeves are being expanded. A primary tube or sleeve is expanded by high pressure of water which flows through a channel in an expander body. The water is supplied through an elongated conductor and is introduced through a connector on the shank connected to the conductor at its outer end. A wire extends through the mandrel and through the conductor to the end of the connector. At its inner end the wire is connected to a tapered pin which is subject to counteracting forces produced by the pressure of the water. The force on the side where the wire is connected to the conductor is smaller than on the opposite side. The tapered pin is moved in the direction of the higher force and extrudes the wire outwardly of the conductor. The tapered surface of the tapered pin engages transverse captive plungers which are maintained in engagement with the expanding tube or sleeve as they are moved outwardly by the tapered pin. The wire and the connector extend out of the generator and, at its outer end, the wire is connected to an indicator which measures the extent to which the wire is moved by the tapered pin, thus measuring the expansion of the tube or sleeve as it progresses

  7. Thermal expansion of coking coals

    Energy Technology Data Exchange (ETDEWEB)

    Orlik, M.; Klimek, J. (Vyzkumny a Zkusebni Ustav Nova Hut, Ostrava (Czechoslovakia))

    1992-12-01

    Analyzes expansion of coal mixtures in coke ovens during coking. Methods for measuring coal expansion on both a laboratory and pilot plant scale are comparatively evaluated. The method, developed, tested and patented in Poland by the Institute for Chemical Coal Processing in Zabrze (Polish standard PN-73/G-04522), is discussed. A laboratory device developed by the Institute for measuring coal expansion is characterized. Expansion of black coal from 10 underground mines in the Ostrava-Karvina coal district and from 9 coal mines in the Upper Silesia basin in Poland is comparatively evaluated. Investigations show that coal expansion reaches a maximum for coal types with a volatile matter ranging from 20 to 25%. With increasing volatile matter in coal, its expansion decreases. Coal expansion increases with increasing swelling index. Coal expansion corresponds with coal dilatation. With increasing coal density its expansion increases. Coal mixtures should be selected in such a way that their expansion does not cause a pressure exceeding 40 MPa. 11 refs.

  8. Identity Expansion and Transcendence

    Directory of Open Access Journals (Sweden)

    William Sims Bainbridge

    2014-05-01

    Full Text Available Emerging developments in communications and computing technology may transform the nature of human identity, in the process rendering obsolete the traditional philosophical and scientific frameworks for understanding the nature of individuals and groups.  Progress toward an evaluation of this possibility and an appropriate conceptual basis for analyzing it may be derived from two very different but ultimately connected social movements that promote this radical change. One is the governmentally supported exploration of Converging Technologies, based in the unification of nanoscience, biology, information science and cognitive science (NBIC. The other is the Transhumanist movement, which has been criticized as excessively radical yet is primarily conducted as a dignified intellectual discussion within a new school of philosophy about human enhancement.  Together, NBIC and Transhumanism suggest the immense transformative power of today’s technologies, through which individuals may explore multiple identities by means of online avatars, semi-autonomous intelligent agents, and other identity expansions.

  9. β-expansion attractors observed in A/D converters

    Science.gov (United States)

    Kohda, Tohru; Horio, Yoshihiko; Aihara, Kazuyuki

    2012-12-01

    The recently proposed β-encoders, analog-to-digital converters using an amplifier with a factor β and a flaky quantizer with threshold ν, have proven to be explained by the deterministic dynamics of multi-valued Rényi-Parry maps. Such a map is locally eventually onto [ν-1, ν), which is topologically conjugate to Parry's (β,α)-map with α =(β-1)(ν-1). This implies that β-encoders have a closed subinterval [ν-1,ν), which includes an attractor. Thus, the iteration of the multi-valued Rényi-Parry map performs the β-expansion of x while quantization errors in β-encoders behave chaotically and do not converge to a fixed point. This β-expansion attractor is relatively simpler than previously reported attractors. The object of this paper is twofold: to observe the embedded attractors in the β-encoder and to identify attractors that are useful for spread-spectrum codes and optimization techniques using pseudo-random numbers.

  10. Thermal expansion of beryllium oxide

    International Nuclear Information System (INIS)

    Solodukhin, A.V.; Kruzhalov, A.V.; Mazurenko, V.G.; Maslov, V.A.; Medvedev, V.A.; Polupanova, T.I.

    1987-01-01

    Precise measurements of temperature dependence of the coefficient of linear expansion in the 22-320 K temperature range on beryllium oxide monocrystals are conducted. A model of thermal expansion is suggested; the range of temperature dependence minimum of the coefficient of thermal expansion is well described within the frames of this model. The results of the experiment may be used for investigation of thermal stresses in crystals

  11. Random Number Generation: A Practitioner's Overview

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    About the speaker Dr. Mascagni is full professor at Florida State University, where he runs a research group consisting of post-doctoral associates, graduate students, and undergraduate workers. The areas they work on are p...

  12. Standard random number generation for MBASIC

    Science.gov (United States)

    Tausworthe, R. C.

    1976-01-01

    A machine-independent algorithm is presented and analyzed for generating pseudorandom numbers suitable for the standard MBASIC system. The algorithm used is the polynomial congruential or linear recurrence modulo 2 method. Numbers, formed as nonoverlapping adjacent 28-bit words taken from the bit stream produced by the formula a sub m + 532 = a sub m + 37 + a sub m (modulo 2), do not repeat within the projected age of the solar system, show no ensemble correlation, exhibit uniform distribution of adjacent numbers up to 19 dimensions, and do not deviate from random runs-up and runs-down behavior.

  13. Renormalization group and Mayer expansions

    International Nuclear Information System (INIS)

    Mack, G.

    1984-02-01

    Mayer expansions promise to become a powerful tool in exact renormalization group calculations. Iterated Mayer expansions were sucessfully used in the rigorous analysis of 3-dimensional U(1) lattice gauge theory by Goepfert and the author, and it is hoped that they will also be useful in the 2-dimensional nonlinear sigma-model, and elsewhere. (orig.)

  14. Isotropic Negative Thermal Expansion Metamaterials.

    Science.gov (United States)

    Wu, Lingling; Li, Bo; Zhou, Ji

    2016-07-13

    Negative thermal expansion materials are important and desirable in science and engineering applications. However, natural materials with isotropic negative thermal expansion are rare and usually unsatisfied in performance. Here, we propose a novel method to achieve two- and three-dimensional negative thermal expansion metamaterials via antichiral structures. The two-dimensional metamaterial is constructed with unit cells that combine bimaterial strips and antichiral structures, while the three-dimensional metamaterial is fabricated by a multimaterial 3D printing process. Both experimental and simulation results display isotropic negative thermal expansion property of the samples. The effective coefficient of negative thermal expansion of the proposed models is demonstrated to be dependent on the difference between the thermal expansion coefficient of the component materials, as well as on the circular node radius and the ligament length in the antichiral structures. The measured value of the linear negative thermal expansion coefficient of the three-dimensional sample is among the largest achieved in experiments to date. Our findings provide an easy and practical approach to obtaining materials with tunable negative thermal expansion on any scale.

  15. Renormalization group and mayer expansions

    International Nuclear Information System (INIS)

    Mack, G.

    1984-01-01

    Mayer expansions promise to become a powerful tool in exact renormalization group calculations. Iterated Mayer expansions were sucessfully used in the rigorous analysis of 3-dimensional U (1) lattice gauge theory by Gopfert and the author, and it is hoped that they will also be useful in the 2-dimensional nonlinear σ-model, and elsewhere

  16. On summation of perturbation expansions

    International Nuclear Information System (INIS)

    Horzela, A.

    1985-04-01

    The problem of the restoration of physical quantities defined by divergent perturbation expansions is analysed. The Pad'e and Borel summability is proved for alternating perturbation expansions with factorially growing coefficients. The proof is based on the methods of the classical moments theory. 17 refs. (author)

  17. Plasma expansion: fundamentals and applications

    International Nuclear Information System (INIS)

    Engeln, R; Mazouffre, S; Vankan, P; Bakker, I; Schram, D C

    2002-01-01

    The study of plasma expansion is interesting from a fundamental point of view as well as from a more applied point of view. We here give a short overview of the way properties like density, velocity and temperature behave in an expanding thermal plasma. Experimental data show that the basic phenomena of plasma expansion are to some extent similar to those of the expansion of a hot neutral gas. From the application point of view, we present first results on the use of an expanding thermal plasma in the plasma-activated catalysis of ammonia, from N 2 -H 2 mixtures

  18. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  19. Warp drive with zero expansion

    Energy Technology Data Exchange (ETDEWEB)

    Natario, Jose [Department of Mathematics, Instituto Superior Tecnico (Portugal)

    2002-03-21

    It is commonly believed that Alcubierre's warp drive works by contracting space in front of the warp bubble and expanding the space behind it. We show that this contraction/expansion is but a marginal consequence of the choice made by Alcubierre and explicitly construct a similar spacetime where no contraction/expansion occurs. Global and optical properties of warp-drive spacetimes are also discussed.

  20. Expansion lyre-shaped tube

    International Nuclear Information System (INIS)

    Andro, Jean.

    1973-01-01

    The invention relates the expansion lyre-shaped tube portions formed in dudgeoned tubular bundles between two bottom plates. An expansion lyre comprises at least two sets of tubes of unequal lengths coplanar and symmetrical with respect to the main tube axis, with connecting portions between the tubes forming said sets. The invention applies to apparatus such as heat exchangers, heaters, superheaters or breeders [fr

  1. Estimates of expansion time scales

    International Nuclear Information System (INIS)

    Jones, E.M.

    1979-01-01

    Monte Carlo simulations of the expansion of a spacefaring civilization show that descendants of that civilization should be found near virtually every useful star in the Galaxy in a time much less than the current age of the Galaxy. Only extreme assumptions about local population growth rates, emigration rates, or ship ranges can slow or halt an expansion. The apparent absence of extraterrestrials from the solar system suggests that no such civilization has arisen in the Galaxy. 1 figure

  2. Strategic Complexity and Global Expansion

    DEFF Research Database (Denmark)

    Oladottir, Asta Dis; Hobdari, Bersant; Papanastassiou, Marina

    2012-01-01

    The purpose of this paper is to analyse the determinants of global expansion strategies of newcomer Multinational Corporations (MNCs) by focusing on Iceland, Israel and Ireland. We argue that newcomer MNCs from small open economies pursue complex global expansion strategies (CGES). We distinguish....... The empirical evidence suggests that newcomer MNCs move away from simplistic dualities in the formulation of their strategic choices towards more complex options as a means of maintaining and enhancing their global competitiveness....

  3. Range expansion of heterogeneous populations.

    Science.gov (United States)

    Reiter, Matthias; Rulands, Steffen; Frey, Erwin

    2014-04-11

    Risk spreading in bacterial populations is generally regarded as a strategy to maximize survival. Here, we study its role during range expansion of a genetically diverse population where growth and motility are two alternative traits. We find that during the initial expansion phase fast-growing cells do have a selective advantage. By contrast, asymptotically, generalists balancing motility and reproduction are evolutionarily most successful. These findings are rationalized by a set of coupled Fisher equations complemented by stochastic simulations.

  4. On genus expansion of superpolynomials

    Energy Technology Data Exchange (ETDEWEB)

    Mironov, Andrei, E-mail: mironov@itep.ru [Lebedev Physics Institute, Moscow 119991 (Russian Federation); ITEP, Moscow 117218 (Russian Federation); National Research Nuclear University MEPhI, Moscow 115409 (Russian Federation); Morozov, Alexei, E-mail: morozov@itep.ru [ITEP, Moscow 117218 (Russian Federation); National Research Nuclear University MEPhI, Moscow 115409 (Russian Federation); Sleptsov, Alexei, E-mail: sleptsov@itep.ru [ITEP, Moscow 117218 (Russian Federation); Laboratory of Quantum Topology, Chelyabinsk State University, Chelyabinsk 454001 (Russian Federation); KdVI, University of Amsterdam (Netherlands); Smirnov, Andrey, E-mail: asmirnov@math.columbia.edu [ITEP, Moscow 117218 (Russian Federation); Columbia University, Department of Mathematics, New York (United States)

    2014-12-15

    Recently it was shown that the (Ooguri–Vafa) generating function of HOMFLY polynomials is the Hurwitz partition function, i.e. that the dependence of the HOMFLY polynomials on representation R is naturally captured by symmetric group characters (cut-and-join eigenvalues). The genus expansion and expansion through Vassiliev invariants explicitly demonstrate this phenomenon. In the present paper we claim that the superpolynomials are not functions of such a type: symmetric group characters do not provide an adequate linear basis for their expansions. Deformation to superpolynomials is, however, straightforward in the multiplicative basis: the Casimir operators are β-deformed to Hamiltonians of the Calogero–Moser–Sutherland system. Applying this trick to the genus and Vassiliev expansions, we observe that the deformation is fully straightforward only for the thin knots. Beyond the family of thin knots additional algebraically independent terms appear in the Vassiliev and genus expansions. This can suggest that the superpolynomials do in fact contain more information about knots than the colored HOMFLY and Kauffman polynomials. However, even for the thin knots the beta-deformation is non-innocent: already in the simplest examples it seems inconsistent with the positivity of colored superpolynomials in non-(anti)symmetric representations, which also happens in I. Cherednik's (DAHA-based) approach to the torus knots.

  5. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  6. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  7. Low Thermal Expansion Glass Ceramics

    CERN Document Server

    Bach, Hans

    2005-01-01

    This book appears in the authoritative series reporting the international research and development activities conducted by the Schott group of companies. This series provides an overview of Schott's activities for scientists, engineers, and managers from all branches of industry worldwide in which glasses and glass ceramics are of interest. Each volume begins with a chapter providing a general idea of the current problems, results, and trends relating to the subjects treated. This new extended edition describes the fundamental principles, the manufacturing process, and applications of low thermal expansion glass ceramics. The composition, structure, and stability of polycrystalline materials having a low thermal expansion are described, and it is shown how low thermal expansion glass ceramics can be manufactured from appropriately chosen glass compositions. Examples illustrate the formation of this type of glass ceramic by utilizing normal production processes together with controlled crystallization. Thus g...

  8. Low thermal expansion glass ceramics

    CERN Document Server

    1995-01-01

    This book is one of a series reporting on international research and development activities conducted by the Schott group of companies With the series, Schott aims to provide an overview of its activities for scientists, engineers, and managers from all branches of industry worldwide where glasses and glass ceramics are of interest Each volume begins with a chapter providing a general idea of the current problems, results, and trends relating to the subjects treated This volume describes the fundamental principles, the manufacturing process, and applications of low thermal expansion glass ceramics The composition, structure, and stability of polycrystalline materials having a low thermal expansion are described, and it is shown how low thermal expansion glass ceramics can be manufactured from appropriately chosen glass compositions Examples illustrate the formation of this type of glass ceramic by utilizing normal production processes together with controlled crystallization Thus glass ceramics with thermal c...

  9. Regulation of gas infrastructure expansion

    International Nuclear Information System (INIS)

    De Joode, J.

    2012-01-01

    The topic of this dissertation is the regulation of gas infrastructure expansion in the European Union (EU). While the gas market has been liberalised, the gas infrastructure has largely remained in the regulated domain. However, not necessarily all gas infrastructure facilities - such as gas storage facilities, LNG import terminals and certain gas transmission pipelines - need to be regulated, as there may be scope for competition. In practice, the choice of regulation of gas infrastructure expansion varies among different types of gas infrastructure facilities and across EU Member States. Based on a review of economic literature and on a series of in-depth case studies, this study explains these differences in choices of regulation from differences in policy objectives, differences in local circumstances and differences in the intrinsic characteristics of the infrastructure projects. An important conclusion is that there is potential for a larger role for competition in gas infrastructure expansion.

  10. The loop expansion as a divergent-power-series expansion

    International Nuclear Information System (INIS)

    Murai, N.

    1981-01-01

    The loop expansion should be divergent, possibly an asymptotic one, in the Euclidean path integral formulation. This consideration is important in applications of the symmetric and mass-independent renormalization. The [1,1] Pade approximant is calculated in a PHI 4 model. Its classical vacua may be not truely stable for nonzero coupling constant. (author)

  11. Cosmological expansion and local physics

    International Nuclear Information System (INIS)

    Faraoni, Valerio; Jacques, Audrey

    2007-01-01

    The interplay between cosmological expansion and local attraction in a gravitationally bound system is revisited in various regimes. First, weakly gravitating Newtonian systems are considered, followed by various exact solutions describing a relativistic central object embedded in a Friedmann universe. It is shown that the 'all or nothing' behavior recently discovered (i.e., weakly coupled systems are comoving while strongly coupled ones resist the cosmic expansion) is limited to the de Sitter background. New exact solutions are presented which describe black holes perfectly comoving with a generic Friedmann universe. The possibility of violating cosmic censorship for a black hole approaching the big rip is also discussed

  12. Temperature expansions for magnetic systems

    International Nuclear Information System (INIS)

    Cangemi, D.; Dunne, G.

    1996-01-01

    We derive finite temperature expansions for relativistic fermion systems in the presence of background magnetic fields, and with nonzero chemical potential. We use the imaginary-time formalism for the finite temperature effects, the proper-time method for the background field effects, and zeta function regularization for developing the expansions. We emphasize the essential difference between even and odd dimensions, focusing on 2+1 and 3+1 dimensions. We concentrate on the high temperature limit, but we also discuss the T=0 limit with nonzero chemical potential. Copyright copyright 1996 Academic Press, Inc

  13. Bearing-Mounting Concept Accommodates Thermal Expansion

    Science.gov (United States)

    Nespodzany, Robert; Davis, Toren S.

    1995-01-01

    Pins or splines allow radial expansion without slippage. Design concept for mounting rotary bearing accommodates differential thermal expansion between bearing and any structure(s) to which bearing connected. Prevents buildup of thermal stresses by allowing thermal expansion to occur freely but accommodating expansion in such way not to introduce looseness. Pin-in-slot configuration also maintains concentricity.

  14. Energy expansion planning by considering electrical and thermal expansion simultaneously

    International Nuclear Information System (INIS)

    Abbasi, Ali Reza; Seifi, Ali Reza

    2014-01-01

    Highlights: • This paper focused on the expansion planning optimization of energy systems. • Employing two form of energy: the expansion of electrical and thermal energies. • The main objective is to minimize the costs. • A new Modified Honey Bee Mating Optimization (MHBMO) algorithm is applied. - Abstract: This study focused on the expansion planning optimization of energy systems employing two forms of energy: the expansion of electrical and thermal energies simultaneously. The main objective of this investigation is confirming network adequacy by adding new equipment to the network, over a given planning horizon. The main objective of the energy expansion planning (EEP) is to minimize the real energy loss, voltage deviation and the total cost of installation equipments. Since the objectives are different and incommensurable, it is difficult to solve the problem by the conventional approaches that may optimize a single objective. So, the meta-heuristic algorithm is applied to this problem. Here, Honey Bee Mating Optimization algorithm (HBMO) as a new evolutionary optimization algorithm is utilized. In order to improve the total ability of HBMO for the global search and exploration, a new modification process is suggested such a way that the algorithm will search the total search space globally. Also, regarding the uncertainties of the new complicated energy systems, in this paper for the first time, the EEP problem is investigated in a stochastic environment by the use of probabilistic load flow technique based on Point Estimate Method (PEM). In order to evaluate the feasibility and effectiveness of the proposed algorithm, two modified test systems are used as case studies

  15. The Thermal Expansion Of Feldspars

    Science.gov (United States)

    Hovis, G. L.; Medford, A.; Conlon, M.

    2009-12-01

    Hovis and others (1) investigated the thermal expansion of natural and synthetic AlSi3 feldspars and demonstrated that the coefficient of thermal expansion (α) decreases significantly, and linearly, with increasing room-temperature volume (VRT). In all such feldspars, therefore, chemical expansion limits thermal expansion. The scope of this work now has been broadened to include plagioclase and Ba-K feldspar crystalline solutions. X-ray powder diffraction data have been collected between room temperature and 925 °C on six plagioclase specimens ranging in composition from anorthite to oligoclase. When combined with thermal expansion data for albite (2,3,4) a steep linear trend of α as a function of VRT emerges, reflecting how small changes in composition dramatically affect expansion behavior. The thermal expansion data for five synthetic Ba-K feldspars ranging in composition from 20 to 100 mole percent celsian, combined with data for pure K-feldspar (3,4), show α-VRT relationships similar in nature to the plagioclase series, but with a slope and intercept different from the latter. Taken as a group all Al2Si2 feldspars, including anorthite and celsian from the present study along with Sr- (5) and Pb-feldspar (6) from other workers, show very limited thermal expansion that, unlike AlSi3 feldspars, has little dependence on the divalent-ion (or M-) site occupant. This apparently is due to the necessitated alternation of Al and Si in the tetrahedral sites of these minerals (7), which in turn locks the tetrahedral framework and makes the M-site occupant nearly irrelevant to expansion behavior. Indeed, in feldspar series with coupled chemical substitution it is the change away from a 1:1 Al:Si ratio that gives feldspars greater freedom to expand. Overall, the relationships among α, chemical composition, and room-temperature volume provide useful predictive tools for estimating feldspar thermal expansion and give insight into the controls of expansion behavior in

  16. Crude oil pipeline expansion summary

    International Nuclear Information System (INIS)

    2005-02-01

    The Canadian Association of Petroleum Producers has been working with producers to address issues associated with the development of new pipeline capacity from western Canada. This document presents an assessment of the need for additional oil pipeline capacity given the changing mix of crude oil types and forecasted supply growth. It is of particular interest to crude oil producers and contributes to current available information for market participants. While detailed, the underlying analysis does not account for all the factors that may come into play when individual market participants make choices about which expansions they may support. The key focus is on the importance of timely expansion. It was emphasized that if pipeline expansions lags the crude supply growth, then the consequences would be both significant and unacceptable. Obstacles to timely expansion are also discussed. The report reviews the production and supply forecasts, the existing crude oil pipeline infrastructure, opportunities for new market development, requirements for new pipeline capacity and tolling options for pipeline development. tabs., figs., 1 appendix

  17. Asymptotic Expansions - Methods and Applications

    International Nuclear Information System (INIS)

    Harlander, R.

    1999-01-01

    Different viewpoints on the asymptotic expansion of Feynman diagrams are reviewed. The relations between the field theoretic and diagrammatic approaches are sketched. The focus is on problems with large masses or large external momenta. Several recent applications also for other limiting cases are touched upon. Finally, the pros and cons of the different approaches are briefly discussed. (author)

  18. Model of clinker capacity expansion

    CSIR Research Space (South Africa)

    Stylianides, T

    1998-10-01

    Full Text Available This paper describes a model which has been applied in practice to determine an optimal plan for clinker capacity expansion. The problem was formulated as an integer linear program aiming to determine the optimal number, size and location of kilns...

  19. The bootstrap and edgeworth expansion

    CERN Document Server

    Hall, Peter

    1992-01-01

    This monograph addresses two quite different topics, in the belief that each can shed light on the other. Firstly, it lays the foundation for a particular view of the bootstrap. Secondly, it gives an account of Edgeworth expansion. Chapter 1 is about the bootstrap, witih almost no mention of Edgeworth expansion; Chapter 2 is about Edgeworth expansion, with scarcely a word about the bootstrap; and Chapters 3 and 4 bring these two themes together, using Edgeworth expansion to explore and develop the properites of the bootstrap. The book is aimed a a graduate level audience who has some exposure to the methods of theoretical statistics. However, technical details are delayed until the last chapter (entitled "Details of Mathematical Rogour"), and so a mathematically able reader without knowledge of the rigorous theory of probability will have no trouble understanding the first four-fifths of the book. The book simultaneously fills two gaps in the literature; it provides a very readable graduate level account of t...

  20. On Fourier re-expansions

    OpenAIRE

    Liflyand, E.

    2012-01-01

    We study an extension to Fourier transforms of the old problem on absolute convergence of the re-expansion in the sine (cosine) Fourier series of an absolutely convergent cosine (sine) Fourier series. The results are obtained by revealing certain relations between the Fourier transforms and their Hilbert transforms.

  1. On persistently positively expansive maps

    Directory of Open Access Journals (Sweden)

    Alexander Arbieto

    2010-06-01

    Full Text Available In this paper, we prove that any C¹-persistently positively expansive map is expanding. This improves a result due to Sakai (Sakai 2004.Neste artigo, mostramos que todo mapa C¹-persistentemente positivamente expansivo e expansor. Isto melhora um resultado devido a Sakai (Sakai 2004.

  2. Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

    International Nuclear Information System (INIS)

    Yang Jing; Wang Chuan; Zhang Ru

    2010-01-01

    In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication. The authentication key expansion method is introduced to improve the life of the keys with security. In the first scheme, the third party, called Trent is introduced to authenticate the users that participate in the communication. He sends the polarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys. In the communication process, polarized single photons are used to serve as the carriers, which transmit the secret messages directly. The second QSDC process with authentication between two parties is also discussed.

  3. From Kyoto to Copenhagen: the carbon markets expansion

    International Nuclear Information System (INIS)

    Alberola, Emilie; Fages, Emmanuel

    2009-01-01

    The article examines the development of carbon markets in the world. Such markets are the main economic instrument of the international climate policy established by the Kyoto Protocol in 1997 and are being implemented by most industrialized countries. They are experimented by Europe since 2005 for industrial facilities and since 2008 by industrialized countries under Kyoto. The development of carbon markets will likely continue beyond 2012, when the Kyoto Protocol expires. Their expansion will be largely determined by the future international climate policy to be negotiated in Copenhagen in December 2009 and by the commitment of the largest economies like the United States. The authors describe the emergence of carbon markets, their basic principles and the experience of Kyoto and European markets. Then, they deal with the expected developments beyond 2012

  4. Solution of Stochastic Nonlinear PDEs Using Automated Wiener-Hermite Expansion

    KAUST Repository

    Al-Juhani, Amnah

    2014-01-06

    The solution of the stochastic differential equations (SDEs) using Wiener-Hermite expansion (WHE) has the advantage of converting the problem to a system of deterministic equations that can be solved efficiently using the standard deterministic numerical methods [1]. The main statistics, such as the mean, covariance, and higher order statistical moments, can be calculated by simple formulae involving only the deterministic Wiener-Hermite coefficients. In WHE approach, there is no randomness directly involved in the computations. One does not have to rely on pseudo random number generators, and there is no need to solve the SDEs repeatedly for many realizations. Instead, the deterministic system is solved only once. For previous research efforts see [2, 4].

  5. Exponential Expansion in Evolutionary Economics

    DEFF Research Database (Denmark)

    Frederiksen, Peter; Jagtfelt, Tue

    2013-01-01

    This article attempts to solve current problems of conceptual fragmentation within the field of evolutionary economics. One of the problems, as noted by a number of observers, is that the field suffers from an assemblage of fragmented and scattered concepts (Boschma and Martin 2010). A solution...... to this problem is proposed in the form of a model of exponential expansion. The model outlines the overall structure and function of the economy as exponential expansion. The pictographic model describes four axiomatic concepts and their exponential nature. The interactive, directional, emerging and expanding...... concepts are described in detail. Taken together it provides the rudimentary aspects of an economic system within an analytical perspective. It is argued that the main dynamic processes of the evolutionary perspective can be reduced to these four concepts. The model and concepts are evaluated in the light...

  6. Production expansion continues to accelerate

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that Saudi Arabian Oil Co. (Saudi Aramco) is continuing its accelerated Crude Oil Expansion Program initiated in 1989 that aims at achieving a 10 million bpd productive capacity by 1995. In addition to major engineering, construction and renovation work related to production expansion, Saudi Aramco drilling and workover operations have been markedly expanded. Since January 1991, rig activity has doubled. As an indication of aging of Saudi production, projects include modernizing current injection water treatment facilities, installing a new seawater injection plant on the Persian Gulf, installing dewatering facilities in a number of locations and installing a pilot gas lift project. In addition, equipment orders indicate the new discoveries south of Riyadh may also need the assistance of water injection from inception of production

  7. Shrub expansion in SW Greenland

    DEFF Research Database (Denmark)

    Jørgensen, Rasmus Halfdan

    Arctic regions have experienced higher temperatures in recent decades, and the warming trend is projected to continue in the coming years. Arctic ecosystems are considered to be particularly vulnerable to climate change. Expansion of shrubs has been observed widely in tundra areas across the Arctic......, and has a range of ecosystem effects where it occurs. Shrub expansion has to a large extend been attributed to increasing temperatures over the past century, while grazing and human disturbance have received less attention. Alnus viridis ssp. crispa is a common arctic species that contributes...... to increasing shrub cover. Despite this, there is only limited experimental evidence that growth of the species responds to warming. Plant populations in fragmented and isolated locations could face problems adapting to a warming climate due to limited genetic variation and restricted migration from southern...

  8. Ex Vivo Expansion of Hematopoietic Stem Cells to Improve Engraftment in Stem Cell Transplantation.

    Science.gov (United States)

    Ko, Kap-Hyoun; Nordon, Robert; O'Brien, Tracey A; Symonds, Geoff; Dolnikov, Alla

    2017-01-01

    The efficient use of hematopoietic stem cells (HSC) for transplantation is often limited by the relatively low numbers of HSC collected. The ex vivo expansion of HSC for clinical use is a potentially valuable and safe approach to increase HSC numbers thereby increasing engraftment and reducing the risk of morbidity from infection. Here, we describe a protocol for the robust ex vivo expansion of human CD34(+) HSC isolated from umbilical cord blood. The protocol described can efficiently generate large numbers of HSC. We also describe a flow cytometry-based method using high-resolution division tracking to characterize the kinetics of HSC growth and differentiation. Utilizing the guidelines discussed, it is possible for investigators to use this protocol as presented or to modify it for their specific needs.

  9. RELIABILITY OF LENTICULAR EXPANSION COMPENSATORS

    Directory of Open Access Journals (Sweden)

    Gabriel BURLACU,

    2011-11-01

    Full Text Available Axial lenticular compensators are made to take over the longitudinal heat expansion, shock , vibration and noise, made elastic connections for piping systems. In order to have a long life for installations it is necessary that all elements, including lenticular compensators, have a good reliability. This desire can be did by technology of manufactoring and assembly of compensators, the material for lenses and by maintenance.of compensator

  10. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  11. A Power Series Expansion and Its Applications

    Science.gov (United States)

    Chen, Hongwei

    2006-01-01

    Using the power series solution of a differential equation and the computation of a parametric integral, two elementary proofs are given for the power series expansion of (arcsin x)[squared], as well as some applications of this expansion.

  12. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  13. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  14. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  15. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  16. Strain expansion-reduction approach

    Science.gov (United States)

    Baqersad, Javad; Bharadwaj, Kedar

    2018-02-01

    Validating numerical models are one of the main aspects of engineering design. However, correlating million degrees of freedom of numerical models to the few degrees of freedom of test models is challenging. Reduction/expansion approaches have been traditionally used to match these degrees of freedom. However, the conventional reduction/expansion approaches are only limited to displacement, velocity or acceleration data. While in many cases only strain data are accessible (e.g. when a structure is monitored using strain-gages), the conventional approaches are not capable of expanding strain data. To bridge this gap, the current paper outlines a reduction/expansion technique to reduce/expand strain data. In the proposed approach, strain mode shapes of a structure are extracted using the finite element method or the digital image correlation technique. The strain mode shapes are used to generate a transformation matrix that can expand the limited set of measurement data. The proposed approach can be used to correlate experimental and analytical strain data. Furthermore, the proposed technique can be used to expand real-time operating data for structural health monitoring (SHM). In order to verify the accuracy of the approach, the proposed technique was used to expand the limited set of real-time operating data in a numerical model of a cantilever beam subjected to various types of excitations. The proposed technique was also applied to expand real-time operating data measured using a few strain gages mounted to an aluminum beam. It was shown that the proposed approach can effectively expand the strain data at limited locations to accurately predict the strain at locations where no sensors were placed.

  17. Expansion of protein domain repeats.

    Directory of Open Access Journals (Sweden)

    Asa K Björklund

    2006-08-01

    Full Text Available Many proteins, especially in eukaryotes, contain tandem repeats of several domains from the same family. These repeats have a variety of binding properties and are involved in protein-protein interactions as well as binding to other ligands such as DNA and RNA. The rapid expansion of protein domain repeats is assumed to have evolved through internal tandem duplications. However, the exact mechanisms behind these tandem duplications are not well-understood. Here, we have studied the evolution, function, protein structure, gene structure, and phylogenetic distribution of domain repeats. For this purpose we have assigned Pfam-A domain families to 24 proteomes with more sensitive domain assignments in the repeat regions. These assignments confirmed previous findings that eukaryotes, and in particular vertebrates, contain a much higher fraction of proteins with repeats compared with prokaryotes. The internal sequence similarity in each protein revealed that the domain repeats are often expanded through duplications of several domains at a time, while the duplication of one domain is less common. Many of the repeats appear to have been duplicated in the middle of the repeat region. This is in strong contrast to the evolution of other proteins that mainly works through additions of single domains at either terminus. Further, we found that some domain families show distinct duplication patterns, e.g., nebulin domains have mainly been expanded with a unit of seven domains at a time, while duplications of other domain families involve varying numbers of domains. Finally, no common mechanism for the expansion of all repeats could be detected. We found that the duplication patterns show no dependence on the size of the domains. Further, repeat expansion in some families can possibly be explained by shuffling of exons. However, exon shuffling could not have created all repeats.

  18. Nuclear fuel reprocessing expansion strategies

    International Nuclear Information System (INIS)

    Gallagher, J.M.

    1975-01-01

    A description is given of an effort to apply the techniques of operations research and energy system modeling to the problem of determination of cost-effective strategies for capacity expansion of the domestic nuclear fuel reprocessing industry for the 1975 to 2000 time period. The research also determines cost disadvantages associated with alternative strategies that may be attractive for political, social, or ecological reasons. The sensitivity of results to changes in cost assumptions was investigated at some length. Reactor fuel types covered by the analysis include the Light Water Reactor (LWR), High-Temperature Gas-Cooled Reactor (HTGR), and the Fast Breeder Reactor (FBR)

  19. Thermal expansion of LATGS crystals

    International Nuclear Information System (INIS)

    Kassem, M.E.; Kandil, S.H.; Hamed, A.E.; Stankowska, J.

    1989-04-01

    The thermal expansion of triglycine sulphate crystals doped with L-α alanine (LATGS) has been studied around the phase transition temperature (30-60 deg. C) using thermomechanical analysis TMA. With increasing the content of admixture, the transition temperature (T c ) was shifted towards higher values, while the relative changes in the dimension of the crystals (ΔL/L 0 ) of the studied directions varied both in the para- and ferroelectric phases. The transition width in the case of doped crystals was found to be broad, and this broadening increases with increasing the content of L-α alanine. (author). 12 refs, 3 figs

  20. Contribution of thermal expansion and

    Directory of Open Access Journals (Sweden)

    O.I.Pursky

    2007-01-01

    Full Text Available A theoretical model is developed to describe the experimental results obtained for the isobaric thermal conductivity of rare gas solids (RGS. The isobaric thermal conductivity of RGS has been analysed within Debye approximation with regard to the effect of thermal expansion. The suggested model takes into consideration the fact that thermal conductivity is determined by U-processes while above the phonon mobility edge it is determined by "diffusive" modes migrating randomly from site to site. The mobility edge ω0 is determined from the condition that the phonon mean-free path restricted by the U-processes cannot be smaller than half of the phonon wavelength.

  1. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  2. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  3. High thermal expansion, sealing glass

    Science.gov (United States)

    Brow, R.K.; Kovacic, L.

    1993-11-16

    A glass composition is described for hermetically sealing to high thermal expansion materials such as aluminum alloys, stainless steels, copper, and copper/beryllium alloys, which includes between about 10 and about 25 mole percent Na[sub 2]O, between about 10 and about 25 mole percent K[sub 2]O, between about 5 and about 15 mole percent Al[sub 2]O[sub 3], between about 35 and about 50 mole percent P[sub 2]O[sub 5] and between about 5 and about 15 mole percent of one of PbO, BaO, and mixtures thereof. The composition, which may also include between 0 and about 5 mole percent Fe[sub 2]O[sub 3] and between 0 and about 10 mole percent B[sub 2]O[sub 3], has a thermal expansion coefficient in a range of between about 160 and 210[times]10[sup [minus]7]/C and a dissolution rate in a range of between about 2[times]10[sup [minus]7] and 2[times]10[sup [minus]9]g/cm[sup 2]-min. This composition is suitable to hermetically seal to metallic electrical components which will be subjected to humid environments over an extended period of time.

  4. Nonperturbative path integral expansion II

    International Nuclear Information System (INIS)

    Kaiser, H.J.

    1976-05-01

    The Feynman path integral representation of the 2-point function for a self-interacting Bose field is investigated using an expansion ('Path Integral Expansion', PIE) of the exponential of the kinetic term of the Lagrangian. This leads to a series - illustrated by a graph scheme - involving successively a coupling of more and more points of the lattice space commonly employed in the evaluation of path integrals. The values of the individual PIE graphs depend of course on the lattice constant. Two methods - Pade approximation and Borel-type extrapolation - are proposed to extract information about the continuum limit from a finite-order PIE. A more flexible PIE is possible by expanding besides the kinetic term a suitably chosen part of the interaction term too. In particular, if the co-expanded part is a mass term the calculation becomes only slightly more complicated than in the original formulation and the appearance of the graph scheme is unchanged. A significant reduction of the number of graphs and an improvement of the convergence of the PIE can be achieved by performing certain sums over an infinity of graph elements. (author)

  5. Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol

    International Nuclear Information System (INIS)

    Hirota, Osamu

    2007-01-01

    There exists a great gap between one-time pad with perfect secrecy and conventional mathematical encryption. The Yuen 2000 (Y00) protocol or αη scheme may provide a protocol which covers from the conventional security to the ultimate one, depending on implementations. This paper presents the complexity-theoretic security analysis on some models of the Y00 protocol with nonlinear pseudo-random-number-generator and quantum noise diffusion mapping (QDM). Algebraic attacks and fast correlation attacks are applied with a model of the Y00 protocol with nonlinear filtering like the Toyocrypt stream cipher as the running key generator, and it is shown that these attacks in principle do not work on such models even when the mapping between running key and quantum state signal is fixed. In addition, a security property of the Y00 protocol with QDM is clarified. Consequently, we show that the Y00 protocol has a potential which cannot be realized by conventional cryptography and that it goes beyond mathematical encryption with physical encryption

  6. Ultra-low thermal expansion realized in giant negative thermal expansion materials through self-compensation

    OpenAIRE

    Fei-Ran Shen; Hao Kuang; Feng-Xia Hu; Hui Wu; Qing-Zhen Huang; Fei-Xiang Liang; Kai-Ming Qiao; Jia Li; Jing Wang; Yao Liu; Lei Zhang; Min He; Ying Zhang; Wen-Liang Zuo; Ji-Rong Sun

    2017-01-01

    Materials with zero thermal expansion (ZTE) or precisely tailored thermal expansion are in urgent demand of modern industries. However, the overwhelming majority of materials show positive thermal expansion. To develop ZTE or negative thermal expansion (NTE) materials as compensators has become an important challenge. Here, we present the evidence for the realization of ultra-low thermal expansion in Mn–Co–Ge–In particles. The bulk with the Ni2In-type hexagonal structure undergoes giant NTE o...

  7. Xeno-Free Strategies for Safe Human Mesenchymal Stem/Stromal Cell Expansion: Supplements and Coatings

    Directory of Open Access Journals (Sweden)

    M. Cimino

    2017-01-01

    Full Text Available Human mesenchymal stem/stromal cells (hMSCs have generated great interest in regenerative medicine mainly due to their multidifferentiation potential and immunomodulatory role. Although hMSC can be obtained from different tissues, the number of available cells is always low for clinical applications, thus requiring in vitro expansion. Most of the current protocols for hMSC expansion make use of fetal bovine serum (FBS as a nutrient-rich supplement. However, regulatory guidelines encourage novel xeno-free alternatives to define safer and standardized protocols for hMSC expansion that preserve their intrinsic therapeutic potential. Since hMSCs are adherent cells, the attachment surface and cell-adhesive components also play a crucial role on their successful expansion. This review focuses on the advantages/disadvantages of FBS-free media and surfaces/coatings that avoid the use of animal serum, overcoming ethical issues and improving the expansion of hMSC for clinical applications in a safe and reproducible way.

  8. Simplified protocol for clinical-grade tumor-infiltrating lymphocyte manufacturing with use of the Wave bioreactor

    DEFF Research Database (Denmark)

    Donia, Marco; Larsen, Signe Møllebæk; Met, Ozcan

    2014-01-01

    , a practical and simple protocol of TIL manufacturing with the use of a closed-system bioreactor was developed and implemented at our institution. RESULTS: This protocol enabled significant work load reduction during the most labor-intense step of TIL expansion, and allowed generation of high-quality TIL...

  9. Expansion of passive safety function

    International Nuclear Information System (INIS)

    Inai, Nobuhiko; Nei, Hiromichi; Kumada, Toshiaki.

    1995-01-01

    Expansion of the use of passive safety functions is proposed. Two notions are presented. One is that, in the design of passive safety nuclear reactors where aversion of active components is stressed, some active components are purposely introduced, by which a system is built in such a way that it behaves in an apparently passive manner. The second notion is that, instead of using a passive safety function alone, a passive safety function is combined with some active components, relating the passivity in the safety function with enhanced controllability in normal operation. The nondormant system which the authors propose is one example of the first notion. This is a system in which a standby safety system is a portion of the normal operation system. An interpretation of the nondormant system via synergetics is made. As an example of the second notion, a PIUS density lock aided with active components is proposed and is discussed

  10. On the Equisummability of Hermite and Fourier Expansions

    Indian Academy of Sciences (India)

    We prove an equisummability result for the Fourier expansions and Hermite expansions as well as special Hermite expansions. We also prove the uniform boundedness of the Bochner-Riesz means associated to the Hermite expansions for polyradial functions.

  11. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  12. [Tissular expansion in giant congenital nevi treatment].

    Science.gov (United States)

    Nguyen Van Nuoi, V; Francois-Fiquet, C; Diner, P; Sergent, B; Zazurca, F; Franchi, G; Buis, J; Vazquez, M-P; Picard, A; Kadlub, N

    2014-08-01

    Surgical management of giant melanotic naevi remains a surgical challenge. Tissue expansion provides tissue of the same quality for the repair of defects. The aim of this study is to review tissular expansion for giant melanotic naevi. We conducted a retrospective study from 2000 to 2012. All children patients who underwent a tissular expansion for giant congenital naevi had been included. Epidemiological data, surgical procedure, complication rate and results had been analysed. Thirty-tree patients had been included; they underwent 61 procedures with 79 tissular-expansion prosthesis. Previous surgery, mostly simple excision had been performed before tissular expansion. Complete naevus excision had been performed in 63.3% of the cases. Complications occurred in 45% of the cases, however in 50% of them were minor. Iterative surgery increased the complication rate. Tissular expansion is a valuable option for giant congenital naevus. However, complication rate remained high, especially when iterative surgery is needed. Copyright © 2013 Elsevier Masson SAS. All rights reserved.

  13. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  14. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  15. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  16. Simulation program for multiple expansion Stirling machines

    International Nuclear Information System (INIS)

    Walker, G.; Weiss, M.; Fauvel, R.; Reader, G.; Bingham, E.R.

    1992-01-01

    Multiple expansion Stirling machines have been a topic of interest at the University of Calgary for some years. Recently a second-order computer simulation program with integral graphics package for Stirling cryocoolers with up to four stages of expansion were developed and made available to the Stirling community. Adaptation of the program to multiple expansion Stirling power systems is anticipated. This paper briefly introduces the program and presents a specimen result

  17. Semiclassical expansions for confined N fermion systems

    International Nuclear Information System (INIS)

    Krivine, H.; Martorell, J.; Casas, M.

    1989-01-01

    A new derivation of the Wigner Kirkwood expansion for N-fermion systems is presented, showing explicitly the connection to the WKB approximation for a single level. This allows to study separately the two ansatz required to obtain the semiclassical expansions: the asymptotic expansions in powers of ℎ and the smoothing of quantal effects. We discuss the one dimensional and three dimensional, with spherical symmetry, cases. Applications for standard potentials used in nuclear physics are described in detail

  18. Thermal and hygroscopic expansion characteristics of bamboo

    OpenAIRE

    Huang, Puxi; Chang, Wen-shao; Ansell, Martin P.; Bowen, Chris R.; Chew, John Y. M.; Adamak, Vana i

    2017-01-01

    The expansion and contraction of bamboo caused by temperature and moisture variations must be evaluated\\ud if bamboo is to be utilised as a building material. However, detailed expansion data, especially data in the ascent and\\ud descent processes of temperature and moisture are unexplored. The aim of this study is to investigate the expansion\\ud characteristics of Phyllostachys edulis (Moso bamboo) in ascent and descent processes of temperature and moisture.\\ud The measurement of linear ther...

  19. $\\delta$-Expansion at Finite Temperature

    OpenAIRE

    Ramos, Rudnei O.

    1996-01-01

    We apply the $\\delta$-expansion perturbation scheme to the $\\lambda \\phi^{4}$ self-interacting scalar field theory in 3+1 D at finite temperature. In the $\\delta$-expansion the interaction term is written as $\\lambda (\\phi^{2})^{ 1 + \\delta}$ and $\\delta$ is considered as the perturbation parameter. We compute within this perturbative approach the renormalized mass at finite temperature at a finite order in $\\delta$. The results are compared with the usual loop-expansion at finite temperature.

  20. Chromatic Derivatives, Chromatic Expansions and Associated Spaces

    OpenAIRE

    Ignjatovic, Aleksandar

    2009-01-01

    This paper presents the basic properties of chromatic derivatives and chromatic expansions and provides an appropriate motivation for introducing these notions. Chromatic derivatives are special, numerically robust linear differential operators which correspond to certain families of orthogonal polynomials. Chromatic expansions are series of the corresponding special functions, which possess the best features of both the Taylor and the Shannon expansions. This makes chromatic derivatives and ...

  1. Thermal expansion in small metallic particles

    International Nuclear Information System (INIS)

    Ivanov, A.S.

    1985-01-01

    An anomalously low thermal expansion observable in small particles is attributed to extending effect of the shell. It is shown that the coefficient of thermal expansion of the oxide-film-coated aluminium particles calculated using elastic constants and coefficients of thermal expansion of massive materials agres well with those measured experimentally. The linear dilatation of the shell, its stress to rupture and the values of the structural tension are estimated vs the temperature

  2. Disjoint sum expansion method in FTA

    International Nuclear Information System (INIS)

    Ruan Keqiang

    1987-01-01

    An expansion formula for transforming boolean algebraic expressions into disjoint form was proved. Based on this expansion formula, a method for transforming system failure function into disjoint form was devised. The fact that the expansion can be done for several elements simulatneously makes the method flexible and fast. Some examples from fault tree analysis (FTA) and network analysis were examined by the new method to show its algorithm and its merit. Besides, by means of the proved expansion formula some boolean algebraic relations can proved very easily

  3. Thermal expansion of L-ascorbic acid

    Science.gov (United States)

    Nicolaï, B.; Barrio, M.; Tamarit, J.-Ll.; Céolin, R.; Rietveld, I. B.

    2017-04-01

    The specific volume of vitamin C has been investigated by X-ray powder diffraction as a function of temperature from 110 K up to complete degradation around 440 K. Its thermal expansion is relatively small in comparison with other organic compounds with an expansivity α v of 1.2(3) × 10-4 K-1. The structure consists of strongly bound molecules in the ac plane through a dense network of hydrogen bonds. The thermal expansion is anisotropic. Along the b axis, the expansion has most leeway and is about 10 times larger than in the other directions.

  4. Adiabatic supernova expansion into the circumstellar medium

    International Nuclear Information System (INIS)

    Band, D.L.; Liang, E.P.

    1987-01-01

    We perform one dimensional numerical simulations with a Lagrangian hydrodynamics code of the adiabatic expansion of a supernova into the surrounding medium. The early expansion follows Chevalier's analytic self-similar solution until the reverse shock reaches the ejecta core. We follow the expansion as it evolves towards the adiabatic blast wave phase. Some memory of the earlier phases of expansion is retained in the interior even when the outer regions expand as a blast wave. We find the results are sensitive to the initial configuration of the ejecta and to the placement of gridpoints. 6 refs., 2 figs

  5. An upper bound on the second order asymptotic expansion for the quantum communication cost of state redistribution

    Energy Technology Data Exchange (ETDEWEB)

    Datta, Nilanjana, E-mail: n.datta@statslab.cam.ac.uk [Statistical Laboratory, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA (United Kingdom); Hsieh, Min-Hsiu, E-mail: Min-Hsiu.Hsieh@uts.edu.au [Centre for Quantum Computation and Intelligent Systems, Faculty of Engineering and Information Technology, University of Technology Sydney, NSW 2007 (Australia); Oppenheim, Jonathan, E-mail: j.oppenheim@ucl.ac.uk [Department of Physics and Astronomy, University College London, Gower Street, London WC1E 6BT (United Kingdom); Department of Computer Science and Centre for Quantum Technologies, National University of Singapore, Singapore 119615 (Singapore)

    2016-05-15

    State redistribution is the protocol in which given an arbitrary tripartite quantum state, with two of the subsystems initially being with Alice and one being with Bob, the goal is for Alice to send one of her subsystems to Bob, possibly with the help of prior shared entanglement. We derive an upper bound on the second order asymptotic expansion for the quantum communication cost of achieving state redistribution with a given finite accuracy. In proving our result, we also obtain an upper bound on the quantum communication cost of this protocol in the one-shot setting, by using the protocol of coherent state merging as a primitive.

  6. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  7. Hubble expansion in static spacetime

    International Nuclear Information System (INIS)

    Rossler, Otto E.; Froehlich, Dieter; Movassagh, Ramis; Moore, Anthony

    2007-01-01

    A recently proposed mechanism for light-path expansion in a static spacetime is based on the moving-lenses paradigm. Since the latter is valid independently of whether space expands or not, a static universe can be used to better see the implications. The moving-lenses paradigm is related to the paradigm of dynamical friction. If this is correct, a Hubble-like law is implicit. It is described quantitatively. A bent in the Hubble-like line is predictably implied. The main underlying assumption is Price's Principle (PI 3 ). If the theory is sound, the greatest remaining problem in cosmology becomes the origin of hydrogen. Since Blandford's jet production mechanism for quasars is too weak, a generalized Hawking radiation hidden in the walls of cosmic voids is invoked. A second prediction is empirical: slow pattern changes in the cosmic microwave background. A third is ultra-high redshifts for Giacconi quasars. Bruno's eternal universe in the spirit of Augustine becomes a bit less outlandish

  8. Primordial vorticity and gradient expansion

    CERN Document Server

    Giovannini, Massimo

    2012-01-01

    The evolution equations of the vorticities of the electrons, ions and photons in a pre-decoupling plasma are derived, in a fully inhomogeneous geometry, by combining the general relativistic gradient expansion and the drift approximation within the Adler-Misner-Deser decomposition. The vorticity transfer between the different species is discussed in this novel framework and a set of general conservation laws, connecting the vorticities of the three-component plasma with the magnetic field intensity, is derived. After demonstrating that a source of large-scale vorticity resides in the spatial gradients of the geometry and of the electromagnetic sources, the total vorticity is estimated to lowest order in the spatial gradients and by enforcing the validity of the momentum constraint. By acknowledging the current bounds on the tensor to scalar ratio in the (minimal) tensor extension of the $\\Lambda$CDM paradigm the maximal comoving magnetic field induced by the total vorticity turns out to be, at most, of the or...

  9. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  10. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  11. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  12. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  13. Negative thermal expansion materials: technological key for control of thermal expansion

    OpenAIRE

    Koshi Takenaka

    2012-01-01

    Most materials expand upon heating. However, although rare, some materials contract upon heating. Such negative thermal expansion (NTE) materials have enormous industrial merit because they can control the thermal expansion of materials. Recent progress in materials research enables us to obtain materials exhibiting negative coefficients of linear thermal expansion over −30 ppm K−1. Such giant NTE is opening a new phase of control of thermal expansion in composites. Specifically examining pra...

  14. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  15. Finnish Higher Education Expansion and Regional Policy

    Science.gov (United States)

    Saarivirta, Toni

    2010-01-01

    This paper concentrates on the expansion of Finnish higher education between the 1960s and 1970s, exposes its background in the light of the policy decisions that were made, compares the unique features of this expansion with those of certain other countries, discusses the impact of the controlled "top down" governance of higher…

  16. The δ expansion for stochastic quantization

    International Nuclear Information System (INIS)

    Bender, C.M.; Cooper, F.; Milton, K.A.; Department of Physics, Brown University, Providence, Rhode Island 02912; Theoretical Division, Los Alamos National Laboratory, Los Alamos, New Mexic o 87545; Department of Physics, The Ohio State University, Columbus, Ohio 43210; Department of Physics and Astronomy, University of Oklahoma, Norman, Oklaho ma 73019)

    1989-01-01

    Using a recently proposed perturbation expansion called the δ expansion, we show how to solve the Langevin equation associated with a gphi 4 field theory. We illustrate the technique in zero- and one-dimensional space-time, and then generalize this approach to d dimensions

  17. The heavy quark expansion of QCD

    International Nuclear Information System (INIS)

    Falk, A.F.

    1997-01-01

    These lectures contain an elementary introduction to heavy quark symmetry and the heavy quark expansion. Applications such as the expansion of heavy meson decay constants and the treatment of inclusive and exclusive semileptonic B decays are included. Heavy hadron production via nonperturbative fragmentation processes is also discussed. 54 refs., 7 figs

  18. The heavy quark expansion of QCD

    Energy Technology Data Exchange (ETDEWEB)

    Falk, A.F. [Johns Hopkins Univ., Baltimore, MD (United States). Dept. of Physics and Astronomy

    1997-06-01

    These lectures contain an elementary introduction to heavy quark symmetry and the heavy quark expansion. Applications such as the expansion of heavy meson decay constants and the treatment of inclusive and exclusive semileptonic B decays are included. Heavy hadron production via nonperturbative fragmentation processes is also discussed. 54 refs., 7 figs.

  19. Thermal expansion of doped lanthanum gallates

    Indian Academy of Sciences (India)

    Administrator

    Since the components are in intimate mechanical contact, any stress generated due to their thermal expansion mis- match during thermal cycling could lead to catastrophic failure of the cell. The functional materials must have similar thermal expansions to avoid mechanical stresses. Hence it is useful to study the thermal ...

  20. Platform Expansion Design as Strategic Choice

    DEFF Research Database (Denmark)

    Staykova, Kalina S.; Damsgaard, Jan

    2016-01-01

    In this paper, we address how the strategic choice of platform expansion design impacts the subse-quent platform strategy. We identify two distinct approaches to platform expansion – platform bun-dling and platform constellations, which currently co-exist. The purpose of this paper is to outline...

  1. Series expansion of the modified Einstein Procedure

    Science.gov (United States)

    Seema Chandrakant Shah-Fairbank

    2009-01-01

    This study examines calculating total sediment discharge based on the Modified Einstein Procedure (MEP). A new procedure based on the Series Expansion of the Modified Einstein Procedure (SEMEP) has been developed. This procedure contains four main modifications to MEP. First, SEMEP solves the Einstein integrals quickly and accurately based on a series expansion. Next,...

  2. Maxwell superalgebras and Abelian semigroup expansion

    Directory of Open Access Journals (Sweden)

    P.K. Concha

    2014-09-01

    Full Text Available The Abelian semigroup expansion is a powerful and simple method to derive new Lie algebras from a given one. Recently it was shown that the S-expansion of so(3,2 leads us to the Maxwell algebra M. In this paper we extend this result to superalgebras, by proving that different choices of abelian semigroups S lead to interesting D=4 Maxwell Superalgebras. In particular, the minimal Maxwell superalgebra sM and the N-extended Maxwell superalgebra sM(N recently found by the Maurer–Cartan expansion procedure, are derived alternatively as an S-expansion of osp(4|N. Moreover, we show that new minimal Maxwell superalgebras type sMm+2 and their N-extended generalization can be obtained using the S-expansion procedure.

  3. Use of expansion joints in power stations

    International Nuclear Information System (INIS)

    Birker; Rommerswinkel.

    1976-01-01

    The paper discusses the mode of action of different systems of expansion joints. Special regard is given to the problems of expansion of pipelines of high rated diameter as employed in today's large power plant turbines. Due to the limited space available, the important role of the spring rate of the bellows for the reaction forces and moments acting on the connection points is pointed out. Apart from this details are given on the fabrication and materials selection of expansion joint bellows, and problems are discussed which arise in connection with the mechanical or hydraulic deformation of bellows with one or more walls. The non-destructive methods now in use for the testing of expansion pipe joints are mentioned along with experiments to test their behaviour under changing loads. The paper concludes on some remarks concerning proper transport, storage and installation of expansion pipe joints. (orig./AK) [de

  4. Maxwell superalgebras and Abelian semigroup expansion

    Energy Technology Data Exchange (ETDEWEB)

    Concha, P.K.; Rodríguez, E.K. [Departamento de Física, Universidad de Concepción, Casilla 160-C, Concepción (Chile); Dipartimento di Scienza Applicata e Tecnologia (DISAT), Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino, Via Pietro Giuria, 1, 10125 Torino (Italy)

    2014-09-15

    The Abelian semigroup expansion is a powerful and simple method to derive new Lie algebras from a given one. Recently it was shown that the S-expansion of so(3,2) leads us to the Maxwell algebra M. In this paper we extend this result to superalgebras, by proving that different choices of abelian semigroups S lead to interesting D=4 Maxwell Superalgebras. In particular, the minimal Maxwell superalgebra sM and the N-extended Maxwell superalgebra sM{sup (N)} recently found by the Maurer–Cartan expansion procedure, are derived alternatively as an S-expansion of osp(4|N). Moreover, we show that new minimal Maxwell superalgebras type sM{sub m+2} and their N-extended generalization can be obtained using the S-expansion procedure.

  5. A PCR-based protocol to accurately size C9orf72 intermediate-length alleles.

    Science.gov (United States)

    Biasiotto, Giorgio; Archetti, Silvana; Di Lorenzo, Diego; Merola, Francesca; Paiardi, Giulia; Borroni, Barbara; Alberici, Antonella; Padovani, Alessandro; Filosto, Massimiliano; Bonvicini, Cristian; Caimi, Luigi; Zanella, Isabella

    2017-04-01

    Although large expansions of the non-coding GGGGCC repeat in C9orf72 gene are clearly defined as pathogenic for Amyotrophic Lateral Sclerosis (ALS) and Frontotemporal Lobar Degeneration (FTLD), intermediate-length expansions have also been associated with those and other neurodegenerative diseases. Intermediate-length allele sizing is complicated by intrinsic properties of current PCR-based methodologies, in that somatic mosaicism could be suspected. We designed a protocol that allows the exact sizing of intermediate-length alleles, as well as the identification of large expansions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  7. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  8. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  9. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  10. δ expansion applied to quantum electrodynamics

    International Nuclear Information System (INIS)

    Bender, C.M.; Boettcher, S.; Milton, K.A.

    1992-01-01

    A recently proposed technique known as the δ expansion provides a nonperturbative treatment of a quantum field theory. The δ-expansion approach can be applied to electrodynamics in such a way that local gauge invariance is preserved. In this paper it is shown that for electrodynamic processes involving only external photon lines and no external electron lines the δ expansion is equivalent to a fermion loop expansion. That is, the coefficient of δ n in the δ expansion is precisely the sum of all n-electron-loop Feynman diagrams in a conventional weak-coupling approximation. This equivalence does not extend to processes having external electron lines. When external electron lines are present, the δ expansion is truly nonperturbative and does not have a simple interpretation as a resummation of conventional Feynman diagrams. To illustrate the nonperturbative character of the δ expansion we perform a speculative calculation of the fermion condensate in the massive Schwinger model in the limit of large coupling constant

  11. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  12. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  13. Interbasis expansions for isotropic harmonic oscillator

    Energy Technology Data Exchange (ETDEWEB)

    Dong, Shi-Hai, E-mail: dongsh2@yahoo.com [Departamento de Física, Escuela Superior de Física y Matemáticas, Instituto Politécnico Nacional, Edificio 9, Unidad Profesional Adolfo López Mateos, Mexico D.F. 07738 (Mexico)

    2012-03-12

    The exact solutions of the isotropic harmonic oscillator are reviewed in Cartesian, cylindrical polar and spherical coordinates. The problem of interbasis expansions of the eigenfunctions is solved completely. The explicit expansion coefficients of the basis for given coordinates in terms of other two coordinates are presented for lower excited states. Such a property is occurred only for those degenerated states for given principal quantum number n. -- Highlights: ► Exact solutions of harmonic oscillator are reviewed in three coordinates. ► Interbasis expansions of the eigenfunctions is solved completely. ► This is occurred only for those degenerated states for given quantum number n.

  14. Decennial plan of expansion 1994-2003

    International Nuclear Information System (INIS)

    1993-12-01

    The Decennial Plan of Expansion 1994-2003 of Electric sector reproduces the results of the studies occurred during the planning cycle of 1992/93 from the Coordinator Groups of the Electric System Planning. Based in the market forecasting, economic-financier and time for finishing the the works, the Decennial Plan of Expansion presents the schedule of the main generation and transmission works for the next ten years, the annual spend in generation, transmission and distribution, the costs of expansion and the evaluation of attending conditions in electric system in Brazil. (C.G.C.)

  15. Thermal expansion: Metallic elements and alloys. [Handbook

    Science.gov (United States)

    Touloukian, Y. S.; Kirby, R. K.; Taylor, R. E.; Desai, P. D.

    1975-01-01

    The introductory sections of the work are devoted to the theory of thermal expansion of solids and to methods for the measurement of the linear thermal expansion of solids (X-ray methods, high speed methods, interferometry, push-rod dilatometry, etc.). The bulk of the work is devoted to numerical data on the thermal linear expansion of all the metallic elements, a large number of intermetallics, and a large number of binary alloy systems and multiple alloy systems. A comprehensive bibliography is provided along with an index to the materials examined.

  16. Discrete expansions of continuum functions. General concepts

    International Nuclear Information System (INIS)

    Bang, J.; Ershov, S.N.; Gareev, F.A.; Kazacha, G.S.

    1979-01-01

    Different discrete expansions of the continuum wave functions are considered: pole expansion (according to the Mittag-Lefler theorem), Weinberg states. The general property of these groups of states is their completeness in the finite region of space. They satisfy the Schroedinger type equations and are matched with free solutions of the Schroedinger equation at the boundary. Convergence of expansions for the S matrix, the Green functions and the continuous-spectrum wave functions is studied. A new group of states possessing the best convergence is introduced

  17. Semiclassical expansions on and near caustics

    International Nuclear Information System (INIS)

    Meetz, K.

    1984-09-01

    We show that the standard WKB expansion can be generalized so that it reproduces the behavior of the wave function on and near a caustic in two-dimensional space time. The expansion is related to the unfolding polynomials of the elementary catastrophes occurring in two dimensions: the fold and the cusp catastrophe. The method determines control parameters and transport coefficients in a self-consistent way from differential equations and does not refer to the asymptotic expansion of Feynman path integrals. The lowest order equations are solved explicitly in terms of the multivalued classical action. The result is a generalized semiclassical approximation on and beyond a caustic. (orig.)

  18. Cosmic growth history and expansion history

    International Nuclear Information System (INIS)

    Linder, Eric V.

    2005-01-01

    The cosmic expansion history tests the dynamics of the global evolution of the universe and its energy density contents, while the cosmic growth history tests the evolution of the inhomogeneous part of the energy density. Precision comparison of the two histories can distinguish the nature of the physics responsible for the accelerating cosmic expansion: an additional smooth component--dark energy--or a modification of the gravitational field equations. With the aid of a new fitting formula for linear perturbation growth accurate to 0.05%-0.2%, we separate out the growth dependence on the expansion history and introduce a new growth index parameter γ that quantifies the gravitational modification

  19. Some Improved Nonperturbative Bounds for Fermionic Expansions

    Energy Technology Data Exchange (ETDEWEB)

    Lohmann, Martin, E-mail: marlohmann@gmail.com [Universita di Roma Tre, Dipartimento di Matematica (Italy)

    2016-06-15

    We reconsider the Gram-Hadamard bound as it is used in constructive quantum field theory and many body physics to prove convergence of Fermionic perturbative expansions. Our approach uses a recursion for the amplitudes of the expansion, discovered in a model problem by Djokic (2013). It explains the standard way to bound the expansion from a new point of view, and for some of the amplitudes provides new bounds, which avoid the use of Fourier transform, and are therefore superior to the standard bounds for models like the cold interacting Fermi gas.

  20. Oblique photon expansion of QED structure functions

    International Nuclear Information System (INIS)

    Chahine, C.

    1986-01-01

    In the oblique photon expansion, the collinear part of photon emission is summed up to all orders in perturbation theory. The number of oblique or non-collinear photons is the expansion order. Unlike in perturbation theory, every term of the expansion is both infrared finite and gauge invariant. The zero oblique photon contribution to the electromagnetic structure tensor in QED is computed in detail. The behaviors of the structure functions F1 and F2 are discussed in the soft and ultra-soft limits

  1. Improvement of Expansive Soils Using Chemical Stabilizers

    Science.gov (United States)

    Ikizler, S. B.; Senol, A.; Khosrowshahi, S. K.; Hatipoğlu, M.

    2014-12-01

    The aim of this study is to investigate the effect of two chemical stabilizers on the swelling potential of expansive soil. A high plasticity sodium bentonite was used as the expansive soil. The additive materials including fly ash (FA) and lime (L) were evaluated as potential stabilizers to decrease the swelling pressure of bentonite. Depending on the type of additive materials, they were blended with bentonite in different percentages to assess the optimum state and approch the maximum swell pressure reduction. According to the results of swell pressure test, both fly ash and lime reduce the swelling potential of bentonite but the maximum improvement occurs using bentonite-lime mixture while the swelling pressure reduction approaches to 49%. The results reveal a significant reduction of swelling potential of expansive soil using chemical stabilizers. Keywords: Expansive soil; swell pressure; chemical stabilization; fly ash; lime

  2. Applications of the large mass expansion

    International Nuclear Information System (INIS)

    Fleischer, J.; Kotikov, A.V.; ); Veretin, O.L.

    1998-01-01

    The method of the large mass expansion (LME) is investigated for selfenergy and vertex functions in two-loop order. It has the technical advantage that in many cases the expansion coefficients can be expressed analytically. As long as only one non-zero external momentum squared, q 2 , is involved also the Taylor expansion (TE) w.r.t. small q 2 yields high precision results in a domain sufficient for most applications. In the case of only one non-zero mass M and only one external momentum squared, the expansion w.r.t. q 2 /M 2 is identical for the TE and the LME. In this case the combined techniques yield analytic expressions for many diagrams, which are quite easy to handle numerically. (author)

  3. Surgically assisted rapid maxillary expansion in adults.

    Science.gov (United States)

    Pogrel, M A; Kaban, L B; Vargervik, K; Baumrind, S

    1992-01-01

    Twelve adults with maxillary width discrepancy of greater than 5 mm were treated by surgically assisted rapid maxillary expansion. The procedure consisted of bilateral zygomatic buttress and midpalatal osteotomies combined with the use of a tooth-borne orthopedic device postoperatively. Mean palatal expansion of 7.5 mm (range of 6 to 13 mm), measured in the first molar region, was achieved within 3 weeks in all patients. Expansion remained stable during the 12-month study period, with a mean relapse for the entire group of 0.88 +/- 0.48 mm. Morbidity was limited to mild postoperative discomfort. The results of this preliminary study indicated that surgically assisted rapid maxillary expansion is a safe, simple, and reliable procedure for achieving a permanent increase in skeletal maxillary width in adults. Further study is necessary to document the three-dimensional movements of the maxillary segments and long-term stability of the skeletal and dental changes.

  4. Expansion of the Neyveli lignite mine, India

    Energy Technology Data Exchange (ETDEWEB)

    Kasturi, T S [Neyveli Lignite Corp. Ltd., Tamil Nadu (India); Streck, W [Gold (O.) G.m.b.H. und Co. K.G., Koeln (Germany, F.R.)

    1979-08-01

    After giving a picture of the difficult winning conditions at the Neyveli open-cast lignite mine, the author states the reasons for the expansions of the open-cast mine and describes the necessary measures and machinery.

  5. Chemical graph-theoretic cluster expansions

    International Nuclear Information System (INIS)

    Klein, D.J.

    1986-01-01

    A general computationally amenable chemico-graph-theoretic cluster expansion method is suggested as a paradigm for incorporation of chemical structure concepts in a systematic manner. The cluster expansion approach is presented in a formalism general enough to cover a variety of empirical, semiempirical, and even ab initio applications. Formally such approaches for the utilization of chemical structure-related concepts may be viewed as discrete analogues of Taylor series expansions. The efficacy of the chemical structure concepts then is simply bound up in the rate of convergence of the cluster expansions. In many empirical applications, e.g., boiling points, chromatographic separation coefficients, and biological activities, this rate of convergence has been observed to be quite rapid. More note will be made here of quantum chemical applications. Relations to questions concerning size extensivity of energies and size consistency of wave functions are addressed

  6. Magnetized relativistic electron-ion plasma expansion

    Science.gov (United States)

    Benkhelifa, El-Amine; Djebli, Mourad

    2016-03-01

    The dynamics of relativistic laser-produced plasma expansion across a transverse magnetic field is investigated. Based on a one dimensional two-fluid model that includes pressure, enthalpy, and rest mass energy, the expansion is studied in the limit of λD (Debye length) ≤RL (Larmor radius) for magnetized electrons and ions. Numerical investigation conducted for a quasi-neutral plasma showed that the σ parameter describing the initial plasma magnetization, and the plasma β parameter, which is the ratio of kinetic to magnetic pressure are the key parameters governing the expansion dynamics. For σ ≪ 1, ion's front shows oscillations associated to the break-down of quasi-neutrality. This is due to the strong constraining effect and confinement of the magnetic field, which acts as a retarding medium slowing the plasma expansion.

  7. Wilson expansion in the minimal subtraction scheme

    International Nuclear Information System (INIS)

    Smirnov, V.A.

    1989-01-01

    The small distance expansion of the product of composite fields is constructed for an arbitrary renormalization procedure of the type of minimal subtraction scheme. Coefficient functions of the expansion are expressed explicitly through the Green functions of composite fields. The expansion has the explicity finite form: the ultraviolet (UV) divergences of the coefficient functions and composite fields are removed by the initial renormalization procedure while the infrared (IR) divergences in massless diagrams with nonvanishing contribution into the coefficient functions are removed by the R-operation which is the IR part of the R-operation. The latter is the generalization of the dimensional renormalization in the case when both UV and IR divergences are present. To derive the expansion, a ''pre-subtracting operator'' is introduced and formulas of the counter-term technique are exploited

  8. Treatment of divergent expansions in scattering theory

    International Nuclear Information System (INIS)

    Gersten, A.; Malin, S.

    1978-01-01

    One of the biggest obstacles in applying quantum field theory to realistic scattering problems are the divergencies of pertubation expansions for large coupling constants and the divergencies of partial wave expansions for massless particles exchanges. There exist, however, methods of summation of the divergent expansions which can lead to significant application in physics. In this paper we treat the problem of summing such expansions using three methods: (i) a generalization of the Pade approximation to the multivariable case. The suggested definition is unique and preserves unitarity. (ii) The summation of divergent partial waves for arbitrary spins. (iii) A successful application of a series inversion to the 3 P 1 nucleon-nucleon phase shift up to 200 MeV. (orig./WL) [de

  9. foundations on expansive soils introduction characteristic

    African Journals Online (AJOL)

    the swelling potential of expansive soils have been found to be: initial moisture content, .... behaviour of such huildin1?1>, it is difficult to give definite recommendations. ..... Structures in Black Cotton Soils, Central Building. Research Institute ...

  10. Boson expansion theory in the seniority scheme

    International Nuclear Information System (INIS)

    Tamura, T.; Li, C.; Pedrocchi, V.G.

    1985-01-01

    A boson expansion formalism in the seniority scheme is presented and its relation with number-conserving quasiparticle calculations is elucidated. Accuracy and convergence are demonstrated numerically. A comparative discussion with other related approaches is given

  11. Operator expansion at short distance in QCD

    Energy Technology Data Exchange (ETDEWEB)

    Hubschmid, W [Bern Univ. (Switzerland). Inst. fuer Theoretische Physik; Mallik, S [Karlsruhe Univ. (T.H.) (Germany, F.R.). Inst. fuer Theoretische Kernphysik

    1982-11-01

    We present a method of calculating coefficients of gluon operators in the operator product expansion of two-point functions at short distance. It is based on a short-distance expansion of the singular part of the quark propagator in the gluon field, the latter being treated as external. We verify in full generality that the spin zero, gluon operator of dimension six does not contribute to the two-point functions of quark bilinears.

  12. Resolution of hydrodynamical equations for transverse expansions

    International Nuclear Information System (INIS)

    Hama, Y.; Pottag, F.W.

    1984-01-01

    The three-dimensional hydrodynamical expansion is treated with a method similar to that of Milekhin, but more explicit. Although in the final stage one have to appeal to numerical calculation, the partial differential equations governing the transverse expansions are treated without transforming them into ordinary equations with an introduction of averaged quantities. It is only concerned with the formalism and the numerical results will be given in the next paper. (Author) [pt

  13. The critical thermal expansion of gadolinium

    International Nuclear Information System (INIS)

    Robinson, K.; Lanchester, P.C.

    1978-01-01

    Measurements have been made of the critical thermal expansion of single crystals of gadolinium, prepared by solid state electrotransport processing. Although the expansion data can be fitted to a simple power law with exponents lambda + =-0.25, lambda - =-0.33, these values are not predicted by theory and a discontinuity remains at Tsub(c)=293.620 K. It is suggested that the results relate to a region of crossover to uniaxial dipolar behaviour. (Auth.)

  14. Cluster expansion for vacuum confining fields

    International Nuclear Information System (INIS)

    Simonov, Yu.A.

    1987-01-01

    Colored particle Green functions in vacuum background random fields are written as path integrals. Averaging over random fields is done using the cluster (cumulant) expansion. The existence of a finite correlation length for vacuum background fields is shown to produce the linear confinement, in agreement with the results, obtained with the help of averaged Hamiltonians. A modified form of cluster expansion for nonabelian fields is introduced using the path-ordered cumulants

  15. Synthesis, microstructure and thermal expansion studies

    Indian Academy of Sciences (India)

    Abstract. We report on the synthesis, microstructure and thermal expansion studies on Ca0.5+/2Sr0.5+/2Zr4P6−2Si2O24 ( = 0.00 to 1.00) system which belongs to NZP family of low thermal expansion ceramics. The ceramics synthesized by co-precipitation method at lower calcination and the sintering temperatures ...

  16. Composite asymptotic expansions and scaling wall turbulence.

    Science.gov (United States)

    Panton, Ronald L

    2007-03-15

    In this article, the assumptions and reasoning that yield composite asymptotic expansions for wall turbulence are discussed. Particular attention is paid to the scaling quantities that are used to render the variables non-dimensional and of order one. An asymptotic expansion is proposed for the streamwise Reynolds stress that accounts for the active and inactive turbulence by using different scalings. The idea is tested with the data from the channel flows and appears to have merit.

  17. A pedagogical approach to the Magnus expansion

    International Nuclear Information System (INIS)

    Blanes, S; Casas, F; Oteo, J A; Ros, J

    2010-01-01

    Time-dependent perturbation theory as a tool to compute approximate solutions of the Schroedinger equation does not preserve unitarity. Here we present, in a simple way, how the Magnus expansion (also known as exponential perturbation theory) provides such unitary approximate solutions. The purpose is to illustrate the importance and consequences of such a property. We suggest that the Magnus expansion may be introduced to students in advanced courses of quantum mechanics.

  18. Local behaviour of negative thermal expansion materials

    International Nuclear Information System (INIS)

    Fornasini, P.; Dalba, G.; Grisenti, R.; Purans, J.; Vaccari, M.; Rocca, F.; Sanson, A.

    2006-01-01

    EXAFS can represent a powerful probe of the local behaviour of negative thermal expansion (NTE) materials, thanks to the possibility of measuring the expansion of selected inter-atomic bonds and the perpendicular relative atomic displacements. The effectiveness of EXAFS for NTE studies is illustrated by a comparison of results recently obtained on germanium, CuCl and the cuprites Cu 2 O and Ag 2 O

  19. Resolution of hydrodynamical equations for transverse expansions

    International Nuclear Information System (INIS)

    Hama, Y.; Pottag, F.W.

    1985-01-01

    The three-dimensional hydrodynamical expansion is treated with a method similar to that of Milekhin, but more explicit. Although in the final stage we have to appeal to numerical calculation, the partial differential equations governing the transverse expansions are treated without transforming them into ordinary equations with an introduction of averaged quantities. The present paper is concerned with the formalism and the numerical results will be reported in another paper. (Author) [pt

  20. Stochastic quantization and 1/N expansion

    International Nuclear Information System (INIS)

    Brunelli, J.C.; Mendes, R.S.

    1992-10-01

    We study the 1/N expansion of field theories in the stochastic quantization method of Parisi and Wu using the supersymmetric functional approach. This formulation provides a systematic procedure to implement the 1/N expansion which resembles the ones used in the equilibrium. The 1/N perturbation theory for the non linear sigma model in two dimensions is worked out as an example. (author). 19 refs., 5 figs

  1. Foundations on Expansive Soils; A Review

    OpenAIRE

    Behzad Kalantari

    2012-01-01

    This study describes various types of foundation designs to be considered for structural engineering projects when the subsoil foundation consists of expansive or swelling soils. Among civil and architectural engineers expansive soils are known to be difficult foundation materials and problematic. These type of soils swell when they are subjected to moistures and shrink due to moisture loss. Because of this different behaviour upon wetting and drying, they cause minor to major structural dama...

  2. Thermal expansion behavior in fabricated cellular structures

    International Nuclear Information System (INIS)

    Oruganti, R.K.; Ghosh, A.K.; Mazumder, J.

    2004-01-01

    Thermal expansion behavior of cellular structures is of interest in applications where undesirable deformation and failure are caused by thermal expansion mismatch. This report describes the role of processing-induced effects and metallurgical aspects of melt-processed cellular structures, such as a bi-material structure designed to contract on heating, as well as uni-material structures of regular and stochastic topology. This bi-material structure utilized the principle of internal geometric constraints to alter the expansion behavior of the internal ligaments to create overall contraction of the structure. Homogenization design method was used to design the structure, and fabrication was by direct metal deposition by laser melting of powder in another part of a joint effort. The degree of porosity and grain size in the fabricated structure are characterized and related to the laser deposition parameters. The structure was found to contract upon heating over a short range of temperature subsequent to which normal expansion ensued. Also examined in this report are uni-material cellular structures, in which internal constraints arise from residual stress variations caused by the fabrication process, and thereby alter their expansion characteristics. A simple analysis of thermal strain of this material supports the observed thermal expansion behavior

  3. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  4. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  5. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  6. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  7. Thin foil expansion into a vacuum

    International Nuclear Information System (INIS)

    Mora, P.

    2005-01-01

    Plasma expansion into a vacuum is an old problem which has been renewed recently in various contexts: expansion of ultra-cold plasmas, cluster expansion, of dust grains, expansion of thin foils. In this presentation I will first discuss the physics of the expansion of a thin foil irradiated by an ultra-short ultra-intense laser pulse. The expansion results in the formation of high energy ions. For an infinitely steep plasma-vacuum interface the fastest ions are located in the outer part of the expansion and their velocity is given by ν m ax∼ 2 C s (In ω p it) where c s (Zk B T e /m i )''1/2 is the ion-acoustic velocity ω p i=(n e 0Ze''2/m i e 0 )''1/2 is the ion plasma frequency, n e 0 is the electron density in the unperturbed plasma, Z is the ion charge number. In the above expression, t is either the pulse duration or the effective acceleration time (in particular t∼L/2c s , where L is the width of the foil, when the electron cooling is taken into account). A salient characteristic of the expansion is the occurrence of a double layer structure and a peak of the accelerating electric field at the ion front. I will explain the origin of the peak and predict its temporal behavior. This peak has been diagnosed in recent experiments. I will also discuss the effect of a 2-temperatures electron distribution function on the expansion, showing the dominant role of the hot electron component. Finally I will discuss the occurrence of ion spikes in the expansion when the initial density profile is smooth. The ion spike is due to a wave breaking which cannot be handled in a satisfactory way by a fluid code and requires a kinetic description. A. simple collisionless particle code has been used to treat the evolution of the spike after the wave breaking and the results will be shown. (Author)

  8. GMP-compliant isolation and large-scale expansion of bone marrow-derived MSC.

    Directory of Open Access Journals (Sweden)

    Natalie Fekete

    Full Text Available BACKGROUND: Mesenchymal stromal cells (MSC have gained importance in tissue repair, tissue engineering and in immunosupressive therapy during the last years. Due to the limited availability of MSC in the bone marrow, ex vivo amplification prior to clinical application is requisite to obtain therapeutic applicable cell doses. Translation of preclinical into clinical-grade large-scale MSC expansion necessitates precise definition and standardization of all procedural parameters including cell seeding density, culture medium and cultivation devices. While xenogeneic additives such as fetal calf serum are still widely used for cell culture, its use in the clinical context is associated with many risks, such as prion and viral transmission or adverse immunological reactions against xenogeneic components. METHODS AND FINDINGS: We established animal-free expansion protocols using platelet lysate as medium supplement and thereby could confirm its safety and feasibility for large-scale MSC isolation and expansion. Five different GMP-compliant standardized protocols designed for the safe, reliable, efficient and economical isolation and expansion of MSC was performed and MSC obtained were analyzed for differentiation capacity by qPCR and histochemistry. Expression of standard MSC markers as defined by the International Society for Cellular Therapy as well as expression of additional MSC markers and of various chemokine and cytokine receptors was analysed by flow cytometry. Changes of metabolic markers and cytokines in the medium were addressed using the LUMINEX platform. CONCLUSIONS: The five different systems for isolation and expansion of MSC described in this study are all suitable to produce at least 100 millions of MSC, which is commonly regarded as a single clinical dose. Final products are equal according to the minimal criteria for MSC defined by the ISCT. We showed that chemokine and integrin receptors analyzed had the same expression pattern

  9. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  10. Negative thermal expansion materials: technological key for control of thermal expansion.

    Science.gov (United States)

    Takenaka, Koshi

    2012-02-01

    Most materials expand upon heating. However, although rare, some materials contract upon heating. Such negative thermal expansion (NTE) materials have enormous industrial merit because they can control the thermal expansion of materials. Recent progress in materials research enables us to obtain materials exhibiting negative coefficients of linear thermal expansion over -30 ppm K -1 . Such giant NTE is opening a new phase of control of thermal expansion in composites. Specifically examining practical aspects, this review briefly summarizes materials and mechanisms of NTE as well as composites containing NTE materials, based mainly on activities of the last decade.

  11. Negative thermal expansion materials: technological key for control of thermal expansion

    Directory of Open Access Journals (Sweden)

    Koshi Takenaka

    2012-01-01

    Full Text Available Most materials expand upon heating. However, although rare, some materials contract upon heating. Such negative thermal expansion (NTE materials have enormous industrial merit because they can control the thermal expansion of materials. Recent progress in materials research enables us to obtain materials exhibiting negative coefficients of linear thermal expansion over −30 ppm K−1. Such giant NTE is opening a new phase of control of thermal expansion in composites. Specifically examining practical aspects, this review briefly summarizes materials and mechanisms of NTE as well as composites containing NTE materials, based mainly on activities of the last decade.

  12. Negative thermal expansion materials: technological key for control of thermal expansion

    International Nuclear Information System (INIS)

    Takenaka, Koshi

    2012-01-01

    Most materials expand upon heating. However, although rare, some materials contract upon heating. Such negative thermal expansion (NTE) materials have enormous industrial merit because they can control the thermal expansion of materials. Recent progress in materials research enables us to obtain materials exhibiting negative coefficients of linear thermal expansion over −30 ppm K −1 . Such giant NTE is opening a new phase of control of thermal expansion in composites. Specifically examining practical aspects, this review briefly summarizes materials and mechanisms of NTE as well as composites containing NTE materials, based mainly on activities of the last decade. (topical review)

  13. Elder Abuse Identification in the Prehospital Setting: An Examination of State Emergency Medical Services Protocols.

    Science.gov (United States)

    Namboodri, Brooke L; Rosen, Tony; Dayaa, Joseph A; Bischof, Jason J; Ramadan, Nadeem; Patel, Mehul D; Grover, Joseph; Brice, Jane H; Platts-Mills, Timothy F

    2018-03-22

    To describe statewide emergency medical service (EMS) protocols relating to identification, management, and reporting of elder abuse in the prehospital setting. Cross-sectional analysis. Statewide EMS protocols in the United States. Publicly available statewide EMS protocols identified from published literature, http://EMSprotocols.org, and each state's public health website. Protocols were reviewed to determine whether elder abuse was mentioned, elder abuse was defined, potential indicators of elder abuse were listed, management of older adults experiencing abuse was described, and instructions regarding reporting were provided. EMS protocols for child abuse were reviewed in the same manner for the purpose of comparison. Of the 35 publicly available statewide EMS protocols, only 14 (40.0%) mention elder abuse. Of protocols that mention elder abuse, 6 (42.9%) define elder abuse, 10 (71.4%) describe indicators of elder abuse, 8 (57.1%) provide instruction regarding management, and 12 (85.7%) provide instruction regarding reporting. Almost twice as many states met each of these metrics for child abuse. Statewide EMS protocols for elder abuse vary in regard to identification, management, and reporting, with the majority of states having no content on this subject. Expansion and standardization of protocols may increase the identification of elder abuse. © 2018, Copyright the Authors Journal compilation © 2018, The American Geriatrics Society.

  14. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  15. Robust generation and expansion of skeletal muscle progenitors and myocytes from human pluripotent stem cells.

    Science.gov (United States)

    Shelton, Michael; Kocharyan, Avetik; Liu, Jun; Skerjanc, Ilona S; Stanford, William L

    2016-05-15

    Human pluripotent stem cells provide a developmental model to study early embryonic and tissue development, tease apart human disease processes, perform drug screens to identify potential molecular effectors of in situ regeneration, and provide a source for cell and tissue based transplantation. Highly efficient differentiation protocols have been established for many cell types and tissues; however, until very recently robust differentiation into skeletal muscle cells had not been possible unless driven by transgenic expression of master regulators of myogenesis. Nevertheless, several breakthrough protocols have been published in the past two years that efficiently generate cells of the skeletal muscle lineage from pluripotent stem cells. Here, we present an updated version of our recently described 50-day protocol in detail, whereby chemically defined media are used to drive and support muscle lineage development from initial CHIR99021-induced mesoderm through to PAX7-expressing skeletal muscle progenitors and mature skeletal myocytes. Furthermore, we report an optional method to passage and expand differentiating skeletal muscle progenitors approximately 3-fold every 2weeks using Collagenase IV and continued FGF2 supplementation. Both protocols have been optimized using a variety of human pluripotent stem cell lines including patient-derived induced pluripotent stem cells. Taken together, our differentiation and expansion protocols provide sufficient quantities of skeletal muscle progenitors and myocytes that could be used for a variety of studies. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  16. Expansion Under Climate Change: The Genetic Consequences.

    Science.gov (United States)

    Garnier, Jimmy; Lewis, Mark A

    2016-11-01

    Range expansion and range shifts are crucial population responses to climate change. Genetic consequences are not well understood but are clearly coupled to ecological dynamics that, in turn, are driven by shifting climate conditions. We model a population with a deterministic reaction-diffusion model coupled to a heterogeneous environment that develops in time due to climate change. We decompose the resulting travelling wave solution into neutral genetic components to analyse the spatio-temporal dynamics of its genetic structure. Our analysis shows that range expansions and range shifts under slow climate change preserve genetic diversity. This is because slow climate change creates range boundaries that promote spatial mixing of genetic components. Mathematically, the mixing leads to so-called pushed travelling wave solutions. This mixing phenomenon is not seen in spatially homogeneous environments, where range expansion reduces genetic diversity through gene surfing arising from pulled travelling wave solutions. However, the preservation of diversity is diminished when climate change occurs too quickly. Using diversity indices, we show that fast expansions and range shifts erode genetic diversity more than slow range expansions and range shifts. Our study provides analytical insight into the dynamics of travelling wave solutions in heterogeneous environments.

  17. Simplified Technique for Predicting Offshore Pipeline Expansion

    Science.gov (United States)

    Seo, J. H.; Kim, D. K.; Choi, H. S.; Yu, S. Y.; Park, K. S.

    2018-06-01

    In this study, we propose a method for estimating the amount of expansion that occurs in subsea pipelines, which could be applied in the design of robust structures that transport oil and gas from offshore wells. We begin with a literature review and general discussion of existing estimation methods and terminologies with respect to subsea pipelines. Due to the effects of high pressure and high temperature, the production of fluid from offshore wells is typically caused by physical deformation of subsea structures, e.g., expansion and contraction during the transportation process. In severe cases, vertical and lateral buckling occurs, which causes a significant negative impact on structural safety, and which is related to on-bottom stability, free-span, structural collapse, and many other factors. In addition, these factors may affect the production rate with respect to flow assurance, wax, and hydration, to name a few. In this study, we developed a simple and efficient method for generating a reliable pipe expansion design in the early stage, which can lead to savings in both cost and computation time. As such, in this paper, we propose an applicable diagram, which we call the standard dimensionless ratio (SDR) versus virtual anchor length (L A ) diagram, that utilizes an efficient procedure for estimating subsea pipeline expansion based on applied reliable scenarios. With this user guideline, offshore pipeline structural designers can reliably determine the amount of subsea pipeline expansion and the obtained results will also be useful for the installation, design, and maintenance of the subsea pipeline.

  18. Preliminary thermal expansion screening data for tuffs

    International Nuclear Information System (INIS)

    Lappin, A.R.

    1980-03-01

    A major variable in evaluating the potential of silicic tuffs for use in geologic disposal of heat-producing nuclear wastes is thermal expansion. Results of ambient-pressure linear expansion measurements on a group of tuffs that vary treatly in porosity and mineralogy are presente here. Thermal expansion of devitrified welded tuffs is generally linear with increasing temperature and independent of both porosity and heating rate. Mineralogic factors affecting behavior of these tuffs are limited to the presence or absence of cristobalite and altered biotite. The presence of cristobalite results in markedly nonlinear expansion above 200 0 C. If biotite in biotite-hearing rocks alters even slightly to expandable clays, the behavior of these tuffs near the boiling point of water can be dominated by contraction of the expandable phase. Expansion of both high- and low-porosity tuffs containing hydrated silicic glass and/or expandable clays is complex. The behavior of these rocks appears to be completely dominated by dehydration of hydrous phases and, hence, should be critically dependent on fluid pressure. Valid extrapolation of the ambient-pressure results presented here to depths of interest for construction of a nuclear-waste repository will depend on a good understanding of the interaction of dehydration rates and fluid pressures, and of the effects of both micro- and macrofractures on the response of tuff masss

  19. Mapping Brazilian Cropland Expansion, 2000-2013

    Science.gov (United States)

    Zalles, V.; Hansen, M.; Potapov, P.

    2016-12-01

    Brazil is one of the world's leading producers and exporters of agricultural goods. Despite undergoing significant increases in its cropland area in the last decades, it remains one of the countries with the most potential for further agricultural expansion. Most notably, the expansion in production areas of commodity crops such as soybean, corn, and sugarcane has become the leading cause of land cover conversion in Brazil. Natural land covers, such as the Amazon and Cerrado forests, have been negatively affected by this agricultural expansion, causing carbon emissions, biodiversity loss, altered water cycles, and many other disturbances to ecosystem services. Monitoring of change in cropland area extent can provide relevant information to decision makers seeking to understand and manage land cover change drivers and their impacts. In this study, the freely-available Landsat archive was leveraged to produce a large-scale, methodologically consistent map of cropland cover at 30 m. resolution for the entire Brazilian territory in the year 2000. Additionally, we mapped cropland expansion from 2000 to 2013, and used statistical sampling techniques to accurately estimate cropland area per Brazilian state. Using the Global Forest Change product produced by Hansen et al. (2013), we can disaggregate forest cover loss due to cropland expansion by year, revealing spatiotemporal trends that could advance our understanding of the drivers of forest loss.

  20. Hematoma Expansion Following Acute Intracerebral Hemorrhage

    Science.gov (United States)

    Brouwers, H. Bart; Greenberg, Steven M.

    2013-01-01

    Intracerebral hemorrhage, the most devastating form of stroke, has no specific therapy proven to improve outcome by randomized controlled trial. Location and baseline hematoma volume are strong predictors of mortality, but are non-modifiable by the time of diagnosis. Expansion of the initial hematoma is a further marker of poor prognosis that may be at least partly preventable. Several risk factors for hematoma expansion have been identified, including baseline ICH volume, early presentation after symptom onset, anticoagulation, and the CT angiography spot sign. Although the biological mechanisms of hematoma expansion remain unclear, accumulating evidence supports a model of ongoing secondary bleeding from ruptured adjacent vessels surrounding the initial bleeding site. Several large clinical trials testing therapies aimed at preventing hematoma expansion are in progress, including aggressive blood pressure reduction, treatment with recombinant factor VIIa guided by CT angiography findings, and surgical intervention for superficial hematomas without intraventricular extension. Hematoma expansion is so far the only marker of outcome that is amenable to treatment and thus a potentially important therapeutic target. PMID:23466430

  1. Considering FACTS in Optimal Transmission Expansion Planning

    Directory of Open Access Journals (Sweden)

    K. Soleimani

    2017-10-01

    Full Text Available The expansion of power transmission systems is an important part of the expansion of power systems that requires enormous investment costs. Since the construction of new transmission lines is very expensive, it is necessary to choose the most efficient expansion plan that ensures system security with a minimal number of new lines. In this paper, the role of Flexible AC Transmission System (FACTS devices in the effective operation and expansion planning of transmission systems is examined. Effort was taken to implement a method based on sensitivity analysis to select the optimal number and location of FACTS devices, lines and other elements of the transmission system. Using this method, the transmission expansion plan for a 9 and a 39 bus power system was performed with and without the presence of FACTS with the use of DPL environment in Digsilent software 15.1. Results show that the use of these devices reduces the need for new transmission lines and minimizes the investment cost.

  2. Thermal expansion of fibre-reinforced composites

    International Nuclear Information System (INIS)

    Schneider, B.

    1991-07-01

    The integral thermal expansion and the coefficient of thermal expansion (CTE) of carbon and Kevlar fibre-reinforced composites were measured with high accuracy from 5 K to room temperature. For this, a laser dilatometer and a sophisticated measuring procedure were used. CTE dependence on the orientation angle ω of angle-ply laminates was determined for samples with 5 different fibre alignments (UD 0deg, +/-30deg, +/-45deg, +/-60deg and UD 90deg). A high variability of the CTE with the orientation angle was shown. At angles of approximately +/-30deg even negative CTEs were found. With suitable reinforcing fibres being selected, their absolute values rose up to 30-100% of the positive CTEs of metals. Hence, composites of this type would be suitable as compensating materials in metal constructions where little thermal expansion is desired. To check the lamination theory, theoretical computations of the CTE- ω -dependence were compared with the measured values. An excellent agreement was found. Using the lamination theory, predictions about the expansion behaviour of angle-ply laminates can be made now, if the thermal and mechanical properties of the unidirectional (UD) laminate are known. Furthermore, it is possible to carry out simulation computations aimed at investigating the influence of a single parameter of the UD-laminate (e.g. shear modulus) on the expansion of the angle-ply laminate. (orig.) [de

  3. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  4. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  5. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  6. Ultra-low thermal expansion realized in giant negative thermal expansion materials through self-compensation

    Science.gov (United States)

    Shen, Fei-Ran; Kuang, Hao; Hu, Feng-Xia; Wu, Hui; Huang, Qing-Zhen; Liang, Fei-Xiang; Qiao, Kai-Ming; Li, Jia; Wang, Jing; Liu, Yao; Zhang, Lei; He, Min; Zhang, Ying; Zuo, Wen-Liang; Sun, Ji-Rong; Shen, Bao-Gen

    2017-10-01

    Materials with zero thermal expansion (ZTE) or precisely tailored thermal expansion are in urgent demand of modern industries. However, the overwhelming majority of materials show positive thermal expansion. To develop ZTE or negative thermal expansion (NTE) materials as compensators has become an important challenge. Here, we present the evidence for the realization of ultra-low thermal expansion in Mn-Co-Ge-In particles. The bulk with the Ni2In-type hexagonal structure undergoes giant NTE owing to a martensitic magnetostructural transition. The major finding is that the thermal expansion behavior can be totally controlled by modulating the crystallinity degree and phase transition from atomic scale. Self-compensation effect leads to ultra-low thermal expansion with a linear expansion coefficient as small as +0.68 × 10-6/K over a wide temperature range around room temperature. The present study opens an avenue to reach ZTE particularly from the large class of giant NTE materials based on phase transition.

  7. Ultra-low thermal expansion realized in giant negative thermal expansion materials through self-compensation

    Directory of Open Access Journals (Sweden)

    Fei-Ran Shen

    2017-10-01

    Full Text Available Materials with zero thermal expansion (ZTE or precisely tailored thermal expansion are in urgent demand of modern industries. However, the overwhelming majority of materials show positive thermal expansion. To develop ZTE or negative thermal expansion (NTE materials as compensators has become an important challenge. Here, we present the evidence for the realization of ultra-low thermal expansion in Mn–Co–Ge–In particles. The bulk with the Ni2In-type hexagonal structure undergoes giant NTE owing to a martensitic magnetostructural transition. The major finding is that the thermal expansion behavior can be totally controlled by modulating the crystallinity degree and phase transition from atomic scale. Self-compensation effect leads to ultra-low thermal expansion with a linear expansion coefficient as small as +0.68 × 10−6/K over a wide temperature range around room temperature. The present study opens an avenue to reach ZTE particularly from the large class of giant NTE materials based on phase transition.

  8. Supersonic expansion of argon into vacuum

    Energy Technology Data Exchange (ETDEWEB)

    Habets, A H.M.

    1977-01-21

    A theoretical description of a free supersonic expansion process is given. Three distinct regions in the expansion are discussed, namely the continuum region, the gradual transition to the collisionless regime, and the free-molecular-flow stage. Important topics are the peaking-factor formalism, the thermal-conduction model, and the virtual-source formalism. The formation of the molecular beam from the expansion and condensation phenomena occurring in the expanding gas are discussed. The molecular beam machine used in the measurements is described and special attention is given to the cryopumps used in the supersonic sources as well as to the time-of-flight analysis of the molecular beam velocity distributions. Finally, the processing of experimental data is discussed, particularly the least-squares determination of best-fit representations of the measurements.

  9. Origami structures for tunable thermal expansion

    Science.gov (United States)

    Boatti, Elisa; Bertoldi, Katia

    Materials with engineered thermal expansion, capable of achieving targeted and extreme area/volume changes in response to variations in temperature, are important for a number of aerospace, optical, energy, and microelectronic applications. While most of the proposed structures with tunable coefficient of thermal expansion consist of bi-material 2D or 3D lattices, here we propose a periodic metastructure based on a bilayer Miura-Ori origami fold. We combine experiments and simulations to demonstrate that by tuning the geometrical and mechanical parameters an extremely broad range of thermal expansion coefficients can be obtained, spanning both negative and positive values. Additionally, the thermal properties along different directions can be adjusted independently. Differently from all previously reported systems, the proposed structure is non-porous.

  10. Radial expansion for spinning conformal blocks

    CERN Document Server

    Costa, Miguel S.; Penedones, João; Trevisani, Emilio

    2016-07-12

    This paper develops a method to compute any bosonic conformal block as a series expansion in the optimal radial coordinate introduced by Hogervorst and Rychkov. The method reduces to the known result when the external operators are all the same scalar operator, but it allows to compute conformal blocks for external operators with spin. Moreover, we explain how to write closed form recursion relations for the coefficients of the expansions. We study three examples of four point functions in detail: one vector and three scalars; two vectors and two scalars; two spin 2 tensors and two scalars. Finally, for the case of two external vectors, we also provide a more efficient way to generate the series expansion using the analytic structure of the blocks as a function of the scaling dimension of the exchanged operator.

  11. Thermal expansion of quaternary nitride coatings

    Science.gov (United States)

    Tasnádi, Ferenc; Wang, Fei; Odén, Magnus; Abrikosov, Igor A.

    2018-04-01

    The thermal expansion coefficient of technologically relevant multicomponent cubic nitride alloys are predicted using the Debye model with ab initio elastic constants calculated at 0 K and an isotropic approximation for the Grüneisen parameter. Our method is benchmarked against measured thermal expansion of TiN and Ti(1-x)Al x N as well as against results of molecular dynamics simulations. We show that the thermal expansion coefficients of Ti(1-x-y)X y Al x N (X  =  Zr, Hf, Nb, V, Ta) solid solutions monotonously increase with the amount of alloying element X at all temperatures except for Zr and Hf, for which they instead decrease for y≳ 0.5 .

  12. On a generalized oscillator system: interbasis expansions

    Energy Technology Data Exchange (ETDEWEB)

    Kibler, M [Lyon-1 Univ., 69 - Villeurbanne (France). Inst. de Physique Nucleaire; Mardoyan, L G; Pogosyan, G S [Joint Inst. for Nuclear Research, Dubna (Russian Federation). Lab. of Theoretical Physics

    1997-12-31

    This article deals with a nonrelativistic quantum mechanical study of a dynamical system which generalizes the isotropic harmonic oscillator system in three dimensions. The Schroedinger equation for this generalized oscillator system is separable in spherical, cylindrical, and spheroidal (prolate and oblate) coordinates. The quantum mechanical spectrum of this system is worked out in some details. The problem of interbasis expansions of the wave functions is completely solved. The coefficients for the expansion of the cylindrical basis in terms of the spherical basis, and vice-versa, are found to be analytic continuations (to real values of their arguments) of Clebsch-Gordan coefficients for the group SU(2). The interbasis expansion coefficients for the prolate and oblate spheroidal bases in terms of the spherical or the cylindrical bases are shown to satisfy three-term recursion relations. Finally, a connection between the generalized oscillator system (projected on the z-line) and the Morse system (in one dimension) are discussed. 41 refs.,.

  13. Anisotropic thermal expansion in flexible materials

    Science.gov (United States)

    Romao, Carl P.

    2017-10-01

    A definition of the Grüneisen parameters for anisotropic materials is derived based on the response of phonon frequencies to uniaxial stress perturbations. This Grüneisen model relates the thermal expansion in a given direction (αi i) to one element of the elastic compliance tensor, which corresponds to the Young's modulus in that direction (Yi i). The model is tested through ab initio prediction of thermal expansion in zinc, graphite, and calcite using density functional perturbation theory, indicating that it could lead to increased accuracy for structurally complex systems. The direct dependence of αi i on Yi i suggests that materials which are flexible along their principal axes but rigid in other directions will generally display both positive and negative thermal expansion.

  14. On a generalized oscillator system: interbasis expansions

    International Nuclear Information System (INIS)

    Kibler, M.; Mardoyan, L.G.; Pogosyan, G.S.

    1996-01-01

    This article deals with a nonrelativistic quantum mechanical study of a dynamical system which generalizes the isotropic harmonic oscillator system in three dimensions. The Schroedinger equation for this generalized oscillator system is separable in spherical, cylindrical, and spheroidal (prolate and oblate) coordinates. The quantum mechanical spectrum of this system is worked out in some details. The problem of interbasis expansions of the wave functions is completely solved. The coefficients for the expansion of the cylindrical basis in terms of the spherical basis, and vice-versa, are found to be analytic continuations (to real values of their arguments) of Clebsch-Gordan coefficients for the group SU(2). The interbasis expansion coefficients for the prolate and oblate spheroidal bases in terms of the spherical or the cylindrical bases are shown to satisfy three-term recursion relations. Finally, a connection between the generalized oscillator system (projected on the z-line) and the Morse system (in one dimension) are discussed. 41 refs.,

  15. Supersonic expansion of argon into vacuum

    International Nuclear Information System (INIS)

    Habets, A.H.M.

    1977-01-01

    A theoretical description of a free supersonic expansion process is given. Three distinct regions in the expansion are discussed, namely the continuum region, the gradual transition to the collisionless regime, and the free-molecular-flow stage. Important topics are the peaking-factor formalism, the thermal-conduction model, and the virtual-source formalism. The formation of the molecular beam from the expansion and condensation phenomena occurring in the expanding gas are discussed. The molecular beam machine used in the measurements is described and special attention is given to the cryopumps used in the supersonic sources as well as to the time-of-flight analysis of the molecular beam velocity distributions. Finally, the processing of experimental data is discussed, particularly the least-squares determination of best-fit representations of the measurements

  16. Back Reaction And Local Cosmological Expansion Rate

    CERN Document Server

    Geshnizjani, G; Geshnizjani, Ghazal; Brandenberger, Robert

    2002-01-01

    We calculate the back reaction of cosmological perturbations on a general relativistic variable which measures the local expansion rate of the Universe. Specifically, we consider a cosmological model in which matter is described by a single field. We analyze back reaction both in a matter dominated Universe and in a phase of scalar field-driven chaotic inflation. In both cases, we find that the leading infrared terms contributing to the back reaction vanish when the local expansion rate is measured at a fixed value of the matter field which is used as a clock, whereas they do not appear to vanish if the expansion rate is evaluated at a fixed value of the background time. We discuss possible implications for more realistic models with a more complicated matter sector.

  17. Longitudinal expansion of field line dipolarization

    Science.gov (United States)

    Saka, O.; Hayashi, K.

    2017-11-01

    We examine the substorm expansions that started at 1155 UT 10 August 1994 in the midnight sector focusing on the longitudinal (eastward) expansion of field line dipolarization in the auroral zone. Eastward expansion of the dipolarization region was observed in all of the H, D, and Z components. The dipolarization that started at 1155 UT (0027 MLT) from 260° of geomagnetic longitude (CMO) expanded to 351°(PBQ) in about 48 min. The expansion velocity was 0.03-0.04°/s, or 1.9 km/s at 62°N of geomagnetic latitude. The dipolarization region expanding to the east was accompanied by a bipolar event at the leading edge of the expansion in latitudes equatorward of the westward electrojet (WEJ). In the midnight sector at the onset meridian, the Magnetospheric Plasma Analyzer (MAP) on board geosynchronous satellite L9 measured electrons and ions between 10 eV and 40 keV. We conclude from the satellite observations that this dipolarization was characterized by the evolution of temperature anisotropies, an increase of the electron and ion temperatures, and a rapid change in the symmetry axis of the temperature tensor. The field line dipolarization and its longitudinal expansion were interpreted in terms of the slow MHD mode triggered by the current disruption. We propose a new magnetosphere-ionosphere coupling (MI-coupling) mechanism based on the scenario that transmitted westward electric fields from the magnetosphere in association with expanding dipolarization produced electrostatic potential (negative) in the ionosphere through differences in the mobility of collisional ions and collisionless electrons. The field-aligned currents that emerged from the negative potential region are arranged in a concentric pattern around the negative potential region, upward toward the center and downward on the peripheral.

  18. A random number generator for continuous random variables

    Science.gov (United States)

    Guerra, V. M.; Tapia, R. A.; Thompson, J. R.

    1972-01-01

    A FORTRAN 4 routine is given which may be used to generate random observations of a continuous real valued random variable. Normal distribution of F(x), X, E(akimas), and E(linear) is presented in tabular form.

  19. Pseudo-random number generator based on asymptotic deterministic randomness

    Science.gov (United States)

    Wang, Kai; Pei, Wenjiang; Xia, Haishan; Cheung, Yiu-ming

    2008-06-01

    A novel approach to generate the pseudorandom-bit sequence from the asymptotic deterministic randomness system is proposed in this Letter. We study the characteristic of multi-value correspondence of the asymptotic deterministic randomness constructed by the piecewise linear map and the noninvertible nonlinearity transform, and then give the discretized systems in the finite digitized state space. The statistic characteristics of the asymptotic deterministic randomness are investigated numerically, such as stationary probability density function and random-like behavior. Furthermore, we analyze the dynamics of the symbolic sequence. Both theoretical and experimental results show that the symbolic sequence of the asymptotic deterministic randomness possesses very good cryptographic properties, which improve the security of chaos based PRBGs and increase the resistance against entropy attacks and symbolic dynamics attacks.

  20. Anosov C-systems and random number generators

    Science.gov (United States)

    Savvidy, G. K.

    2016-08-01

    We further develop our previous proposal to use hyperbolic Anosov C-systems to generate pseudorandom numbers and to use them for efficient Monte Carlo calculations in high energy particle physics. All trajectories of hyperbolic dynamical systems are exponentially unstable, and C-systems therefore have mixing of all orders, a countable Lebesgue spectrum, and a positive Kolmogorov entropy. These exceptional ergodic properties follow from the C-condition introduced by Anosov. This condition defines a rich class of dynamical systems forming an open set in the space of all dynamical systems. An important property of C-systems is that they have a countable set of everywhere dense periodic trajectories and their density increases exponentially with entropy. Of special interest are the C-systems defined on higher-dimensional tori. Such C-systems are excellent candidates for generating pseudorandom numbers that can be used in Monte Carlo calculations. An efficient algorithm was recently constructed that allows generating long C-system trajectories very rapidly. These trajectories have good statistical properties and can be used for calculations in quantum chromodynamics and in high energy particle physics.

  1. Framework for testing random numbers in parallel calculations

    DEFF Research Database (Denmark)

    Vattulainen, Ilpo Tapio

    1999-01-01

    sequence. The asymptotic power-law behavior of the corresponding correlation functions yields exponents, which can be compared with exact theoretical results. Correlations prior to the asymptotic regime can be further investigated by other complementary methods. We demonstrate this approach by three...

  2. Pseudo-random number generator based on asymptotic deterministic randomness

    International Nuclear Information System (INIS)

    Wang Kai; Pei Wenjiang; Xia Haishan; Cheung Yiuming

    2008-01-01

    A novel approach to generate the pseudorandom-bit sequence from the asymptotic deterministic randomness system is proposed in this Letter. We study the characteristic of multi-value correspondence of the asymptotic deterministic randomness constructed by the piecewise linear map and the noninvertible nonlinearity transform, and then give the discretized systems in the finite digitized state space. The statistic characteristics of the asymptotic deterministic randomness are investigated numerically, such as stationary probability density function and random-like behavior. Furthermore, we analyze the dynamics of the symbolic sequence. Both theoretical and experimental results show that the symbolic sequence of the asymptotic deterministic randomness possesses very good cryptographic properties, which improve the security of chaos based PRBGs and increase the resistance against entropy attacks and symbolic dynamics attacks

  3. Eigenfunction expansion for fractional Brownian motions

    International Nuclear Information System (INIS)

    Maccone, C.

    1981-01-01

    The fractional Brownian motions, a class of nonstationary stochastic processes defined as the Riemann-Liouville fractional integral/derivative of the Brownian motion, are studied. It is shown that these processes can be regarded as the output of a suitable linear system of which the input is the white noise. Their autocorrelation is then derived with a study of their standard-deviation curves. Their power spectra are found by resorting to the nonstationary spectral theory. And finally their eigenfunction expansion (Karhunen-Loeve expansion) is obtained: the eigenfunctions are proved to be suitable Bessel functions and the eigenvalues zeros of the Bessel functions. (author)

  4. New dynamic system suggested for earth expansion

    Energy Technology Data Exchange (ETDEWEB)

    Fitzpatrick, J [Asuncion Nacional Univ. (Paraguay). Inst. de Ciencias

    1972-01-01

    It is here suggested that there may have been much more radioactive materials in the deep interior of the earth than bitherto supposed. Trapped heat being generated in the interior would provide a mechanism for earth expansion. An assumption of heat generation in the deep interior of the earth of the order of 0,5 X 10-13 calories per second, per cubic centimeter, would provide sufficient thermal expansion to account for approximately 0.1 mm. change in the radius of the earth per year.

  5. Large J expansion in ABJM theory revisited.

    Science.gov (United States)

    Dimov, H; Mladenov, S; Rashkov, R C

    Recently there has been progress in the computation of the anomalous dimensions of gauge theory operators at strong coupling by making use of the AdS/CFT correspondence. On the string theory side they are given by dispersion relations in the semiclassical regime. We revisit the problem of a large-charge expansion of the dispersion relations for simple semiclassical strings in an [Formula: see text] background. We present the calculation of the corresponding anomalous dimensions of the gauge theory operators to an arbitrary order using three different methods. Although the results of the three methods look different, power series expansions show their consistency.

  6. Near threshold expansion of Feynman diagrams

    International Nuclear Information System (INIS)

    Mendels, E.

    2005-01-01

    The near threshold expansion of Feynman diagrams is derived from their configuration space representation, by performing all x integrations. The general scalar Feynman diagram is considered, with an arbitrary number of external momenta, an arbitrary number of internal lines and an arbitrary number of loops, in n dimensions and all masses may be different. The expansions are considered both below and above threshold. Rules, giving real and imaginary part, are derived. Unitarity of a sunset diagram with I internal lines is checked in a direct way by showing that its imaginary part is equal to the phase space integral of I particles

  7. Thermal expansion of diamond at low temperatures.

    Science.gov (United States)

    Stoupin, Stanislav; Shvyd'ko, Yuri V

    2010-02-26

    Temperature variation of a lattice parameter of a synthetic diamond crystal (type IIa) was measured using high-energy-resolution x-ray Bragg diffraction in backscattering. A 2 order of magnitude improvement in the measurement accuracy allowed us to directly probe the linear thermal expansion coefficient at temperatures below 100 K. The lowest value measured was 2x10{-9} K-1. It was found that the coefficient deviates from the expected Debye law (T3) while no negative thermal expansion was observed. The anomalous behavior might be attributed to tunneling states due to low concentration impurities.

  8. Expansion of the whole wheat flour extrusion

    DEFF Research Database (Denmark)

    Cheng, Hongyuan; Friis, Alan

    2008-01-01

    A new model framework is proposed to describe the expansion of extrudates with extruder operating conditions based on dimensional analysis principle. The Buckingham pi dimensional analysis method is applied to form the basic structure of the model from extrusion process operational parameters. Us....... Using the Central Composite Design (CCD) method, whole wheat flour was processed in a twin-screw extruder with 16 trials. The proposed model can well correlate the expansion of the 16 trials using 3 regression parameters. The average deviation of the correlation is 5.9%....

  9. Testing the isotropy of the Hubble expansion

    OpenAIRE

    Migkas, K.; Plionis, M.

    2016-01-01

    Abstract: We have used the Union2.1 SNIa compilation to search for possible Hubble expansion anisotropies, dividing the sky in 9 solid angles containing roughly the same number of SNIa, as well as in two Galactic hemispheres. We identified only one sky region, containing 82 SNIa (~15% of total sample with z > 0.02), that indeed appears to share a Hubble expansion significantly different from the rest of the sample. However, this behaviour can be attributed to the joint "erratic" behaviour of ...

  10. Scenarios of Expansion to Electric Generation Capacity

    Directory of Open Access Journals (Sweden)

    José Somoza-Cabrera

    2017-06-01

    Full Text Available We show the building scenarios of expansion to electric generation capacity enough to supply the demand to 2050. We were using the LEAP facility (Long-range Energy Alternatives Planning System, to simulate dispatch of electricity at minimum cost. Finally, we show the cost-benefice analysis of the technologies availability, included externality and CO2 emission limited. However that we included the externals cost in this analysis, it results insufficient to closed gap between fossil and renewable technologies of electric generation. Nevertheless, in some opportunities the renewable options had very important participations in the minimal cost scenario of expansion.

  11. The Monetary Policy – Restrictive or Expansive?

    Directory of Open Access Journals (Sweden)

    Adam Szafarczyk

    2007-10-01

    Full Text Available The monetary policy plays an important role in macroeconomic policy of government. There is a question concerning type of this policy expansive or restrictive (easy or tidy monetary policy. Unfortunately, we have a lot of criteria. Each of them gives us other answer. So due to equitation of Irving Fisher we have dominantly expansive monetary policy. This same situation exists when we use nominal value of rediscount interest rate of central bank. Opposite result appears when we use real value of this interest rate or level of obligatory reserve. Taking under consideration liquidity on money market we know, that level of interest rate is too high.

  12. Towards finite density QCD with Taylor expansions

    International Nuclear Information System (INIS)

    Karsch, F.; Schaefer, B.-J.; Wagner, M.; Wambach, J.

    2011-01-01

    Convergence properties of Taylor expansions of observables, which are also used in lattice QCD calculations at non-zero chemical potential, are analyzed in an effective N f =2+1 flavor Polyakov quark-meson model. A recently developed algorithmic technique allows the calculation of higher-order Taylor expansion coefficients in functional approaches. This novel technique is for the first time applied to an effective N f =2+1 flavor Polyakov quark-meson model and the findings are compared with the full model solution at finite densities. The results are used to discuss prospects for locating the QCD phase boundary and a possible critical endpoint in the phase diagram.

  13. Expansion program is a challenging project

    International Nuclear Information System (INIS)

    Walker, G.L.

    1992-01-01

    This paper reports that construction is set to begin on the $1.5 billion PGT-PG and E Pipeline Expansion Project. It will consist of 691 miles of 42-in pipeline and 110 miles of 36-in. pipeline, to be built over 2 years. The project, which will transport additional supplies of natural gas to US West Coast markets, has its US regulatory approval in hand. On Oct. 16, 1991, the Federal Energy Regulatory Commission authorized Pacific Gas Transmission Co. to construct its Pacific Northwest segment of the expansion. Pacific Gas and Electric Co. received approval to build its California segment in late 1990 from the California Public Utilities Commission

  14. Strategic Expansion Models in Academic Radiology.

    Science.gov (United States)

    Natesan, Rajni; Yang, Wei T; Tannir, Habib; Parikh, Jay

    2016-03-01

    In response to economic pressures, academic institutions in the United States and their radiology practices, are expanding into the community to build a larger network, thereby driving growth and achieving economies of scale. These economies of scale are being achieved variously via brick-and-mortar construction, community practice acquisition, and partnership-based network expansion. We describe and compare these three expansion models within a 4-part framework of: (1) upfront investment; (2) profitability impact; (3) brand impact; and (4) risk of execution. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  15. From greedy to lazy expansions and their driving dynamics

    NARCIS (Netherlands)

    Dajani, K.; Kraaikamp, C.

    2001-01-01

    In this paper we study the ergodic properties of non-greedy series expansions to non-integer bases β > 1. It is shown that the so-called 'lazy' expansion is isomorphic to the 'greedy' expansion. Furthermore, a class of expansions to base β > 1, β =2 Z, 'in between' the lazy and the greedy

  16. Parabolic cyclinder functions : examples of error bounds for asymptotic expansions

    NARCIS (Netherlands)

    R. Vidunas; N.M. Temme (Nico)

    2002-01-01

    textabstractSeveral asymptotic expansions of parabolic cylinder functions are discussedand error bounds for remainders in the expansions are presented. Inparticular Poincaré-type expansions for large values of the argument$z$ and uniform expansions for large values of the parameter areconsidered.

  17. Electrical Resistance Alloys and Low-Expansion Alloys

    DEFF Research Database (Denmark)

    Kjer, Torben

    1996-01-01

    The article gives an overview of electrical resistance alloys and alloys with low thermal expansion. The electrical resistance alloys comprise resistance alloys, heating alloys and thermostat alloys. The low expansion alloys comprise alloys with very low expansion coefficients, alloys with very low...... thermoelastic coefficients and age hardenable low expansion alloys....

  18. Research and Implementation of Collision Detection Based on Modbus Protocol

    Directory of Open Access Journals (Sweden)

    Yinglan Fang

    2013-01-01

    Full Text Available In order to solve the communication errors resulted by traditional working condition multi-platform device communication using the custom protocol communication and link congestion malpractice brought by retransmission, it ensures network communication using time-sharing communication conflict detection based on mature Modbus protocol. Thereby it enhances the stability of the entire system during operation process, and provides simple, efficient, stable business specification interface for the future expansion of the system. After a comprehensive evaluation and analysis of system communication messages before and after improvement, system comprehensive evaluation target has improved. While the system is more flexible to modular design, develop transparent, structure open side and has a broad application prospects.

  19. Edgeworth expansion for functionals of continuous diffusion processes

    DEFF Research Database (Denmark)

    Podolskij, Mark; Yoshida, Nakahiro

    This paper presents new results on the Edgeworth expansion for high frequency functionals of continuous diffusion processes. We derive asymptotic expansions for weighted functionals of the Brownian motion and apply them to provide the Edgeworth expansion for power variation of diffusion processes....... Our methodology relies on martingale embedding, Malliavin calculus and stable central limit theorems for semimartingales. Finally, we demonstrate the density expansion for studentized statistics of power variations.......This paper presents new results on the Edgeworth expansion for high frequency functionals of continuous diffusion processes. We derive asymptotic expansions for weighted functionals of the Brownian motion and apply them to provide the Edgeworth expansion for power variation of diffusion processes...

  20. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  1. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  2. Principles of Thermal Expansion in Feldspars

    Science.gov (United States)

    Hovis, Guy; Medford, Aaron; Conlon, Maricate; Tether, Allison; Romanoski, Anthony

    2010-05-01

    Following the recent thermal expansion work of Hovis et al. (1) on AlSi3 feldspars, we have investigated the thermal expansion of plagioclase, Ba-K, and Ca-K feldspar crystalline solutions. X-ray powder diffraction data were collected between room temperature and 925 °C on six natural plagioclase specimens ranging in composition from anorthite to oligoclase, the K-exchanged equivalents of these plagioclase specimens, and five synthetic Ba-K feldspars with compositions ranging from 25 to 99 mol % BaAl2Si2O8. The resulting thermal expansion coefficients (α) for volume have been combined with earlier results for end-member Na- and K-feldspars (2,3). Unlike AlSi3 feldspars, Al2Si2 feldspars, including anorthite and celsian from the present study plus Sr- and Pb-feldspar from other workers (4,5), show essentially constant and very limited thermal expansion, regardless of divalent cation size. In the context of structures where the Lowenstein rule (6) requires Al and Si to alternate among tetrahedra, the proximity of bridging Al-O-Si oxygen ions to divalent neighbors (ranging from 0 to 2) produces short Ca-O (or Ba-O) bonds (7,8) that apparently are the result of local charge-balance requirements (9). Gibbs et al. (10) suggest that short bonds such as these have a partially covalent character. This in turn stiffens the structure. Thus, for feldspar series with coupled substitution the change away from a purely divalent M-site occupant gives the substituting (less strongly bonded) monovalent cations increasingly greater influence on thermal expansion. Overall, then, thermal expansion in the feldspar system is well represented on a plot of α against room-temperature volume, where one sees a quadrilateral bounded by data for (A) AlSi3 feldspars whose expansion behavior is controlled largely by the size of the monovalent alkali-site occupant, (B) Al2Si2 feldspars whose expansion is uniformly limited by partially-covalent bonds between divalent M-site occupants and

  3. Eta-Expansion Does The Trick

    DEFF Research Database (Denmark)

    Danvy, Olivier; Malmkjær, Karoline; Palsberg, Jens

    1996-01-01

    -sum type. For the latter case, it enables “The Trick.” In this article, we extend Gomard and Jones' partial evaluator for the &lgr;-calculus, &lgr;-Mix, with products and disjoint sums; we point out how eta-expansion for (finite) disjoint sums enable The Trick; we generalize our earlier work by identifying...

  4. Eta-Expansion Does The Trick

    DEFF Research Database (Denmark)

    Danvy, Olivier; Malmkjær, Karoline; Palsberg, Jens

    1995-01-01

    -sum type. For the latter case, it enables “The Trick.” In this article, we extend Gomard and Jones' partial evaluator for the &lgr;-calculus, &lgr;-Mix, with products and disjoint sums; we point out how eta-expansion for (finite) disjoint sums enable The Trick; we generalize our earlier work by identifying...

  5. Thermal Expansion Properties of Aerospace Materials

    Science.gov (United States)

    Green, E. F.

    1969-01-01

    Thermal expansion properties of materials used in aerospace systems are compiled into a single handbook. The data, derived from experimental measurements supplemented by information from literature sources, are presented in charts and tables arranged in two sections, covering cryogenic and elevated temperatures.

  6. Cropland expansion in Brazil, 2000 to 2014

    Science.gov (United States)

    Zalles, V.; Hansen, M.; Potapov, P.; Stehman, S. V.; Tyukavina, A.; Pickens, A. H.; Okpa, C.; Aguilar, R.; John, N.; Chavez, S.

    2017-12-01

    Brazil has become a global leader in the production of commodity row crops such as soybean, sugarcane, cotton, and corn. Here, we employ 30m spatial resolution Landsat data to estimate cropland extent in the year 2000 and its subsequent expansion through 2014. A probability-based sample of reference data allows us to report unbiased estimates of national, biome, and state-scale area of crop expansion with associated uncertainties. We find an increase in Brazilian cropland extent from 26.0 Mha in 2000 to 46.1 Mha in 2014. The cropland frontier states of Maranhao, Tocantins, Piaui, Bahia (MATOPIBA), Mato Grosso, Mato Grosso do Sul, and Para all more than doubled in cropland extent. The states of Goias, Minas Gerais and Sao Paulo experienced >50% increases. The vast majority of expansion, 79%, occurred on repurposed pasture lands, and 20% from the conversion of natural vegetation. Area of converted Cerrado savannas was nearly 2.5 times that of Amazon forests, and accounted for over half of new cropland in MATOPIBA. Spatio-temporal dynamics of cropland expansion are reflected in market conditions, land use policies, and other factors. Continued extensification of cropland is a viable option across Brazil with attendant benefits for and challenges to development.

  7. Territorial expansion and primary state formation.

    Science.gov (United States)

    Spencer, Charles S

    2010-04-20

    A major research problem in anthropology is the origin of the state and its bureaucratic form of governance. Of particular importance for evaluating theories of state origins are cases of primary state formation, whereby a first-generation state evolves without contact with any preexisting states. A general model of this process, the territorial-expansion model, is presented and assessed with archaeological data from six areas where primary states emerged in antiquity: Mesoamerica, Peru, Egypt, Mesopotamia, the Indus Valley, and China. In each case, the evidence shows a close correspondence in time between the first appearance of state institutions and the earliest expansion of the state's political-economic control to regions lying more than a day's round-trip from the capital. Although additional research will add detail and clarity to the empirical record, the results to date are consistent with the territorial-expansion model, which argues that the success of such long-distance expansion not only demanded the bureaucratization of central authority but also helped provide the resources necessary to underwrite this administrative transformation.

  8. Thermal expansion absorbing structure for pipeline

    International Nuclear Information System (INIS)

    Nagata, Takashi; Yamashita, Takuya.

    1995-01-01

    A thermal expansion absorbing structure for a pipeline is disposed to the end of pipelines to form a U-shaped cross section connecting a semi-circular torus shell and a short double-walled cylindrical tube. The U-shaped longitudinal cross-section is deformed in accordance with the shrinking deformation of the pipeline and absorbs thermal expansion. Namely, since the central lines of the outer and inner tubes of the double-walled cylindrical tube deform so as to incline, when the pipeline is deformed by thermal expansion, thermal expansion can be absorbed by a simple configuration thereby enabling to contribute to ensure the safety. Then, the entire length of the pipeline can greatly be shortened by applying it to the pipeline disposed in a high temperature state compared with a method of laying around a pipeline using only elbows, which has been conducted so far. Especially, when it is applied to a pipeline for an FBR-type reactor, the cost for the construction of a facility of a primary systems can greater be reduced. In addition, it can be applied to a pipeline for usual chemical plants and any other structures requiring absorption of deformation. (N.H.)

  9. The asymptotic expansion method via symbolic computation

    OpenAIRE

    Navarro, Juan F.

    2012-01-01

    This paper describes an algorithm for implementing a perturbation method based on an asymptotic expansion of the solution to a second-order differential equation. We also introduce a new symbolic computation system which works with the so-called modified quasipolynomials, as well as an implementation of the algorithm on it.

  10. The Asymptotic Expansion Method via Symbolic Computation

    Directory of Open Access Journals (Sweden)

    Juan F. Navarro

    2012-01-01

    Full Text Available This paper describes an algorithm for implementing a perturbation method based on an asymptotic expansion of the solution to a second-order differential equation. We also introduce a new symbolic computation system which works with the so-called modified quasipolynomials, as well as an implementation of the algorithm on it.

  11. Discrete expansions of continuum wave functions

    International Nuclear Information System (INIS)

    Bang, J.; Ershov, S.N.; Gareev, F.A.; Kazacha, G.S.

    1980-01-01

    Different methods of expanding continuum wave functions in terms of discrete basis sets are discussed. The convergence properties of these expansions are investigated, both from a mathematical and a numerical point of view, for the case of potentials of Woods-Saxon and square well type. (orig.)

  12. Phase transition from strong-coupling expansion

    International Nuclear Information System (INIS)

    Polonyi, J.; Szlachanyi, K.

    1982-01-01

    Starting with quarkless SU(2) lattice gauge theory and using the strong-coupling expansion we calculate the action of the effective field theory which corresponds to the thermal Wilson loop. This effective action makes evident that the quark liberating phase transition traces back to the spontaneous breaking of a global Z(2) symmetry group. It furthermore describes both phases qualitatively. (orig.)

  13. On Learning Ring-Sum-Expansions

    DEFF Research Database (Denmark)

    Fischer, Paul; Simon, H. -U.

    1992-01-01

    The problem of learning ring-sum-expansions from examples is studied. Ring-sum-expansions (RSE) are representations of Boolean functions over the base {#123;small infinum, (+), 1}#125;, which reflect arithmetic operations in GF(2). k-RSE is the class of ring-sum-expansions containing only monomials...... of length at most k:. term-RSE is the class of ring-sum-expansions having at most I: monomials. It is shown that k-RSE, k>or=1, is learnable while k-term-RSE, k>2, is not learnable if RPnot=NP. Without using a complexity-theoretical hypothesis, it is proven that k-RSE, k>or=1, and k-term-RSE, k>or=2 cannot...... be learned from positive (negative) examples alone. However, if the restriction that the hypothesis which is output by the learning algorithm is also a k-RSE is suspended, then k-RSE is learnable from positive (negative) examples only. Moreover, it is proved that 2-term-RSE is learnable by a conjunction...

  14. Regulatory Holidays and Optimal Network Expansion

    NARCIS (Netherlands)

    Willems, Bert; Zwart, Gijsbert

    2016-01-01

    We model the optimal regulation of continuous, irreversible, capacity expansion, in a model in which the regulated network firm has private information about its capacity costs, investments need to be financed out of the firm’s cash flows from selling network access and demand is stochastic. If

  15. On the Convergence of the Virial Expansion

    NARCIS (Netherlands)

    Ramawadh, S.D.

    2015-01-01

    The virial expansion appears in statistical mechanics, an area where physics and mathematics intersect. Throughout this thesis we will mostly ignore the physics and mainly focus on the mathematical aspects. This is a deliberate choice, made for two reasons. Firstly, there are several books that

  16. The optimizied expansion method for wavefield extrapolation

    KAUST Repository

    Wu, Zedong; Alkhalifah, Tariq Ali

    2013-01-01

    , for inhomogeneous media, we face difficulties in dealing with the mixed space-wavenumber domain operator.In this abstract, we propose an optimized expansion method that can approximate this operator with its low rank representation. The rank defines the number

  17. Asymptotic expansions for the Gaussian unitary ensemble

    DEFF Research Database (Denmark)

    Haagerup, Uffe; Thorbjørnsen, Steen

    2012-01-01

    Let g : R ¿ C be a C8-function with all derivatives bounded and let trn denote the normalized trace on the n × n matrices. In Ref. 3 Ercolani and McLaughlin established asymptotic expansions of the mean value ¿{trn(g(Xn))} for a rather general class of random matrices Xn, including the Gaussian U...

  18. Analytic continuation and perturbative expansions in QCD

    Czech Academy of Sciences Publication Activity Database

    Caprini, I.; Fischer, Jan

    2002-01-01

    Roč. 24, - (2002), s. 127-135 ISSN 1434-6044 R&D Projects: GA MPO RP-4210/69 Institutional research plan: CEZ:AV0Z1010920 Keywords : perturbative expansion * quantum chromodynamics * infrared ambiguity * essential singularities Subject RIV: BF - Elementary Particles and High Energy Physics Impact factor: 6.162, year: 2002

  19. A Pedagogical Approach to the Magnus Expansion

    Science.gov (United States)

    Blanes, S.; Casas, F.; Oteo, J. A.; Ros, J.

    2010-01-01

    Time-dependent perturbation theory as a tool to compute approximate solutions of the Schrodinger equation does not preserve unitarity. Here we present, in a simple way, how the "Magnus expansion" (also known as "exponential perturbation theory") provides such unitary approximate solutions. The purpose is to illustrate the importance and…

  20. Thermal Expansion Anomaly Regulated by Entropy

    Science.gov (United States)

    Liu, Zi-Kui; Wang, Yi; Shang, Shunli

    2014-11-01

    Thermal expansion, defined as the temperature dependence of volume under constant pressure, is a common phenomenon in nature and originates from anharmonic lattice dynamics. However, it has been poorly understood how thermal expansion can show anomalies such as colossal positive, zero, or negative thermal expansion (CPTE, ZTE, or NTE), especially in quantitative terms. Here we show that changes in configurational entropy due to metastable micro(scopic)states can lead to quantitative prediction of these anomalies. We integrate the Maxwell relation, statistic mechanics, and first-principles calculations to demonstrate that when the entropy is increased by pressure, NTE occurs such as in Invar alloy (Fe3Pt, for example), silicon, ice, and water, and when the entropy is decreased dramatically by pressure, CPTE is expected such as in anti-Invar cerium, ice and water. Our findings provide a theoretic framework to understand and predict a broad range of anomalies in nature in addition to thermal expansion, which may include gigantic electrocaloric and electromechanical responses, anomalously reduced thermal conductivity, and spin distributions.